SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
Intelligent Cybersecurity 
for the Real World 
Francisco Ramirez 
Ghassan Dreibi 
Nov 5, 2014
Agenda 
Session 1 
Francisco Ramirez – Security Managing Director 
Ghassan Dreibi – Strategic & Planning BDM 
Session 2 
Carlo Davila – IDC LATAM Analyst 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
The Industrialization of Hacking 
Hacking Becomes 
an Industry 
Sophisticated Attacks, 
Complex Landscape 
Phishing, Low 
Sophistication 
1990 1995 2000 2005 2010 2015 2020 
Viruses 
1990–2000 
Worms 
2000–2005 
Spyware and Rootkits 
2005–Today 
APTs Cyberware 
Today + 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Threat Landscape Demands more than Application Control 
100% 
of companies connect 
to domains that host 
malicious files or services 
54% 
of breaches 
remain undiscovered 
for months 
60% 
of data is 
stolen in 
hours 
It is a Community 
that hides in plain sight 
avoids detection and 
attacks swiftly 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
The Pervasiveness of Malicious Traffic 
High-Threat Malware 
Hijacked Infrastructure 
Sites without Content 
Suspect FTP 
Suspect VPN 
Inappropriate Content 
100% 
96% 
92% 
88% 
79% 
50% 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
The Silver Bullet Does Not Exist 
Sandboxing 
Application 
Control 
“Detect the 
Unknown” 
“Fix the Firewall” 
“Captive portal” 
IDS/IPS 
UTM 
PKI 
“No key, no access” 
“It matches the pattern” 
NAC 
“No false positives, 
no false negatives” 
FW/VPN 
AV 
“Block or Allow” 
GSSO focuses on the totality of defending against threats 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
GSSO – Global Security Sales Organization 
A New Way to Solve Real World Security Issues 
Dedicated Security 
sales force – GSSO 
Aligned with Cisco’s 
Services, Partner 
and Sales 
Organization (Cisco) + 
Selling market 
leading technology, 
services and 
solutions across the 
entire attack 
continuum 
+ 
= 
Unmatched differentiation 
Market credibility that will amplify loyalty 
Stronger solutions across all architectures 
© 2014 2013-Cisco 2014 and/Cisco or its and/affiliates. or its affiliates. All rights All reserved. rights reserved. Cisco Confidential 7
Visibility: See More – Protect More 
Files 
Network 
Servers 
Users 
Operating 
Systems 
Web 
Applications 
Routers and 
Switches 
Application 
Protocols 
Mobile 
Devices 
Printers 
VoIP 
Phones 
Malware 
Virtual 
Machines 
Command 
and Control 
Servers 
Client 
Applications 
Services 
Vulnerabilities 
NetFlow 
Network 
Behavior 
Processes 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Cyber Security Advanced Model 
BEFORE 
Discover 
Enforce 
Harden 
AFTER 
Scope 
Contain 
Remediate 
Attack Continuum 
DURING 
Detect 
Block 
Defend 
Network Endpoint Mobile Virtual Cloud 
Point in Time Continuous 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Cyber Security Attach Continuum Approach 
DURING 
Cyber Threat Defense 
Manage Security CPE 
Solution Implementation 
Security Assessment 
Strategic Planning 
Solution Plan / Design 
Managed Threat Defense 
Custom Threat Intelligence 
Services 
Security Optimization 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Firewall 
NGFW 
NAC + Identity Services 
VPN 
UTM 
NGIPS 
Web Security 
Advanced Malware Protection 
Network Behavior Analysis 
Products 
Email Security 
BEFORE 
Discover 
Enforce 
Harden 
AFTER 
Scope 
Contain 
Remediate 
Detect 
Block 
Defend
Strategic Imperatives 
Visibility-Driven Threat-Focused Platform-Based 
Network Endpoint Mobile Virtual Cloud 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
The Security Perimeter in the Cloud 
Collective 
Security 
Intelligence 
The 
Distributed 
Perimeter 
Cloud 
Connected 
Network 
Telemetry Data Threat Research Advanced Analytics 
Mobile Router Firewall 
3M+ 
Cloud Web 
Security Users 
6GB 
Web Traffic Examined, 
Protected 
Every Hour 
75M 
Unique Hits 
Every Hour 
10M 
Blocks Enforced Every 
Hour 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Platform-Based Security Architecture 
Management 
Security Services 
and Applications 
Security Services 
Platform 
Infrastructure 
Element 
Layer 
Common Security Policy and Management 
Cisco Security Applications Third-Party Security Applications 
Context 
Awareness 
Content 
Inspection 
Application 
Visibility 
Common Security Policy & Management 
Orchestration 
Access 
Control 
Security 
Management APIs 
Cisco ONE 
APIs 
Platform 
APIs 
Threat 
Prevention 
Cloud Intelligence 
APIs 
Physical Appliance Virtual Cloud 
APIs APIs 
Device API: OnePK™, OpenFlow, CLI 
Cisco Networking Operating Systems (Enterprise, Data Center, Service Provider) 
ASIC Data Plane Route–Switch–Compute Software Data Plane 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Thank you.

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020
 
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
El Futuro de la Cibersegu
El Futuro de la CiberseguEl Futuro de la Cibersegu
El Futuro de la Cibersegu
 
Re solution - corona virus cyber security infographic
Re solution - corona virus cyber security infographicRe solution - corona virus cyber security infographic
Re solution - corona virus cyber security infographic
 
Intelligence Driven Security
Intelligence Driven SecurityIntelligence Driven Security
Intelligence Driven Security
 
Garantice la continuidad de su negocio Damian Prieto
Garantice la continuidad de su negocio   Damian PrietoGarantice la continuidad de su negocio   Damian Prieto
Garantice la continuidad de su negocio Damian Prieto
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid final
 
Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trust
 
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureCisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
 
What is Zero Trust
What is Zero TrustWhat is Zero Trust
What is Zero Trust
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
 
NG EXPERTS Services and Solutions
NG EXPERTS Services and SolutionsNG EXPERTS Services and Solutions
NG EXPERTS Services and Solutions
 
Security transformation: Helping you manage digital risk
Security transformation: Helping you manage digital riskSecurity transformation: Helping you manage digital risk
Security transformation: Helping you manage digital risk
 
SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
SAE 2014 - Cyber Security: Mission Critical for the Internet of CarsSAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
 
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy
 
Cisco connect winnipeg 2018 unlocking business value with network programma...
Cisco connect winnipeg 2018   unlocking business value with network programma...Cisco connect winnipeg 2018   unlocking business value with network programma...
Cisco connect winnipeg 2018 unlocking business value with network programma...
 

Semelhante a Cisco Live Cancun PR Session

apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
Chrysostomos Christofi
 

Semelhante a Cisco Live Cancun PR Session (20)

Cisco Content Security
Cisco Content SecurityCisco Content Security
Cisco Content Security
 
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and LancopeThe Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
 
Presentación - Cisco ASA with FirePOWER Services
Presentación -  Cisco ASA with FirePOWER ServicesPresentación -  Cisco ASA with FirePOWER Services
Presentación - Cisco ASA with FirePOWER Services
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
Cisco ASA con fire power services
Cisco ASA con fire power services Cisco ASA con fire power services
Cisco ASA con fire power services
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
 
Adaptive Trust for Strong Network Security
Adaptive Trust for Strong Network SecurityAdaptive Trust for Strong Network Security
Adaptive Trust for Strong Network Security
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
The Next Generation Security
The Next Generation SecurityThe Next Generation Security
The Next Generation Security
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin Nystrom
 
Cisco Cybersecurity #10YearChallenge
Cisco Cybersecurity #10YearChallengeCisco Cybersecurity #10YearChallenge
Cisco Cybersecurity #10YearChallenge
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Two for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content ProtectionTwo for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content Protection
 
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaProteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto Presentation
 

Mais de Felipe Lamus

2015 VNI Complete Forecast Latin America
2015 VNI Complete Forecast Latin America2015 VNI Complete Forecast Latin America
2015 VNI Complete Forecast Latin America
Felipe Lamus
 
VNI Global (Andres Maz), Power Point
VNI Global (Andres Maz), Power PointVNI Global (Andres Maz), Power Point
VNI Global (Andres Maz), Power Point
Felipe Lamus
 
VNI, Informacion America Latina, Junio 11, 2014
VNI, Informacion America Latina, Junio 11, 2014VNI, Informacion America Latina, Junio 11, 2014
VNI, Informacion America Latina, Junio 11, 2014
Felipe Lamus
 

Mais de Felipe Lamus (20)

2015 VNI Complete Forecast Latin America
2015 VNI Complete Forecast Latin America2015 VNI Complete Forecast Latin America
2015 VNI Complete Forecast Latin America
 
Latam 2015 VNI Mobile Media prezo
Latam 2015 VNI Mobile Media prezo Latam 2015 VNI Mobile Media prezo
Latam 2015 VNI Mobile Media prezo
 
F&S Presentation Whitepaper Cisco Services
F&S Presentation Whitepaper Cisco ServicesF&S Presentation Whitepaper Cisco Services
F&S Presentation Whitepaper Cisco Services
 
White Paper Servicios Frost & Sullivan English
White Paper Servicios Frost & Sullivan EnglishWhite Paper Servicios Frost & Sullivan English
White Paper Servicios Frost & Sullivan English
 
White Paper Frost & Sullivan Portugues
White Paper Frost & Sullivan PortuguesWhite Paper Frost & Sullivan Portugues
White Paper Frost & Sullivan Portugues
 
White Paper Servicios Frost & Sullivan
White Paper Servicios Frost & SullivanWhite Paper Servicios Frost & Sullivan
White Paper Servicios Frost & Sullivan
 
Cisco Services Strategy Press Conference final
Cisco Services Strategy Press Conference finalCisco Services Strategy Press Conference final
Cisco Services Strategy Press Conference final
 
Fast IT Mariano O'Kon, Cisco Live Cancun 2014
Fast IT Mariano O'Kon, Cisco Live Cancun 2014Fast IT Mariano O'Kon, Cisco Live Cancun 2014
Fast IT Mariano O'Kon, Cisco Live Cancun 2014
 
Fast IT Full Study Findings, Portuguese
Fast IT Full Study Findings, PortugueseFast IT Full Study Findings, Portuguese
Fast IT Full Study Findings, Portuguese
 
Fast IT Full Study Findings, Espanol
Fast IT Full Study Findings, EspanolFast IT Full Study Findings, Espanol
Fast IT Full Study Findings, Espanol
 
CCWTR Press Deck Completo
CCWTR Press Deck CompletoCCWTR Press Deck Completo
CCWTR Press Deck Completo
 
IDC, the third platform and a security perspective Latam, Cisco Live 2014
IDC, the third platform and a security perspective Latam, Cisco Live 2014IDC, the third platform and a security perspective Latam, Cisco Live 2014
IDC, the third platform and a security perspective Latam, Cisco Live 2014
 
Joseph Bradley, IoE in action, Cisco Live
Joseph Bradley, IoE in action, Cisco LiveJoseph Bradley, IoE in action, Cisco Live
Joseph Bradley, IoE in action, Cisco Live
 
Cisco Intercloud Announcement, Cisco Live 2014
Cisco Intercloud Announcement, Cisco Live 2014Cisco Intercloud Announcement, Cisco Live 2014
Cisco Intercloud Announcement, Cisco Live 2014
 
Cisco Global Cloud index Public deck 2013 2018 latam prensa
Cisco Global Cloud index Public deck 2013 2018 latam prensaCisco Global Cloud index Public deck 2013 2018 latam prensa
Cisco Global Cloud index Public deck 2013 2018 latam prensa
 
C white cisco_livecancun_nov_press
C white cisco_livecancun_nov_pressC white cisco_livecancun_nov_press
C white cisco_livecancun_nov_press
 
Presentacion Wim Elfrink IoT World Forum Chicago
Presentacion Wim Elfrink IoT World Forum ChicagoPresentacion Wim Elfrink IoT World Forum Chicago
Presentacion Wim Elfrink IoT World Forum Chicago
 
Infografia: Cisco presenta primer Firewall de próxima generación enfocado en ...
Infografia: Cisco presenta primer Firewall de próxima generación enfocado en ...Infografia: Cisco presenta primer Firewall de próxima generación enfocado en ...
Infografia: Cisco presenta primer Firewall de próxima generación enfocado en ...
 
VNI Global (Andres Maz), Power Point
VNI Global (Andres Maz), Power PointVNI Global (Andres Maz), Power Point
VNI Global (Andres Maz), Power Point
 
VNI, Informacion America Latina, Junio 11, 2014
VNI, Informacion America Latina, Junio 11, 2014VNI, Informacion America Latina, Junio 11, 2014
VNI, Informacion America Latina, Junio 11, 2014
 

Último

6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 

Último (20)

APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft DatingDubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 

Cisco Live Cancun PR Session

  • 1. Intelligent Cybersecurity for the Real World Francisco Ramirez Ghassan Dreibi Nov 5, 2014
  • 2. Agenda Session 1 Francisco Ramirez – Security Managing Director Ghassan Dreibi – Strategic & Planning BDM Session 2 Carlo Davila – IDC LATAM Analyst © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
  • 3. The Industrialization of Hacking Hacking Becomes an Industry Sophisticated Attacks, Complex Landscape Phishing, Low Sophistication 1990 1995 2000 2005 2010 2015 2020 Viruses 1990–2000 Worms 2000–2005 Spyware and Rootkits 2005–Today APTs Cyberware Today + © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
  • 4. Threat Landscape Demands more than Application Control 100% of companies connect to domains that host malicious files or services 54% of breaches remain undiscovered for months 60% of data is stolen in hours It is a Community that hides in plain sight avoids detection and attacks swiftly © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
  • 5. The Pervasiveness of Malicious Traffic High-Threat Malware Hijacked Infrastructure Sites without Content Suspect FTP Suspect VPN Inappropriate Content 100% 96% 92% 88% 79% 50% © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
  • 6. The Silver Bullet Does Not Exist Sandboxing Application Control “Detect the Unknown” “Fix the Firewall” “Captive portal” IDS/IPS UTM PKI “No key, no access” “It matches the pattern” NAC “No false positives, no false negatives” FW/VPN AV “Block or Allow” GSSO focuses on the totality of defending against threats © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
  • 7. GSSO – Global Security Sales Organization A New Way to Solve Real World Security Issues Dedicated Security sales force – GSSO Aligned with Cisco’s Services, Partner and Sales Organization (Cisco) + Selling market leading technology, services and solutions across the entire attack continuum + = Unmatched differentiation Market credibility that will amplify loyalty Stronger solutions across all architectures © 2014 2013-Cisco 2014 and/Cisco or its and/affiliates. or its affiliates. All rights All reserved. rights reserved. Cisco Confidential 7
  • 8. Visibility: See More – Protect More Files Network Servers Users Operating Systems Web Applications Routers and Switches Application Protocols Mobile Devices Printers VoIP Phones Malware Virtual Machines Command and Control Servers Client Applications Services Vulnerabilities NetFlow Network Behavior Processes © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
  • 9. Cyber Security Advanced Model BEFORE Discover Enforce Harden AFTER Scope Contain Remediate Attack Continuum DURING Detect Block Defend Network Endpoint Mobile Virtual Cloud Point in Time Continuous © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
  • 10. Cyber Security Attach Continuum Approach DURING Cyber Threat Defense Manage Security CPE Solution Implementation Security Assessment Strategic Planning Solution Plan / Design Managed Threat Defense Custom Threat Intelligence Services Security Optimization © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Firewall NGFW NAC + Identity Services VPN UTM NGIPS Web Security Advanced Malware Protection Network Behavior Analysis Products Email Security BEFORE Discover Enforce Harden AFTER Scope Contain Remediate Detect Block Defend
  • 11. Strategic Imperatives Visibility-Driven Threat-Focused Platform-Based Network Endpoint Mobile Virtual Cloud © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
  • 12. The Security Perimeter in the Cloud Collective Security Intelligence The Distributed Perimeter Cloud Connected Network Telemetry Data Threat Research Advanced Analytics Mobile Router Firewall 3M+ Cloud Web Security Users 6GB Web Traffic Examined, Protected Every Hour 75M Unique Hits Every Hour 10M Blocks Enforced Every Hour © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
  • 13. Platform-Based Security Architecture Management Security Services and Applications Security Services Platform Infrastructure Element Layer Common Security Policy and Management Cisco Security Applications Third-Party Security Applications Context Awareness Content Inspection Application Visibility Common Security Policy & Management Orchestration Access Control Security Management APIs Cisco ONE APIs Platform APIs Threat Prevention Cloud Intelligence APIs Physical Appliance Virtual Cloud APIs APIs Device API: OnePK™, OpenFlow, CLI Cisco Networking Operating Systems (Enterprise, Data Center, Service Provider) ASIC Data Plane Route–Switch–Compute Software Data Plane © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13