SlideShare a Scribd company logo
1 of 25
Download to read offline
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Changing The Security Equation
Stephen Dane
Managing Director, Security, Asia Pacific & Japan
March 2018
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
Global security challenges
People
• Talent Crunch
• High Demanded Expertise
• Increased Costs
Digital Disruption,
Massive Scale
• 50B Devices
Connected by 2020
• $19T Opportunity
Security Industry
• Rapidly expanding number
of security companies
• Not interoperable
• Not open
Active Adversaries
• Attack surface
• Threat Actors
• Attack Sophistication
Dynamic
Threat
Landscape
Changing
Business Models
Complexity and
Fragmentation
Shortage of
Cybersecurity
Experts
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
Current situation and outlook
ASEAN is a prime target for cyber attack...
... and the threat landscape is bound to
escalate over time
Rising Systemic Risk
• Increasing trade and business linkages will make the region as
strong as its weakest link
Sustained under-investment
• Diverging national priorities and different paces of digital evolution
will lead to persistent under-investment
Persistently porous cyber defenses
• Caused by limited intelligence sharing, increasing vulnerability to
Advanced Persistent Threats
Larger attack surfaces leading to complexity in
monitoring and response
• Due to technology developments (IT/OT convergence, Multi-cloud,
increased share of encrypted traffic)
Policy preparedness and institutional oversight is
extremely low
• Lack of strategic mindset around policy and governance
• Absence of a unifying framework
• Significant under-investment
Absence of a holistic approach by businesses
• Cyber risk is seen as IT rather than business risk
Nascent local cybersecurity industry together with
limited buyer awareness
• Fragmentation
• Multi vendor/product landscape leading to operational complexity
• Paucity of skilled talent
Cybersecurity in ASEAN
1. Based on Market capitalization of Top 1000 listed companies across SEA in 2017
Source: A.T. Kearney interviews and analysis
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
ASEAN countries have emerged as launchpads for
cyber attack either as vulnerable hotbeds or as trusted,
well-connected hubs
Blocked suspicious web activity by country of origin (expected ratio = 1.0)
0.83Chile
1.43Peru
1.46Panama
1.54Belize
1.20United States
2.11Canada
1.15 Venezuela
1.22Italy
0.87
France
Germany
Ukraine
Turkey
Romania
0.94 Russia
1.31 China
Malaysia
1.60 Australia
Indonesia
Vietnam
3.52
2.84
1.07
3.88
1.47
1.00
2.77
• Malaysia and Indonesia
are global hotspots for
major blocked
suspicious web
activities—up to 3.5
times the standard ratio
• Vietnam is amongst the
top 5 countries from
which attacks on IoT
devices originated
Source: A.T. Kearney research report
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
National
Strategy
development
Legislation
Governance
and operational
entities
International
cooperation
Awareness
Capacity
building
Sector –
specific focus
Singapore Malaysia Philippines Thailand Indonesia Vietnam Rest of ASEAN
Absent Initiated / Proposed Established & Operational
Level of policy preparedness across ASEAN remains low
across most countries, with lack of a unifying framework
Only Singapore and
Malaysia have operational
National strategies
Progress on legislation
and governance remains
fairly slow
Source:
A.T. Kearney, Interviews, Press clippings
Most regional efforts
focused on
Capacity Building
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
Identify
Identify End Point Network Content Cloud Analytics IOT SIEM Managed & Professional Security Services
Protect
Defect
Respond
Recover
Share of ASEAN cyber security
spend, 2017
x% Product Design & Development 70% Services 30%
Vendor positioning across the security value chain
Product/Product
Implementation &/or
Monitoring Services
Technology
Capability Specialist
Holistic Solutions
Provider
Regional System
Integrators &
Managed Service
Providers
Consulting &
Services Providers
Product & Technology of others
Product & Technology of others
Focused on limited set of
products they supply
Fragmented vendor landscape with few
holistic providers …
Large number of localized MSS
providers with limited regional
mobility
Source: Industry interviews, A.T.Kearney analysis
…and several hundred small
niche players Rely on others
Large number of product
specialists with varied
capabilities
Very few holistic solutions
providers, perpetuating “best of
breed as an industry practice”
Emerging regional systems
integrators facing challenges in
expanding across the value chain.
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
Urgent call to action across ASEAN
Source: A.T. Kearney analysis
Secure sustained
regional
commitment for
cybersecurity
Elevate
cybersecurity on the
regional policy
agenda
Build the next wave
of cybersecurity
capability
Fortify the
Ecosystem
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
Changing the equation
People
Policy & Process
Technology
Networking Academy 20 years
students across
180 countries
7.8 million
students in
Asia Pacific & Japan
1.26 million
Security students
trained globally in FY17
90,000
students in Asia
Pacific & Japan
10,000and
Security & Trust Organization
Integrated architectural approach
Engages world governments
to help shape national cybersecurity policy agenda
INTERPOL collaboration
to share threat intelligence & best practices
New era of networking
security is foundational
Security
enables digital transformation
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
Cisco’s Security architecture
Security that works together
Threat Intelligence –
Services
Endpoint CloudNetwork
4.6 Hours Reduced Time To Detection | On Average 184 Days To Detect A Breach In ASEAN
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
Security capabilities integrated throughout
the network
Digital Network Architecture
Network visibility Network Segmentation
360° visibility
Real-time analysis of data and traffic to provide
visibility and intelligence across the network
Dynamic control
Software-defined segmentation for effective and
consistent policy application
Comprehensive automation
Integrated solutions that augment your
capabilities and reduce manual processes
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
Malicious binaries and encryption
Increase
November 2016
Attackers embrace encryption to conceal command-and-control activity
19%
12% Increase
268%70%
50%
38%
Global Encrypted Web Traffic Malicious Sandbox Binaries with Encryption
October 2017
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
The Cisco network with Encrypted Traffic Analytics
Known
malware traffic
Known
benign traffic
Extract
observable
features in
the data
Employ
machine learning
techniques
to build detectors
Malware
detected in
Encrypted
Traffic
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
Deep Visibility
Context
Control
Malware will get in. You must prevent what you can, but you can never prevent 100% of attacks.
So what’s needed to protect against threats that get in?
Securing the endpoint
PC
MobileLinux
Mac
on the
endpoint
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
AMP for Endpoints
Prevent
Prevent attacks and block
malware in real time
Detect
Continuously monitor
to reduce time
to detection
Respond
Accelerate investigations and
remediate faster and more
effectively
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
SEE
Once
Threat
Endpoint security in action
17
AMP Cloud1
Threat Grid2
Security
Intelligence
Endpoint
AMP for Endpoint
Enforce
Everywhere
3
Endpoint CloudNetwork
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
Cisco AMP for Endpoints Excels
in ‘The Evolving Effectiveness of
Endpoint Protection Solutions’ Report
AMP for Endpoints
named a Leader
Cisco named a Visionary
for AMP for Endpoints
Gartner 2018 Magic
Quadrant for Endpoint
Protection Platforms
Gartner evaluated 12 endpoint
security products, including Cisco
AMP for Endpoints
IDC Marketscape: Worldwide Endpoint
Specialized Threat Analysis and
Protection 2017 Vendor Assessment
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
It’s a multicloud world
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
Modern data centers are incredibly complex
Big and Fast Data
Virtualization
Expanded attack surface
Increase in east-west traffic
Hybrid Cloud
Multi cloud orchestration
Workload portability
Zero trust model
Application Architecture
Continuous development | Micro Services | APIs
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
Visibility
“See Everything”
Complete visibility of users,
devices, networks, applications,
workloads and processes
Threat protection
“Stop the Breach”
Quickly detect, block, and respond to
attacks before hackers can steal data
or disrupt operations
Segmentation
“Reduce the Attack Surface”
Prevent attackers from moving
laterally east-west with application
whitelisting and micro-segmentation
Securing the data center
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
Attack Continuum
Before During After
Security everywhere architecture
22
Branch IOTCloudData CenterEndpoint CampusEdge
Web
Network Analytics
Advanced Malware
Secure Internet Gateway
UTMW W W
Policy & Access
Email
NGFW + NGIPS
Cloud Security
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
PROTECTING YOUR NETWORK
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
Deeper data + more context = better security
We analyze massive
amounts of data —
19.7 billion threats
blocked daily
Our real-time
datasets are diverse,
global, and live
600 Billion
Email samples
16 Billion
Web requests
3.4 Billion
AMP queries
160
Countries
worldwide
100 Billion
Internet
requests
12,000
Enterprise
customers
80 Million
Daily active
users
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
Why Cisco Security
5K
People Strong
#1
Cisco Priority
Threat Researchers
250
Invested
Billions
Sourcefire
Lancope
Neohapsis
OpenDNS
ThreatGRID
Cognitive
Portcullis
CloudLock
Faster Finding
Breaches
100x
Ongoing
Innovation
Best of breed
portfolio
Integrated
Threats Blocked
Daily
19.7B
Fortune 100 use
Cisco Security
88%
Security
Effectiveness
99%
Cisco Connect 2018 Philippines -   security keynote

More Related Content

What's hot

FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsPuneet Kukreja
 
From Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber ResilienceFrom Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber Resilienceaccenture
 
Google peter logli & jake shea
Google   peter logli & jake sheaGoogle   peter logli & jake shea
Google peter logli & jake sheaColloqueRISQ
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
Cloud Computing & Cybersecurity
Cloud Computing & CybersecurityCloud Computing & Cybersecurity
Cloud Computing & CybersecurityDavid Sweigert
 
CWIN17 Rome / A holostic cybersecurity
CWIN17 Rome / A holostic cybersecurityCWIN17 Rome / A holostic cybersecurity
CWIN17 Rome / A holostic cybersecurityCapgemini
 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistMatthew Rosenquist
 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingPhil Agcaoili
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
FireEye investis case study
FireEye investis case studyFireEye investis case study
FireEye investis case studycnnetwork
 
CWIN17 New-York / Transforming enterprises with blockchain
CWIN17 New-York / Transforming enterprises with blockchainCWIN17 New-York / Transforming enterprises with blockchain
CWIN17 New-York / Transforming enterprises with blockchainCapgemini
 
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010ARC Advisory Group
 
Outpost24 webinar - Busting the myths of cloud security
Outpost24 webinar - Busting the myths of cloud security Outpost24 webinar - Busting the myths of cloud security
Outpost24 webinar - Busting the myths of cloud security Outpost24
 
Outside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in EnergyOutside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in Energyaccenture
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionNetskope
 
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.Netskope
 
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco #ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco ITSitio.com
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019PECB
 
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesForrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesNetskope
 

What's hot (20)

FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
 
From Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber ResilienceFrom Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber Resilience
 
Google peter logli & jake shea
Google   peter logli & jake sheaGoogle   peter logli & jake shea
Google peter logli & jake shea
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Cloud Computing & Cybersecurity
Cloud Computing & CybersecurityCloud Computing & Cybersecurity
Cloud Computing & Cybersecurity
 
CWIN17 Rome / A holostic cybersecurity
CWIN17 Rome / A holostic cybersecurityCWIN17 Rome / A holostic cybersecurity
CWIN17 Rome / A holostic cybersecurity
 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.Rosenquist
 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter Meeting
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
FireEye investis case study
FireEye investis case studyFireEye investis case study
FireEye investis case study
 
CWIN17 New-York / Transforming enterprises with blockchain
CWIN17 New-York / Transforming enterprises with blockchainCWIN17 New-York / Transforming enterprises with blockchain
CWIN17 New-York / Transforming enterprises with blockchain
 
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
 
Outpost24 webinar - Busting the myths of cloud security
Outpost24 webinar - Busting the myths of cloud security Outpost24 webinar - Busting the myths of cloud security
Outpost24 webinar - Busting the myths of cloud security
 
Outside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in EnergyOutside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in Energy
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
 
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
 
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco #ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
 
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesForrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
 
The State of Cyber
The State of CyberThe State of Cyber
The State of Cyber
 

Similar to Cisco Connect 2018 Philippines - security keynote

Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationNetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response ServicesCisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response ServicesNetworkCollaborators
 
Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаИнтуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаCisco Russia
 
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...NetworkCollaborators
 
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...NetworkCollaborators
 
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4Nur Shiqim Chok
 
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Singapore -   delivering intent for data center networkingCisco Connect 2018 Singapore -   delivering intent for data center networking
Cisco Connect 2018 Singapore - delivering intent for data center networkingNetworkCollaborators
 
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking NetworkCollaborators
 
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assurance
[Cisco Connect 2018 - Vietnam] Yedu s.   introducing cisco dna assurance[Cisco Connect 2018 - Vietnam] Yedu s.   introducing cisco dna assurance
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assuranceNur Shiqim Chok
 
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...NetworkCollaborators
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldNetworkCollaborators
 
[Cisco Connect 2018 - Vietnam] Jijun cai present - cisco connect 2018 vn- c...
[Cisco Connect 2018 - Vietnam] Jijun cai   present - cisco connect 2018 vn- c...[Cisco Connect 2018 - Vietnam] Jijun cai   present - cisco connect 2018 vn- c...
[Cisco Connect 2018 - Vietnam] Jijun cai present - cisco connect 2018 vn- c...Nur Shiqim Chok
 
Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynoteNur Shiqim Chok
 
Cisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights onCisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights onNetworkCollaborators
 
[Cisco Connect 2018 - Vietnam] Jinjun cai print -cisco connect 2018 vn-cisc...
[Cisco Connect 2018 - Vietnam] Jinjun cai   print -cisco connect 2018 vn-cisc...[Cisco Connect 2018 - Vietnam] Jinjun cai   print -cisco connect 2018 vn-cisc...
[Cisco Connect 2018 - Vietnam] Jinjun cai print -cisco connect 2018 vn-cisc...Nur Shiqim Chok
 
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...Cohesive Networks
 
Cisco Connect 2018 Vietnam - Cisco services
Cisco Connect 2018 Vietnam - Cisco servicesCisco Connect 2018 Vietnam - Cisco services
Cisco Connect 2018 Vietnam - Cisco servicesNetworkCollaborators
 
Cisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights onCisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights onNetworkCollaborators
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSMAU
 
Cisco Connect 2018 Indonesia - Do More Than Keep The Lights On
Cisco Connect 2018 Indonesia - Do More Than Keep The Lights OnCisco Connect 2018 Indonesia - Do More Than Keep The Lights On
Cisco Connect 2018 Indonesia - Do More Than Keep The Lights OnNetworkCollaborators
 

Similar to Cisco Connect 2018 Philippines - security keynote (20)

Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
 
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response ServicesCisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response Services
 
Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаИнтуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнеса
 
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
 
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
 
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
 
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Singapore -   delivering intent for data center networkingCisco Connect 2018 Singapore -   delivering intent for data center networking
Cisco Connect 2018 Singapore - delivering intent for data center networking
 
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
 
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assurance
[Cisco Connect 2018 - Vietnam] Yedu s.   introducing cisco dna assurance[Cisco Connect 2018 - Vietnam] Yedu s.   introducing cisco dna assurance
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assurance
 
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
 
[Cisco Connect 2018 - Vietnam] Jijun cai present - cisco connect 2018 vn- c...
[Cisco Connect 2018 - Vietnam] Jijun cai   present - cisco connect 2018 vn- c...[Cisco Connect 2018 - Vietnam] Jijun cai   present - cisco connect 2018 vn- c...
[Cisco Connect 2018 - Vietnam] Jijun cai present - cisco connect 2018 vn- c...
 
Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynote
 
Cisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights onCisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights on
 
[Cisco Connect 2018 - Vietnam] Jinjun cai print -cisco connect 2018 vn-cisc...
[Cisco Connect 2018 - Vietnam] Jinjun cai   print -cisco connect 2018 vn-cisc...[Cisco Connect 2018 - Vietnam] Jinjun cai   print -cisco connect 2018 vn-cisc...
[Cisco Connect 2018 - Vietnam] Jinjun cai print -cisco connect 2018 vn-cisc...
 
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
 
Cisco Connect 2018 Vietnam - Cisco services
Cisco Connect 2018 Vietnam - Cisco servicesCisco Connect 2018 Vietnam - Cisco services
Cisco Connect 2018 Vietnam - Cisco services
 
Cisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights onCisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights on
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - Cisco
 
Cisco Connect 2018 Indonesia - Do More Than Keep The Lights On
Cisco Connect 2018 Indonesia - Do More Than Keep The Lights OnCisco Connect 2018 Indonesia - Do More Than Keep The Lights On
Cisco Connect 2018 Indonesia - Do More Than Keep The Lights On
 

More from NetworkCollaborators

Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy NetworkCollaborators
 
Cisco Connect 2018 Singapore - jordan koh
Cisco Connect 2018 Singapore -  jordan kohCisco Connect 2018 Singapore -  jordan koh
Cisco Connect 2018 Singapore - jordan kohNetworkCollaborators
 
Cisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network IntuitiveCisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network IntuitiveNetworkCollaborators
 
Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition NetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WANCisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WANNetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined AccessCisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined AccessNetworkCollaborators
 
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellCisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellNetworkCollaborators
 
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureCisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureNetworkCollaborators
 
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...NetworkCollaborators
 
Cisco Connect 2018 Philippines - ben green
Cisco Connect 2018 Philippines -  ben greenCisco Connect 2018 Philippines -  ben green
Cisco Connect 2018 Philippines - ben greenNetworkCollaborators
 
Cisco Connect 2018 Philippines - jaymen quah
Cisco Connect 2018 Philippines - jaymen quahCisco Connect 2018 Philippines - jaymen quah
Cisco Connect 2018 Philippines - jaymen quahNetworkCollaborators
 
Cisco Connect 2018 Philippines - The workplace of the future
Cisco Connect 2018 Philippines - The workplace of the futureCisco Connect 2018 Philippines - The workplace of the future
Cisco Connect 2018 Philippines - The workplace of the futureNetworkCollaborators
 
Cisco Connect 2018 Philippines - fay ocampo
Cisco Connect 2018 Philippines - fay ocampoCisco Connect 2018 Philippines - fay ocampo
Cisco Connect 2018 Philippines - fay ocampoNetworkCollaborators
 
Cisco Connect 2018 Philippines - Microsoft azure stack
Cisco Connect 2018 Philippines - Microsoft azure stackCisco Connect 2018 Philippines - Microsoft azure stack
Cisco Connect 2018 Philippines - Microsoft azure stackNetworkCollaborators
 
Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...
Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...
Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...NetworkCollaborators
 
Cisco Connect 2018 Philippines - cybersecurity strategy
Cisco Connect 2018 Philippines - cybersecurity strategyCisco Connect 2018 Philippines - cybersecurity strategy
Cisco Connect 2018 Philippines - cybersecurity strategyNetworkCollaborators
 
Cisco Connect 2018 Philippines - next-generation customer care and the connec...
Cisco Connect 2018 Philippines - next-generation customer care and the connec...Cisco Connect 2018 Philippines - next-generation customer care and the connec...
Cisco Connect 2018 Philippines - next-generation customer care and the connec...NetworkCollaborators
 
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
 Cisco Connect 2018 Philippines - software-defined access-a transformational ... Cisco Connect 2018 Philippines - software-defined access-a transformational ...
Cisco Connect 2018 Philippines - software-defined access-a transformational ...NetworkCollaborators
 
Cisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assuranceCisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assuranceNetworkCollaborators
 
Cisco Connect 2018 Philippines - Trends transforming it network data into bus...
Cisco Connect 2018 Philippines - Trends transforming it network data into bus...Cisco Connect 2018 Philippines - Trends transforming it network data into bus...
Cisco Connect 2018 Philippines - Trends transforming it network data into bus...NetworkCollaborators
 

More from NetworkCollaborators (20)

Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy
 
Cisco Connect 2018 Singapore - jordan koh
Cisco Connect 2018 Singapore -  jordan kohCisco Connect 2018 Singapore -  jordan koh
Cisco Connect 2018 Singapore - jordan koh
 
Cisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network IntuitiveCisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network Intuitive
 
Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition
 
Cisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WANCisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WAN
 
Cisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined AccessCisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined Access
 
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellCisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernell
 
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureCisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
 
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
 
Cisco Connect 2018 Philippines - ben green
Cisco Connect 2018 Philippines -  ben greenCisco Connect 2018 Philippines -  ben green
Cisco Connect 2018 Philippines - ben green
 
Cisco Connect 2018 Philippines - jaymen quah
Cisco Connect 2018 Philippines - jaymen quahCisco Connect 2018 Philippines - jaymen quah
Cisco Connect 2018 Philippines - jaymen quah
 
Cisco Connect 2018 Philippines - The workplace of the future
Cisco Connect 2018 Philippines - The workplace of the futureCisco Connect 2018 Philippines - The workplace of the future
Cisco Connect 2018 Philippines - The workplace of the future
 
Cisco Connect 2018 Philippines - fay ocampo
Cisco Connect 2018 Philippines - fay ocampoCisco Connect 2018 Philippines - fay ocampo
Cisco Connect 2018 Philippines - fay ocampo
 
Cisco Connect 2018 Philippines - Microsoft azure stack
Cisco Connect 2018 Philippines - Microsoft azure stackCisco Connect 2018 Philippines - Microsoft azure stack
Cisco Connect 2018 Philippines - Microsoft azure stack
 
Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...
Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...
Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...
 
Cisco Connect 2018 Philippines - cybersecurity strategy
Cisco Connect 2018 Philippines - cybersecurity strategyCisco Connect 2018 Philippines - cybersecurity strategy
Cisco Connect 2018 Philippines - cybersecurity strategy
 
Cisco Connect 2018 Philippines - next-generation customer care and the connec...
Cisco Connect 2018 Philippines - next-generation customer care and the connec...Cisco Connect 2018 Philippines - next-generation customer care and the connec...
Cisco Connect 2018 Philippines - next-generation customer care and the connec...
 
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
 Cisco Connect 2018 Philippines - software-defined access-a transformational ... Cisco Connect 2018 Philippines - software-defined access-a transformational ...
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
 
Cisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assuranceCisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assurance
 
Cisco Connect 2018 Philippines - Trends transforming it network data into bus...
Cisco Connect 2018 Philippines - Trends transforming it network data into bus...Cisco Connect 2018 Philippines - Trends transforming it network data into bus...
Cisco Connect 2018 Philippines - Trends transforming it network data into bus...
 

Recently uploaded

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Recently uploaded (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Cisco Connect 2018 Philippines - security keynote

  • 1.
  • 2. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Changing The Security Equation Stephen Dane Managing Director, Security, Asia Pacific & Japan March 2018
  • 3. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU Global security challenges People • Talent Crunch • High Demanded Expertise • Increased Costs Digital Disruption, Massive Scale • 50B Devices Connected by 2020 • $19T Opportunity Security Industry • Rapidly expanding number of security companies • Not interoperable • Not open Active Adversaries • Attack surface • Threat Actors • Attack Sophistication Dynamic Threat Landscape Changing Business Models Complexity and Fragmentation Shortage of Cybersecurity Experts
  • 4. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU Current situation and outlook ASEAN is a prime target for cyber attack... ... and the threat landscape is bound to escalate over time Rising Systemic Risk • Increasing trade and business linkages will make the region as strong as its weakest link Sustained under-investment • Diverging national priorities and different paces of digital evolution will lead to persistent under-investment Persistently porous cyber defenses • Caused by limited intelligence sharing, increasing vulnerability to Advanced Persistent Threats Larger attack surfaces leading to complexity in monitoring and response • Due to technology developments (IT/OT convergence, Multi-cloud, increased share of encrypted traffic) Policy preparedness and institutional oversight is extremely low • Lack of strategic mindset around policy and governance • Absence of a unifying framework • Significant under-investment Absence of a holistic approach by businesses • Cyber risk is seen as IT rather than business risk Nascent local cybersecurity industry together with limited buyer awareness • Fragmentation • Multi vendor/product landscape leading to operational complexity • Paucity of skilled talent Cybersecurity in ASEAN 1. Based on Market capitalization of Top 1000 listed companies across SEA in 2017 Source: A.T. Kearney interviews and analysis
  • 5. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU ASEAN countries have emerged as launchpads for cyber attack either as vulnerable hotbeds or as trusted, well-connected hubs Blocked suspicious web activity by country of origin (expected ratio = 1.0) 0.83Chile 1.43Peru 1.46Panama 1.54Belize 1.20United States 2.11Canada 1.15 Venezuela 1.22Italy 0.87 France Germany Ukraine Turkey Romania 0.94 Russia 1.31 China Malaysia 1.60 Australia Indonesia Vietnam 3.52 2.84 1.07 3.88 1.47 1.00 2.77 • Malaysia and Indonesia are global hotspots for major blocked suspicious web activities—up to 3.5 times the standard ratio • Vietnam is amongst the top 5 countries from which attacks on IoT devices originated Source: A.T. Kearney research report
  • 6. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU National Strategy development Legislation Governance and operational entities International cooperation Awareness Capacity building Sector – specific focus Singapore Malaysia Philippines Thailand Indonesia Vietnam Rest of ASEAN Absent Initiated / Proposed Established & Operational Level of policy preparedness across ASEAN remains low across most countries, with lack of a unifying framework Only Singapore and Malaysia have operational National strategies Progress on legislation and governance remains fairly slow Source: A.T. Kearney, Interviews, Press clippings Most regional efforts focused on Capacity Building
  • 7. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU Identify Identify End Point Network Content Cloud Analytics IOT SIEM Managed & Professional Security Services Protect Defect Respond Recover Share of ASEAN cyber security spend, 2017 x% Product Design & Development 70% Services 30% Vendor positioning across the security value chain Product/Product Implementation &/or Monitoring Services Technology Capability Specialist Holistic Solutions Provider Regional System Integrators & Managed Service Providers Consulting & Services Providers Product & Technology of others Product & Technology of others Focused on limited set of products they supply Fragmented vendor landscape with few holistic providers … Large number of localized MSS providers with limited regional mobility Source: Industry interviews, A.T.Kearney analysis …and several hundred small niche players Rely on others Large number of product specialists with varied capabilities Very few holistic solutions providers, perpetuating “best of breed as an industry practice” Emerging regional systems integrators facing challenges in expanding across the value chain.
  • 8. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU Urgent call to action across ASEAN Source: A.T. Kearney analysis Secure sustained regional commitment for cybersecurity Elevate cybersecurity on the regional policy agenda Build the next wave of cybersecurity capability Fortify the Ecosystem
  • 9. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU Changing the equation People Policy & Process Technology Networking Academy 20 years students across 180 countries 7.8 million students in Asia Pacific & Japan 1.26 million Security students trained globally in FY17 90,000 students in Asia Pacific & Japan 10,000and Security & Trust Organization Integrated architectural approach Engages world governments to help shape national cybersecurity policy agenda INTERPOL collaboration to share threat intelligence & best practices New era of networking security is foundational Security enables digital transformation
  • 10. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU Cisco’s Security architecture Security that works together Threat Intelligence – Services Endpoint CloudNetwork 4.6 Hours Reduced Time To Detection | On Average 184 Days To Detect A Breach In ASEAN
  • 11. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU Security capabilities integrated throughout the network Digital Network Architecture Network visibility Network Segmentation 360° visibility Real-time analysis of data and traffic to provide visibility and intelligence across the network Dynamic control Software-defined segmentation for effective and consistent policy application Comprehensive automation Integrated solutions that augment your capabilities and reduce manual processes
  • 12. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU Malicious binaries and encryption Increase November 2016 Attackers embrace encryption to conceal command-and-control activity 19% 12% Increase 268%70% 50% 38% Global Encrypted Web Traffic Malicious Sandbox Binaries with Encryption October 2017
  • 13. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU The Cisco network with Encrypted Traffic Analytics Known malware traffic Known benign traffic Extract observable features in the data Employ machine learning techniques to build detectors Malware detected in Encrypted Traffic
  • 14. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU Deep Visibility Context Control Malware will get in. You must prevent what you can, but you can never prevent 100% of attacks. So what’s needed to protect against threats that get in? Securing the endpoint PC MobileLinux Mac on the endpoint
  • 15. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU AMP for Endpoints Prevent Prevent attacks and block malware in real time Detect Continuously monitor to reduce time to detection Respond Accelerate investigations and remediate faster and more effectively
  • 16. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU SEE Once Threat Endpoint security in action 17 AMP Cloud1 Threat Grid2 Security Intelligence Endpoint AMP for Endpoint Enforce Everywhere 3 Endpoint CloudNetwork
  • 17. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU Cisco AMP for Endpoints Excels in ‘The Evolving Effectiveness of Endpoint Protection Solutions’ Report AMP for Endpoints named a Leader Cisco named a Visionary for AMP for Endpoints Gartner 2018 Magic Quadrant for Endpoint Protection Platforms Gartner evaluated 12 endpoint security products, including Cisco AMP for Endpoints IDC Marketscape: Worldwide Endpoint Specialized Threat Analysis and Protection 2017 Vendor Assessment
  • 18. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU It’s a multicloud world
  • 19. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU Modern data centers are incredibly complex Big and Fast Data Virtualization Expanded attack surface Increase in east-west traffic Hybrid Cloud Multi cloud orchestration Workload portability Zero trust model Application Architecture Continuous development | Micro Services | APIs
  • 20. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU Visibility “See Everything” Complete visibility of users, devices, networks, applications, workloads and processes Threat protection “Stop the Breach” Quickly detect, block, and respond to attacks before hackers can steal data or disrupt operations Segmentation “Reduce the Attack Surface” Prevent attackers from moving laterally east-west with application whitelisting and micro-segmentation Securing the data center
  • 21. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU Attack Continuum Before During After Security everywhere architecture 22 Branch IOTCloudData CenterEndpoint CampusEdge Web Network Analytics Advanced Malware Secure Internet Gateway UTMW W W Policy & Access Email NGFW + NGIPS Cloud Security
  • 22. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU PROTECTING YOUR NETWORK
  • 23. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU Deeper data + more context = better security We analyze massive amounts of data — 19.7 billion threats blocked daily Our real-time datasets are diverse, global, and live 600 Billion Email samples 16 Billion Web requests 3.4 Billion AMP queries 160 Countries worldwide 100 Billion Internet requests 12,000 Enterprise customers 80 Million Daily active users
  • 24. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU Why Cisco Security 5K People Strong #1 Cisco Priority Threat Researchers 250 Invested Billions Sourcefire Lancope Neohapsis OpenDNS ThreatGRID Cognitive Portcullis CloudLock Faster Finding Breaches 100x Ongoing Innovation Best of breed portfolio Integrated Threats Blocked Daily 19.7B Fortune 100 use Cisco Security 88% Security Effectiveness 99%