SlideShare una empresa de Scribd logo
1 de 14
Descargar para leer sin conexión
Intelligent Cybersecurity 
for the Real World 
Francisco Ramirez 
Ghassan Dreibi 
Nov 5, 2014
Agenda 
Session 1 
Francisco Ramirez – Security Managing Director 
Ghassan Dreibi – Strategic & Planning BDM 
Session 2 
Carlo Davila – IDC LATAM Analyst 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
The Industrialization of Hacking 
Hacking Becomes 
an Industry 
Sophisticated Attacks, 
Complex Landscape 
Phishing, Low 
Sophistication 
1990 1995 2000 2005 2010 2015 2020 
Viruses 
1990–2000 
Worms 
2000–2005 
Spyware and Rootkits 
2005–Today 
APTs Cyberware 
Today + 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Threat Landscape Demands more than Application Control 
100% 
of companies connect 
to domains that host 
malicious files or services 
54% 
of breaches 
remain undiscovered 
for months 
60% 
of data is 
stolen in 
hours 
It is a Community 
that hides in plain sight 
avoids detection and 
attacks swiftly 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
The Pervasiveness of Malicious Traffic 
High-Threat Malware 
Hijacked Infrastructure 
Sites without Content 
Suspect FTP 
Suspect VPN 
Inappropriate Content 
100% 
96% 
92% 
88% 
79% 
50% 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
The Silver Bullet Does Not Exist 
Sandboxing 
Application 
Control 
“Detect the 
Unknown” 
“Fix the Firewall” 
“Captive portal” 
IDS/IPS 
UTM 
PKI 
“No key, no access” 
“It matches the pattern” 
NAC 
“No false positives, 
no false negatives” 
FW/VPN 
AV 
“Block or Allow” 
GSSO focuses on the totality of defending against threats 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
GSSO – Global Security Sales Organization 
A New Way to Solve Real World Security Issues 
Dedicated Security 
sales force – GSSO 
Aligned with Cisco’s 
Services, Partner 
and Sales 
Organization (Cisco) + 
Selling market 
leading technology, 
services and 
solutions across the 
entire attack 
continuum 
+ 
= 
Unmatched differentiation 
Market credibility that will amplify loyalty 
Stronger solutions across all architectures 
© 2014 2013-Cisco 2014 and/Cisco or its and/affiliates. or its affiliates. All rights All reserved. rights reserved. Cisco Confidential 7
Visibility: See More – Protect More 
Files 
Network 
Servers 
Users 
Operating 
Systems 
Web 
Applications 
Routers and 
Switches 
Application 
Protocols 
Mobile 
Devices 
Printers 
VoIP 
Phones 
Malware 
Virtual 
Machines 
Command 
and Control 
Servers 
Client 
Applications 
Services 
Vulnerabilities 
NetFlow 
Network 
Behavior 
Processes 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Cyber Security Advanced Model 
BEFORE 
Discover 
Enforce 
Harden 
AFTER 
Scope 
Contain 
Remediate 
Attack Continuum 
DURING 
Detect 
Block 
Defend 
Network Endpoint Mobile Virtual Cloud 
Point in Time Continuous 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Cyber Security Attach Continuum Approach 
DURING 
Cyber Threat Defense 
Manage Security CPE 
Solution Implementation 
Security Assessment 
Strategic Planning 
Solution Plan / Design 
Managed Threat Defense 
Custom Threat Intelligence 
Services 
Security Optimization 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Firewall 
NGFW 
NAC + Identity Services 
VPN 
UTM 
NGIPS 
Web Security 
Advanced Malware Protection 
Network Behavior Analysis 
Products 
Email Security 
BEFORE 
Discover 
Enforce 
Harden 
AFTER 
Scope 
Contain 
Remediate 
Detect 
Block 
Defend
Strategic Imperatives 
Visibility-Driven Threat-Focused Platform-Based 
Network Endpoint Mobile Virtual Cloud 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
The Security Perimeter in the Cloud 
Collective 
Security 
Intelligence 
The 
Distributed 
Perimeter 
Cloud 
Connected 
Network 
Telemetry Data Threat Research Advanced Analytics 
Mobile Router Firewall 
3M+ 
Cloud Web 
Security Users 
6GB 
Web Traffic Examined, 
Protected 
Every Hour 
75M 
Unique Hits 
Every Hour 
10M 
Blocks Enforced Every 
Hour 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Platform-Based Security Architecture 
Management 
Security Services 
and Applications 
Security Services 
Platform 
Infrastructure 
Element 
Layer 
Common Security Policy and Management 
Cisco Security Applications Third-Party Security Applications 
Context 
Awareness 
Content 
Inspection 
Application 
Visibility 
Common Security Policy & Management 
Orchestration 
Access 
Control 
Security 
Management APIs 
Cisco ONE 
APIs 
Platform 
APIs 
Threat 
Prevention 
Cloud Intelligence 
APIs 
Physical Appliance Virtual Cloud 
APIs APIs 
Device API: OnePK™, OpenFlow, CLI 
Cisco Networking Operating Systems (Enterprise, Data Center, Service Provider) 
ASIC Data Plane Route–Switch–Compute Software Data Plane 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Thank you.

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020
 
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
El Futuro de la Cibersegu
El Futuro de la CiberseguEl Futuro de la Cibersegu
El Futuro de la Cibersegu
 
Re solution - corona virus cyber security infographic
Re solution - corona virus cyber security infographicRe solution - corona virus cyber security infographic
Re solution - corona virus cyber security infographic
 
Intelligence Driven Security
Intelligence Driven SecurityIntelligence Driven Security
Intelligence Driven Security
 
Garantice la continuidad de su negocio Damian Prieto
Garantice la continuidad de su negocio   Damian PrietoGarantice la continuidad de su negocio   Damian Prieto
Garantice la continuidad de su negocio Damian Prieto
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid final
 
Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trust
 
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureCisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
 
What is Zero Trust
What is Zero TrustWhat is Zero Trust
What is Zero Trust
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
 
NG EXPERTS Services and Solutions
NG EXPERTS Services and SolutionsNG EXPERTS Services and Solutions
NG EXPERTS Services and Solutions
 
Security transformation: Helping you manage digital risk
Security transformation: Helping you manage digital riskSecurity transformation: Helping you manage digital risk
Security transformation: Helping you manage digital risk
 
SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
SAE 2014 - Cyber Security: Mission Critical for the Internet of CarsSAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
 
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy
 
Cisco connect winnipeg 2018 unlocking business value with network programma...
Cisco connect winnipeg 2018   unlocking business value with network programma...Cisco connect winnipeg 2018   unlocking business value with network programma...
Cisco connect winnipeg 2018 unlocking business value with network programma...
 

Similar a Cisco Live Cancun PR Session

apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
Chrysostomos Christofi
 

Similar a Cisco Live Cancun PR Session (20)

Cisco Content Security
Cisco Content SecurityCisco Content Security
Cisco Content Security
 
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and LancopeThe Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
 
Presentación - Cisco ASA with FirePOWER Services
Presentación -  Cisco ASA with FirePOWER ServicesPresentación -  Cisco ASA with FirePOWER Services
Presentación - Cisco ASA with FirePOWER Services
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
Cisco ASA con fire power services
Cisco ASA con fire power services Cisco ASA con fire power services
Cisco ASA con fire power services
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
 
Adaptive Trust for Strong Network Security
Adaptive Trust for Strong Network SecurityAdaptive Trust for Strong Network Security
Adaptive Trust for Strong Network Security
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
The Next Generation Security
The Next Generation SecurityThe Next Generation Security
The Next Generation Security
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin Nystrom
 
Cisco Cybersecurity #10YearChallenge
Cisco Cybersecurity #10YearChallengeCisco Cybersecurity #10YearChallenge
Cisco Cybersecurity #10YearChallenge
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Two for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content ProtectionTwo for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content Protection
 
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaProteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto Presentation
 

Más de Felipe Lamus

2015 VNI Complete Forecast Latin America
2015 VNI Complete Forecast Latin America2015 VNI Complete Forecast Latin America
2015 VNI Complete Forecast Latin America
Felipe Lamus
 
VNI Global (Andres Maz), Power Point
VNI Global (Andres Maz), Power PointVNI Global (Andres Maz), Power Point
VNI Global (Andres Maz), Power Point
Felipe Lamus
 
VNI, Informacion America Latina, Junio 11, 2014
VNI, Informacion America Latina, Junio 11, 2014VNI, Informacion America Latina, Junio 11, 2014
VNI, Informacion America Latina, Junio 11, 2014
Felipe Lamus
 

Más de Felipe Lamus (20)

2015 VNI Complete Forecast Latin America
2015 VNI Complete Forecast Latin America2015 VNI Complete Forecast Latin America
2015 VNI Complete Forecast Latin America
 
Latam 2015 VNI Mobile Media prezo
Latam 2015 VNI Mobile Media prezo Latam 2015 VNI Mobile Media prezo
Latam 2015 VNI Mobile Media prezo
 
F&S Presentation Whitepaper Cisco Services
F&S Presentation Whitepaper Cisco ServicesF&S Presentation Whitepaper Cisco Services
F&S Presentation Whitepaper Cisco Services
 
White Paper Servicios Frost & Sullivan English
White Paper Servicios Frost & Sullivan EnglishWhite Paper Servicios Frost & Sullivan English
White Paper Servicios Frost & Sullivan English
 
White Paper Frost & Sullivan Portugues
White Paper Frost & Sullivan PortuguesWhite Paper Frost & Sullivan Portugues
White Paper Frost & Sullivan Portugues
 
White Paper Servicios Frost & Sullivan
White Paper Servicios Frost & SullivanWhite Paper Servicios Frost & Sullivan
White Paper Servicios Frost & Sullivan
 
Cisco Services Strategy Press Conference final
Cisco Services Strategy Press Conference finalCisco Services Strategy Press Conference final
Cisco Services Strategy Press Conference final
 
Fast IT Mariano O'Kon, Cisco Live Cancun 2014
Fast IT Mariano O'Kon, Cisco Live Cancun 2014Fast IT Mariano O'Kon, Cisco Live Cancun 2014
Fast IT Mariano O'Kon, Cisco Live Cancun 2014
 
Fast IT Full Study Findings, Portuguese
Fast IT Full Study Findings, PortugueseFast IT Full Study Findings, Portuguese
Fast IT Full Study Findings, Portuguese
 
Fast IT Full Study Findings, Espanol
Fast IT Full Study Findings, EspanolFast IT Full Study Findings, Espanol
Fast IT Full Study Findings, Espanol
 
CCWTR Press Deck Completo
CCWTR Press Deck CompletoCCWTR Press Deck Completo
CCWTR Press Deck Completo
 
IDC, the third platform and a security perspective Latam, Cisco Live 2014
IDC, the third platform and a security perspective Latam, Cisco Live 2014IDC, the third platform and a security perspective Latam, Cisco Live 2014
IDC, the third platform and a security perspective Latam, Cisco Live 2014
 
Joseph Bradley, IoE in action, Cisco Live
Joseph Bradley, IoE in action, Cisco LiveJoseph Bradley, IoE in action, Cisco Live
Joseph Bradley, IoE in action, Cisco Live
 
Cisco Intercloud Announcement, Cisco Live 2014
Cisco Intercloud Announcement, Cisco Live 2014Cisco Intercloud Announcement, Cisco Live 2014
Cisco Intercloud Announcement, Cisco Live 2014
 
Cisco Global Cloud index Public deck 2013 2018 latam prensa
Cisco Global Cloud index Public deck 2013 2018 latam prensaCisco Global Cloud index Public deck 2013 2018 latam prensa
Cisco Global Cloud index Public deck 2013 2018 latam prensa
 
C white cisco_livecancun_nov_press
C white cisco_livecancun_nov_pressC white cisco_livecancun_nov_press
C white cisco_livecancun_nov_press
 
Presentacion Wim Elfrink IoT World Forum Chicago
Presentacion Wim Elfrink IoT World Forum ChicagoPresentacion Wim Elfrink IoT World Forum Chicago
Presentacion Wim Elfrink IoT World Forum Chicago
 
Infografia: Cisco presenta primer Firewall de próxima generación enfocado en ...
Infografia: Cisco presenta primer Firewall de próxima generación enfocado en ...Infografia: Cisco presenta primer Firewall de próxima generación enfocado en ...
Infografia: Cisco presenta primer Firewall de próxima generación enfocado en ...
 
VNI Global (Andres Maz), Power Point
VNI Global (Andres Maz), Power PointVNI Global (Andres Maz), Power Point
VNI Global (Andres Maz), Power Point
 
VNI, Informacion America Latina, Junio 11, 2014
VNI, Informacion America Latina, Junio 11, 2014VNI, Informacion America Latina, Junio 11, 2014
VNI, Informacion America Latina, Junio 11, 2014
 

Último

一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
F
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Monica Sydney
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
F
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
AS
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Monica Sydney
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 

Último (20)

一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
South Bopal [ (Call Girls) in Ahmedabad ₹7.5k Pick Up & Drop With Cash Paymen...
South Bopal [ (Call Girls) in Ahmedabad ₹7.5k Pick Up & Drop With Cash Paymen...South Bopal [ (Call Girls) in Ahmedabad ₹7.5k Pick Up & Drop With Cash Paymen...
South Bopal [ (Call Girls) in Ahmedabad ₹7.5k Pick Up & Drop With Cash Paymen...
 
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
 

Cisco Live Cancun PR Session

  • 1. Intelligent Cybersecurity for the Real World Francisco Ramirez Ghassan Dreibi Nov 5, 2014
  • 2. Agenda Session 1 Francisco Ramirez – Security Managing Director Ghassan Dreibi – Strategic & Planning BDM Session 2 Carlo Davila – IDC LATAM Analyst © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
  • 3. The Industrialization of Hacking Hacking Becomes an Industry Sophisticated Attacks, Complex Landscape Phishing, Low Sophistication 1990 1995 2000 2005 2010 2015 2020 Viruses 1990–2000 Worms 2000–2005 Spyware and Rootkits 2005–Today APTs Cyberware Today + © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
  • 4. Threat Landscape Demands more than Application Control 100% of companies connect to domains that host malicious files or services 54% of breaches remain undiscovered for months 60% of data is stolen in hours It is a Community that hides in plain sight avoids detection and attacks swiftly © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
  • 5. The Pervasiveness of Malicious Traffic High-Threat Malware Hijacked Infrastructure Sites without Content Suspect FTP Suspect VPN Inappropriate Content 100% 96% 92% 88% 79% 50% © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
  • 6. The Silver Bullet Does Not Exist Sandboxing Application Control “Detect the Unknown” “Fix the Firewall” “Captive portal” IDS/IPS UTM PKI “No key, no access” “It matches the pattern” NAC “No false positives, no false negatives” FW/VPN AV “Block or Allow” GSSO focuses on the totality of defending against threats © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
  • 7. GSSO – Global Security Sales Organization A New Way to Solve Real World Security Issues Dedicated Security sales force – GSSO Aligned with Cisco’s Services, Partner and Sales Organization (Cisco) + Selling market leading technology, services and solutions across the entire attack continuum + = Unmatched differentiation Market credibility that will amplify loyalty Stronger solutions across all architectures © 2014 2013-Cisco 2014 and/Cisco or its and/affiliates. or its affiliates. All rights All reserved. rights reserved. Cisco Confidential 7
  • 8. Visibility: See More – Protect More Files Network Servers Users Operating Systems Web Applications Routers and Switches Application Protocols Mobile Devices Printers VoIP Phones Malware Virtual Machines Command and Control Servers Client Applications Services Vulnerabilities NetFlow Network Behavior Processes © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
  • 9. Cyber Security Advanced Model BEFORE Discover Enforce Harden AFTER Scope Contain Remediate Attack Continuum DURING Detect Block Defend Network Endpoint Mobile Virtual Cloud Point in Time Continuous © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
  • 10. Cyber Security Attach Continuum Approach DURING Cyber Threat Defense Manage Security CPE Solution Implementation Security Assessment Strategic Planning Solution Plan / Design Managed Threat Defense Custom Threat Intelligence Services Security Optimization © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Firewall NGFW NAC + Identity Services VPN UTM NGIPS Web Security Advanced Malware Protection Network Behavior Analysis Products Email Security BEFORE Discover Enforce Harden AFTER Scope Contain Remediate Detect Block Defend
  • 11. Strategic Imperatives Visibility-Driven Threat-Focused Platform-Based Network Endpoint Mobile Virtual Cloud © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
  • 12. The Security Perimeter in the Cloud Collective Security Intelligence The Distributed Perimeter Cloud Connected Network Telemetry Data Threat Research Advanced Analytics Mobile Router Firewall 3M+ Cloud Web Security Users 6GB Web Traffic Examined, Protected Every Hour 75M Unique Hits Every Hour 10M Blocks Enforced Every Hour © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
  • 13. Platform-Based Security Architecture Management Security Services and Applications Security Services Platform Infrastructure Element Layer Common Security Policy and Management Cisco Security Applications Third-Party Security Applications Context Awareness Content Inspection Application Visibility Common Security Policy & Management Orchestration Access Control Security Management APIs Cisco ONE APIs Platform APIs Threat Prevention Cloud Intelligence APIs Physical Appliance Virtual Cloud APIs APIs Device API: OnePK™, OpenFlow, CLI Cisco Networking Operating Systems (Enterprise, Data Center, Service Provider) ASIC Data Plane Route–Switch–Compute Software Data Plane © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13