changing the security equation - 2018.icc.moscow 14.30-15.4… · john maynard vice president,...
TRANSCRIPT
![Page 1: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/1.jpg)
John MaynardVice President, Global Security – EMEAR July 2018
Effective Integrated Security
Changing the Security Equation
![Page 2: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/2.jpg)
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
2018
3.9B2018
415M2000
Internet users
![Page 3: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/3.jpg)
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
$325M2015 $11.5B
2019
2018 2019
Ransomware
![Page 4: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/4.jpg)
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
2B2006
2018 2019 2020
200B2020
IoT Devices
![Page 5: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/5.jpg)
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
$3T2015
2018 2019 2020 2021
$6T2021
Cybercrime
![Page 6: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/6.jpg)
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
A New Era of DigitizationBrings a new era of security challenges
Users work from anywhere across many devicesLoss of visibilityMore IoT devices
connect everydayExpanded attack surface
Workloads are moving to the cloudLoss of control
Threats are more numerous and persistentHigh likelihood of a breach
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
![Page 7: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/7.jpg)
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
Flooded with products
Lack of talent
Multi-vector multi-stage threats
![Page 8: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/8.jpg)
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
CapabilitiesComplexity
The Security Effectiveness Gap
![Page 9: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/9.jpg)
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
Time
ResponseDetectionThreat
Do you have an effective security posture?
![Page 10: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/10.jpg)
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
ArchitectureIntegrated
PortfolioBest of breed
IntelligenceCloud-Delivered
![Page 11: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/11.jpg)
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
Cisco Security Architecture
Endpoint CloudNetwork
Threat intelligence –
Services
![Page 12: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/12.jpg)
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
600 BillionEmail Samples
16 BillionWeb Requests
3.4 BillionAMP Queries
About 3 threats per person
EVERY DAY
19.7 Billion Threats Blocked DAILY
7.5 BillionTotal World Population
Unmatched Visibility, Threat Research, and Analytics
![Page 13: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/13.jpg)
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
The Network is the Cornerstone of Digital Success (or Failure)
![Page 14: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/14.jpg)
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
Network security was focused on the perimeter
BranchNetwork
Campus Network Data Center Network
Firewalls securedyour perimeter
Visibility into what’s leaving and coming in
Segmentation managed through IP access lists
![Page 15: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/15.jpg)
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
S E C U R I T Y
Network Security
Intent-based Network Infrastructure
Threat ProtectionVisibility Segmentation
Cisco has embedded security into the network
![Page 16: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/16.jpg)
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
Threats changing by encryption
Budget allocated to IT for encryption Source: Thales and VormetricExpansion of use of encryption
Linear prediction
16%
20% 19%22% 23% 23%
25%27%
30%
34%
41%
60%
50%
2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017
Malware
Cisco Threat G rid , 2015
Jul Aug Sep Oct Nov Dec
1 5 %
1 0 %
According to Gartner's forecast, by 2019 80% of traffic is encrypted
![Page 17: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/17.jpg)
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l© 2 0 1 7 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
Protect the Business:Encrypted Traffic Analytics Visibility and Malware Detection without Decryption
ETA algorithms analyze multiple network data sources
Malware in Encrypted Traffic
No information is decrypted
Security AND Privacy
99.99% Accuracy
Detection Accuracy
![Page 18: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/18.jpg)
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
Cisco Security Architecture
EndpointCloudNetwork
Threat intelligence –
Services
![Page 19: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/19.jpg)
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
Eliminate blind spotsThe network and endpoint, working together across all operating systems
Discover unknown threats
With proactive threat hunting
Stop malwareUsing multiple detection and protection mechanisms
Uncover the 1% with Cisco AMP for Endpoints
![Page 20: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/20.jpg)
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
Share intelligence across network, web, email, and endpoints to see once, block everywhere
NGIPS CES/ESA WSA/SIGISRNGFW Endpoint
Talos Threat GridAMP Cloud
See once, block everywhere
![Page 21: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/21.jpg)
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
Cisco Security ConnectorThe first ever security application for iOS
Advanced MalwareProtection (AMP)
Cisco Umbrella
![Page 22: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/22.jpg)
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
Cisco Security Architecture
EndpointCloud
Network
Threat intelligence –
Services
![Page 23: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/23.jpg)
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
53%manage over half of their infrastructure in the cloud
Cloud security market by 2020
$3.6B
Most Everyone using the CloudOrganizations increase reliance on the cloud
will use multiple clouds
84%
![Page 24: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/24.jpg)
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
Multicloud Security – What’s needed
Secure Internet Gateway (SIG)
Security to get to the Cloud
Visibility & Protection
Security for Public Cloud
User, Data & App Security
Security for SaaS Apps
![Page 25: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/25.jpg)
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
WANNACRY
![Page 26: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/26.jpg)
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
Talos brings the intelligence –
Smarter every day
Microsoft
vulnerability identified
Mar 14
Talos detects vulnerabilities
Customers with NGFW, IPS,
Meraki MX are protected
Shadow Brokers
exploit leaked
Apr 14
Talos detects vulnerabilities
Customers with NGFW, IPS,
Meraki MX are protected
WannaCry
ransomware released
May 12
Customers with NGFW, IPS,
Meraki MX already protected
Plus
AMP caught the payload and
Umbrella blocked the callout
2018
![Page 27: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/27.jpg)
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
Cisco Security Architecture
Endpoint CloudNetwork
Threat intelligence –
Services
![Page 28: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/28.jpg)
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
Users Endpoints
Cisco Security PortfolioBest of breed products integrated to protect all key vectors
UNMANAGED
ENDPOINTS
1. Not the same as cloud security2. ISR Firepower services
Network Security
Endpoint Security
Security via the cloud
MANAGED
ENDPOINTS
MANAGED
LOCATIONS
INTERNET
THE SHIFTING
PERIMETER CORPORATE
NETWORK/DATA CENTER
UNMANAGED
USERS / APPS
UNMANAGED LOCATIONS
NGFW/NGIPSWeb/Email Gateways UTM/Router
Security2
Data
Cloud Access Security;Virtual NGFW;Cloud Security Analytics and Workload Security
Users Data Apps
SaaS APPS,
PUBLIC & PRIVATE
CLOUDS
Security Analytics;Network Access
Control; Software-defined segmentation
INTERNAL
SUBNET/VLANS
Secure InternetGateway
VPN
Endpoint Security and Roaming Protection;
Cloud-managed network security, cloud–managed UTM, Cloud Threat Analytics and Sandboxing, Cloud Email Security
CISCO SECURITY
AS A SERVICE
IoT
Cloud Security
![Page 29: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/29.jpg)
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
NetworkISR/ASR
AdvancedMalware
Umbrella
Web W W W
ISE
NGFW/ NGIPS
Threat Grid
Stealthwatch
Meraki
Cloudlock
![Page 30: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/30.jpg)
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
Automation
Save time
See more
Detect faster
Better protection
NetworkISR/ASR
AdvancedMalware
Umbrella
Web W W W
ISE
NGFW/ NGIPS
Threat Grid
Stealthwatch
Meraki
Cloudlock
![Page 31: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/31.jpg)
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
Query Cisco Visibility
Integrated Portfolio Security/Response
Respond in AMP for Endpoints
and Umbrella
SHA
IPDOMAIN
Umbrella
AMPThreatGrid
VirusTotalTalos
![Page 32: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/32.jpg)
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
Bringing the Architecture to Life: Cisco Visibility
![Page 33: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/33.jpg)
© 2 0 1 8 C i s c o a n d / o r i t s a f f i l i a t e s . A l l r i g h t s r e s e r v e d . C i s c o C o n f i d e n t i a l
Cisco Security commitment
#1Cisco priority
5KPeople strong
Ongoing
Innovation IntegratedBest of breed portfolio
250Threat
researchers
19.7BThreats blocked
daily
100xFaster finding
breaches
99%Security
effectiveness
88%Fortune 100 use
Cisco Security
BillionsInvested
SourcefireLancopeNeohapsis OpenDNS
Threat GridCognitivePortcullisCloudlock
Observable Networks
![Page 34: Changing the Security Equation - 2018.icc.moscow 14.30-15.4… · John Maynard Vice President, Global Security –EMEAR July 2018 Effective Integrated Security Changing the Security](https://reader035.vdocuments.net/reader035/viewer/2022070817/5f130a6edfc65854f55c7843/html5/thumbnails/34.jpg)