CLOSING THE GAP - TechWorld Event · CLOSING THE GAP Christofer Tibbelin Säkerhetsarkitekt...

Preview:

Citation preview

Changing the equation with Cisco Security

CLOSING THE GAP

Christofer Tibbelin

Säkerhetsarkitekt

christofer.tibbelin@cygate.se

Chung-wai Lee

Säkerhetsspecialist

chungwle@cisco.com

AGENDA

• Trendspaning

• Är säkerhetsarbetet annorlunda idag?

• Vad lägger Cisco sitt krut?

• Kundcase

• Summering

4-YEAR OLD RANSOMWARE MILLIONAIRE

#evilpumpkin

MEGATRENDS DISRUPTING TRADITIONAL SECURITY THINKING

Cloud Adoption

Internet of Things

Internet is going dark

IT IS NOT A SIDE BUSINESS ANYMORE.

IT Usage

IT Requirements

IT Expectation

SECURITY IS NOT A PATCH WORK

SECURITY IS NOT A PATCH WORK

• Network Security

• Client Security

• Server Security

• Application Security

• Data Security

• Development Security

• Physical Security

Important that

these work together

Architecture instead of

point solutions

IT-SECURITY’S BUILDING BLOCKS

Confidentiality Integrity

AvailabilityTraceability

Compliance

Early Detection

Accurate Scoping

Proper Containment

Reassess Defences

ENHANCE YOUR SECURITY CAPABILITY

Security

Effectiveness

CISCO SECURITY ARCHITECTURE

– Threat Intelligence

Services

Integrated Threat Defense

Endpoint CloudNetwork

A REAL LIFE EXAMPLE

Zero-day attack

unknown to Anti-virus

4. Launch ransomware

& encrypt data

Domains registered

only hours before the

attack

News site1. Reading news

Ransomware

Key Server 5. Post cryptokey

Malwartising

site3. Redirect and Download file

2. Go and fetch ad

A client

vulnerability

HOW CYGATE & CISCO SOLVE THIS ATTACK

News site

Ransomware

Key Server

Malwartising

site

Block and trace with cloud

Trace and quarantine device with network

Block and trace with endpoint

THE SECURITY EFFECTIVENESS GAP

CISCO SECURITY CLOSES THE GAPand Changing the Equation

HOW IS YOUR SECURITY?

How do you control who gets onto

your network?

How do you find and contain problems fast?

How do you simplify networksegmentation?

How do you protect users

wherever they work?

How do you stop threats

at the edge?

BETTER TOGETHER

Recommended