0
 
Cyber Defence in the Corporate World Paul King Senior Security Advisor Cisco System [email_address]
Risk “ How do we know what we know we don’t know?”
The Network of 15 Years Ago Closed Network Remote Site Frame Relay X.25 Leased Line PSTN PSTN
The Network Today
Risk – What is it? Impact Risk Vulnerability Threat Asset Likelihood
How is a Business Threatened?  Virus Outbreak DDoS Theft Loss of Information Website Defacement WWW Damage to reputation (...
Leader-led, but Includes Everyone “ Security starts with me, the CEO, down to the   individual contributor level… it’s man...
People:  Your Greatest Security Asset “ Cisco's open culture facilitates a proactive, positive and  rewarding approach to ...
<ul><li>Pervasive awareness and education programs </li></ul><ul><li>Cross-collaborative efforts of constituents </li></ul...
… Our Process… Then Now Signature-based How Anomaly-Based Specialized Security Expertise What Defense  Automation Use a Fi...
A Day in the Life of My  Corporate  Laptop Cisco INTERNET Home Office 05:00 VPN VPN Firewall
A Day in the Life of My  Corporate  Laptop Cisco INTERNET 07:00
A Day in the Life of My  Corporate  Laptop Cisco INTERNET 08:00 VPN Train Station Public Hotspot
A Day in the Life of My  Corporate  Laptop Cisco INTERNET 08:10 Train Station
A Day in the Life of My  Corporate  Laptop Cisco INTERNET 12:00
A Day in the Life of My  Corporate  Laptop Cisco INTERNET Home Office 20:00 VPN VPN Firewall
Concluding Thoughts
 
FOR FURTHER QUESTIONS AND TO SEE OUR TECHNOLOGY DEMOS, VISIT US AT STAND 660
Upcoming SlideShare
Loading in...5
×

Cyber Defence in the Corporate World

602

Published on

All organisations are making more and more use of technology and so their reliance on it is also increasing. With the increase in reliance comes a bigger impact if things were to go wrong. Organisations need to develop their cyber defence strategies to meet these threats and risks. However it has to be done in the environment of very tight cost control and it must be done to enable all of the benefits from technology. Security should be the enabling strategy for an organisation and not be seen as an inhibitor or expense item.

Published in: Technology, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
602
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
35
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Cyber Defence in the Corporate World"

  1. 2. Cyber Defence in the Corporate World Paul King Senior Security Advisor Cisco System [email_address]
  2. 3. Risk “ How do we know what we know we don’t know?”
  3. 4. The Network of 15 Years Ago Closed Network Remote Site Frame Relay X.25 Leased Line PSTN PSTN
  4. 5. The Network Today
  5. 6. Risk – What is it? Impact Risk Vulnerability Threat Asset Likelihood
  6. 7. How is a Business Threatened? Virus Outbreak DDoS Theft Loss of Information Website Defacement WWW Damage to reputation (CEO) Financial Loss (CFO) Disruption To business (CIO)
  7. 8. Leader-led, but Includes Everyone “ Security starts with me, the CEO, down to the individual contributor level… it’s mandatory.” John Chambers Chairman and CEO
  8. 9. People: Your Greatest Security Asset “ Cisco's open culture facilitates a proactive, positive and rewarding approach to security awareness and education — one that empowers security champions across the company to do their part to keep Cisco secure. – Mia Bradway Winter Cisco Sr. Security Awareness Program Manager People
  9. 10. <ul><li>Pervasive awareness and education programs </li></ul><ul><li>Cross-collaborative efforts of constituents </li></ul><ul><li>Policies, guidelines and essential practices </li></ul><ul><li>Rewards for exemplary security related behavior </li></ul><ul><li>Compelling set of marketing activities and communications </li></ul>Awareness and Education Driven Training & Education Be A Security Champion Creative Communications We Are The Targets Marketing Collateral Award-winning Programs
  10. 11. … Our Process… Then Now Signature-based How Anomaly-Based Specialized Security Expertise What Defense Automation Use a Firewall! When Use technologies pervasively Internet Facing Where System-wide Detect Attacks Who Find Attackers
  11. 12. A Day in the Life of My Corporate Laptop Cisco INTERNET Home Office 05:00 VPN VPN Firewall
  12. 13. A Day in the Life of My Corporate Laptop Cisco INTERNET 07:00
  13. 14. A Day in the Life of My Corporate Laptop Cisco INTERNET 08:00 VPN Train Station Public Hotspot
  14. 15. A Day in the Life of My Corporate Laptop Cisco INTERNET 08:10 Train Station
  15. 16. A Day in the Life of My Corporate Laptop Cisco INTERNET 12:00
  16. 17. A Day in the Life of My Corporate Laptop Cisco INTERNET Home Office 20:00 VPN VPN Firewall
  17. 18. Concluding Thoughts
  18. 20. FOR FURTHER QUESTIONS AND TO SEE OUR TECHNOLOGY DEMOS, VISIT US AT STAND 660
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×