Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Intelligent Cybersecurity 
for the Real World 
Francisco Ramirez 
Ghassan Dreibi 
Nov 5, 2014
Agenda 
Session 1 
Francisco Ramirez – Security Managing Director 
Ghassan Dreibi – Strategic & Planning BDM 
Session 2 
C...
The Industrialization of Hacking 
Hacking Becomes 
an Industry 
Sophisticated Attacks, 
Complex Landscape 
Phishing, Low 
...
Threat Landscape Demands more than Application Control 
100% 
of companies connect 
to domains that host 
malicious files ...
The Pervasiveness of Malicious Traffic 
High-Threat Malware 
Hijacked Infrastructure 
Sites without Content 
Suspect FTP 
...
The Silver Bullet Does Not Exist 
Sandboxing 
Application 
Control 
“Detect the 
Unknown” 
“Fix the Firewall” 
“Captive po...
GSSO – Global Security Sales Organization 
A New Way to Solve Real World Security Issues 
Dedicated Security 
sales force ...
Visibility: See More – Protect More 
Files 
Network 
Servers 
Users 
Operating 
Systems 
Web 
Applications 
Routers and 
S...
Cyber Security Advanced Model 
BEFORE 
Discover 
Enforce 
Harden 
AFTER 
Scope 
Contain 
Remediate 
Attack Continuum 
DURI...
Cyber Security Attach Continuum Approach 
DURING 
Cyber Threat Defense 
Manage Security CPE 
Solution Implementation 
Secu...
Strategic Imperatives 
Visibility-Driven Threat-Focused Platform-Based 
Network Endpoint Mobile Virtual Cloud 
© 2013-2014...
The Security Perimeter in the Cloud 
Collective 
Security 
Intelligence 
The 
Distributed 
Perimeter 
Cloud 
Connected 
Ne...
Platform-Based Security Architecture 
Management 
Security Services 
and Applications 
Security Services 
Platform 
Infras...
Thank you.
Upcoming SlideShare
Loading in …5
×

Cisco Live Cancun PR Session

1,532 views

Published on

Cisco Live Cancun, Security press conference

Published in: Internet
  • Be the first to comment

Cisco Live Cancun PR Session

  1. 1. Intelligent Cybersecurity for the Real World Francisco Ramirez Ghassan Dreibi Nov 5, 2014
  2. 2. Agenda Session 1 Francisco Ramirez – Security Managing Director Ghassan Dreibi – Strategic & Planning BDM Session 2 Carlo Davila – IDC LATAM Analyst © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
  3. 3. The Industrialization of Hacking Hacking Becomes an Industry Sophisticated Attacks, Complex Landscape Phishing, Low Sophistication 1990 1995 2000 2005 2010 2015 2020 Viruses 1990–2000 Worms 2000–2005 Spyware and Rootkits 2005–Today APTs Cyberware Today + © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
  4. 4. Threat Landscape Demands more than Application Control 100% of companies connect to domains that host malicious files or services 54% of breaches remain undiscovered for months 60% of data is stolen in hours It is a Community that hides in plain sight avoids detection and attacks swiftly © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
  5. 5. The Pervasiveness of Malicious Traffic High-Threat Malware Hijacked Infrastructure Sites without Content Suspect FTP Suspect VPN Inappropriate Content 100% 96% 92% 88% 79% 50% © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
  6. 6. The Silver Bullet Does Not Exist Sandboxing Application Control “Detect the Unknown” “Fix the Firewall” “Captive portal” IDS/IPS UTM PKI “No key, no access” “It matches the pattern” NAC “No false positives, no false negatives” FW/VPN AV “Block or Allow” GSSO focuses on the totality of defending against threats © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
  7. 7. GSSO – Global Security Sales Organization A New Way to Solve Real World Security Issues Dedicated Security sales force – GSSO Aligned with Cisco’s Services, Partner and Sales Organization (Cisco) + Selling market leading technology, services and solutions across the entire attack continuum + = Unmatched differentiation Market credibility that will amplify loyalty Stronger solutions across all architectures © 2014 2013-Cisco 2014 and/Cisco or its and/affiliates. or its affiliates. All rights All reserved. rights reserved. Cisco Confidential 7
  8. 8. Visibility: See More – Protect More Files Network Servers Users Operating Systems Web Applications Routers and Switches Application Protocols Mobile Devices Printers VoIP Phones Malware Virtual Machines Command and Control Servers Client Applications Services Vulnerabilities NetFlow Network Behavior Processes © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
  9. 9. Cyber Security Advanced Model BEFORE Discover Enforce Harden AFTER Scope Contain Remediate Attack Continuum DURING Detect Block Defend Network Endpoint Mobile Virtual Cloud Point in Time Continuous © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
  10. 10. Cyber Security Attach Continuum Approach DURING Cyber Threat Defense Manage Security CPE Solution Implementation Security Assessment Strategic Planning Solution Plan / Design Managed Threat Defense Custom Threat Intelligence Services Security Optimization © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Firewall NGFW NAC + Identity Services VPN UTM NGIPS Web Security Advanced Malware Protection Network Behavior Analysis Products Email Security BEFORE Discover Enforce Harden AFTER Scope Contain Remediate Detect Block Defend
  11. 11. Strategic Imperatives Visibility-Driven Threat-Focused Platform-Based Network Endpoint Mobile Virtual Cloud © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
  12. 12. The Security Perimeter in the Cloud Collective Security Intelligence The Distributed Perimeter Cloud Connected Network Telemetry Data Threat Research Advanced Analytics Mobile Router Firewall 3M+ Cloud Web Security Users 6GB Web Traffic Examined, Protected Every Hour 75M Unique Hits Every Hour 10M Blocks Enforced Every Hour © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
  13. 13. Platform-Based Security Architecture Management Security Services and Applications Security Services Platform Infrastructure Element Layer Common Security Policy and Management Cisco Security Applications Third-Party Security Applications Context Awareness Content Inspection Application Visibility Common Security Policy & Management Orchestration Access Control Security Management APIs Cisco ONE APIs Platform APIs Threat Prevention Cloud Intelligence APIs Physical Appliance Virtual Cloud APIs APIs Device API: OnePK™, OpenFlow, CLI Cisco Networking Operating Systems (Enterprise, Data Center, Service Provider) ASIC Data Plane Route–Switch–Compute Software Data Plane © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
  14. 14. Thank you.

×