SlideShare a Scribd company logo
1 of 26
#CiscoSmartTalk 1© 2015 Cisco and/or its affiliates. All rights reserved.
Reduce Security Risks to Protect Your Network
Webinar will start at 12 pm EST
Use the Question Pane in
WebEx to ask questions.
Join the live discussion on Twitter.
Follow @CiscoServices and tweet
#SmartTalk
#CiscoSmartTalk 2© 2015 Cisco and/or its affiliates. All rights reserved.
@CiscoServices
#CiscoSmartTalk
#CiscoSmartTalk 3© 2015 Cisco and/or its affiliates. All rights reserved.
cisco.com/go/smarttalk
#CiscoSmartTalk 4© 2015 Cisco and/or its affiliates. All rights reserved.
Upcoming Sessions
Forecasting
the Future:
Analytics and
Modeling
On Demand:
Architecture
Strategy: What's
Your Game Plan?
April 16
Proactive vs.
Reactive:
Assessing Your
Network Strategy
On Demand:
Manage Network
Operations Risk
and Compliance
May 21
#CiscoSmartTalk 5© 2015 Cisco and/or its affiliates. All rights reserved.
Reduce Security Risks to
Protect Your Network
Presented by:
Tim Levad
#CiscoSmartTalk 6© 2015 Cisco and/or its affiliates. All rights reserved.
An Optimized Network is the Foundation for
Business Innovation & Outcomes
Security & Risk
Operations Efficiency
& Automation
Analytics & Modeling
Compliance & Change
Management
Architecture Strategy
& Planning
Operations Support
& Lifecycle Management
Six Areas
You Need to
Address
CiscoSmartTalk
#CiscoSmartTalk 7© 2015 Cisco and/or its affiliates. All rights reserved.
Security
& Risk
#CiscoSmartTalk 8© 2015 Cisco and/or its affiliates. All rights reserved.
Agenda
• Assessing and evolving your security strategy
• Maintaining your security posture
• Security services to help prepare your network
#CiscoSmartTalk 9© 2015 Cisco and/or its affiliates. All rights reserved.
When was the last time you validated your
security posture?
#CiscoSmartTalk 10© 2015 Cisco and/or its affiliates. All rights reserved.
Do you know what weak links are?
#CiscoSmartTalk 11© 2015 Cisco and/or its affiliates. All rights reserved.
TheVulnerability Lifecycle
Prioritize Risk
Remediate Risk
Validate Removal of Risk
Identify Risk
#CiscoSmartTalk 12© 2015 Cisco and/or its affiliates. All rights reserved.
ValidateYour Current Security Posture
Current State Desired State
Strategy Map
#CiscoSmartTalk 13© 2015 Cisco and/or its affiliates. All rights reserved.
Assess Risk Based onYour Needs
Perimeter
Assessment
Wireless
Assessment
Device Security
Assessment
Assessment Examples
#CiscoSmartTalk 14© 2015 Cisco and/or its affiliates. All rights reserved.
What does an Assessment look like?
Review Probe Analyze Recommend
#CiscoSmartTalk 15© 2015 Cisco and/or its affiliates. All rights reserved.
Uncovering Risk
Agents IT Staff Management
#CiscoSmartTalk 16© 2015 Cisco and/or its affiliates. All rights reserved.
Prioritize Risk Based onYour Business
#CiscoSmartTalk 17© 2015 Cisco and/or its affiliates. All rights reserved.
Develop a Risk Framework
#CiscoSmartTalk 18© 2015 Cisco and/or its affiliates. All rights reserved.
Risk Remediation Strategy
#CiscoSmartTalk 19© 2015 Cisco and/or its affiliates. All rights reserved.
Protection by Segmentation
Agents IT Staff Management
#CiscoSmartTalk 20© 2015 Cisco and/or its affiliates. All rights reserved.
Validate Risk Removal
Agents IT Staff Management
#CiscoSmartTalk 21© 2015 Cisco and/or its affiliates. All rights reserved.
Recap:TheVulnerability Lifecycle
Prioritize Risk
Remediate Risk
Validate Removal of Risk
Identify Risk
#CiscoSmartTalk 22© 2015 Cisco and/or its affiliates. All rights reserved.
Cisco Security Services
Network
Optimization
Service
Security
Optimization
Service
Managed
Threat
Defense
#CiscoSmartTalk 23© 2015 Cisco and/or its affiliates. All rights reserved.
Resources
Cisco 2015 Annual
Security Report
Security Optimization
Service At-A-Glance
ManagedThreat DefenseAt-
A-Glance
#CiscoSmartTalk 24© 2015 Cisco and/or its affiliates. All rights reserved.
Upcoming Sessions
Forecasting
the Future:
Analytics and
Modeling
On Demand:
Architecture
Strategy: What's
Your Game Plan?
April 16
Proactive vs.
Reactive:
Assessing Your
Network Strategy
On Demand:
Manage Network
Operations Risk
and Compliance
May 21
#CiscoSmartTalk 25© 2015 Cisco and/or its affiliates. All rights reserved.
QUESTIONS?
#CiscoSmartTalk 26© 2015 Cisco and/or its affiliates. All rights reserved.
ThankYou

More Related Content

What's hot

Idc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian AronIdc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian AronDejan Jeremic
 
How Silicon Valley startups are approaching security differently
How Silicon Valley startups are approaching security differentlyHow Silicon Valley startups are approaching security differently
How Silicon Valley startups are approaching security differentlyScott Cressman
 
Internet Security Threat
Internet Security ThreatInternet Security Threat
Internet Security ThreatSteve Petty
 
ExpoQA19 slides security awareness Steven Nienhuis
ExpoQA19 slides security awareness Steven NienhuisExpoQA19 slides security awareness Steven Nienhuis
ExpoQA19 slides security awareness Steven Nienhuissteavy
 
Monitorama 2017 - Who Watches the Watchers?
Monitorama 2017 - Who Watches the Watchers?Monitorama 2017 - Who Watches the Watchers?
Monitorama 2017 - Who Watches the Watchers?brantstrand
 
ITAM AUS 2017 Harnessing the power of SAM Intelligence for Cyber Security
ITAM AUS 2017 Harnessing the power of SAM Intelligence for Cyber SecurityITAM AUS 2017 Harnessing the power of SAM Intelligence for Cyber Security
ITAM AUS 2017 Harnessing the power of SAM Intelligence for Cyber SecurityMartin Thompson
 
Why are Software Updates so Important for your Security
Why are Software Updates so Important for your SecurityWhy are Software Updates so Important for your Security
Why are Software Updates so Important for your SecurityQuick Heal Technologies Ltd.
 
Icinga camp ams 2016 icinga2
Icinga camp ams 2016 icinga2Icinga camp ams 2016 icinga2
Icinga camp ams 2016 icinga2Assaf Flatto
 
5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an AntivirusQuick Heal Technologies Ltd.
 
Shifting left: Continuous testing for better app quality and security
Shifting left: Continuous testing for better app quality and securityShifting left: Continuous testing for better app quality and security
Shifting left: Continuous testing for better app quality and securityNowSecure
 
10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must FollowQuick Heal Technologies Ltd.
 
Why Depending On Malware Prevention Alone Is No Longer An Option
Why Depending On Malware Prevention Alone Is No Longer An Option Why Depending On Malware Prevention Alone Is No Longer An Option
Why Depending On Malware Prevention Alone Is No Longer An Option Seculert
 
Creating the Workplace of Tomorrow
Creating the Workplace of TomorrowCreating the Workplace of Tomorrow
Creating the Workplace of TomorrowCisco Canada
 
Compliance in the mobile enterprise: 5 tips to prepare for your next audit
Compliance in the mobile enterprise: 5 tips to prepare for your next auditCompliance in the mobile enterprise: 5 tips to prepare for your next audit
Compliance in the mobile enterprise: 5 tips to prepare for your next auditNowSecure
 
Win the Cyber War! with Precognitive Heuristics technology
Win the Cyber War! with Precognitive Heuristics technologyWin the Cyber War! with Precognitive Heuristics technology
Win the Cyber War! with Precognitive Heuristics technologyAnge Albertini
 
Testing with a Rooted Mobile Device
Testing with a Rooted Mobile DeviceTesting with a Rooted Mobile Device
Testing with a Rooted Mobile DeviceTechWell
 
How to scale mobile application security testing
How to scale mobile application security testingHow to scale mobile application security testing
How to scale mobile application security testingNowSecure
 
Deception in Cyber Security (League of Women in Cyber Security)
Deception in Cyber Security (League of Women in Cyber Security)Deception in Cyber Security (League of Women in Cyber Security)
Deception in Cyber Security (League of Women in Cyber Security)Phillip Maddux
 
DevOps Incident Handling - Making friends not enemies.
DevOps Incident Handling - Making friends not enemies.DevOps Incident Handling - Making friends not enemies.
DevOps Incident Handling - Making friends not enemies.Server Density
 

What's hot (20)

Idc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian AronIdc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian Aron
 
How Silicon Valley startups are approaching security differently
How Silicon Valley startups are approaching security differentlyHow Silicon Valley startups are approaching security differently
How Silicon Valley startups are approaching security differently
 
Internet Security Threat
Internet Security ThreatInternet Security Threat
Internet Security Threat
 
ExpoQA19 slides security awareness Steven Nienhuis
ExpoQA19 slides security awareness Steven NienhuisExpoQA19 slides security awareness Steven Nienhuis
ExpoQA19 slides security awareness Steven Nienhuis
 
Monitorama 2017 - Who Watches the Watchers?
Monitorama 2017 - Who Watches the Watchers?Monitorama 2017 - Who Watches the Watchers?
Monitorama 2017 - Who Watches the Watchers?
 
ITAM AUS 2017 Harnessing the power of SAM Intelligence for Cyber Security
ITAM AUS 2017 Harnessing the power of SAM Intelligence for Cyber SecurityITAM AUS 2017 Harnessing the power of SAM Intelligence for Cyber Security
ITAM AUS 2017 Harnessing the power of SAM Intelligence for Cyber Security
 
Why are Software Updates so Important for your Security
Why are Software Updates so Important for your SecurityWhy are Software Updates so Important for your Security
Why are Software Updates so Important for your Security
 
Icinga camp ams 2016 icinga2
Icinga camp ams 2016 icinga2Icinga camp ams 2016 icinga2
Icinga camp ams 2016 icinga2
 
Three Leadership Lens
Three Leadership LensThree Leadership Lens
Three Leadership Lens
 
5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus
 
Shifting left: Continuous testing for better app quality and security
Shifting left: Continuous testing for better app quality and securityShifting left: Continuous testing for better app quality and security
Shifting left: Continuous testing for better app quality and security
 
10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow
 
Why Depending On Malware Prevention Alone Is No Longer An Option
Why Depending On Malware Prevention Alone Is No Longer An Option Why Depending On Malware Prevention Alone Is No Longer An Option
Why Depending On Malware Prevention Alone Is No Longer An Option
 
Creating the Workplace of Tomorrow
Creating the Workplace of TomorrowCreating the Workplace of Tomorrow
Creating the Workplace of Tomorrow
 
Compliance in the mobile enterprise: 5 tips to prepare for your next audit
Compliance in the mobile enterprise: 5 tips to prepare for your next auditCompliance in the mobile enterprise: 5 tips to prepare for your next audit
Compliance in the mobile enterprise: 5 tips to prepare for your next audit
 
Win the Cyber War! with Precognitive Heuristics technology
Win the Cyber War! with Precognitive Heuristics technologyWin the Cyber War! with Precognitive Heuristics technology
Win the Cyber War! with Precognitive Heuristics technology
 
Testing with a Rooted Mobile Device
Testing with a Rooted Mobile DeviceTesting with a Rooted Mobile Device
Testing with a Rooted Mobile Device
 
How to scale mobile application security testing
How to scale mobile application security testingHow to scale mobile application security testing
How to scale mobile application security testing
 
Deception in Cyber Security (League of Women in Cyber Security)
Deception in Cyber Security (League of Women in Cyber Security)Deception in Cyber Security (League of Women in Cyber Security)
Deception in Cyber Security (League of Women in Cyber Security)
 
DevOps Incident Handling - Making friends not enemies.
DevOps Incident Handling - Making friends not enemies.DevOps Incident Handling - Making friends not enemies.
DevOps Incident Handling - Making friends not enemies.
 

Similar to PPT TEST

Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Cisco Canada
 
Nos webinar architecture strategy and planning what's your game plan fina lv3
Nos   webinar architecture strategy and planning what's your game plan fina lv3Nos   webinar architecture strategy and planning what's your game plan fina lv3
Nos webinar architecture strategy and planning what's your game plan fina lv3B2BContact
 
TEST -- Nos webinar architecture test
TEST -- Nos webinar architecture testTEST -- Nos webinar architecture test
TEST -- Nos webinar architecture testB2BContact
 
Nos webinar architecture strategy and planning what's your game plan fina lv3
Nos   webinar architecture strategy and planning what's your game plan fina lv3Nos   webinar architecture strategy and planning what's your game plan fina lv3
Nos webinar architecture strategy and planning what's your game plan fina lv3B2BContact
 
NEW - Nos webinar architecture strategy and planning what's your game plan ...
NEW - Nos   webinar architecture strategy and planning what's your game plan ...NEW - Nos   webinar architecture strategy and planning what's your game plan ...
NEW - Nos webinar architecture strategy and planning what's your game plan ...B2BContact
 
Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans...
Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans...Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans...
Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans...APNIC
 
Cisco Technology Radar
Cisco Technology RadarCisco Technology Radar
Cisco Technology RadarCisco DevNet
 
Intelligent Cybersecurity for the Real World
Intelligent Cybersecurity for the Real WorldIntelligent Cybersecurity for the Real World
Intelligent Cybersecurity for the Real WorldNetCraftsmen
 
Securing 100 products - How hard can it be?
Securing 100 products - How hard can it be?Securing 100 products - How hard can it be?
Securing 100 products - How hard can it be?Priyanka Aash
 
Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security CA Technologies
 
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4Nur Shiqim Chok
 
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...CA Technologies
 
Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynoteNur Shiqim Chok
 
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...NetworkCollaborators
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldNetworkCollaborators
 
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco #ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco ITSitio.com
 
How Training and Consulting Companies Can Position CISSP, CISM and CRISC
How Training and Consulting Companies Can Position CISSP, CISM and CRISCHow Training and Consulting Companies Can Position CISSP, CISM and CRISC
How Training and Consulting Companies Can Position CISSP, CISM and CRISCITpreneurs
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data CenterCisco Canada
 
Kelly kramer shareholder value draft final
Kelly kramer shareholder value draft finalKelly kramer shareholder value draft final
Kelly kramer shareholder value draft finalir_cisco
 

Similar to PPT TEST (20)

Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
Nos webinar architecture strategy and planning what's your game plan fina lv3
Nos   webinar architecture strategy and planning what's your game plan fina lv3Nos   webinar architecture strategy and planning what's your game plan fina lv3
Nos webinar architecture strategy and planning what's your game plan fina lv3
 
TEST -- Nos webinar architecture test
TEST -- Nos webinar architecture testTEST -- Nos webinar architecture test
TEST -- Nos webinar architecture test
 
Nos webinar architecture strategy and planning what's your game plan fina lv3
Nos   webinar architecture strategy and planning what's your game plan fina lv3Nos   webinar architecture strategy and planning what's your game plan fina lv3
Nos webinar architecture strategy and planning what's your game plan fina lv3
 
NEW - Nos webinar architecture strategy and planning what's your game plan ...
NEW - Nos   webinar architecture strategy and planning what's your game plan ...NEW - Nos   webinar architecture strategy and planning what's your game plan ...
NEW - Nos webinar architecture strategy and planning what's your game plan ...
 
Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans...
Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans...Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans...
Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans...
 
Cisco Advanced Services
Cisco Advanced ServicesCisco Advanced Services
Cisco Advanced Services
 
Cisco Technology Radar
Cisco Technology RadarCisco Technology Radar
Cisco Technology Radar
 
Intelligent Cybersecurity for the Real World
Intelligent Cybersecurity for the Real WorldIntelligent Cybersecurity for the Real World
Intelligent Cybersecurity for the Real World
 
Securing 100 products - How hard can it be?
Securing 100 products - How hard can it be?Securing 100 products - How hard can it be?
Securing 100 products - How hard can it be?
 
Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security
 
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
 
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
 
Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynote
 
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
 
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco #ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
 
How Training and Consulting Companies Can Position CISSP, CISM and CRISC
How Training and Consulting Companies Can Position CISSP, CISM and CRISCHow Training and Consulting Companies Can Position CISSP, CISM and CRISC
How Training and Consulting Companies Can Position CISSP, CISM and CRISC
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
Kelly kramer shareholder value draft final
Kelly kramer shareholder value draft finalKelly kramer shareholder value draft final
Kelly kramer shareholder value draft final
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 

PPT TEST

  • 1. #CiscoSmartTalk 1© 2015 Cisco and/or its affiliates. All rights reserved. Reduce Security Risks to Protect Your Network Webinar will start at 12 pm EST Use the Question Pane in WebEx to ask questions. Join the live discussion on Twitter. Follow @CiscoServices and tweet #SmartTalk
  • 2. #CiscoSmartTalk 2© 2015 Cisco and/or its affiliates. All rights reserved. @CiscoServices #CiscoSmartTalk
  • 3. #CiscoSmartTalk 3© 2015 Cisco and/or its affiliates. All rights reserved. cisco.com/go/smarttalk
  • 4. #CiscoSmartTalk 4© 2015 Cisco and/or its affiliates. All rights reserved. Upcoming Sessions Forecasting the Future: Analytics and Modeling On Demand: Architecture Strategy: What's Your Game Plan? April 16 Proactive vs. Reactive: Assessing Your Network Strategy On Demand: Manage Network Operations Risk and Compliance May 21
  • 5. #CiscoSmartTalk 5© 2015 Cisco and/or its affiliates. All rights reserved. Reduce Security Risks to Protect Your Network Presented by: Tim Levad
  • 6. #CiscoSmartTalk 6© 2015 Cisco and/or its affiliates. All rights reserved. An Optimized Network is the Foundation for Business Innovation & Outcomes Security & Risk Operations Efficiency & Automation Analytics & Modeling Compliance & Change Management Architecture Strategy & Planning Operations Support & Lifecycle Management Six Areas You Need to Address CiscoSmartTalk
  • 7. #CiscoSmartTalk 7© 2015 Cisco and/or its affiliates. All rights reserved. Security & Risk
  • 8. #CiscoSmartTalk 8© 2015 Cisco and/or its affiliates. All rights reserved. Agenda • Assessing and evolving your security strategy • Maintaining your security posture • Security services to help prepare your network
  • 9. #CiscoSmartTalk 9© 2015 Cisco and/or its affiliates. All rights reserved. When was the last time you validated your security posture?
  • 10. #CiscoSmartTalk 10© 2015 Cisco and/or its affiliates. All rights reserved. Do you know what weak links are?
  • 11. #CiscoSmartTalk 11© 2015 Cisco and/or its affiliates. All rights reserved. TheVulnerability Lifecycle Prioritize Risk Remediate Risk Validate Removal of Risk Identify Risk
  • 12. #CiscoSmartTalk 12© 2015 Cisco and/or its affiliates. All rights reserved. ValidateYour Current Security Posture Current State Desired State Strategy Map
  • 13. #CiscoSmartTalk 13© 2015 Cisco and/or its affiliates. All rights reserved. Assess Risk Based onYour Needs Perimeter Assessment Wireless Assessment Device Security Assessment Assessment Examples
  • 14. #CiscoSmartTalk 14© 2015 Cisco and/or its affiliates. All rights reserved. What does an Assessment look like? Review Probe Analyze Recommend
  • 15. #CiscoSmartTalk 15© 2015 Cisco and/or its affiliates. All rights reserved. Uncovering Risk Agents IT Staff Management
  • 16. #CiscoSmartTalk 16© 2015 Cisco and/or its affiliates. All rights reserved. Prioritize Risk Based onYour Business
  • 17. #CiscoSmartTalk 17© 2015 Cisco and/or its affiliates. All rights reserved. Develop a Risk Framework
  • 18. #CiscoSmartTalk 18© 2015 Cisco and/or its affiliates. All rights reserved. Risk Remediation Strategy
  • 19. #CiscoSmartTalk 19© 2015 Cisco and/or its affiliates. All rights reserved. Protection by Segmentation Agents IT Staff Management
  • 20. #CiscoSmartTalk 20© 2015 Cisco and/or its affiliates. All rights reserved. Validate Risk Removal Agents IT Staff Management
  • 21. #CiscoSmartTalk 21© 2015 Cisco and/or its affiliates. All rights reserved. Recap:TheVulnerability Lifecycle Prioritize Risk Remediate Risk Validate Removal of Risk Identify Risk
  • 22. #CiscoSmartTalk 22© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Security Services Network Optimization Service Security Optimization Service Managed Threat Defense
  • 23. #CiscoSmartTalk 23© 2015 Cisco and/or its affiliates. All rights reserved. Resources Cisco 2015 Annual Security Report Security Optimization Service At-A-Glance ManagedThreat DefenseAt- A-Glance
  • 24. #CiscoSmartTalk 24© 2015 Cisco and/or its affiliates. All rights reserved. Upcoming Sessions Forecasting the Future: Analytics and Modeling On Demand: Architecture Strategy: What's Your Game Plan? April 16 Proactive vs. Reactive: Assessing Your Network Strategy On Demand: Manage Network Operations Risk and Compliance May 21
  • 25. #CiscoSmartTalk 25© 2015 Cisco and/or its affiliates. All rights reserved. QUESTIONS?
  • 26. #CiscoSmartTalk 26© 2015 Cisco and/or its affiliates. All rights reserved. ThankYou

Editor's Notes

  1. Insert intro slide for some housekeeping notes prior to presentation
  2. Tweet out slide deck
  3. Here are the 6 fundamental areas to address on your shift from reactive to proactive network management.
  4. Today we’re going to focus on a plan to reduce security risks.
  5. Poll question.
  6. How many of you know what your weak links are? As you know, it only takes one small oversight, like a configuration error, to open your network up to attacks. As business models, technologies and regulations change, organizations are asking questions like: What‘s our security risk of moving to the cloud? With more devices accessing our network, how can we effectively control user access levels? We have so many fragmented point-solutions for security….how can we reduce this complexity? It seems like there’s a shortage of security talent in the market. How can we keep up with these constant security changes? During this Smart Talk session, we’ll touch on these areas and discuss some of the critical considerations for reducing risk in your network.
  7. Identify risk in your network Prioritize risk based on your business Remediate risk Validate the removal of risk
  8. An organization’s security posture should never be considered static. Over time, security strategies, products and policies must evolve to keep up with changing business models and modern threats. This is why understanding the current state of your security posture is critical. Knowing how well your security strategy is working and what your vulnerabilities are will help you create a strategy map to get to your desired end state.
  9. When it’s time to validate your security posture, you should always assess risk based on your business needs. From network devices assessments to collaboration security, there’s a wide array of assessments that can you help you pinpoint areas for improvement. For example, you could run a Perimeter Security Assessment to identify vulnerabilities that allow inappropriate access to your internal IT infrastructure from the outside OR a you could run a Wireless Security Assessment to identify points of exposure, including unauthorized access points, weak access control, and wireless data leakage.
  10. Here’s what a typical security posture assessment looks like. Review An assessment begins by conducting a detailed review of your security goals and requirements. Probe Based on this information, security experts probe your infrastructure from the interior and perimeter, survey and map your wireless network, and attempt to engineer their way into your facility by simulating modern attacks. This is all done is a safe and controlled manner. Analyze Any discovered vulnerabilities are then analyzed and compared to industry best practices and security intelligence to remove false positives and determine which critical assets and data are exposed. Recommend The results are then prioritized and delivered to you in an actionable report with recommendations for remediation.
  11. Recently, a large insurance company came to us because they knew their current network access controls could be putting the company at risk. It didn’t matter if you were an insurance agent or the CIO, everyone had the same physical and logical access to the network. The only thing differentiating users access levels were privileges set at the application layer. They had previously attempted to address this issue, but failed to implement a solution that didn’t impact their user experience and business operations. However, with new compliance regulations and changing business models, they knew it was time for a different approach. Our first step was to run a Security Design Assessment to identify their risks. The assessment uncovered: A flat network with very little access control Little to no segmentation of critical assets No visibility into current compliance status
  12. Now let’s take a look at the second phase in the vulnerability lifecycle; Prioritizing Risk. When risks are identified, they need to be prioritized based on your environment. Just because Cisco or the common vulnerability scoring systems say something is low or high, it doesn’t necessarily mean that risk value is tied to your organization. You may find that your organization has different circumstances that change the value of that particular risk. Something that’s marked medium, may be a top concern for your environment. Key Message: Establishing your risk framework helps you identify solutions that address your highest risks.
  13. Going back to they insurance company…the question they needed to answer was, which vulnerabilities put our organization at the greatest risk? For their environment, access control was the highest risk so deploying a better identity management solution became their priority. Other risks… No true segmentation of data Non-Compliance
  14. Now that we’ve identified and prioritized risk, it’s time to develop a strategy to improve your security posture. This will become your roadmap to addressing deficiencies with solutions that align to your specific business requirements. Optional – Things to consider while creating your security strategy: Change to security infrastructure must have little to no impact on business operations Business flexibility – ability to add new applications and services while still complying with policies and regulations Security solutions must provide superior protection while reducing complexity
  15. For the insurance company, this meant mapping out a more segmented and controlled approach to users access and critical data assets. This allowed them to setup isolated environments using an access management solution and VLANs. Now their agents only have access to what they need, without the risk of compromising the business. This same segmentation model was applied to their critical data to keep it isolated from other business units.
  16. All changes must be validated to ensure risk removal. For the insurance company this meant validating their network access controls and their data segmentation policies. This validation not only affirms the improvement in their security posture, but also helps them maintain compliance and regulatory standards.
  17. Outcome: By assessing the current state of their security infrastructure, the insurance company gained the insight required to understand and improve their security posture. They identified their vulnerabilities, prioritized risks based on their environment, created a security strategy aligned with their business goals, and then validated the removal of the risk.
  18. NOS Security Services Security Optimization Assessment Managed Threat Defense (MTD)
  19. Cisco 2015 Annual Security Report http://www.cisco.com/web/offers/lp/2015-annual-security-report/index.html Security Optimization Service At-A-Glance http://www.cisco.com/web/services/portfolio/documents/security-optimization-service-aag.pdf Managed Threat Defense At-A-Glance http://www.cisco.com/web/services/portfolio/documents/managed-threat-defense-service.pdf
  20. How we define A&M
  21. Customize as needed.