CLOSING THE GAP - TechWorld Event CLOSING THE GAP Christofer Tibbelin Sأ¤kerhetsarkitekt ...

download CLOSING THE GAP - TechWorld Event CLOSING THE GAP Christofer Tibbelin Sأ¤kerhetsarkitekt  @cygate.se

of 16

  • date post

    27-Jun-2020
  • Category

    Documents

  • view

    1
  • download

    0

Embed Size (px)

Transcript of CLOSING THE GAP - TechWorld Event CLOSING THE GAP Christofer Tibbelin Sأ¤kerhetsarkitekt ...

  • Changing the equation with Cisco Security

    CLOSING THE GAP

    Christofer Tibbelin

    Säkerhetsarkitekt

    christofer.tibbelin@cygate.se

    Chung-wai Lee

    Säkerhetsspecialist

    chungwle@cisco.com

  • AGENDA

    • Trendspaning

    • Är säkerhetsarbetet annorlunda idag?

    • Vad lägger Cisco sitt krut?

    • Kundcase

    • Summering

  • 4-YEAR OLD RANSOMWARE MILLIONAIRE

    #evilpumpkin

  • MEGATRENDS DISRUPTING TRADITIONAL SECURITY THINKING

    Cloud Adoption

    Internet of Things

    Internet is going dark

  • IT IS NOT A SIDE BUSINESS ANYMORE.

    IT Usage

    IT Requirements

    IT Expectation

  • SECURITY IS NOT A PATCH WORK

  • SECURITY IS NOT A PATCH WORK

    • Network Security

    • Client Security

    • Server Security

    • Application Security

    • Data Security

    • Development Security

    • Physical Security

    Important that

    these work together

    Architecture instead of point solutions

  • IT-SECURITY’S BUILDING BLOCKS

    Confidentiality Integrity

    AvailabilityTraceability

    Compliance

  • Early Detection

    Accurate Scoping

    Proper Containment

    Reassess Defences

    ENHANCE YOUR SECURITY CAPABILITY

    Security

    Effectiveness

  • CISCO SECURITY ARCHITECTURE

    – Threat Intelligence

    Services

    Integrated Threat Defense

    Endpoint CloudNetwork

  • A REAL LIFE EXAMPLE

    Zero-day attack

    unknown to Anti-virus

    4. Launch ransomware

    & encrypt data

    Domains registered

    only hours before the

    attack

    News site 1. Reading news

    Ransomware

    Key Server 5. Post cryptokey

    Malwartising

    site 3. Redirect and Download file

    2. Go and fetch ad

    A client

    vulnerability

  • HOW CYGATE & CISCO SOLVE THIS ATTACK

    News site

    Ransomware

    Key Server

    Malwartising

    site

    Block and trace with cloud

    Trace and quarantine device with network

    Block and trace with endpoint

  • THE SECURITY EFFECTIVENESS GAP

  • CISCO SECURITY CLOSES THE GAP and Changing the Equation

  • HOW IS YOUR SECURITY?

    How do you control who gets onto

    your network?

    How do you find and contain problems fast?

    How do you simplify network segmentation?

    How do you protect users

    wherever they work?

    How do you stop threats

    at the edge?

  • BETTER TOGETHER