visibility and retrospective security-before during and after an attack

17
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 Intelligent Cybersecurity for the Real World 11 Marzo 2015 Stefano Volpi, GSSO Cisco

Upload: cisco-italia

Post on 19-Jul-2015

229 views

Category:

Documents


1 download

TRANSCRIPT

© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 1© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 1

Intelligent Cybersecurityfor the Real World

11 Marzo 2015

Stefano Volpi, GSSO Cisco

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2

FY15 Business Vision and Strategy: Security

28th Jan, Miln, IoE Forum, David Bevilacqua “42% of CIO consider Security as the first topic in relation to IoE”

Vision :

Security as a

Business

Transformation

Driver

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3

Cisco Confidential 3© 2013-2014 Cisco and/or its affiliates. All rights reserved.

In the news: Feb 2013 Today

Cisco Confidential 3©2014 Cisco and/or its affiliates. All rights reserved.

Global Security Sales Organization

5000+

© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 4

The Industrialization of Hacking

20001990 1995 2005 2010 2015 2020

Viruses1990–2000

Worms2000–2005

Spyware and Rootkits2005–Today

APTs CyberwareToday +

Hacking Becomesan Industry

Sophisticated Attacks, Complex Landscape

Phishing, Low Sophistication

© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 5

Any Device to Any Cloud

Private Cloud

Public Cloud

Public Cloud

© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 6

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6

Il 64% dei dipendenti ritiene che la propria azienda abbia attuato policy di sicurezza, l’11% che non le abbia attuate e il 25% non ne è a conoscenza

Il 56% dei dipendenti rispetta moderatamente le policy e una persona su 14 elude consapevolmente le policy di sicurezza IT aziendale

Il 29% dipendenti ritiene che la sicurezza IT stia soffocando l'innovazione e la collaborazione all’interno dell’azienda, rendendo più difficile fare il proprio loro lavoro

© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 7

How Industrial Hackers Monetize the Opportunity

Social Security

$1

Medical

Record

>$50

DDOS

as a Service

~$7/hour

WELCOME TO THE HACKERS’ ECONOMY

DDoS

Credit

Card Data

$0.25-$60

Bank Account Info

>$1000depending on account

type and balance

$

Exploits

$1000-$300K

Facebook Account

$1 for an account

with 15 friends

Spam

$50/500K emails

Malware

Development

$2500(commercial malware)

Global

Cybercrime

Market:

$450B-$1T

Mobile Malware

$150

© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 8

The Security Problem

Changing

Business Models

Dynamic

Threat Landscape

Complexity

and Fragmentation

© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 9

The Threat-Centric Security Model

Attack Continuum

Network Endpoint Mobile Virtual Cloud

Point in Time Continuous

DiscoverEnforceHarden

DetectBlock

Defend

ScopeContain

Remediate

© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 10

Strategic Imperatives

Network-Integrated,

Broad Sensor Base,

Context and Automation

Continuous Advanced Threat

Protection, Cloud-Based

Security Intelligence

Agile and Open Platforms,

Built for Scale, Consistent

Control, Management

EndpointNetwork Mobile Virtual Cloud

Visibility-Driven Threat-Focused Platform-Based

© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 11

Increases Visibility Accelerates Detection Scales Enforcement

Synergies Through Integration

The Network and Security

© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 12

Silos Create Security Gaps

W W W

Context-Aware

Functions

IPS Functions

Malware Functions

VPNFunctions

Traditional Firewall

Functions

© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 13

Mapping Technologies to the Model

Security Services

Firewall

App Control

VPN

Patch Mgmt

Vuln Mgmt

IAM/NAC

IPS

Antivirus

Email/Web

IDS

FPC

Forensics

AMD

Log Mgmt

SIEM

Attack Continuum

DiscoverEnforceHarden

DetectBlock

Defend

ScopeContain

Remediate

© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 14

Comprehensive Security Product Portfolio

IPS & NGIPS

• Cisco IPS 4300 Series

• Cisco ASA 5500-X Series integrated IPS

• FirePOWER NGIPS

• FirePOWER NGIPS w/ Application Control

• FirePOWER Virtual NGIPS

NAC +Identity Services

• Cisco Identity Services Engine (ISE)

• Cisco Access Control Server (ACS)

Email Security

• Cisco Email Security Appliance (ESA)

• Cisco Virtual Email Security Appliance (vESA)

• Cisco Cloud Email Security

Web Security

• Cisco Web Security Appliance (WSA)

• Cisco Virtual Web Security Appliance (vWSA)

• Cisco Cloud Web Security

UTM

• Meraki MX

Advanced Malware Protection

• AMP for Networks

• AMP for Endpoints

• AMP for Private Cloud / Virtual Appliance

VPN

• Cisco AnyConnect VPN

Firewall & NGFW

• Cisco ASA 5500-X Series

• Cisco ASA 5500-X w/ NGFW

license

• Cisco ASA 5585-X w/ NGFW

blade

• Cisco ASA with FirePOWERServices

© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 15

Only Cisco Delivers

Consistent Control

ReducedComplexity

Consistent Policies

Across the

Network and

Data Center

Fits and Adapts

to Changing

Business Models

Global Intelligence

With the Right

Context

Detects and Stops

Advanced Threats

Advanced Threat Protection

UnmatchedVisibility

© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 16

Advisory Integration Managed

Custom Threat

Intelligence

Technical Security

Assessments

Integration

Services

Security Optimization

Services

Managed Threat

Defense

Remote Managed

Services

Security Services

© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 17

GRAZIE!

Focus Group 2 - 14.45 - 15.45

Security intelligence: come contrastare le minacce di nuova generazione

impiegando i Big Data e la Real-time Analytics

Chaired by: Giancarlo Vercellino, (IDC Italia) Stefano Volpi (Cisco Italia), Marco Mazzoleni (Cisco Italia)