1© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Ghassan Dreibi
Manager, Business Development
Nov, 2015
CyberSecurity for the Real World
Network as a Sensor
2© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Donald Rumsfeld
Former US Defense Secretary
3© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Organizations are more confident
but increasingly vulnerable
4© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Medical
Devices
State-
sponsored
hacking
CryptoWall
Advanced
Malwares
Phishing
Attacks
EMV Chip
Cards
Automotive
hacking
Mobile
Devices
Industry
Infrastructure
Cloud
Computing
5© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
41%
Beware
Of Directed Cyber
Attacks Were Focused
On Organizations with
fewer than 500
Employees.
Smaller companies are a
vector into the networks of
larger companies
6© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
65% Of Net New Jobs in the
Country Since 1995.
50% Of the U.S. Private
Sector Workforce is
Employed By Small
Business.
Creating Nearly
Protect
Larger companies are
equipped to absorb the cost
of a large security breach.
Smaller companies face
complete devastation upon
suffering a single large
security breach.
7© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
100%
of top 500 companies with
malicious connection
detected
60%
“collected”
in hours
54%
of new
Threats Discovered
after months
8© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
9© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
New surface for threats
10© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Advanced Persistent Threats
11© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Gain access to the Network
12© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Social Medias | PEN Drives | Social Engineering
13© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Suspected VPN connections
14© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Time to reach the target….
15© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Time to be detected….
16© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Security Strategy
17© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Point in
Time
Solution
Fragmented
Complex
Requires additional
management
17© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
18© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Scope
Contain
Remediate
Continuous
Solution
Discover
Enforce
Harden
Detect
Block
Defend
18© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
19© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Advanced Malware Protection
Network Behavior Analysis
NGFW
UTM
NAC + Identity Services
VPN
Firewall
NGIPS
Web Security
Email Security
Continuous
Solution
19© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
20© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Coverage | Automation
More Sensors
More Sensors | Global
Intelligence
Continuous
Solution
20© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
21© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network
Servers
Operating
Systems
Routers
and
Switches
Mobile
Devices
Printers
VoIP
Phones
Virtual
Machines
Client
Applications
Files
Users
Web
Applications
Application
Protocols
Services
Malware
Command
and Control
Servers
Vulnerabilities
NetFlow
Network
Behavior
Processes
22© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
See more …
23© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Reducing the scope of attack
24© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Understand the scope of attack
25© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Better information…Better decision
26© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network
as Sensor
Network as
Enforcer
27© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Performance | Capacity | SLA
28© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Thank You

Network as a sensor

  • 1.
    1© 2015 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Ghassan Dreibi Manager, Business Development Nov, 2015 CyberSecurity for the Real World Network as a Sensor
  • 2.
    2© 2015 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Donald Rumsfeld Former US Defense Secretary
  • 3.
    3© 2015 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Organizations are more confident but increasingly vulnerable
  • 4.
    4© 2015 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Medical Devices State- sponsored hacking CryptoWall Advanced Malwares Phishing Attacks EMV Chip Cards Automotive hacking Mobile Devices Industry Infrastructure Cloud Computing
  • 5.
    5© 2015 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 5© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41% Beware Of Directed Cyber Attacks Were Focused On Organizations with fewer than 500 Employees. Smaller companies are a vector into the networks of larger companies
  • 6.
    6© 2015 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 6© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65% Of Net New Jobs in the Country Since 1995. 50% Of the U.S. Private Sector Workforce is Employed By Small Business. Creating Nearly Protect Larger companies are equipped to absorb the cost of a large security breach. Smaller companies face complete devastation upon suffering a single large security breach.
  • 7.
    7© 2015 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 100% of top 500 companies with malicious connection detected 60% “collected” in hours 54% of new Threats Discovered after months
  • 8.
    8© 2015 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential
  • 9.
    9© 2015 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential New surface for threats
  • 10.
    10© 2015 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Advanced Persistent Threats
  • 11.
    11© 2015 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Gain access to the Network
  • 12.
    12© 2015 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Social Medias | PEN Drives | Social Engineering
  • 13.
    13© 2015 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Suspected VPN connections
  • 14.
    14© 2015 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Time to reach the target….
  • 15.
    15© 2015 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Time to be detected….
  • 16.
    16© 2015 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Security Strategy
  • 17.
    17© 2015 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Point in Time Solution Fragmented Complex Requires additional management 17© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 18.
    18© 2015 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Scope Contain Remediate Continuous Solution Discover Enforce Harden Detect Block Defend 18© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 19.
    19© 2015 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Advanced Malware Protection Network Behavior Analysis NGFW UTM NAC + Identity Services VPN Firewall NGIPS Web Security Email Security Continuous Solution 19© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 20.
    20© 2015 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Coverage | Automation More Sensors More Sensors | Global Intelligence Continuous Solution 20© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 21.
    21© 2015 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Network Servers Operating Systems Routers and Switches Mobile Devices Printers VoIP Phones Virtual Machines Client Applications Files Users Web Applications Application Protocols Services Malware Command and Control Servers Vulnerabilities NetFlow Network Behavior Processes
  • 22.
    22© 2015 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential See more …
  • 23.
    23© 2015 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Reducing the scope of attack
  • 24.
    24© 2015 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Understand the scope of attack
  • 25.
    25© 2015 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Better information…Better decision
  • 26.
    26© 2015 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Network as Sensor Network as Enforcer
  • 27.
    27© 2015 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Performance | Capacity | SLA
  • 28.
    28© 2015 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Thank You