O slideshow foi denunciado.
Utilizamos seu perfil e dados de atividades no LinkedIn para personalizar e exibir anúncios mais relevantes. Altere suas preferências de anúncios quando desejar.

Network as a sensor

513 visualizações

Publicada em

Apresentação de Ghassan Dreibi, especialista Cisco sobre como tornar sua rede um sensor de segurança para combater as mais modernas ameaças.

Publicada em: Tecnologia
  • Seja o primeiro a comentar

Network as a sensor

  1. 1. 1© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Ghassan Dreibi Manager, Business Development Nov, 2015 CyberSecurity for the Real World Network as a Sensor
  2. 2. 2© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Donald Rumsfeld Former US Defense Secretary
  3. 3. 3© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Organizations are more confident but increasingly vulnerable
  4. 4. 4© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Medical Devices State- sponsored hacking CryptoWall Advanced Malwares Phishing Attacks EMV Chip Cards Automotive hacking Mobile Devices Industry Infrastructure Cloud Computing
  5. 5. 5© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41% Beware Of Directed Cyber Attacks Were Focused On Organizations with fewer than 500 Employees. Smaller companies are a vector into the networks of larger companies
  6. 6. 6© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65% Of Net New Jobs in the Country Since 1995. 50% Of the U.S. Private Sector Workforce is Employed By Small Business. Creating Nearly Protect Larger companies are equipped to absorb the cost of a large security breach. Smaller companies face complete devastation upon suffering a single large security breach.
  7. 7. 7© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 100% of top 500 companies with malicious connection detected 60% “collected” in hours 54% of new Threats Discovered after months
  8. 8. 8© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  9. 9. 9© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential New surface for threats
  10. 10. 10© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Advanced Persistent Threats
  11. 11. 11© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Gain access to the Network
  12. 12. 12© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Social Medias | PEN Drives | Social Engineering
  13. 13. 13© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Suspected VPN connections
  14. 14. 14© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Time to reach the target….
  15. 15. 15© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Time to be detected….
  16. 16. 16© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Security Strategy
  17. 17. 17© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Point in Time Solution Fragmented Complex Requires additional management 17© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  18. 18. 18© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Scope Contain Remediate Continuous Solution Discover Enforce Harden Detect Block Defend 18© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  19. 19. 19© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Advanced Malware Protection Network Behavior Analysis NGFW UTM NAC + Identity Services VPN Firewall NGIPS Web Security Email Security Continuous Solution 19© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  20. 20. 20© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Coverage | Automation More Sensors More Sensors | Global Intelligence Continuous Solution 20© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  21. 21. 21© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Servers Operating Systems Routers and Switches Mobile Devices Printers VoIP Phones Virtual Machines Client Applications Files Users Web Applications Application Protocols Services Malware Command and Control Servers Vulnerabilities NetFlow Network Behavior Processes
  22. 22. 22© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential See more …
  23. 23. 23© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Reducing the scope of attack
  24. 24. 24© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Understand the scope of attack
  25. 25. 25© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Better information…Better decision
  26. 26. 26© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network as Sensor Network as Enforcer
  27. 27. 27© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Performance | Capacity | SLA
  28. 28. 28© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Thank You

×