SlideShare a Scribd company logo
1 of 59
Download to read offline
REDUCING RISK OF
RANSOMWARE ATTACKS
– Tightening security
posture with micro-
segmentation
Have you already started a micro-segmentation
project in your organization?
• Yes, we’ve completed our micro-segmentation project
• Yes, we are currently in the midst of a micro-segmentation
project
• No, but it is in our roadmap
• No, and we don’t plan to in the near future
2 | Confidential
POLL
LET’S INTRODUCE OUR SPEAKERS
HUIB KLAASSENS
BDM
JAN HEIJDRA
TECHNOLOGY EVANGELIST
YITZY TANNENBAUM
PRODUCT MARKETING MANAGER
JAN HEIJDRA – CISCO SECURITY
Enterprise Mobility
Management
Network Traffic Security Analytics
(Cloud) Workload
Protection
Web
Security
Email
Security
Advanced
Threat
Secure
SD-WAN / Routers
Identity and Network
Access Control
Secure Internet
Gateway
Switches and
Access Points
Next-Gen
FW/IPS
Cloud Access Security
2 | Confidential
YITZY TANNENBAUM – ALGOSEC OVERVIEW
Founded 2004
1800+ Enterprise Customers
Serving 20 of the Fortune 50
24/7 Support via 3 Global Centers
ISO 27001 Certified
Passionate about Customer Satisfaction
FORTUNE
50
ISO
27001
2004
HUIB KLAASSENS – METSI TECHNOLOGIES
SECURITY SERVICES
SOC Services
• SOC Build, Operate and Optimization
• Security Devices (ASA, FP, FTD, AMP,
Third Party FWs, IPS)
• Switches, Servers, Endpoints,
• Managed ISE
• Managed AMP
• Cloud Security Monitoring
Security Consulting
• Network Architecture
Assessment
• Cloud Security Assessment
• Gap Assessment (NIST-800)
• Pen Testing
• Security Optimization
• Incident Response
• Forensics
• Malware Readiness Assessment
for Endpoint, Network and DC
• AMP (Endpoints, Network)
• Incident Response
Next Generation Firewall Services
(Cisco ASA and FirePOWER Threat Defense)
• Firewall Policy Reviews and Optimization
• Design and Deployments
• Migrations (from old Cisco Firewalls and Third-Party
Firewalls to Cisco ASA/FTD)
• Operate
• Compliance
• On-Prem, DC and Cloud
Network Access Control (Cisco ISE)
and Segmentations
• Workshops
• Proof of Value/POC and Pilot Deployment
• Enterprise Rollout
• Post Deployment optimization and Support
• ACS to ISE Migration
• Network Segmentation (TrustSec)
• SDA (DNA Center)
Malware Protection
AGENDA
Microsegmentation
1
2
3
4
Reducing the attack surface
How it’s done
What to do next?
9 | Confidential
MICROSEGMENTATION WITH CISCO
SECURE WORKLOAD (TETRATION)
10
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco Zero Trust – Segmentation
Secure the Workforce
With Duo
User-bound Device Access
Secure Your Workloads
With Tetration
Workload Access
Servers
Apps
Databases
SaaS
Data Center
Application
Access
Secure the Workplace
With SD-Access
Network Access
User & Devices
IoT Devices
Wireless
Network
Traffic
Corporate Network
WAN
Routing
+
All Corp IT
11
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Core East-West
Firewall Challenges
(a.k.a. the PAIN!)
• Traffic has to get through the firewall!!
• Traditional firewalls are bottlenecks and are
worse in the cloud
• Every cloud is different
• Cloud-native controls have limited scale
• When new segmentation is needed, policy is
unknown
• Policy is static while applications are dynamic.
This requires change requests.
• Limited visibility required for compliance and
troubleshooting App-to-App traffic
• What about edge computing?
• Where do I start?
12
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Somewhat
• Is host based necessary to protect lateral movement?
- Absolutely, we (Cisco) have been saying that for years
• Is host based the best option for modern workloads (Cloud, Containers)?
- Yes! The scale and rate of change can’t be efficiently supported by hardware
• Can you remove a firewall from the picture?
- Absolutely… NOT! Have you tried blocking 10 Gbps of traffic with software?
Ok… So… What are we saying?
13
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Deploying Firewalls for Workloads
Defense in Depth
End-User to Application
Workload to Internet
App
to
App
Deploy Firewalling FTD/SASE
IPS and Internet URL Filtering are often Required
Alternative positioning is End-to-End Zero Trust with Tetration
and ISE
Deploy Secure Workload
Throughput Scale, Policy Automation, and Policy Discovery are
Requirements. IPS can be selectively provided with SDN re-direction.
Secure Workload: Tetration
15
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
What does Tetration do:
• Micro-segmentation (Firewall++ for your App Workloads)
• Cloud Workload Protection Platform
How and what else do we do:
• Automatically discover your E/W and N/S security policy
• Deeper workload protection
• Forensics
• Vulnerability detection
Any cloud, Any Infrastructure – Real Time Enforcement
– as your applications evolve
Secure Workload Use Cases
16
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
• Number 1 problem we see? Trying to get to microsegmentation in 1-shot (Boiling
the ocean)
• Guaranteed Failure
• Guaranteed Rollback
• Guaranteed unhappy life
• Microsegmentation is a Journey, it is achievable when you take a step by step
approach
• So where do we start….
Microsegmentation Journey
17
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Step 1 – Zone Based
Group 1
Group 2
Group 3
BM
VM
C
Bare Metal Server
Virtual Machine
Container
VM BM
VM C C
BM
C BM
BM VM VM
VM
C VM
C VM C
C
BM BM
VM BM C
BM
C BM
VM BM VM
BM
VM BM
BM C C
VM
Firewall
VM BM
VM C
C
BM
C
BM
BM VM
VM
VM
C
VM
C VM
C
C BM BM
VM
BM
C
BM
C BM
VM BM
VM
BM
VM BM
BM
C
C
VM
Firewall
Firewall
Firewall
Zone Based
Segmentation
18
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
What is zone based segmentation
Production workloads cannot talk to development
workloads
Cisco Tetration knows
which are production
workloads
Cisco Tetration knows
which ones are
development workloads
Policies are continuously updated
as new servers are added, servers
moved or IP addresses changes
Production workloads and development workloads context provided to Tetration through tags
19
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Step 2 – Inter Application Based
Group 1
Group 2
Group 3
BM
VM
C
Bare Metal Server
Virtual Machine
Container
VM BM
VM C
C
BM
C
BM
BM VM
VM
VM
C
VM
C VM
C
C
BM BM
VM
BM
C
BM
C BM
VM BM
VM
BM
VM BM
BM
C
C
VM
VM BM
VM C
C
BM
C
BM
BM VM
VM
VM
C
VM
C VM
C
C
BM BM
VM
BM
C
BM
C
BM
VM
BM
VM
BM
VM BM
BM
C
C
VM
Application
Based
Segmentation
20
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
What is application based segmentation
Only production app servers can talk to production
database servers
Cisco Tetration knows
which are production
app server workloads
Cisco Tetration knows
which ones are
production database
workloads
Policies are continuously updated
as new servers are added, servers
moved or IP addresses changes
Production app and database workloads context provided to Tetration through tags
21
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Step 3 –Microsegmentation
Group 1
Group 2
Group 3
BM
VM
C
Bare Metal Server
Virtual Machine
Container
VM BM
VM C
C
BM
C
BM
BM VM
VM
VM
C
VM
C VM
C
C
BM BM
VM
BM
C
BM
C
BM
VM
BM
VM
BM
VM BM
BM
C
C
VM
Micro
Segmentation
VM BM
VM C
C
BM
C
BM
BM VM
VM
VM
C
VM
C VM
C
C
BM BM
VM
BM
C
BM
C
BM
VM
BM
VM
BM
VM BM
BM
C
C
VM
22
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
• Key challenge with microsegmentation journey is managing the policy lifecycle
• It is not trivial and it cannot be done manually
• That is where application dependency mapping becomes important in Step-2 and Step-3
• Step-2: Inter application based segmentation
• ADM is used to identify inter application communications, shared services and other infrastructure services
• Communication behavior between these applications and shared services are discovered
• This becomes the foundation for the inter application policy
• Step-3: Microsegmentation
• ADM plays an even more pivotal role in identifying different tiers within an application (Web, DB, etc.,)
• Communication behavior between these tiers
• Autogenerating the microsegmentation policy based on the behavior of these various application components
Why do we need Application Dependency Mapping
(ADM)?
23
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Application dependency and cluster grouping
Bare-metal, VM,
and switch telemetry
Bare-metal
and VM telemetry
VM telemetry (AMI …)
Bare metal and VM
BM VM VM BM
Brownfield
✓
✓
✓
✓
On-premises and
cloud workloads
(any public or private cloud)
BM VM VM BM
✓
✓
✓
✓
VM BM
VM C C
BM
C BM
BM VM VM
VM
C VM
C VM C
C
BM BM
VM BM C
BM
C BM
VM BM VM
BM
VM BM
BM C C
VM
Unsupervised
machine learning
Behavior analysis
Network-only sensors, host-only
sensors, or both (preferred)
BM VM VM VM BM
Cisco Nexus® 9000 Series ✓
Group 1
Group 2
Group 3
BM
VM
C
Bare Metal Server
Virtual Machine
Container
Cisco Tetration
24
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Application dependency – cluster view
Cluster view provides a quick snapshot
of communication between the
application components
Drill down into an application cluster to view
• Number of elements in the cluster
• Intra-cluster communication
• Communication between cluster element to other application
components
Select a cluster member to look at
• Ports to process bindings on which services
are provided
• Distinctive processes running on the workload
25
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Secure Application Segmentation
Made Easy with Cisco Tetration
Full-Lifecycle policy Discovery, Management and Enforcement
Step 3. Validate policy through
simulation
Step 4. Enforces policy
Step 5. Compliance monitoring,
audit, alerting
Step 2. Map application dependencies
and generate policy
Step 1: Auto-discover
heterogenous workloads
Segmentation projects
that don’t last YEARS
Significant reduction in security
rule management
Significant reduction in
attack surface
Faster time to value
Cisco Tetration™ Platform
26
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Automatic
Inventory
Tagging
Flexible
Policy
Hierarchy
Alert on
deviations
Alert on
deviations
Advanced
Policies
Cisco Tetration Policy Lifecycle
99% Automation of Policy Discovery, Management and Enforcement
Zero Trust - Micro-segmentation
is not a product, it’s a process
Gradual implementation across any infrastructure
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential – Zero Trust for Workload - jheijdra
27
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
#SUNBURST
Cisco’s official response page
https://tools.cisco.com/security/center/reso
urces/solarwinds_orion_event_response
Secure Workload SUNBURST blog
https://blogs.cisco.com/security/cisco-secure-
workload-immediate-actions-in-response-to-
sunburst-trojan-and-backdoor
Talos threat intel
SUNBURST blog
https://blog.talosintelligence.co
m/2020/12/solarwinds-
supplychain-coverage.html
28
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
SUNBURST– Secure Workload
Identify compromised assets
• Cisco Secure Workload can identify compromised assets via three methods:
1. Presence of installed package
2. Presence of running process (either name or hash)
3. Presence of loaded libraries (DLLs)
1. Identifying workloads with affected SolarWinds package installed,
regardless of whether it is running in memory or not 3. identifying workloads with affected SolarWinds
processes based on published DLL hash signatures
2. identifying workloads with affected SolarWinds
processes based on published process hash
signatures
29
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
SUNBURST – Secure Wokrload
Restrict traffic (prevent communication and lateral movement)
• A Cisco Secure Workload policy includes a dynamic
set of source and destinations, defined here by
workloads that have been detected to have
SolarWinds software and an action, which in this
case is to restrict any network traffic.
• More fine grained methods of restricting traffic:
https://documentation.solarwinds.com/en/Success_Center/orionplatfor
m/Content/core-solarwinds-port-requirements.htm#Ports
What is your main challenge when rolling out a
micro-segmentation project in your organization?
• Complex network, lack of visibility
• Defining the segments based on application dependency
• Make the policy changes required to create the segments
• Not enough manpower / time
30 | Confidential
POLL
STEPPING STONES
3
1
Financial
Database
HVAC
Control
Partner
Network
Procurement
Department
Internet
Step 0
STEPPING STONES
3
2
Financial
Database
HVAC
Control
Partner
Network
Procurement
Department
Internet
Step 0
Step 1
STEPPING STONES
3
3
Financial
Database
HVAC
Control
Partner
Network
Procurement
Department
Internet
Step 0
Step 1 Step 2 Step 3
STEPPING STONES
3
4
Financial
Database
HVAC
Control
Partner
Network
Procurement
Department
Internet
Step 0
Step 1 Step 2 Step 3
Pay $$$$ or lose data
35 | Confidential
REDUCING THE ATTACK SURFACE
MICRO-SEGMENTATION: A BLUEPRINT
• Define network segments to control east-west traffic
• Activate traffic filters crossing segments
• Traffic fully inside a segment can flow freely
• Write restrictive policies for traffic crossing segment borders
36
CONTROL EAST-WEST TRAFFIC
Financial
Database
HVAC
Control
Partner
Network
Procurement
Department
Internet
Easy, right?
37
TRADITIONAL EXCUSES IN A TRADITIONAL DATA CENTER
Use standard or virtualized firewalls
Requires:
• Reassigning IP addresses
• Making routing changes
• Defining new VLANs
• Possibly connecting new cables
Hard Work!
38
SOFTWARE-DEFINED DATA CENTERS
• Comes with filtering capabilities inside the networking fabric
• Reassigning IP addresses
• Making routing changes
• Defining new VLANs
• Possibly connecting new cables
• On-premise data center:
• Cisco ACI
• VMware NSX
• Public cloud:
• Amazon AWS
• Microsoft Azure
Old excuses are gone!
Technology is just the 1st step.
You still need to configure it!
39
NEXT CHALLENGES
• Where to place the segment boundaries?
• What filtering policy should you write ?
• So all legitimate business traffic is allowed!
• To do this – you just need to know all the legitimate traffic in the
data center, so you can write policy allowing it.
Naturally, you have perfectly accurate records
of all the application flows running through
the data center, so it’s easy. right?
40
FOR EVERYONE ELSE: APPLICATION DISCOVERY
• Need to:
• Detect all the network flows
• Annotate them with application name (“intent”)
• Aggregate & optimize “thin” flows into “fat” flows
• Put them in the filtering policy
• How:
• Netflow > AlgoSec AutoDiscovery
• Or Cisco Tetration
• Import into AlgoSec AppViz
• Results:
• Micro-segmentation knowhow
• Application name annotates current + future rules that support it
41
42 | Confidential
HOW IT’S DONE
44 | Confidential
45 | Confidential
46 | Confidential
Aggregate into ‘fat’ flows
47 | Confidential
48 | Confidential
49 | Confidential
50 | Confidential
51 | Confidential
52 | Confidential
53 | Confidential
55 | Confidential
WHAT TO DO NEXT?
ATTACHMENTS TAB
Connect with us on LinkedIn
Join the Raffle request a Ransomware Assessment Service
1 random winner will be selected for a free of charge assessment
Request your copy of:
• Cisco Zero Trust Security
• Ransomware Defense for dummies
Select
58 | Confidential
Q&A
59 | Confidential
THANK YOU
HUIB KLAASSENS
BDM
JAN HEIJDRA
TECHNOLOGY EVANGELIST
YITZY TANNENBAUM
PRODUCT MARKETINGMANAGER

More Related Content

What's hot

The state of the cloud csa survey webinar
The state of the cloud csa survey webinarThe state of the cloud csa survey webinar
The state of the cloud csa survey webinarAlgoSec
 
SDN's managing security across the virtual network final
SDN's managing security across the virtual network finalSDN's managing security across the virtual network final
SDN's managing security across the virtual network finalAlgoSec
 
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint WebinarCisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint WebinarAlgoSec
 
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...AlgoSec
 
More Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management SuiteMore Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management SuiteAlgoSec
 
2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solution2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solutionAlgoSec
 
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementCisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementAlgoSec
 
Managing Application Connectivity in the World of Network Security
Managing Application Connectivity in the World of Network SecurityManaging Application Connectivity in the World of Network Security
Managing Application Connectivity in the World of Network Securityshira koper
 
Application visibility across the security estate the value and the vision ...
Application visibility across the security estate   the value and the vision ...Application visibility across the security estate   the value and the vision ...
Application visibility across the security estate the value and the vision ...AlgoSec
 
Cloud migrations made simpler safe secure and successful migrations
Cloud migrations made simpler   safe secure and successful migrationsCloud migrations made simpler   safe secure and successful migrations
Cloud migrations made simpler safe secure and successful migrationsAlgoSec
 
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...AlgoSec
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar finalAlgoSec
 
2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...AlgoSec
 
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
Movin' On Up to the Cloud: How to Migrate your Application ConnectivityMovin' On Up to the Cloud: How to Migrate your Application Connectivity
Movin' On Up to the Cloud: How to Migrate your Application Connectivityshira koper
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomwareAlgoSec
 
Migrating and Managing Security in an AWS Environment- Best Practices
Migrating and Managing Security in an AWS Environment- Best PracticesMigrating and Managing Security in an AWS Environment- Best Practices
Migrating and Managing Security in an AWS Environment- Best Practicesshira koper
 
DevSecOps: Putting the Sec into the DevOps
DevSecOps: Putting the Sec into the DevOpsDevSecOps: Putting the Sec into the DevOps
DevSecOps: Putting the Sec into the DevOpsshira koper
 
Examining the Impact of Security Management on the Business (Infographic)
Examining the Impact of Security Management on the Business (Infographic)Examining the Impact of Security Management on the Business (Infographic)
Examining the Impact of Security Management on the Business (Infographic)AlgoSec
 
Tying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigationTying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigation Maytal Levi
 
Cisco aci and AlgoSec webinar
Cisco aci and AlgoSec webinar Cisco aci and AlgoSec webinar
Cisco aci and AlgoSec webinar Maytal Levi
 

What's hot (20)

The state of the cloud csa survey webinar
The state of the cloud csa survey webinarThe state of the cloud csa survey webinar
The state of the cloud csa survey webinar
 
SDN's managing security across the virtual network final
SDN's managing security across the virtual network finalSDN's managing security across the virtual network final
SDN's managing security across the virtual network final
 
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint WebinarCisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
 
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
 
More Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management SuiteMore Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management Suite
 
2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solution2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solution
 
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementCisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
 
Managing Application Connectivity in the World of Network Security
Managing Application Connectivity in the World of Network SecurityManaging Application Connectivity in the World of Network Security
Managing Application Connectivity in the World of Network Security
 
Application visibility across the security estate the value and the vision ...
Application visibility across the security estate   the value and the vision ...Application visibility across the security estate   the value and the vision ...
Application visibility across the security estate the value and the vision ...
 
Cloud migrations made simpler safe secure and successful migrations
Cloud migrations made simpler   safe secure and successful migrationsCloud migrations made simpler   safe secure and successful migrations
Cloud migrations made simpler safe secure and successful migrations
 
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
 
2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...
 
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
Movin' On Up to the Cloud: How to Migrate your Application ConnectivityMovin' On Up to the Cloud: How to Migrate your Application Connectivity
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware
 
Migrating and Managing Security in an AWS Environment- Best Practices
Migrating and Managing Security in an AWS Environment- Best PracticesMigrating and Managing Security in an AWS Environment- Best Practices
Migrating and Managing Security in an AWS Environment- Best Practices
 
DevSecOps: Putting the Sec into the DevOps
DevSecOps: Putting the Sec into the DevOpsDevSecOps: Putting the Sec into the DevOps
DevSecOps: Putting the Sec into the DevOps
 
Examining the Impact of Security Management on the Business (Infographic)
Examining the Impact of Security Management on the Business (Infographic)Examining the Impact of Security Management on the Business (Infographic)
Examining the Impact of Security Management on the Business (Infographic)
 
Tying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigationTying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigation
 
Cisco aci and AlgoSec webinar
Cisco aci and AlgoSec webinar Cisco aci and AlgoSec webinar
Cisco aci and AlgoSec webinar
 

Similar to 2021 01-27 reducing risk of ransomware webinar

Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...NetworkCollaborators
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data CenterCisco Canada
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes WebinarThousandEyes
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)Cisco Canada
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarThousandEyes
 
Cloud and the Future of Networked Systems
Cloud and the Future of Networked SystemsCloud and the Future of Networked Systems
Cloud and the Future of Networked SystemsJames Urquhart
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyesThousandEyes
 
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBETENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBECristian Garcia G.
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyesThousandEyes
 
VMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptxVMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptxAbasse KPEGOUNI
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesMichele Vecchione
 
Introduction To ThousandEyes
Introduction To ThousandEyesIntroduction To ThousandEyes
Introduction To ThousandEyesThousandEyes
 
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdfSaurabh Chauhan
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Securitypatmisasi
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyesThousandEyes
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Amazon Web Services
 

Similar to 2021 01-27 reducing risk of ransomware webinar (20)

Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes Webinar
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? Webinar
 
Cloud and the Future of Networked Systems
Cloud and the Future of Networked SystemsCloud and the Future of Networked Systems
Cloud and the Future of Networked Systems
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
 
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBETENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
 
VMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptxVMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptx
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future Challanges
 
Introduction To ThousandEyes
Introduction To ThousandEyesIntroduction To ThousandEyes
Introduction To ThousandEyes
 
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Security
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
 

More from AlgoSec

Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.AlgoSec
 
Radically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationRadically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationAlgoSec
 
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...AlgoSec
 
Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time AlgoSec
 
2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)AlgoSec
 
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentManaging Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentAlgoSec
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​AlgoSec
 
Selecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organizationSelecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organizationAlgoSec
 
2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinar2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinarAlgoSec
 
Create and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best PracticesCreate and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best PracticesAlgoSec
 

More from AlgoSec (10)

Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.
 
Radically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationRadically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertification
 
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
 
Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time
 
2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)
 
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentManaging Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
Selecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organizationSelecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organization
 
2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinar2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinar
 
Create and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best PracticesCreate and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best Practices
 

Recently uploaded

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

2021 01-27 reducing risk of ransomware webinar

  • 1. REDUCING RISK OF RANSOMWARE ATTACKS – Tightening security posture with micro- segmentation
  • 2. Have you already started a micro-segmentation project in your organization? • Yes, we’ve completed our micro-segmentation project • Yes, we are currently in the midst of a micro-segmentation project • No, but it is in our roadmap • No, and we don’t plan to in the near future 2 | Confidential POLL
  • 3. LET’S INTRODUCE OUR SPEAKERS HUIB KLAASSENS BDM JAN HEIJDRA TECHNOLOGY EVANGELIST YITZY TANNENBAUM PRODUCT MARKETING MANAGER
  • 4. JAN HEIJDRA – CISCO SECURITY Enterprise Mobility Management Network Traffic Security Analytics (Cloud) Workload Protection Web Security Email Security Advanced Threat Secure SD-WAN / Routers Identity and Network Access Control Secure Internet Gateway Switches and Access Points Next-Gen FW/IPS Cloud Access Security
  • 5. 2 | Confidential YITZY TANNENBAUM – ALGOSEC OVERVIEW Founded 2004 1800+ Enterprise Customers Serving 20 of the Fortune 50 24/7 Support via 3 Global Centers ISO 27001 Certified Passionate about Customer Satisfaction FORTUNE 50 ISO 27001 2004
  • 6. HUIB KLAASSENS – METSI TECHNOLOGIES
  • 7. SECURITY SERVICES SOC Services • SOC Build, Operate and Optimization • Security Devices (ASA, FP, FTD, AMP, Third Party FWs, IPS) • Switches, Servers, Endpoints, • Managed ISE • Managed AMP • Cloud Security Monitoring Security Consulting • Network Architecture Assessment • Cloud Security Assessment • Gap Assessment (NIST-800) • Pen Testing • Security Optimization • Incident Response • Forensics • Malware Readiness Assessment for Endpoint, Network and DC • AMP (Endpoints, Network) • Incident Response Next Generation Firewall Services (Cisco ASA and FirePOWER Threat Defense) • Firewall Policy Reviews and Optimization • Design and Deployments • Migrations (from old Cisco Firewalls and Third-Party Firewalls to Cisco ASA/FTD) • Operate • Compliance • On-Prem, DC and Cloud Network Access Control (Cisco ISE) and Segmentations • Workshops • Proof of Value/POC and Pilot Deployment • Enterprise Rollout • Post Deployment optimization and Support • ACS to ISE Migration • Network Segmentation (TrustSec) • SDA (DNA Center) Malware Protection
  • 8. AGENDA Microsegmentation 1 2 3 4 Reducing the attack surface How it’s done What to do next?
  • 9. 9 | Confidential MICROSEGMENTATION WITH CISCO SECURE WORKLOAD (TETRATION)
  • 10. 10 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Zero Trust – Segmentation Secure the Workforce With Duo User-bound Device Access Secure Your Workloads With Tetration Workload Access Servers Apps Databases SaaS Data Center Application Access Secure the Workplace With SD-Access Network Access User & Devices IoT Devices Wireless Network Traffic Corporate Network WAN Routing + All Corp IT
  • 11. 11 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Core East-West Firewall Challenges (a.k.a. the PAIN!) • Traffic has to get through the firewall!! • Traditional firewalls are bottlenecks and are worse in the cloud • Every cloud is different • Cloud-native controls have limited scale • When new segmentation is needed, policy is unknown • Policy is static while applications are dynamic. This requires change requests. • Limited visibility required for compliance and troubleshooting App-to-App traffic • What about edge computing? • Where do I start?
  • 12. 12 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Somewhat • Is host based necessary to protect lateral movement? - Absolutely, we (Cisco) have been saying that for years • Is host based the best option for modern workloads (Cloud, Containers)? - Yes! The scale and rate of change can’t be efficiently supported by hardware • Can you remove a firewall from the picture? - Absolutely… NOT! Have you tried blocking 10 Gbps of traffic with software? Ok… So… What are we saying?
  • 13. 13 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Deploying Firewalls for Workloads Defense in Depth End-User to Application Workload to Internet App to App Deploy Firewalling FTD/SASE IPS and Internet URL Filtering are often Required Alternative positioning is End-to-End Zero Trust with Tetration and ISE Deploy Secure Workload Throughput Scale, Policy Automation, and Policy Discovery are Requirements. IPS can be selectively provided with SDN re-direction.
  • 15. 15 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential What does Tetration do: • Micro-segmentation (Firewall++ for your App Workloads) • Cloud Workload Protection Platform How and what else do we do: • Automatically discover your E/W and N/S security policy • Deeper workload protection • Forensics • Vulnerability detection Any cloud, Any Infrastructure – Real Time Enforcement – as your applications evolve Secure Workload Use Cases
  • 16. 16 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential • Number 1 problem we see? Trying to get to microsegmentation in 1-shot (Boiling the ocean) • Guaranteed Failure • Guaranteed Rollback • Guaranteed unhappy life • Microsegmentation is a Journey, it is achievable when you take a step by step approach • So where do we start…. Microsegmentation Journey
  • 17. 17 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Step 1 – Zone Based Group 1 Group 2 Group 3 BM VM C Bare Metal Server Virtual Machine Container VM BM VM C C BM C BM BM VM VM VM C VM C VM C C BM BM VM BM C BM C BM VM BM VM BM VM BM BM C C VM Firewall VM BM VM C C BM C BM BM VM VM VM C VM C VM C C BM BM VM BM C BM C BM VM BM VM BM VM BM BM C C VM Firewall Firewall Firewall Zone Based Segmentation
  • 18. 18 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential What is zone based segmentation Production workloads cannot talk to development workloads Cisco Tetration knows which are production workloads Cisco Tetration knows which ones are development workloads Policies are continuously updated as new servers are added, servers moved or IP addresses changes Production workloads and development workloads context provided to Tetration through tags
  • 19. 19 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Step 2 – Inter Application Based Group 1 Group 2 Group 3 BM VM C Bare Metal Server Virtual Machine Container VM BM VM C C BM C BM BM VM VM VM C VM C VM C C BM BM VM BM C BM C BM VM BM VM BM VM BM BM C C VM VM BM VM C C BM C BM BM VM VM VM C VM C VM C C BM BM VM BM C BM C BM VM BM VM BM VM BM BM C C VM Application Based Segmentation
  • 20. 20 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential What is application based segmentation Only production app servers can talk to production database servers Cisco Tetration knows which are production app server workloads Cisco Tetration knows which ones are production database workloads Policies are continuously updated as new servers are added, servers moved or IP addresses changes Production app and database workloads context provided to Tetration through tags
  • 21. 21 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Step 3 –Microsegmentation Group 1 Group 2 Group 3 BM VM C Bare Metal Server Virtual Machine Container VM BM VM C C BM C BM BM VM VM VM C VM C VM C C BM BM VM BM C BM C BM VM BM VM BM VM BM BM C C VM Micro Segmentation VM BM VM C C BM C BM BM VM VM VM C VM C VM C C BM BM VM BM C BM C BM VM BM VM BM VM BM BM C C VM
  • 22. 22 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential • Key challenge with microsegmentation journey is managing the policy lifecycle • It is not trivial and it cannot be done manually • That is where application dependency mapping becomes important in Step-2 and Step-3 • Step-2: Inter application based segmentation • ADM is used to identify inter application communications, shared services and other infrastructure services • Communication behavior between these applications and shared services are discovered • This becomes the foundation for the inter application policy • Step-3: Microsegmentation • ADM plays an even more pivotal role in identifying different tiers within an application (Web, DB, etc.,) • Communication behavior between these tiers • Autogenerating the microsegmentation policy based on the behavior of these various application components Why do we need Application Dependency Mapping (ADM)?
  • 23. 23 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Application dependency and cluster grouping Bare-metal, VM, and switch telemetry Bare-metal and VM telemetry VM telemetry (AMI …) Bare metal and VM BM VM VM BM Brownfield ✓ ✓ ✓ ✓ On-premises and cloud workloads (any public or private cloud) BM VM VM BM ✓ ✓ ✓ ✓ VM BM VM C C BM C BM BM VM VM VM C VM C VM C C BM BM VM BM C BM C BM VM BM VM BM VM BM BM C C VM Unsupervised machine learning Behavior analysis Network-only sensors, host-only sensors, or both (preferred) BM VM VM VM BM Cisco Nexus® 9000 Series ✓ Group 1 Group 2 Group 3 BM VM C Bare Metal Server Virtual Machine Container Cisco Tetration
  • 24. 24 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Application dependency – cluster view Cluster view provides a quick snapshot of communication between the application components Drill down into an application cluster to view • Number of elements in the cluster • Intra-cluster communication • Communication between cluster element to other application components Select a cluster member to look at • Ports to process bindings on which services are provided • Distinctive processes running on the workload
  • 25. 25 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Secure Application Segmentation Made Easy with Cisco Tetration Full-Lifecycle policy Discovery, Management and Enforcement Step 3. Validate policy through simulation Step 4. Enforces policy Step 5. Compliance monitoring, audit, alerting Step 2. Map application dependencies and generate policy Step 1: Auto-discover heterogenous workloads Segmentation projects that don’t last YEARS Significant reduction in security rule management Significant reduction in attack surface Faster time to value Cisco Tetration™ Platform
  • 26. 26 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Automatic Inventory Tagging Flexible Policy Hierarchy Alert on deviations Alert on deviations Advanced Policies Cisco Tetration Policy Lifecycle 99% Automation of Policy Discovery, Management and Enforcement Zero Trust - Micro-segmentation is not a product, it’s a process Gradual implementation across any infrastructure © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential – Zero Trust for Workload - jheijdra
  • 27. 27 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential #SUNBURST Cisco’s official response page https://tools.cisco.com/security/center/reso urces/solarwinds_orion_event_response Secure Workload SUNBURST blog https://blogs.cisco.com/security/cisco-secure- workload-immediate-actions-in-response-to- sunburst-trojan-and-backdoor Talos threat intel SUNBURST blog https://blog.talosintelligence.co m/2020/12/solarwinds- supplychain-coverage.html
  • 28. 28 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential SUNBURST– Secure Workload Identify compromised assets • Cisco Secure Workload can identify compromised assets via three methods: 1. Presence of installed package 2. Presence of running process (either name or hash) 3. Presence of loaded libraries (DLLs) 1. Identifying workloads with affected SolarWinds package installed, regardless of whether it is running in memory or not 3. identifying workloads with affected SolarWinds processes based on published DLL hash signatures 2. identifying workloads with affected SolarWinds processes based on published process hash signatures
  • 29. 29 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential SUNBURST – Secure Wokrload Restrict traffic (prevent communication and lateral movement) • A Cisco Secure Workload policy includes a dynamic set of source and destinations, defined here by workloads that have been detected to have SolarWinds software and an action, which in this case is to restrict any network traffic. • More fine grained methods of restricting traffic: https://documentation.solarwinds.com/en/Success_Center/orionplatfor m/Content/core-solarwinds-port-requirements.htm#Ports
  • 30. What is your main challenge when rolling out a micro-segmentation project in your organization? • Complex network, lack of visibility • Defining the segments based on application dependency • Make the policy changes required to create the segments • Not enough manpower / time 30 | Confidential POLL
  • 35. 35 | Confidential REDUCING THE ATTACK SURFACE
  • 36. MICRO-SEGMENTATION: A BLUEPRINT • Define network segments to control east-west traffic • Activate traffic filters crossing segments • Traffic fully inside a segment can flow freely • Write restrictive policies for traffic crossing segment borders 36
  • 38. TRADITIONAL EXCUSES IN A TRADITIONAL DATA CENTER Use standard or virtualized firewalls Requires: • Reassigning IP addresses • Making routing changes • Defining new VLANs • Possibly connecting new cables Hard Work! 38
  • 39. SOFTWARE-DEFINED DATA CENTERS • Comes with filtering capabilities inside the networking fabric • Reassigning IP addresses • Making routing changes • Defining new VLANs • Possibly connecting new cables • On-premise data center: • Cisco ACI • VMware NSX • Public cloud: • Amazon AWS • Microsoft Azure Old excuses are gone! Technology is just the 1st step. You still need to configure it! 39
  • 40. NEXT CHALLENGES • Where to place the segment boundaries? • What filtering policy should you write ? • So all legitimate business traffic is allowed! • To do this – you just need to know all the legitimate traffic in the data center, so you can write policy allowing it. Naturally, you have perfectly accurate records of all the application flows running through the data center, so it’s easy. right? 40
  • 41. FOR EVERYONE ELSE: APPLICATION DISCOVERY • Need to: • Detect all the network flows • Annotate them with application name (“intent”) • Aggregate & optimize “thin” flows into “fat” flows • Put them in the filtering policy • How: • Netflow > AlgoSec AutoDiscovery • Or Cisco Tetration • Import into AlgoSec AppViz • Results: • Micro-segmentation knowhow • Application name annotates current + future rules that support it 41
  • 42. 42 | Confidential HOW IT’S DONE
  • 43.
  • 46. 46 | Confidential Aggregate into ‘fat’ flows
  • 54.
  • 56.
  • 57. WHAT TO DO NEXT? ATTACHMENTS TAB Connect with us on LinkedIn Join the Raffle request a Ransomware Assessment Service 1 random winner will be selected for a free of charge assessment Request your copy of: • Cisco Zero Trust Security • Ransomware Defense for dummies Select
  • 59. 59 | Confidential THANK YOU HUIB KLAASSENS BDM JAN HEIJDRA TECHNOLOGY EVANGELIST YITZY TANNENBAUM PRODUCT MARKETINGMANAGER