SlideShare a Scribd company logo
1 of 18
Bruce Johnson
Senior Product Marketing Manager
February 10, 2016
Cisco Web and Email Security
New Ways to Protect from
the Top Threat Vectors
Email: Leading Threat Vector
Data Loss
Acceptable Use
Violations
Malware Infections
IPv6 Spam
Blended Threats
Targeted
Attacks
APTs
Advanced Malware
Rootkits
Worms Trojan Horse
205.6 Billion
Emails per Day in 2015
and Growing - Radicati
Blended Attacks
Multiple Security Layers Needed
Point in Time Security is Not Enough!
BEFORE
Discover
Enforce
Harden
DURING
Detect
Block
Defend
AFTER
Scope
Contain
Remediate
Web ReputationWeb Reputation
Usage ControlsUsage Controls
Malware SignatureMalware Signature
File ReputationFile Reputation
File SandboxingFile Sandboxing
File RetrospectionFile Retrospection
Application ControlsApplication Controls
Threat AnalyticsThreat Analytics
Actionable
Reporting
Actionable
Reporting
Cisco Confidential 5© 2013-2014 Cisco and/or its affiliates. All rights reserved.
“If you knew you were going
to be compromised…
…would you do security
differently?”
Joe CFO
Waiting for his plane
Meet Joe. He is heading
home for a well deserved
vacation.
He’s catching up on email
using the airport Wi-Fi while
he waits for his flight.
BEFORE
Joe CFO
Checks his email
Joe just got an email from
his vacation resort with a
confirmation link.
www.beautiful-hawaii.com
BEFORE
Your Tropical Getaway
Joe,
Thank you for choosing us. We look forward to seeing you.
Before your arrival, please verify your information here:
www.vacationresort.com
Best,
Resort Team
Joe CFO
Instinctively, he clicks on the link
No problem, right?
Everything looks normal.
The site may even be a
trusted site,
or maybe a site that is
newly minted.
BEFORE
Your Tropical Getaway
Joe,
Thank you for choosing us. We look forward to seeing you.
Before your arrival, please verify your information here:
www.vacationresort.com
Best,
Resort Team
DURING
Joe CFO
Joe is now infected
Joe opens the link and the resort video
plays.
Although he doesn’t know it, Joe’s
machine has been compromised by a
flash-based video exploit.
The malware now starts to harvest
Joe’s confidential information:
•Passwords
•Credentials
•Company access authorizations
Cisco Confidential 10© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Now let’s see how Cisco’s
Layered Defense protects Joe….
instant replay
Meet Joe. He is heading
home for a well deserved
vacation.
Instant Replay with Cisco Security
BEFORE
Waiting for his plane
How Cisco Protects You
Joe just got an email from
his vacation resort.
Instant Replay with Cisco Email Security
DURING
Checks his email
How Cisco Protects You
Your Tropical Getaway
Joe,
Thank you for choosing us. We look forward to seeing you.
Before your arrival, please verify your information here:
www.vacationresort.com
Best,
Resort Team
No problem, right?
Everything looks normal.
Instant Replay with Cisco Web Security
DURING
Instinctively, he clicks on the link
How Cisco Protects You
Deploys malware protection
Traces phone home traffic
Conducts 200 pt. website “credit check”
Controls social media micro-app policy
Activates embedded protection
Your Tropical Getaway
Joe,
Thank you for choosing us. We look forward to seeing you.
Before your arrival, please verify your information here:
www.vacationresort.com
Best,
Resort Team
Traces “phone home” traffic
Joe opens the link and the
resort video plays.
Instant Replay with Cisco AMP for Email & Web Security
DURING
Joe is protected
How Cisco Protects You
Isolates unknown files through sandboxing
Evaluates file reputation
Registers files
After a relaxing vacation,
Joe returns home protected
and unaware that the threat
even existed. (and he still
has a job!)
Joe CFO arrives home
AFTER
Joe is protected
After a few days, a file
begins to behave
maliciously.
Joe CFO arrives home
AFTER
Joe is protected
How Cisco Protects You
Identifies polymorphic attacks
Discovers patient zero and zero +1
Analyzes threats retrospectively
Layered Email and Web Security
Best Defense for Complex Threats
Come by the Email
and Web Security
Booth and Learn
More
Thank you

More Related Content

What's hot

Internet security and privacy
Internet security and privacyInternet security and privacy
Internet security and privacygbemis00
 
Deployment Scenarios KES4B [Kaspersky]
Deployment Scenarios KES4B [Kaspersky]Deployment Scenarios KES4B [Kaspersky]
Deployment Scenarios KES4B [Kaspersky]Desmond Israel
 
Android App Security Solution
Android App Security SolutionAndroid App Security Solution
Android App Security SolutionJay Li
 
Top 5 website security myths
Top 5 website security mythsTop 5 website security myths
Top 5 website security mythskanika sharma
 
Pure retail training non animation
Pure retail training non animationPure retail training non animation
Pure retail training non animationkatelyn-fogarty
 
Pure retail training presentation
Pure retail training presentationPure retail training presentation
Pure retail training presentationkatelyn-fogarty
 
Pure retail training presentation v2
Pure retail training presentation v2Pure retail training presentation v2
Pure retail training presentation v2kaspersky-lab
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureHeimdal Security
 
AVG 8.0 Product Listing
AVG 8.0 Product ListingAVG 8.0 Product Listing
AVG 8.0 Product Listinglilsyko
 
Bitdefender Android/Mobile Security
Bitdefender Android/Mobile SecurityBitdefender Android/Mobile Security
Bitdefender Android/Mobile SecurityKazi Sarwar Hossain
 
Simple Steps to Online Safety
 Simple Steps to Online Safety  Simple Steps to Online Safety
Simple Steps to Online Safety Symantec
 
Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]Prathan Phongthiproek
 
Top10 Biggest Security Threats
Top10 Biggest Security ThreatsTop10 Biggest Security Threats
Top10 Biggest Security ThreatsKim Jensen
 
Keep Your SME Safe Online
Keep Your SME Safe OnlineKeep Your SME Safe Online
Keep Your SME Safe Onlinealbryce
 

What's hot (18)

Internet security and privacy
Internet security and privacyInternet security and privacy
Internet security and privacy
 
Deployment Scenarios KES4B [Kaspersky]
Deployment Scenarios KES4B [Kaspersky]Deployment Scenarios KES4B [Kaspersky]
Deployment Scenarios KES4B [Kaspersky]
 
Android App Security Solution
Android App Security SolutionAndroid App Security Solution
Android App Security Solution
 
Top 5 website security myths
Top 5 website security mythsTop 5 website security myths
Top 5 website security myths
 
Viruses
VirusesViruses
Viruses
 
Pure retail training non animation
Pure retail training non animationPure retail training non animation
Pure retail training non animation
 
Pure retail training presentation
Pure retail training presentationPure retail training presentation
Pure retail training presentation
 
Pure retail training presentation v2
Pure retail training presentation v2Pure retail training presentation v2
Pure retail training presentation v2
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
 
AVG 8.0 Product Listing
AVG 8.0 Product ListingAVG 8.0 Product Listing
AVG 8.0 Product Listing
 
Bitdefender Android/Mobile Security
Bitdefender Android/Mobile SecurityBitdefender Android/Mobile Security
Bitdefender Android/Mobile Security
 
Simple Steps to Online Safety
 Simple Steps to Online Safety  Simple Steps to Online Safety
Simple Steps to Online Safety
 
Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]
 
REVE Antivirus
REVE AntivirusREVE Antivirus
REVE Antivirus
 
1
11
1
 
IT Security for Small Business
IT Security for Small BusinessIT Security for Small Business
IT Security for Small Business
 
Top10 Biggest Security Threats
Top10 Biggest Security ThreatsTop10 Biggest Security Threats
Top10 Biggest Security Threats
 
Keep Your SME Safe Online
Keep Your SME Safe OnlineKeep Your SME Safe Online
Keep Your SME Safe Online
 

Similar to Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation

Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Security
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself OnlineGary Wagnon
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationJeff Zahn
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?TechGenie
 
Seminar on Phishing Protection
Seminar on Phishing ProtectionSeminar on Phishing Protection
Seminar on Phishing ProtectionCristian Garcia G.
 
Computer Viruses, Biometrics, And Encryption
Computer Viruses, Biometrics, And EncryptionComputer Viruses, Biometrics, And Encryption
Computer Viruses, Biometrics, And Encryptionjpatetta
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfSoo Chin Hock
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldEmil Tan
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Mainsmeech
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Mukesh Chinta
 
Mobile Security Attacks: A Glimpse from the Trenches - Yair Amit, Skycure
Mobile Security Attacks: A Glimpse from the Trenches - Yair Amit, SkycureMobile Security Attacks: A Glimpse from the Trenches - Yair Amit, Skycure
Mobile Security Attacks: A Glimpse from the Trenches - Yair Amit, SkycureCodemotion Tel Aviv
 
Mobile Security: A Glimpse from the Trenches
Mobile Security: A Glimpse from the TrenchesMobile Security: A Glimpse from the Trenches
Mobile Security: A Glimpse from the TrenchesYair Amit
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesShmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesTyler Shields
 

Similar to Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation (20)

Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
pp.pptx
pp.pptxpp.pptx
pp.pptx
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentation
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
 
Seminar on Phishing Protection
Seminar on Phishing ProtectionSeminar on Phishing Protection
Seminar on Phishing Protection
 
Computer Viruses, Biometrics, And Encryption
Computer Viruses, Biometrics, And EncryptionComputer Viruses, Biometrics, And Encryption
Computer Viruses, Biometrics, And Encryption
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
What is malware
What is malwareWhat is malware
What is malware
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber World
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3
 
Mobile Security Attacks: A Glimpse from the Trenches - Yair Amit, Skycure
Mobile Security Attacks: A Glimpse from the Trenches - Yair Amit, SkycureMobile Security Attacks: A Glimpse from the Trenches - Yair Amit, Skycure
Mobile Security Attacks: A Glimpse from the Trenches - Yair Amit, Skycure
 
Mobile Security: A Glimpse from the Trenches
Mobile Security: A Glimpse from the TrenchesMobile Security: A Glimpse from the Trenches
Mobile Security: A Glimpse from the Trenches
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesShmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the Berries
 

Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation

  • 1. Bruce Johnson Senior Product Marketing Manager February 10, 2016 Cisco Web and Email Security New Ways to Protect from the Top Threat Vectors
  • 2. Email: Leading Threat Vector Data Loss Acceptable Use Violations Malware Infections IPv6 Spam Blended Threats Targeted Attacks APTs Advanced Malware Rootkits Worms Trojan Horse 205.6 Billion Emails per Day in 2015 and Growing - Radicati
  • 4. Point in Time Security is Not Enough! BEFORE Discover Enforce Harden DURING Detect Block Defend AFTER Scope Contain Remediate Web ReputationWeb Reputation Usage ControlsUsage Controls Malware SignatureMalware Signature File ReputationFile Reputation File SandboxingFile Sandboxing File RetrospectionFile Retrospection Application ControlsApplication Controls Threat AnalyticsThreat Analytics Actionable Reporting Actionable Reporting
  • 5. Cisco Confidential 5© 2013-2014 Cisco and/or its affiliates. All rights reserved. “If you knew you were going to be compromised… …would you do security differently?”
  • 6. Joe CFO Waiting for his plane Meet Joe. He is heading home for a well deserved vacation. He’s catching up on email using the airport Wi-Fi while he waits for his flight. BEFORE
  • 7. Joe CFO Checks his email Joe just got an email from his vacation resort with a confirmation link. www.beautiful-hawaii.com BEFORE Your Tropical Getaway Joe, Thank you for choosing us. We look forward to seeing you. Before your arrival, please verify your information here: www.vacationresort.com Best, Resort Team
  • 8. Joe CFO Instinctively, he clicks on the link No problem, right? Everything looks normal. The site may even be a trusted site, or maybe a site that is newly minted. BEFORE Your Tropical Getaway Joe, Thank you for choosing us. We look forward to seeing you. Before your arrival, please verify your information here: www.vacationresort.com Best, Resort Team
  • 9. DURING Joe CFO Joe is now infected Joe opens the link and the resort video plays. Although he doesn’t know it, Joe’s machine has been compromised by a flash-based video exploit. The malware now starts to harvest Joe’s confidential information: •Passwords •Credentials •Company access authorizations
  • 10. Cisco Confidential 10© 2013-2014 Cisco and/or its affiliates. All rights reserved. Now let’s see how Cisco’s Layered Defense protects Joe…. instant replay
  • 11. Meet Joe. He is heading home for a well deserved vacation. Instant Replay with Cisco Security BEFORE Waiting for his plane How Cisco Protects You
  • 12. Joe just got an email from his vacation resort. Instant Replay with Cisco Email Security DURING Checks his email How Cisco Protects You Your Tropical Getaway Joe, Thank you for choosing us. We look forward to seeing you. Before your arrival, please verify your information here: www.vacationresort.com Best, Resort Team
  • 13. No problem, right? Everything looks normal. Instant Replay with Cisco Web Security DURING Instinctively, he clicks on the link How Cisco Protects You Deploys malware protection Traces phone home traffic Conducts 200 pt. website “credit check” Controls social media micro-app policy Activates embedded protection Your Tropical Getaway Joe, Thank you for choosing us. We look forward to seeing you. Before your arrival, please verify your information here: www.vacationresort.com Best, Resort Team Traces “phone home” traffic
  • 14. Joe opens the link and the resort video plays. Instant Replay with Cisco AMP for Email & Web Security DURING Joe is protected How Cisco Protects You Isolates unknown files through sandboxing Evaluates file reputation Registers files
  • 15. After a relaxing vacation, Joe returns home protected and unaware that the threat even existed. (and he still has a job!) Joe CFO arrives home AFTER Joe is protected
  • 16. After a few days, a file begins to behave maliciously. Joe CFO arrives home AFTER Joe is protected How Cisco Protects You Identifies polymorphic attacks Discovers patient zero and zero +1 Analyzes threats retrospectively
  • 17. Layered Email and Web Security Best Defense for Complex Threats Come by the Email and Web Security Booth and Learn More

Editor's Notes

  1. T: There are new challenges during every stage of an attack.
  2. Cisco Web security provides protection across the attack continuum. We start with Web Reputation, Usage and application controls During an attack your protected with : Malware Signature File reputation And file sandboxing for dynamic analysis And after an attack with continuous retrospection – the ability to identify malicious malware that crossed the wire undetected – using file retrospection, threat analytics and actionable reporting capabilities.
  3. If it was your house that was going to be broken into, certainly. The same should be true for your system, after all both represent your personal information, property and safety. Allow me to present a use case. Let’s consider an email based spear phishing attack and how it would unfold across the attack continuum. The target will be Joe. He’s a CFO on his way home to enjoy some vacation time. Joe’s going to receive an email from what looks like a trusted site. In reality, the email is a targeted attack and contains a compromised link. We’ll look at two versions of this case: one in which Joe is unprotected, and one in which Joe is protected by Cisco security products. T: First, let’s look a scenario where Joe is not protected.
  4. Meet Joe CFO. He’s sitting in the airport waiting to head home. He’s excited to go back for a well deserved vacation. T: He’s using the public airport Wi-Fi to check his email
  5. Joe just received an email from what appears to be his vacation resort. It is asking him to verify his information – a credit card number, dinner reservations, or any number of things. It wants him to verify by clicking on an embedded URL link. T: Joe is drawn to the link.
  6. Everything seems fine. There is a factor of trust, since Joe is going on vacation and the email is from a vacation resort. The email may even be from a trusted site that has been compromised. T: Joe clicks on the link.
  7. A resort video plays. Although he doesn’t know it, Joe has been taken to a website with a flash-based video exploit and it has downloaded malware onto his machine. The malware begins to harvest his information. Joe’s passwords, credentials, and company access authorizations have all been compromised. He has unknowingly given hackers the ability to steal sensitive company and customer information. T: Enjoy your vacation Joe.
  8. As a company CFO, Joe is an attractive target. In order to secure his and his company’s information, Joe needs the best possible protection. In a moment we’ll explore the second version of the case. This time, Joe will have Cisco’s Talos and layered defense products to protect him, his company’s information, and his job. T: Before that, allow me to briefly expand on Cisco’s Talos.
  9. Meet Joe again. He’s using the public airport Wi-Fi to check his email. He is accessing his corporate network via an encrypted VPN from Cisco. His mobile devices are being managed through Cisco’s Identity Services Engine. Cloud security and split tunneling are implemented for further protection, and Talos inoculates his device against malware. Lastly our indexing can us to track patterns of behavior and analyze it for harmful patters. So that we can identify complex attacks even if they are made up of seemingly benign actions. T: Before an attack even happens, Joe is actively being defended.
  10. He receives an email from what appears to be his vacation resort. As Joe opens the email, Cisco’s email security appliance and Talos spring into action. They provide an email credit check, conduct a 200 point inspection, rewrite or redirect URLs and enforce corporate security policy. It seems that the resort staff are asking Joe to verify his information by clicking on a hyperlinked web address. T: Joe is drawn to the link while Cisco continues to protect him.
  11. Everything seems fine. The email address is legitimate and the site it links to appears to be legitimate as well. Joe clicks on the link while his defenses take action. Cisco’s security products activate embedded protection and conduct a 200 point website “credit check.” They deploy malware protection, control social media micro-app policy and trace phone home traffic. T: Joe’s browser opens the web page.
  12. A resort video plays. Though he doesn’t know it, Joe has been taken to a malicious website that begins to download files onto his machine. But this time, Joe is protected. Cisco security products register the downloaded files and evaluate their reputations. They isolate unknown and suspicious files through sandboxing and update the Talos database in order to inoculate against further attacks. T: Joe can now enjoy his vacation without the worry of a security threat.
  13. T: Joe returns home with his devices and data secure.
  14. Now let’s say that a file appears to be legitimate. It passes through Joe’s defenses and is loaded onto his device. Three days later a timer goes off, and the file begins to behave maliciously. Joe is now the target of a polymorphic attack. Thankfully for Joe, Cisco security products analyze threats retrospectively. They identify the polymorphic attack, discover patient zero and trace the file’s trajectory to discover if anyone else has been attacked. All discoveries are cataloged and added to the Talos database to inoculate even further. T: With Cisco security, the damages can be traced, scoped and remediated.