SlideShare una empresa de Scribd logo
1 de 22
Descargar para leer sin conexión
Denis Donnelly
Cybersecurity Specialist
March 2018
Cybersecurity Strategy:
An Integrated Approach
It’s a matter of trust
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Can the Network Infrastructure be trusted?
2
Physical Isolation
Locked Cabinets
Limited staff access
Proprietary HW & SW
10 Years Ago Today
Risk
Physical Barriers
Break Down
Staff Related
Breaches Grow
Attackers are
Professional
 Nation-State
 Criminal
 Political
 Insider
 Social Engineering
 Outsourcing
 Internet
 Cloud
 Virtualization
 Open-Source
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
3BRKARC-1010
Chuck Robbins, CEO Cisco Systems
“Security is and will remain one of
our absolute highest priorities.”
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
175+
global government
certifications
150+
Cisco product lines
with Trustworthy
Technologies
80+ Red Team
20 Research Partnerships in 5 countries
70,000+
Employees
Sign Code
of Conduct
every year
14,
230
Security-specific
Enterprise
InfoSec/DP policies,
Audits
Security Advocates900+
35K+ Security Ninjas
Incident Responders100+
Mandatory Secure
Development Lifecycle
Value Chain
Security Program
Data Protection Program
Cisco Investment in Explicit Trust
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
A Security-Based
Culture
Verify Platform
Integrity
Protect the
Network
Building a Cyber-Resilient Network with
Trustworthy Systems
Embedded Security Evidence of TrustBuilt for
Today’s
Threats
Security Expertise
& Innovation
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco Trustworthy Systems Levels
Platform
Integrity
Protect
the Network
ISE StealthwatchIP Source Guard ACLs
uRPFDHCP Snooping Port Security
Device Level Attack Protection
Intrusion Detection TrustSec FnF
Security
Culture
PSIRT
Advisories
Security
Training
Product
Security
Baseline
Threat
Modeling
Open Source
Registration
Supply Chain
Management
Solution Level Attack Protection
Counterfeit
Protections
Runtime
Defenses
Secure
Boot
Modern
Crypto
Image
Signing
Hardware
Trust Anchor
Secure Device
Onboarding
OS
Validation
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco Secure Development Lifecycle (CSDL)
Perform
GAP
Analysis
Register and
Update Third
Party Software
Identify and
Address
Security
ThreatsPrevent
Security
Attacks
Detect
Security
Defects
Validate
Requirements
and Resiliency
Address risks: eliminate, mitigate,
manage
Eliminate preventable defect escapes
Use best-in-class security and data
protection/privacy tool sets
Integrate security & data protection /
privacy into build systems/workflow
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Third Party Software
Fundamentals
Minimize exposure by
• Perform gap analysis
• Establish maintenance plan
• Verify no backdoors
• Address all known vulnerabilities before FCS
Manages third party security alerts
• Register components with in a centralized database
• Contract support for critical security fixes
Planned response to security issues
• Follow established maintenance plan
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Security Awareness: Cisco Security Training
Practical application of security principles, techniques, and
implementation of role-specific CSDL elements; advanced
understanding of security concepts
Recognized security leader providing ongoing, significant contributions
internally at Cisco and externally in the industry
Lead on projects to improve product security; mentor other engineers
in increasing Security IQ
Familiarity with basic security vocabulary
and concepts; basic knowledge of Cisco
Secure Development Lifecycle
Drive change to improve trustworthiness; act upon the knowledge
within white and green belt
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco Trustworthy Systems Levels
Platform
Integrity
Protect
the Network
ISE StealthwatchIP Source Guard ACLs
uRPFDHCP Snooping Port Security
Device Level Attack Protection
Intrusion Detection TrustSec FnF
Security
Culture
PSIRT
Advisories
Security
Training
Product
Security
Baseline
Threat
Modeling
Open Source
Registration
Supply Chain
Management
Solution Level Attack Protection
Counterfeit
Protections
Runtime
Defenses
Secure
Boot
Modern
Crypto
Image
Signing
Hardware
Trust Anchor
Secure Device
Onboarding
OS
Validation
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
• Jai Vijayan, DARKReading.
Software Modification on Network Elements
“In a troubling new development, threat actors looking
for different ways to break into and remain undetected
on enterprise networks appear to have begun targeting
routers connecting businesses to the Internet.”
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
12
Image Signing: How It Works
Signing
01000101
110011
Hash Function
Signing Hash With
Cisco Private Key
Embed Signature to
the Software
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
13
Image Signing: How It Works
Verification
Hash Function 01000101
110011
Verify Signature Hash
With Cisco Public Key
01000101
110011
Hash is Compared
to Verify Authenticity
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Attacking the Boot Sequence
BIOS
Fetch
Firmware
Instruction
set
Operating System
Start-up
Operating
System
 Changing the boot interface
 Booting from alternate device
 Bypassing Integrity checks
 Adding persistent code
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Secure Boot Starts from Protected Code
Firmware Instruction Set
(Boot Code) must be
protected against an
unauthorized modification
from outside
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
 Only authentic signed
Cisco software boots up
on a Cisco platform
 The boot process stops if
any step fails to
authenticate
 IOS “show software
authenticity” command
illustrates the results
Cisco Secure Boot
Anchors Secure Boot in Hardware to Create a Chain of Trust
Cisco Secure Boot
Boot Code Integrity Anchored in Hardware
Step 1
Hardware
Anchor
Microloader
CPU
Microloader
Step 2
Microloader
checks
bootloader
CPU
Bootloader
Step 3
Bootloader
checks OS
CPU
OS
Step 4
OS launched
Software
Authenticity:
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco Trust Anchor Module (TAm)
Hardware-based Trust Anchor
 Anti-Theft & Anti-Tamper Chip Design
 Built-In Crypto Functions
 Immutable Identity with IEEE 802.1AR (Secure
UDI- X.509 cert)
 Secure Storage for Certificates and Objects
 Certifiable Entropy for Random Number Generation
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Counterfeiting is Real
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
*
*
How They Come Together: Cisco Secure Boot and
Trust Anchor module
Validating the Authenticity of Software Followed by Hardware
Step 1
Microloader
CPU
Microloader
Step 2
Microloader
checks Bootloader
CPU
Bootloader
Step 3
Bootloader
checks OS
CPU
OS
Step 4
OS launched
Trust Anchor
module
Step 5
Authenticity and
license checks
CPU
OS
Trust Anchor
module
Step 6
Trust Anchor
module provides
critical services
CPU
OS
Software authenticity check
Hardware authenticity check
* The first instructions that run on a CPU are either stored in immutable hardware so that they cannot be tampered with or are validated by the hardware
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco Trustworthy Systems
Secure by Design
Evidence
of Trust
Holistic
Approach
Security Expertise
and Innovation
Built for
Today’s Threats
Organizations require a cyber-resilient network foundation for digitization
https://trust.cisco.com
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Q & A
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Más contenido relacionado

La actualidad más candente

[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
Nur Shiqim Chok
 

La actualidad más candente (20)

Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
 
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia -  software-defined access-a transformational ap...Cisco Connect 2018 Indonesia -  software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
 
Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition
 
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformationCisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
 
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyCisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
 
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellCisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernell
 
Cisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WANCisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WAN
 
Cisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network IntuitiveCisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network Intuitive
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
 
Cisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined AccessCisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined Access
 
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
 
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy [Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
 
Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаИнтуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнеса
 
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
 
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics
 
Cisco Connect 2018 Singapore - jordan koh
Cisco Connect 2018 Singapore -  jordan kohCisco Connect 2018 Singapore -  jordan koh
Cisco Connect 2018 Singapore - jordan koh
 
Cisco connect winnipeg 2018 unlocking business value with network programma...
Cisco connect winnipeg 2018   unlocking business value with network programma...Cisco connect winnipeg 2018   unlocking business value with network programma...
Cisco connect winnipeg 2018 unlocking business value with network programma...
 
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assurance
[Cisco Connect 2018 - Vietnam] Yedu s.   introducing cisco dna assurance[Cisco Connect 2018 - Vietnam] Yedu s.   introducing cisco dna assurance
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assurance
 
Cisco Connect Halifax 2018 Accelerating incident response in organizations...
Cisco Connect Halifax 2018   Accelerating incident  response in organizations...Cisco Connect Halifax 2018   Accelerating incident  response in organizations...
Cisco Connect Halifax 2018 Accelerating incident response in organizations...
 
Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynote
 

Similar a Cisco Connect 2018 Singapore - Cybersecurity strategy

Similar a Cisco Connect 2018 Singapore - Cybersecurity strategy (20)

Mfg workshop security
Mfg workshop   securityMfg workshop   security
Mfg workshop security
 
Cisco Connect Ottawa 2018 data centre security
Cisco Connect Ottawa 2018 data centre securityCisco Connect Ottawa 2018 data centre security
Cisco Connect Ottawa 2018 data centre security
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
 
Cisco SecureX.pdf
Cisco SecureX.pdfCisco SecureX.pdf
Cisco SecureX.pdf
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dc
 
Cisco Cybersecurity #10YearChallenge
Cisco Cybersecurity #10YearChallengeCisco Cybersecurity #10YearChallenge
Cisco Cybersecurity #10YearChallenge
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOT
 
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
 
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...
 
Straight Talk on End to End Encryption and Confidentiality
Straight Talk on End to End Encryption and ConfidentialityStraight Talk on End to End Encryption and Confidentiality
Straight Talk on End to End Encryption and Confidentiality
 
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
 
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco #ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
 
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
 
[Cisco Connect 2018 - Vietnam] Eric rennie sw cisco_connect
[Cisco Connect 2018 - Vietnam] Eric rennie  sw cisco_connect[Cisco Connect 2018 - Vietnam] Eric rennie  sw cisco_connect
[Cisco Connect 2018 - Vietnam] Eric rennie sw cisco_connect
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
 
ISE-CiscoLive.pdf
ISE-CiscoLive.pdfISE-CiscoLive.pdf
ISE-CiscoLive.pdf
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
 
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 -  Security Through The Eyes of a HackerCisco Connect Toronto 2017 -  Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
 
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIsIncredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
 

Más de NetworkCollaborators

Más de NetworkCollaborators (15)

Cisco Connect 2018 Philippines - ben green
Cisco Connect 2018 Philippines -  ben greenCisco Connect 2018 Philippines -  ben green
Cisco Connect 2018 Philippines - ben green
 
Cisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights onCisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights on
 
Cisco Connect 2018 Philippines - jaymen quah
Cisco Connect 2018 Philippines - jaymen quahCisco Connect 2018 Philippines - jaymen quah
Cisco Connect 2018 Philippines - jaymen quah
 
Cisco Connect 2018 Philippines - The workplace of the future
Cisco Connect 2018 Philippines - The workplace of the futureCisco Connect 2018 Philippines - The workplace of the future
Cisco Connect 2018 Philippines - The workplace of the future
 
Cisco Connect 2018 Philippines - fay ocampo
Cisco Connect 2018 Philippines - fay ocampoCisco Connect 2018 Philippines - fay ocampo
Cisco Connect 2018 Philippines - fay ocampo
 
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
 
Cisco Connect 2018 Philippines - security keynote
Cisco Connect 2018 Philippines -   security keynoteCisco Connect 2018 Philippines -   security keynote
Cisco Connect 2018 Philippines - security keynote
 
Cisco Connect 2018 Philippines - Microsoft azure stack
Cisco Connect 2018 Philippines - Microsoft azure stackCisco Connect 2018 Philippines - Microsoft azure stack
Cisco Connect 2018 Philippines - Microsoft azure stack
 
Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...
Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...
Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...
 
Cisco Connect 2018 Philippines - cybersecurity strategy
Cisco Connect 2018 Philippines - cybersecurity strategyCisco Connect 2018 Philippines - cybersecurity strategy
Cisco Connect 2018 Philippines - cybersecurity strategy
 
Cisco Connect 2018 Philippines - next-generation customer care and the connec...
Cisco Connect 2018 Philippines - next-generation customer care and the connec...Cisco Connect 2018 Philippines - next-generation customer care and the connec...
Cisco Connect 2018 Philippines - next-generation customer care and the connec...
 
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
 Cisco Connect 2018 Philippines - software-defined access-a transformational ... Cisco Connect 2018 Philippines - software-defined access-a transformational ...
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
 
Cisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assuranceCisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assurance
 
Cisco Connect 2018 Philippines - Trends transforming it network data into bus...
Cisco Connect 2018 Philippines - Trends transforming it network data into bus...Cisco Connect 2018 Philippines - Trends transforming it network data into bus...
Cisco Connect 2018 Philippines - Trends transforming it network data into bus...
 
Cisco Connect 2018 Philippines - cisco cmx
Cisco Connect 2018 Philippines - cisco cmxCisco Connect 2018 Philippines - cisco cmx
Cisco Connect 2018 Philippines - cisco cmx
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Cisco Connect 2018 Singapore - Cybersecurity strategy

  • 1. Denis Donnelly Cybersecurity Specialist March 2018 Cybersecurity Strategy: An Integrated Approach It’s a matter of trust
  • 2. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Can the Network Infrastructure be trusted? 2 Physical Isolation Locked Cabinets Limited staff access Proprietary HW & SW 10 Years Ago Today Risk Physical Barriers Break Down Staff Related Breaches Grow Attackers are Professional  Nation-State  Criminal  Political  Insider  Social Engineering  Outsourcing  Internet  Cloud  Virtualization  Open-Source
  • 3. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3BRKARC-1010 Chuck Robbins, CEO Cisco Systems “Security is and will remain one of our absolute highest priorities.”
  • 4. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 175+ global government certifications 150+ Cisco product lines with Trustworthy Technologies 80+ Red Team 20 Research Partnerships in 5 countries 70,000+ Employees Sign Code of Conduct every year 14, 230 Security-specific Enterprise InfoSec/DP policies, Audits Security Advocates900+ 35K+ Security Ninjas Incident Responders100+ Mandatory Secure Development Lifecycle Value Chain Security Program Data Protection Program Cisco Investment in Explicit Trust
  • 5. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A Security-Based Culture Verify Platform Integrity Protect the Network Building a Cyber-Resilient Network with Trustworthy Systems Embedded Security Evidence of TrustBuilt for Today’s Threats Security Expertise & Innovation
  • 6. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Trustworthy Systems Levels Platform Integrity Protect the Network ISE StealthwatchIP Source Guard ACLs uRPFDHCP Snooping Port Security Device Level Attack Protection Intrusion Detection TrustSec FnF Security Culture PSIRT Advisories Security Training Product Security Baseline Threat Modeling Open Source Registration Supply Chain Management Solution Level Attack Protection Counterfeit Protections Runtime Defenses Secure Boot Modern Crypto Image Signing Hardware Trust Anchor Secure Device Onboarding OS Validation
  • 7. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Secure Development Lifecycle (CSDL) Perform GAP Analysis Register and Update Third Party Software Identify and Address Security ThreatsPrevent Security Attacks Detect Security Defects Validate Requirements and Resiliency Address risks: eliminate, mitigate, manage Eliminate preventable defect escapes Use best-in-class security and data protection/privacy tool sets Integrate security & data protection / privacy into build systems/workflow
  • 8. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Third Party Software Fundamentals Minimize exposure by • Perform gap analysis • Establish maintenance plan • Verify no backdoors • Address all known vulnerabilities before FCS Manages third party security alerts • Register components with in a centralized database • Contract support for critical security fixes Planned response to security issues • Follow established maintenance plan
  • 9. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Security Awareness: Cisco Security Training Practical application of security principles, techniques, and implementation of role-specific CSDL elements; advanced understanding of security concepts Recognized security leader providing ongoing, significant contributions internally at Cisco and externally in the industry Lead on projects to improve product security; mentor other engineers in increasing Security IQ Familiarity with basic security vocabulary and concepts; basic knowledge of Cisco Secure Development Lifecycle Drive change to improve trustworthiness; act upon the knowledge within white and green belt
  • 10. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Trustworthy Systems Levels Platform Integrity Protect the Network ISE StealthwatchIP Source Guard ACLs uRPFDHCP Snooping Port Security Device Level Attack Protection Intrusion Detection TrustSec FnF Security Culture PSIRT Advisories Security Training Product Security Baseline Threat Modeling Open Source Registration Supply Chain Management Solution Level Attack Protection Counterfeit Protections Runtime Defenses Secure Boot Modern Crypto Image Signing Hardware Trust Anchor Secure Device Onboarding OS Validation
  • 11. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential • Jai Vijayan, DARKReading. Software Modification on Network Elements “In a troubling new development, threat actors looking for different ways to break into and remain undetected on enterprise networks appear to have begun targeting routers connecting businesses to the Internet.”
  • 12. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 Image Signing: How It Works Signing 01000101 110011 Hash Function Signing Hash With Cisco Private Key Embed Signature to the Software
  • 13. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 Image Signing: How It Works Verification Hash Function 01000101 110011 Verify Signature Hash With Cisco Public Key 01000101 110011 Hash is Compared to Verify Authenticity
  • 14. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Attacking the Boot Sequence BIOS Fetch Firmware Instruction set Operating System Start-up Operating System  Changing the boot interface  Booting from alternate device  Bypassing Integrity checks  Adding persistent code
  • 15. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Secure Boot Starts from Protected Code Firmware Instruction Set (Boot Code) must be protected against an unauthorized modification from outside
  • 16. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential  Only authentic signed Cisco software boots up on a Cisco platform  The boot process stops if any step fails to authenticate  IOS “show software authenticity” command illustrates the results Cisco Secure Boot Anchors Secure Boot in Hardware to Create a Chain of Trust Cisco Secure Boot Boot Code Integrity Anchored in Hardware Step 1 Hardware Anchor Microloader CPU Microloader Step 2 Microloader checks bootloader CPU Bootloader Step 3 Bootloader checks OS CPU OS Step 4 OS launched Software Authenticity:
  • 17. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Trust Anchor Module (TAm) Hardware-based Trust Anchor  Anti-Theft & Anti-Tamper Chip Design  Built-In Crypto Functions  Immutable Identity with IEEE 802.1AR (Secure UDI- X.509 cert)  Secure Storage for Certificates and Objects  Certifiable Entropy for Random Number Generation
  • 18. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Counterfeiting is Real
  • 19. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential * * How They Come Together: Cisco Secure Boot and Trust Anchor module Validating the Authenticity of Software Followed by Hardware Step 1 Microloader CPU Microloader Step 2 Microloader checks Bootloader CPU Bootloader Step 3 Bootloader checks OS CPU OS Step 4 OS launched Trust Anchor module Step 5 Authenticity and license checks CPU OS Trust Anchor module Step 6 Trust Anchor module provides critical services CPU OS Software authenticity check Hardware authenticity check * The first instructions that run on a CPU are either stored in immutable hardware so that they cannot be tampered with or are validated by the hardware
  • 20. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Trustworthy Systems Secure by Design Evidence of Trust Holistic Approach Security Expertise and Innovation Built for Today’s Threats Organizations require a cyber-resilient network foundation for digitization https://trust.cisco.com
  • 21. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Q & A
  • 22. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential