Cyber bdm

767 views

Published on

Cisco Security PPT

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
767
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
33
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • The future of work is an activity, not a place. The workplace is changing. The workplace will be borderless.Workforce flexibility is allowing government employees to do their job at their desk, in a conference room, at a remote site or in the field. The ability to connect workers (and citizens) on the fly improves productivity, collaboration and citizen satisfaction
  • Cyber bdm

    1. 1. Cybersecurity: <br />Trust, Visibility, Resilience<br />
    2. 2. With Pervasive Connectivity <br />Whatis at stake?<br />
    3. 3. Cybersecurity Threats<br />Manipulation<br />Espionage<br />Disruption<br />
    4. 4. Pentagon Report<br />“financial terrorism (in 2008) may have cost the global economy as much as $50 trillion.”<br />
    5. 5. Popular Mechanic<br /> “Currently on Chinese military drawing boards are plans for combat aircraft, the Chengdu J-10 and Xian JH-7A fighter jets; a combat helicopter, the Z-10; advanced warships; and even space-based weapons designed to knock out communications satellites. U.S. observers fear that much of this will be made possible by espionage.”<br />
    6. 6. How? Advanced Malware: Stuxnet <br />Target: Iranian Nuclear<br /> Reactors<br />Impact: 2-5 Year Delay<br />Exploit: Siemens PLC<br /> Software <br />Origin: Unknown<br />
    7. 7. Regardless of the Mission<br />The Challenges of Cybersecurity are the Same<br />Trust, Visibility, Resilience<br />
    8. 8. Federal Cybersecurity Challenges<br />Operational Management<br />Business Resiliency<br />Data <br />Capacity<br />Supply Chain<br />Data Loss<br />
    9. 9. Federal Cybersecurity<br />Whatis Cisco’s Role?<br />
    10. 10. Why Cisco? Everything is on the Network<br />“No single company can solve the complex challenge presented by the Internet, <br />but the inherent role of the network positions Cisco as the natural partner in developing and executing a successful cybersecurity strategy”<br />
    11. 11. Cisco’s Approach to Cybersecurity<br />Identify and Manage<br />Trust<br />Visibility<br />Resilience<br />Respond and Recover <br />Prevent and Detect<br />
    12. 12. Who and What?<br />What is on my Network?<br />Who is on my Network? <br />What can they access?<br />
    13. 13. Cisco CyberSolutions<br />Trust<br />Visibility<br />Resilience<br />Identity and Access<br />Secure Mobility <br />Wireless Integrity<br />Configuration Assurance<br />Physical Security<br />Audit and Compliance <br />Continuous Monitoring<br />Data Exfiltration<br />Boundary Defense<br />Malware and APT Defense<br />Situational Awareness<br />COOP<br />Incident Handling<br />Availability<br />Service Level Assurance<br />
    14. 14. What and Where?<br />What threats are present? <br />Where are they? <br />How do we take action?<br />
    15. 15. Cisco CyberSolutions<br />Trust<br />Visibility<br />Resilience<br />Identity and Access<br />Secure Mobility <br />Wireless Integrity<br />Configuration Assurance<br />Physical Security<br />Audit and Compliance <br />Continuous Monitoring<br />Data Exfiltration<br />Boundary Defense<br />Malware and APT Defense<br />Situational Awareness<br />COOP<br />Incident Handling<br />Availability<br />Service Level Assurance<br />
    16. 16. How?<br />How do we avoid disruption?<br />How can we mitigate risk?<br />How do we get back to trust?<br />
    17. 17. Cisco CyberSolutions<br />Trust<br />Visibility<br />Resilience<br />Identity and Access<br />Secure Mobility <br />Wireless Integrity<br />Configuration Assurance<br />Physical Security<br />Audit and Compliance <br />Continuous Monitoring<br />Data Exfiltration<br />Boundary Defense<br />Malware and APT Defense<br />Situational Awareness<br />COOP<br />Incident Handling<br />Availability<br />Service Level Assurance<br />
    18. 18. The Collective Application of Cisco TVR Solutions <br />Create a Layered Cyber Defense<br />
    19. 19. Partnership<br />Private Sector<br />Public Sector<br />
    20. 20. The Cybersecurity Journey<br />The Journey Ahead<br />Investment<br /> Education<br />Manufacturing Integrity<br />Thought leadership<br />Regulatory Alignment<br /> Private/Public Partnerships<br />Cybersecurity Innovation<br />
    21. 21.
    22. 22. Backup Slides<br />
    23. 23. CybersecurityPartner Ecosystem:<br /> Building solutions with best of breed ISVs & Technology Partners<br /><ul><li> IRAD projects to address customer requirements
    24. 24. Integrate component parts in proof-of-concept environments to foster learning and innovation</li></ul>Systems <br />Integrators<br /><ul><li>Ecosystem partners to meet diverse customer security incident and event management requirements
    25. 25. Cisco validated design and deployment methodologies</li></ul>SIEM Partners<br /><ul><li> Cybersecurity focus partners to ensure consistent delivery of Cisco and partner systems
    26. 26. Agile custom solution development</li></ul>Implementation<br />Partners<br /><ul><li> Complimentary technology partners to complete Cybersecurity solution offerings
    27. 27. Best of bread market proven technologies</li></ul>Technology <br />Partners<br />
    28. 28. Federal Cybersecurity Priorities<br />Continuous <br />Monitoring<br />Identity Mgmt.<br />Situational Awareness<br />Secure Supply Chain<br />Vulnerability <br />Analysis/IDS<br />Real-time<br />Continuous Monitoring<br />Education and Training<br />Application Security<br />Vulnerability Analysis/IDS<br />Limited <br />Access <br />Points<br />Application <br />Security<br />
    29. 29. Why Cisco?<br />Cisco’s Pervasive Footprint<br />The Network is the Sensor<br />Public/Private Partnerships<br />Education<br />Certifications<br />Incident Response<br />Supply Chain Management<br />Trusted HW/SW<br />
    30. 30. SOLUTIONS<br /> ARCHITECTURES<br />STRATEGY<br />Data Center/<br />Virtualization<br />Collaboration<br />Borderless <br />Networks<br />TRUST<br /><ul><li>Access Control
    31. 31. Audit & Accountability
    32. 32. Configuration Management
    33. 33. Identification &
    34. 34. Authentication</li></ul>Maintenance<br /><ul><li>System & Communication</li></ul>Protection<br />Identity and Access<br />Secure Mobility <br />Wireless Integrity<br />Audit and Compliance <br />Configuration Assurance<br />Physical Security<br /><ul><li> Cisco Works LMS 4.0
    35. 35. Cisco Configuration Engine
    36. 36. Cisco TrustSec (Identity)
    37. 37. Cisco AnyConnect Client
    38. 38. Cisco VPN Services
    39. 39. Cisco Mobility Engine &</li></ul> Wireless Solution<br /><ul><li> Cisco Unified Border Element
    40. 40. ASA Firewall
    41. 41. IOS Firewall</li></ul>NIST 800-53<br />Critical Control Family<br />VISIBILITY<br /><ul><li>Security Assessment &</li></ul>Authorization<br /><ul><li>System & Communication</li></ul>Protection<br /><ul><li>System & Information Integrity
    42. 42. Incident Monitoring</li></ul>Continuous Monitoring<br />Data Exfiltration<br />Boundary Defense<br />Malware Defense<br />Situational Awareness<br /><ul><li> Security Intelligence </li></ul> Operations<br /><ul><li> IPS 4200 Series
    43. 43. Clean Air Technology
    44. 44. NBAR
    45. 45. IOS Intrusion Prevention
    46. 46. IOS NetFlow
    47. 47. Service Control Engine
    48. 48. ASA BotNet Filter</li></ul>NIST 800-53<br />Critical Control Family<br />RESILIENCE<br /><ul><li>Contingency Planning
    49. 49. System & Communication</li></ul>Protection<br /><ul><li>Incident Monitoring
    50. 50. Physical & Environmental</li></ul>COOP<br />Incident Handling<br />Availability<br />Service Level Assurance<br /><ul><li> Performance Routing
    51. 51. NSF/SSO
    52. 52. EnergyWise
    53. 53. Policy Based Routing</li></ul>NIST 800-53<br />Critical Control Family<br />
    54. 54. TVR-Trust Use Case<br />Problem #1: Customers don’t know what is on their network<br />Solution: Cisco Trustsec (802.1X, Profiling)<br />Problem #2: DoD Networks/resources are being shared amongst each other and<br /> coalition forces<br />Solution: Cisco Trustsec (Security Group Tags)<br />Problem #3: DoD is subject to multi level security <br />Solution: Cisco Trustsec (Security Group Tags, 802.1AE)<br />Problem #4: DoD is turning up wireless<br />Solution: Cisco Secure Wireless (Clean Air, Suite B, etc)<br />
    55. 55. TVR-Visibility Use Case<br />Problem #1: Customers want a common operating picture<br />Solution: SIEM Ecosystem, Various IOS Features, CSM, (COSMOS future)<br />Problem #2: Customers need to stop Data Leakage<br />Solution: Trustsec, Ironport DLP, FW<br />Problem #3: Customers need actionable intelligence <br />Solution: AIPS 4200, IronPort (ESA/WSA), SCE, IOS Security Services <br /> (Firewall, ISRG2, Content Filtering)<br />
    56. 56. TVR-Resilience Use Case<br />Problem #1: Customers need to prevent disruption to service <br />Solution: SCE (e.g. DPI) IOS Technologies (Control Plane Policing –CoPP, <br />QOS, IP-SLA, NBAR,syslog, Ecosystem (e.g. Arbor Networks) Continuity <br />of Operations (DC-Vblock, Webex/Tandberg, CVO-HR1722<br />Problem #2: Customers need to mitigate damage from attack<br />Solution: IronPort ESA/WSA, Cloud Security / Scan Safe, Cisco Firewall <br />Solutions (e.g. DPI), IPS, Netflow<br />Problem #3: If attacked, customers need Incident response capabilities<br />Solution: Cisco FISMA Response Solution, Cisco Security Optimization Service<br />SIM Ecosystem (NBAR,Syslog, Netflow, QOS, IPS, Network Telemetry)<br />
    57. 57. “No single company can <br />solve the complex challenge presented by the Internet, <br />but the inherent role of the network positions Cisco as the natural partner in developing and executing a successful cyber security strategy”<br />

    ×