SlideShare a Scribd company logo
ontrol
solution
1
2
3
4
5
system entity relationship diagram
inventory and control of software assets
system entity relationship diagram
controlled use of administrative privileges
secure configuration for hardware and
software on mobile devices, laptops,
workstations and servers
DNA center, Next Generation Firewall, ISE, Cisco Any
Connect: working together. Firepower is an
option if all solutions are not feasible at once
DNA Center, Firepower, ISE, DUO to understand
what software is running, AMP for Endpoints
DNA Center, ISE - control over versions and
roll out patches with AnyConnect
DNA Center, DUO
DNA Center, Veeam for backups
ontrol
solution
6
7
8
9
10
maintenance, monitoring and
analysis of audit logs
email and web browser protections
malware defenses
limitation and control of network ports,
protocols, and services
data recovery capabilities
DNA Center- Assurance feature.
third party tools: stealth watch, firepower
ESA & WSA, Umbrella
AMP for Network, AMP for Endpoints,
Umbrella
ISE
Veeam / Pure - site recovery management
ontrol
solution
11
12
13
14
15
secure configuration for network devices,
such as firewalls, routers, and switches
boundary defense
data protection
controlled access based
on the need to know
wireless access control
DNA Center
Umbrella, AMP for Endpoints, DUO, ISE
Firepower, AnyConnect
DUO, Firepower, ISE segmentation
DUO, ISE
ontrol
solution
16
17
18
19
20
account monitoring and control
implement a security awareness
and training program
application software security
incident response and management
penetration tests and red team exercises
DUO, ISE
tbl networks can recommend a third party
security awareness vendor
tbl networks can recommend application
software security from a third-party vendor
tbl networks can recommend a templated
incident response management plan
tbl networks can make recommendations
on penetration testing vendors
Cisco AMP for Endpoints
Cisco Advanced Malware Protection (AMP) for Endpoints prevents threats at point of entry, then
continuously tracks every file it lets onto your endpoints. AMP can uncover even the most advanced
threats- including file-less malware and ransomware in hours, not days or months.
implementation effort 1-10
3
helps solve controls:
Cisco AMP for Network
This network-based malware goes beyond point-in-time detection to protect across the entire attack
continuum. AMP for Networks provides visibility and control to protect against highly sophisticated and
targeted advanced malware.
implementation effort 1-10
5
helps solve control:
Cisco AnyConnect
This empowers your employees to work from anywhere, at any time, on company laptops or
personal mobile devices. AnyConnect simplifies secure endpoint access and provides
the security necessary to help keep your organization safe and protected.
implementation effort 1-10
1
helps solve control:
1
Cisco DNA Center
Cisco DNA Center is the network management and command center for Cisco DNA, your
intent-based network for the enterprise. Provision and configure all your network devices in minutes.
Use advanced artificial intelligence and machine learning to proactively monitor, troubleshoot, and
optimize your network. Integrate with third-party systems for improved operational processes.
implementation effort 1-10
helps solve controls:
5
Duo
With Cisco ASA with Firepower Services, you consolidate multiple security layers in a single
platform, eliminating the cost of buying and managing multiple solutions.This integrated approach
combines best-in-class security technology with multilayer protection integrated in a single device that’s
less costly than piecemeal security solutions.
implementation effort 1-10
helps solve controls:
2 2
Cisco Firepower Next Generation Firewall
With Cisco ASA with Firepower Services, you consolidate multiple security layers in a single
platform, eliminating the cost of buying and managing multiple solutions.This integrated approach
combines best-in-class security technology with multilayer protection integrated in a single device that’s
less costly than piecemeal security solutions.
implementation effort 1-10
helps solve controls:
6
Cisco Identity Services Engine
By providing a differentiated policy based on theWho,What,When,Where, and How of the
endpoint,Cisco ISE links who is in your network to what they are doing.With Cisco ISE, your entire
network is the enforcement point for your security policy, not just a singular network device.
implementation effort 1-10
helps solve controls:
9
Cisco Umbrella (formerly OpenDNS)
Cisco Umbrella provides the first line of defense against threats on the internet - at the DNS level.
Because Umbrella is delivered from the cloud, it is the easiest way to protect all of your users in minutes.
implementation effort 1-10
helps solve controls:
1
Data Recovery Abilities: Site Recovery Manager
VMware vCenter Site Recovery Manager is a business continuity and disaster recovery solution that
helps you plan, test, and run the recovery of virtual machines between a protected vCenter Server site
and a recovery vCenter Server site.You can configure Site Recovery Manager to work with several third-
party disk replication mechanisms by configuring array-based replication.Array-based replication
surfaces replicated datastores to recover virtual machine workloads.You can also use host-based
replication by configuring Site Recovery Manager to useVMware vSphere Replication to protect virtual
machine workloads.
implementation effort 1-10
helps solve controls:
5
Backups: Veeam
Veeam® Backup & Replication™ helps business achieve comprehensive data protection forALL
workloads — cloud, virtual and physical.With a single console, achieve fast, flexible and reliable
backup, recovery and replication of all applications and data, on-premises or in the cloud.
implementation effort 1-10
helps solve controls:
5
Security Awareness Training Program
Develop an ongoing security awareness training that addresses new technologies, threats, and
business requirements. Short 15 minute videos that are released quarterly would meet this
control’s standards. Outsourcing a security awareness training program is an option for meeting
this control as well.
implementation effort 1-10
helps solve controls:
5
Application Software Security
Have a corporate policy in place to ensure proper training for software developers is followed so
that all components and secure coding methodologies are updated and secure. Scanning of
applications and evaluations of third-party software can be outsourced.
implementation effort 1-10
helps solve controls:
5
Incident Response Management
In case of a security breach, develop plans, define roles, conduct training, establish
communication channels, and determine management oversight.
implementation effort 1-10
helps solve controls:
5
Penetration Testing
Consider utilizing an outside organization to perform penetration tests.Tests should include a full
scope of blended attacks, such as wireless, client-based, and web application attacks.
implementation effort 1-10
helps solve controls:
5
CIS Control Solution Guide

More Related Content

What's hot

The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14
Aventis Systems, Inc.
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
Dsunte Wilson
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Symantec
 
Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6
Sarah Isaacs
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
Andrew Ryan
 
Mitigating Rapid Cyberattacks
Mitigating Rapid CyberattacksMitigating Rapid Cyberattacks
Mitigating Rapid Cyberattacks
Erdem Erdogan
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
Burak DAYIOGLU
 
Advanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešeníAdvanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešení
MarketingArrowECS_CZ
 
Security analyst
Security analystSecurity analyst
Security analyst
Arjun Panwar
 
SanerNow Patch Management
SanerNow Patch ManagementSanerNow Patch Management
SanerNow Patch Management
SecPod Technologies
 
Product overview-eset-file-security
Product overview-eset-file-securityProduct overview-eset-file-security
Product overview-eset-file-security
Üstün Koruma
 
Bezpečnost není jen antivirus
Bezpečnost není jen antivirusBezpečnost není jen antivirus
Bezpečnost není jen antivirus
MarketingArrowECS_CZ
 
How Hard Is It To Hack A Pc
How Hard Is It To Hack A PcHow Hard Is It To Hack A Pc
How Hard Is It To Hack A Pchaimkarel
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint Protection
Panda Security
 
RemoteExec DataSheet
RemoteExec DataSheetRemoteExec DataSheet
RemoteExec DataSheet
IS Decisions
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
Ajay Jassi
 
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Iftikhar Ali Iqbal
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
Dsunte Wilson
 
Onsite Vs Hosted Desktop Security
Onsite Vs Hosted Desktop SecurityOnsite Vs Hosted Desktop Security
Onsite Vs Hosted Desktop Security
James Hegarty
 

What's hot (20)

The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
 
Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 
Mitigating Rapid Cyberattacks
Mitigating Rapid CyberattacksMitigating Rapid Cyberattacks
Mitigating Rapid Cyberattacks
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
Advanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešeníAdvanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešení
 
Security analyst
Security analystSecurity analyst
Security analyst
 
SanerNow Patch Management
SanerNow Patch ManagementSanerNow Patch Management
SanerNow Patch Management
 
Product overview-eset-file-security
Product overview-eset-file-securityProduct overview-eset-file-security
Product overview-eset-file-security
 
Justin_Laughman_res
Justin_Laughman_resJustin_Laughman_res
Justin_Laughman_res
 
Bezpečnost není jen antivirus
Bezpečnost není jen antivirusBezpečnost není jen antivirus
Bezpečnost není jen antivirus
 
How Hard Is It To Hack A Pc
How Hard Is It To Hack A PcHow Hard Is It To Hack A Pc
How Hard Is It To Hack A Pc
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint Protection
 
RemoteExec DataSheet
RemoteExec DataSheetRemoteExec DataSheet
RemoteExec DataSheet
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
 
Onsite Vs Hosted Desktop Security
Onsite Vs Hosted Desktop SecurityOnsite Vs Hosted Desktop Security
Onsite Vs Hosted Desktop Security
 

Similar to CIS Control Solution Guide

How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
William hendric
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
Qualys
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
ImamBahrudin5
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
xband
 
Cisco SecureX.pdf
Cisco SecureX.pdfCisco SecureX.pdf
Cisco SecureX.pdf
WildhaniIhyaraRahman1
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleDavid Fuchs
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfee
Cristian Garcia G.
 
brochure-triton-ap-web-en
brochure-triton-ap-web-enbrochure-triton-ap-web-en
brochure-triton-ap-web-enLee Dalton
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
Cisco Russia
 
ApplicationPro Flyer English
ApplicationPro Flyer EnglishApplicationPro Flyer English
ApplicationPro Flyer English
cynapspro GmbH
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer English
cynapspro GmbH
 
Kaspersky Endpoint Overview
Kaspersky Endpoint OverviewKaspersky Endpoint Overview
Kaspersky Endpoint Overviewsferinga
 
Kaspersky Endpoint overview
Kaspersky Endpoint overviewKaspersky Endpoint overview
Kaspersky Endpoint overviewsferinga
 
SanerNow platform-datasheet
SanerNow platform-datasheetSanerNow platform-datasheet
SanerNow platform-datasheet
SecPod Technologies
 
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptxKASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
francis578223
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptx
NBBNOC
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
GE코리아
 
HCI ECOCAST
HCI ECOCAST HCI ECOCAST
HCI ECOCAST
Melina Black
 

Similar to CIS Control Solution Guide (20)

How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Cisco SecureX.pdf
Cisco SecureX.pdfCisco SecureX.pdf
Cisco SecureX.pdf
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfee
 
brochure-triton-ap-web-en
brochure-triton-ap-web-enbrochure-triton-ap-web-en
brochure-triton-ap-web-en
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
ApplicationPro Flyer English
ApplicationPro Flyer EnglishApplicationPro Flyer English
ApplicationPro Flyer English
 
Saravanan_Resume_IBM Updated
Saravanan_Resume_IBM UpdatedSaravanan_Resume_IBM Updated
Saravanan_Resume_IBM Updated
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer English
 
Kaspersky Endpoint Overview
Kaspersky Endpoint OverviewKaspersky Endpoint Overview
Kaspersky Endpoint Overview
 
Kaspersky Endpoint overview
Kaspersky Endpoint overviewKaspersky Endpoint overview
Kaspersky Endpoint overview
 
SanerNow platform-datasheet
SanerNow platform-datasheetSanerNow platform-datasheet
SanerNow platform-datasheet
 
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptxKASPERSKY Description, Ease of Performance and conformity Guide.pptx
KASPERSKY Description, Ease of Performance and conformity Guide.pptx
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptx
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
HCI ECOCAST
HCI ECOCAST HCI ECOCAST
HCI ECOCAST
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

CIS Control Solution Guide

  • 1.
  • 2. ontrol solution 1 2 3 4 5 system entity relationship diagram inventory and control of software assets system entity relationship diagram controlled use of administrative privileges secure configuration for hardware and software on mobile devices, laptops, workstations and servers DNA center, Next Generation Firewall, ISE, Cisco Any Connect: working together. Firepower is an option if all solutions are not feasible at once DNA Center, Firepower, ISE, DUO to understand what software is running, AMP for Endpoints DNA Center, ISE - control over versions and roll out patches with AnyConnect DNA Center, DUO DNA Center, Veeam for backups
  • 3. ontrol solution 6 7 8 9 10 maintenance, monitoring and analysis of audit logs email and web browser protections malware defenses limitation and control of network ports, protocols, and services data recovery capabilities DNA Center- Assurance feature. third party tools: stealth watch, firepower ESA & WSA, Umbrella AMP for Network, AMP for Endpoints, Umbrella ISE Veeam / Pure - site recovery management
  • 4. ontrol solution 11 12 13 14 15 secure configuration for network devices, such as firewalls, routers, and switches boundary defense data protection controlled access based on the need to know wireless access control DNA Center Umbrella, AMP for Endpoints, DUO, ISE Firepower, AnyConnect DUO, Firepower, ISE segmentation DUO, ISE
  • 5. ontrol solution 16 17 18 19 20 account monitoring and control implement a security awareness and training program application software security incident response and management penetration tests and red team exercises DUO, ISE tbl networks can recommend a third party security awareness vendor tbl networks can recommend application software security from a third-party vendor tbl networks can recommend a templated incident response management plan tbl networks can make recommendations on penetration testing vendors
  • 6. Cisco AMP for Endpoints Cisco Advanced Malware Protection (AMP) for Endpoints prevents threats at point of entry, then continuously tracks every file it lets onto your endpoints. AMP can uncover even the most advanced threats- including file-less malware and ransomware in hours, not days or months. implementation effort 1-10 3 helps solve controls:
  • 7. Cisco AMP for Network This network-based malware goes beyond point-in-time detection to protect across the entire attack continuum. AMP for Networks provides visibility and control to protect against highly sophisticated and targeted advanced malware. implementation effort 1-10 5 helps solve control:
  • 8. Cisco AnyConnect This empowers your employees to work from anywhere, at any time, on company laptops or personal mobile devices. AnyConnect simplifies secure endpoint access and provides the security necessary to help keep your organization safe and protected. implementation effort 1-10 1 helps solve control: 1
  • 9. Cisco DNA Center Cisco DNA Center is the network management and command center for Cisco DNA, your intent-based network for the enterprise. Provision and configure all your network devices in minutes. Use advanced artificial intelligence and machine learning to proactively monitor, troubleshoot, and optimize your network. Integrate with third-party systems for improved operational processes. implementation effort 1-10 helps solve controls: 5
  • 10. Duo With Cisco ASA with Firepower Services, you consolidate multiple security layers in a single platform, eliminating the cost of buying and managing multiple solutions.This integrated approach combines best-in-class security technology with multilayer protection integrated in a single device that’s less costly than piecemeal security solutions. implementation effort 1-10 helps solve controls: 2 2
  • 11. Cisco Firepower Next Generation Firewall With Cisco ASA with Firepower Services, you consolidate multiple security layers in a single platform, eliminating the cost of buying and managing multiple solutions.This integrated approach combines best-in-class security technology with multilayer protection integrated in a single device that’s less costly than piecemeal security solutions. implementation effort 1-10 helps solve controls: 6
  • 12. Cisco Identity Services Engine By providing a differentiated policy based on theWho,What,When,Where, and How of the endpoint,Cisco ISE links who is in your network to what they are doing.With Cisco ISE, your entire network is the enforcement point for your security policy, not just a singular network device. implementation effort 1-10 helps solve controls: 9
  • 13. Cisco Umbrella (formerly OpenDNS) Cisco Umbrella provides the first line of defense against threats on the internet - at the DNS level. Because Umbrella is delivered from the cloud, it is the easiest way to protect all of your users in minutes. implementation effort 1-10 helps solve controls: 1
  • 14. Data Recovery Abilities: Site Recovery Manager VMware vCenter Site Recovery Manager is a business continuity and disaster recovery solution that helps you plan, test, and run the recovery of virtual machines between a protected vCenter Server site and a recovery vCenter Server site.You can configure Site Recovery Manager to work with several third- party disk replication mechanisms by configuring array-based replication.Array-based replication surfaces replicated datastores to recover virtual machine workloads.You can also use host-based replication by configuring Site Recovery Manager to useVMware vSphere Replication to protect virtual machine workloads. implementation effort 1-10 helps solve controls: 5
  • 15. Backups: Veeam Veeam® Backup & Replication™ helps business achieve comprehensive data protection forALL workloads — cloud, virtual and physical.With a single console, achieve fast, flexible and reliable backup, recovery and replication of all applications and data, on-premises or in the cloud. implementation effort 1-10 helps solve controls: 5
  • 16. Security Awareness Training Program Develop an ongoing security awareness training that addresses new technologies, threats, and business requirements. Short 15 minute videos that are released quarterly would meet this control’s standards. Outsourcing a security awareness training program is an option for meeting this control as well. implementation effort 1-10 helps solve controls: 5
  • 17. Application Software Security Have a corporate policy in place to ensure proper training for software developers is followed so that all components and secure coding methodologies are updated and secure. Scanning of applications and evaluations of third-party software can be outsourced. implementation effort 1-10 helps solve controls: 5
  • 18. Incident Response Management In case of a security breach, develop plans, define roles, conduct training, establish communication channels, and determine management oversight. implementation effort 1-10 helps solve controls: 5
  • 19. Penetration Testing Consider utilizing an outside organization to perform penetration tests.Tests should include a full scope of blended attacks, such as wireless, client-based, and web application attacks. implementation effort 1-10 helps solve controls: 5