16
Changing the equation with Cisco Security CLOSING THE GAP Christofer Tibbelin Säkerhetsarkitekt [email protected] Chung-wai Lee Säkerhetsspecialist [email protected]

CLOSING THE GAP - TechWorld Event · CLOSING THE GAP Christofer Tibbelin Säkerhetsarkitekt [email protected] ... Go and fetch ad A client vulnerability. HOW CYGATE &

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CLOSING THE GAP - TechWorld Event · CLOSING THE GAP Christofer Tibbelin Säkerhetsarkitekt christofer.tibbelin@cygate.se ... Go and fetch ad A client vulnerability. HOW CYGATE &

Changing the equation with Cisco Security

CLOSING THE GAP

Christofer Tibbelin

Säkerhetsarkitekt

[email protected]

Chung-wai Lee

Säkerhetsspecialist

[email protected]

Page 2: CLOSING THE GAP - TechWorld Event · CLOSING THE GAP Christofer Tibbelin Säkerhetsarkitekt christofer.tibbelin@cygate.se ... Go and fetch ad A client vulnerability. HOW CYGATE &

AGENDA

• Trendspaning

• Är säkerhetsarbetet annorlunda idag?

• Vad lägger Cisco sitt krut?

• Kundcase

• Summering

Page 3: CLOSING THE GAP - TechWorld Event · CLOSING THE GAP Christofer Tibbelin Säkerhetsarkitekt christofer.tibbelin@cygate.se ... Go and fetch ad A client vulnerability. HOW CYGATE &

4-YEAR OLD RANSOMWARE MILLIONAIRE

#evilpumpkin

Page 4: CLOSING THE GAP - TechWorld Event · CLOSING THE GAP Christofer Tibbelin Säkerhetsarkitekt christofer.tibbelin@cygate.se ... Go and fetch ad A client vulnerability. HOW CYGATE &

MEGATRENDS DISRUPTING TRADITIONAL SECURITY THINKING

Cloud Adoption

Internet of Things

Internet is going dark

Page 5: CLOSING THE GAP - TechWorld Event · CLOSING THE GAP Christofer Tibbelin Säkerhetsarkitekt christofer.tibbelin@cygate.se ... Go and fetch ad A client vulnerability. HOW CYGATE &

IT IS NOT A SIDE BUSINESS ANYMORE.

IT Usage

IT Requirements

IT Expectation

Page 6: CLOSING THE GAP - TechWorld Event · CLOSING THE GAP Christofer Tibbelin Säkerhetsarkitekt christofer.tibbelin@cygate.se ... Go and fetch ad A client vulnerability. HOW CYGATE &

SECURITY IS NOT A PATCH WORK

Page 7: CLOSING THE GAP - TechWorld Event · CLOSING THE GAP Christofer Tibbelin Säkerhetsarkitekt christofer.tibbelin@cygate.se ... Go and fetch ad A client vulnerability. HOW CYGATE &

SECURITY IS NOT A PATCH WORK

• Network Security

• Client Security

• Server Security

• Application Security

• Data Security

• Development Security

• Physical Security

Important that

these work together

Architecture instead of

point solutions

Page 8: CLOSING THE GAP - TechWorld Event · CLOSING THE GAP Christofer Tibbelin Säkerhetsarkitekt christofer.tibbelin@cygate.se ... Go and fetch ad A client vulnerability. HOW CYGATE &

IT-SECURITY’S BUILDING BLOCKS

Confidentiality Integrity

AvailabilityTraceability

Compliance

Page 9: CLOSING THE GAP - TechWorld Event · CLOSING THE GAP Christofer Tibbelin Säkerhetsarkitekt christofer.tibbelin@cygate.se ... Go and fetch ad A client vulnerability. HOW CYGATE &

Early Detection

Accurate Scoping

Proper Containment

Reassess Defences

ENHANCE YOUR SECURITY CAPABILITY

Security

Effectiveness

Page 10: CLOSING THE GAP - TechWorld Event · CLOSING THE GAP Christofer Tibbelin Säkerhetsarkitekt christofer.tibbelin@cygate.se ... Go and fetch ad A client vulnerability. HOW CYGATE &

CISCO SECURITY ARCHITECTURE

– Threat Intelligence

Services

Integrated Threat Defense

Endpoint CloudNetwork

Page 11: CLOSING THE GAP - TechWorld Event · CLOSING THE GAP Christofer Tibbelin Säkerhetsarkitekt christofer.tibbelin@cygate.se ... Go and fetch ad A client vulnerability. HOW CYGATE &

A REAL LIFE EXAMPLE

Zero-day attack

unknown to Anti-virus

4. Launch ransomware

& encrypt data

Domains registered

only hours before the

attack

News site1. Reading news

Ransomware

Key Server 5. Post cryptokey

Malwartising

site3. Redirect and Download file

2. Go and fetch ad

A client

vulnerability

Page 12: CLOSING THE GAP - TechWorld Event · CLOSING THE GAP Christofer Tibbelin Säkerhetsarkitekt christofer.tibbelin@cygate.se ... Go and fetch ad A client vulnerability. HOW CYGATE &

HOW CYGATE & CISCO SOLVE THIS ATTACK

News site

Ransomware

Key Server

Malwartising

site

Block and trace with cloud

Trace and quarantine device with network

Block and trace with endpoint

Page 13: CLOSING THE GAP - TechWorld Event · CLOSING THE GAP Christofer Tibbelin Säkerhetsarkitekt christofer.tibbelin@cygate.se ... Go and fetch ad A client vulnerability. HOW CYGATE &

THE SECURITY EFFECTIVENESS GAP

Page 14: CLOSING THE GAP - TechWorld Event · CLOSING THE GAP Christofer Tibbelin Säkerhetsarkitekt christofer.tibbelin@cygate.se ... Go and fetch ad A client vulnerability. HOW CYGATE &

CISCO SECURITY CLOSES THE GAPand Changing the Equation

Page 15: CLOSING THE GAP - TechWorld Event · CLOSING THE GAP Christofer Tibbelin Säkerhetsarkitekt christofer.tibbelin@cygate.se ... Go and fetch ad A client vulnerability. HOW CYGATE &

HOW IS YOUR SECURITY?

How do you control who gets onto

your network?

How do you find and contain problems fast?

How do you simplify networksegmentation?

How do you protect users

wherever they work?

How do you stop threats

at the edge?

Page 16: CLOSING THE GAP - TechWorld Event · CLOSING THE GAP Christofer Tibbelin Säkerhetsarkitekt christofer.tibbelin@cygate.se ... Go and fetch ad A client vulnerability. HOW CYGATE &

BETTER TOGETHER