SlideShare a Scribd company logo
1 of 28
Download to read offline
The Business
Relevance of Security:
Challenges  Solutions



Fred Kost and Calvin Chai
Interop Las Vegas
April 30, 2008



                                                                       1
      ยฉ 2008 Cisco Systems, Inc. All rights reserved.   Cisco Public
How Many of You Haveโ€ฆ

 been notified of a potential identity breach?

 been notified of a potential breach of
 payment card information?

 been a victim of malware or lured to a
 phishing site?




                                                                   2
  ยฉ 2008 Cisco Systems, Inc. All rights reserved.   Cisco Public
Security 2007: A Year In Review




                                                                   3
  ยฉ 2008 Cisco Systems, Inc. All rights reserved.   Cisco Public
The Business Relevance of Security: Challenges & Solutions
The Business Relevance of Security: Challenges & Solutions
The Business Relevance of Security: Challenges & Solutions
The Business Relevance of Security: Challenges & Solutions
The Business Relevance of Security: Challenges & Solutions
The Business Relevance of Security: Challenges & Solutions
The Business Relevance of Security: Challenges & Solutions
The Business Relevance of Security: Challenges & Solutions
The Business Relevance of Security: Challenges & Solutions
The Business Relevance of Security: Challenges & Solutions
The Business Relevance of Security: Challenges & Solutions
The Business Relevance of Security: Challenges & Solutions
The Business Relevance of Security: Challenges & Solutions
The Business Relevance of Security: Challenges & Solutions
The Business Relevance of Security: Challenges & Solutions
The Business Relevance of Security: Challenges & Solutions
The Business Relevance of Security: Challenges & Solutions
The Business Relevance of Security: Challenges & Solutions
The Business Relevance of Security: Challenges & Solutions
The Business Relevance of Security: Challenges & Solutions
The Business Relevance of Security: Challenges & Solutions
The Business Relevance of Security: Challenges & Solutions
The Business Relevance of Security: Challenges & Solutions
The Business Relevance of Security: Challenges & Solutions
The Business Relevance of Security: Challenges & Solutions

More Related Content

What's hot

Windstream Managed Network Security Infographic
Windstream Managed Network Security InfographicWindstream Managed Network Security Infographic
Windstream Managed Network Security InfographicIdeba
ย 
Cyber supply chain risk management ASDE
Cyber supply chain risk management   ASDECyber supply chain risk management   ASDE
Cyber supply chain risk management ASDEEngineers Australia
ย 
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy [Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy Nur Shiqim Chok
ย 
Windstream Managed Network Security Ebook
Windstream Managed Network Security EbookWindstream Managed Network Security Ebook
Windstream Managed Network Security EbookIdeba
ย 
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM SolutionsSecurity Kung Fu: SIEM Solutions
Security Kung Fu: SIEM SolutionsSolarWinds
ย 
Securing Web Services
Securing Web ServicesSecuring Web Services
Securing Web Servicesdigitallibrary
ย 
Security Kung Fu: Firewall Logs
Security Kung Fu: Firewall LogsSecurity Kung Fu: Firewall Logs
Security Kung Fu: Firewall LogsJoshua Berman
ย 
The Importance of Consolidating Your Infrastructure Security โ€“ by United Secu...
The Importance of Consolidating Your Infrastructure Security โ€“ by United Secu...The Importance of Consolidating Your Infrastructure Security โ€“ by United Secu...
The Importance of Consolidating Your Infrastructure Security โ€“ by United Secu...United Security Providers AG
ย 
Garantice la continuidad de su negocio Damian Prieto
Garantice la continuidad de su negocio   Damian PrietoGarantice la continuidad de su negocio   Damian Prieto
Garantice la continuidad de su negocio Damian PrietoCristian Garcia G.
ย 
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyCisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyNetworkCollaborators
ย 
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationCisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationNetworkCollaborators
ย 
Targeted ย & ย Persistent ย Attacks ย in ย EU
Targeted ย & ย Persistent ย Attacks ย in ย EU Targeted ย & ย Persistent ย Attacks ย in ย EU
Targeted ย & ย Persistent ย Attacks ย in ย EU DFLABS SRL
ย 
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...Education & Training Boards
ย 
Cisco Connect 2018 Vietnam - data center transformation - vn
Cisco Connect 2018 Vietnam - data center transformation - vnCisco Connect 2018 Vietnam - data center transformation - vn
Cisco Connect 2018 Vietnam - data center transformation - vnNetworkCollaborators
ย 
CEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber AttackCEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber AttackKevin Duffey
ย 
Effective IS Starts, Ends With Security Culture - ISACA Now
Effective IS Starts, Ends With Security Culture - ISACA NowEffective IS Starts, Ends With Security Culture - ISACA Now
Effective IS Starts, Ends With Security Culture - ISACA NowDominic Vogel
ย 
New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 DaysResilient Systems
ย 
Security Kung Fu: Security vs. Compliance
Security Kung Fu: Security vs. ComplianceSecurity Kung Fu: Security vs. Compliance
Security Kung Fu: Security vs. ComplianceJoshua Berman
ย 
Network as a sensor
Network as a sensorNetwork as a sensor
Network as a sensorCisco do Brasil
ย 
Social Engineering the CEO
Social Engineering the CEOSocial Engineering the CEO
Social Engineering the CEOKevin Duffey
ย 

What's hot (20)

Windstream Managed Network Security Infographic
Windstream Managed Network Security InfographicWindstream Managed Network Security Infographic
Windstream Managed Network Security Infographic
ย 
Cyber supply chain risk management ASDE
Cyber supply chain risk management   ASDECyber supply chain risk management   ASDE
Cyber supply chain risk management ASDE
ย 
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy [Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
ย 
Windstream Managed Network Security Ebook
Windstream Managed Network Security EbookWindstream Managed Network Security Ebook
Windstream Managed Network Security Ebook
ย 
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM SolutionsSecurity Kung Fu: SIEM Solutions
Security Kung Fu: SIEM Solutions
ย 
Securing Web Services
Securing Web ServicesSecuring Web Services
Securing Web Services
ย 
Security Kung Fu: Firewall Logs
Security Kung Fu: Firewall LogsSecurity Kung Fu: Firewall Logs
Security Kung Fu: Firewall Logs
ย 
The Importance of Consolidating Your Infrastructure Security โ€“ by United Secu...
The Importance of Consolidating Your Infrastructure Security โ€“ by United Secu...The Importance of Consolidating Your Infrastructure Security โ€“ by United Secu...
The Importance of Consolidating Your Infrastructure Security โ€“ by United Secu...
ย 
Garantice la continuidad de su negocio Damian Prieto
Garantice la continuidad de su negocio   Damian PrietoGarantice la continuidad de su negocio   Damian Prieto
Garantice la continuidad de su negocio Damian Prieto
ย 
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyCisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
ย 
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationCisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
ย 
Targeted ย & ย Persistent ย Attacks ย in ย EU
Targeted ย & ย Persistent ย Attacks ย in ย EU Targeted ย & ย Persistent ย Attacks ย in ย EU
Targeted ย & ย Persistent ย Attacks ย in ย EU
ย 
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
ย 
Cisco Connect 2018 Vietnam - data center transformation - vn
Cisco Connect 2018 Vietnam - data center transformation - vnCisco Connect 2018 Vietnam - data center transformation - vn
Cisco Connect 2018 Vietnam - data center transformation - vn
ย 
CEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber AttackCEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber Attack
ย 
Effective IS Starts, Ends With Security Culture - ISACA Now
Effective IS Starts, Ends With Security Culture - ISACA NowEffective IS Starts, Ends With Security Culture - ISACA Now
Effective IS Starts, Ends With Security Culture - ISACA Now
ย 
New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 Days
ย 
Security Kung Fu: Security vs. Compliance
Security Kung Fu: Security vs. ComplianceSecurity Kung Fu: Security vs. Compliance
Security Kung Fu: Security vs. Compliance
ย 
Network as a sensor
Network as a sensorNetwork as a sensor
Network as a sensor
ย 
Social Engineering the CEO
Social Engineering the CEOSocial Engineering the CEO
Social Engineering the CEO
ย 

Viewers also liked

BGP Weight Manipulation with Route Map
BGP Weight Manipulation with Route MapBGP Weight Manipulation with Route Map
BGP Weight Manipulation with Route MapNetProtocol Xpert
ย 
APRICOT 2015 - NetConf for Peering Automation
APRICOT 2015 - NetConf for Peering AutomationAPRICOT 2015 - NetConf for Peering Automation
APRICOT 2015 - NetConf for Peering AutomationTom Paseka
ย 
BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)NetProtocol Xpert
ย 
Peering in an IP World - Technology Requirements (3-nov, 2009)
Peering in an IP World - Technology Requirements (3-nov, 2009)Peering in an IP World - Technology Requirements (3-nov, 2009)
Peering in an IP World - Technology Requirements (3-nov, 2009)steve ulrich
ย 
Peering and Transit Tutorials: PeeringDB
Peering and Transit Tutorials: PeeringDBPeering and Transit Tutorials: PeeringDB
Peering and Transit Tutorials: PeeringDBInternet Society
ย 

Viewers also liked (6)

BGP Weight Manipulation with Route Map
BGP Weight Manipulation with Route MapBGP Weight Manipulation with Route Map
BGP Weight Manipulation with Route Map
ย 
APRICOT 2015 - NetConf for Peering Automation
APRICOT 2015 - NetConf for Peering AutomationAPRICOT 2015 - NetConf for Peering Automation
APRICOT 2015 - NetConf for Peering Automation
ย 
BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)
ย 
Peering in an IP World - Technology Requirements (3-nov, 2009)
Peering in an IP World - Technology Requirements (3-nov, 2009)Peering in an IP World - Technology Requirements (3-nov, 2009)
Peering in an IP World - Technology Requirements (3-nov, 2009)
ย 
Peering and Transit Tutorials: PeeringDB
Peering and Transit Tutorials: PeeringDBPeering and Transit Tutorials: PeeringDB
Peering and Transit Tutorials: PeeringDB
ย 
Bgp (1)
Bgp (1)Bgp (1)
Bgp (1)
ย 

Similar to The Business Relevance of Security: Challenges & Solutions

Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Mukesh Chinta
ย 
Public Sphere: Gov 2.0 - Martin Stewart Weeks
Public Sphere: Gov 2.0 - Martin Stewart WeeksPublic Sphere: Gov 2.0 - Martin Stewart Weeks
Public Sphere: Gov 2.0 - Martin Stewart WeeksPia Waugh
ย 
CA_Module_1.pdf
CA_Module_1.pdfCA_Module_1.pdf
CA_Module_1.pdfEhabRushdy1
ย 
Why Have A Digital Investigative Infrastructure
Why Have A Digital Investigative InfrastructureWhy Have A Digital Investigative Infrastructure
Why Have A Digital Investigative InfrastructureKevin Wharram
ย 
Cisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptCisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptjdenbryston
ย 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesSeccuris Inc.
ย 
Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Ulf Mattsson
ย 
The Perils that PCI brings to Security
The Perils that PCI brings to SecurityThe Perils that PCI brings to Security
The Perils that PCI brings to SecurityTripwire
ย 
CA_Module_1.pptx
CA_Module_1.pptxCA_Module_1.pptx
CA_Module_1.pptxYazanSalileh
ย 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Mukesh Chinta
ย 
Trends In The Israeli Information Security Market 2008
Trends In The Israeli Information Security Market 2008Trends In The Israeli Information Security Market 2008
Trends In The Israeli Information Security Market 2008Shahar Geiger Maor
ย 
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...Puneet Kukreja
ย 
Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyougUlf Mattsson
ย 
CCNA Icnd110 s01l02
CCNA Icnd110 s01l02CCNA Icnd110 s01l02
CCNA Icnd110 s01l02computerlenguyen
ย 
Current Emerging Threats
Current Emerging ThreatsCurrent Emerging Threats
Current Emerging Threatsdnomura
ย 
CYBERSECURITY WEYAI.pptx
CYBERSECURITY WEYAI.pptxCYBERSECURITY WEYAI.pptx
CYBERSECURITY WEYAI.pptxWeyai1
ย 
Architecting cybersecurity to future proof smart cities against emerging cybe...
Architecting cybersecurity to future proof smart cities against emerging cybe...Architecting cybersecurity to future proof smart cities against emerging cybe...
Architecting cybersecurity to future proof smart cities against emerging cybe...NUS-ISS
ย 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloudInterop
ย 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Mukesh Chinta
ย 
A 5 step guide to protecting backup data by Iron Mountain
A 5 step guide to protecting backup data by Iron MountainA 5 step guide to protecting backup data by Iron Mountain
A 5 step guide to protecting backup data by Iron MountainPim Piepers
ย 

Similar to The Business Relevance of Security: Challenges & Solutions (20)

Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
ย 
Public Sphere: Gov 2.0 - Martin Stewart Weeks
Public Sphere: Gov 2.0 - Martin Stewart WeeksPublic Sphere: Gov 2.0 - Martin Stewart Weeks
Public Sphere: Gov 2.0 - Martin Stewart Weeks
ย 
CA_Module_1.pdf
CA_Module_1.pdfCA_Module_1.pdf
CA_Module_1.pdf
ย 
Why Have A Digital Investigative Infrastructure
Why Have A Digital Investigative InfrastructureWhy Have A Digital Investigative Infrastructure
Why Have A Digital Investigative Infrastructure
ย 
Cisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptCisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.ppt
ย 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
ย 
Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0
ย 
The Perils that PCI brings to Security
The Perils that PCI brings to SecurityThe Perils that PCI brings to Security
The Perils that PCI brings to Security
ย 
CA_Module_1.pptx
CA_Module_1.pptxCA_Module_1.pptx
CA_Module_1.pptx
ย 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8
ย 
Trends In The Israeli Information Security Market 2008
Trends In The Israeli Information Security Market 2008Trends In The Israeli Information Security Market 2008
Trends In The Israeli Information Security Market 2008
ย 
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
ย 
Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyoug
ย 
CCNA Icnd110 s01l02
CCNA Icnd110 s01l02CCNA Icnd110 s01l02
CCNA Icnd110 s01l02
ย 
Current Emerging Threats
Current Emerging ThreatsCurrent Emerging Threats
Current Emerging Threats
ย 
CYBERSECURITY WEYAI.pptx
CYBERSECURITY WEYAI.pptxCYBERSECURITY WEYAI.pptx
CYBERSECURITY WEYAI.pptx
ย 
Architecting cybersecurity to future proof smart cities against emerging cybe...
Architecting cybersecurity to future proof smart cities against emerging cybe...Architecting cybersecurity to future proof smart cities against emerging cybe...
Architecting cybersecurity to future proof smart cities against emerging cybe...
ย 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
ย 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
ย 
A 5 step guide to protecting backup data by Iron Mountain
A 5 step guide to protecting backup data by Iron MountainA 5 step guide to protecting backup data by Iron Mountain
A 5 step guide to protecting backup data by Iron Mountain
ย 

More from digitallibrary

SOA: State of the Union
SOA: State of the UnionSOA: State of the Union
SOA: State of the Uniondigitallibrary
ย 
How to Get (and Keep) Your ITSM Initiative on Track
How to Get (and Keep) Your ITSM Initiative on TrackHow to Get (and Keep) Your ITSM Initiative on Track
How to Get (and Keep) Your ITSM Initiative on Trackdigitallibrary
ย 
Physical Security & IT
Physical Security & ITPhysical Security & IT
Physical Security & ITdigitallibrary
ย 
Application Virtualization: What its all about and how do you manage it?
Application Virtualization: What its all about and how do you manage it?Application Virtualization: What its all about and how do you manage it?
Application Virtualization: What its all about and how do you manage it?digitallibrary
ย 
How taking a strategic approach to WAN optimization supports application deli...
How taking a strategic approach to WAN optimization supports application deli...How taking a strategic approach to WAN optimization supports application deli...
How taking a strategic approach to WAN optimization supports application deli...digitallibrary
ย 
FAN - An Architecture for Data Management
FAN - An Architecture for Data ManagementFAN - An Architecture for Data Management
FAN - An Architecture for Data Managementdigitallibrary
ย 
10GE Challenges, Opportunities, Vision
10GE Challenges, Opportunities, Vision10GE Challenges, Opportunities, Vision
10GE Challenges, Opportunities, Visiondigitallibrary
ย 
Virtualization and WAN Optimization
Virtualization and WAN OptimizationVirtualization and WAN Optimization
Virtualization and WAN Optimizationdigitallibrary
ย 
The Industrialisation of Software Development
The Industrialisation of Software DevelopmentThe Industrialisation of Software Development
The Industrialisation of Software Developmentdigitallibrary
ย 
The Impact of SOA on Traditional Middleware Technologies
The Impact of SOA on Traditional Middleware TechnologiesThe Impact of SOA on Traditional Middleware Technologies
The Impact of SOA on Traditional Middleware Technologiesdigitallibrary
ย 
Software 2008: The Convergence of Open Source & SaaS
Software 2008: The Convergence of Open Source & SaaSSoftware 2008: The Convergence of Open Source & SaaS
Software 2008: The Convergence of Open Source & SaaSdigitallibrary
ย 
The Open Source & SaaS Revolution
The Open Source & SaaS RevolutionThe Open Source & SaaS Revolution
The Open Source & SaaS Revolutiondigitallibrary
ย 
Sinking like a BRIC: Better Choices than Brazil, Russia,
Sinking like a BRIC: Better Choices than Brazil, Russia,Sinking like a BRIC: Better Choices than Brazil, Russia,
Sinking like a BRIC: Better Choices than Brazil, Russia,digitallibrary
ย 
Lost in Translation: Unique issues in tech vendor
Lost in Translation: Unique issues in tech vendorLost in Translation: Unique issues in tech vendor
Lost in Translation: Unique issues in tech vendordigitallibrary
ย 
Adaptive Access Contextual Security for Application Delivery Networks
Adaptive Access Contextual Security for Application Delivery NetworksAdaptive Access Contextual Security for Application Delivery Networks
Adaptive Access Contextual Security for Application Delivery Networksdigitallibrary
ย 
Virtualized Data Centers
Virtualized Data CentersVirtualized Data Centers
Virtualized Data Centersdigitallibrary
ย 
The On-Demand Project Execution Company
The On-Demand Project Execution CompanyThe On-Demand Project Execution Company
The On-Demand Project Execution Companydigitallibrary
ย 
Architectures for IP Telephony Deployment
Architectures for IP Telephony DeploymentArchitectures for IP Telephony Deployment
Architectures for IP Telephony Deploymentdigitallibrary
ย 
Outsourcing 3.0: India the Market and the Factory for Software Products
Outsourcing 3.0: India the Market and the Factory for Software ProductsOutsourcing 3.0: India the Market and the Factory for Software Products
Outsourcing 3.0: India the Market and the Factory for Software Productsdigitallibrary
ย 
Virtualization: The Best Initiative to Alleviate the Power Crisis in the Data...
Virtualization: The Best Initiative to Alleviate the Power Crisis in the Data...Virtualization: The Best Initiative to Alleviate the Power Crisis in the Data...
Virtualization: The Best Initiative to Alleviate the Power Crisis in the Data...digitallibrary
ย 

More from digitallibrary (20)

SOA: State of the Union
SOA: State of the UnionSOA: State of the Union
SOA: State of the Union
ย 
How to Get (and Keep) Your ITSM Initiative on Track
How to Get (and Keep) Your ITSM Initiative on TrackHow to Get (and Keep) Your ITSM Initiative on Track
How to Get (and Keep) Your ITSM Initiative on Track
ย 
Physical Security & IT
Physical Security & ITPhysical Security & IT
Physical Security & IT
ย 
Application Virtualization: What its all about and how do you manage it?
Application Virtualization: What its all about and how do you manage it?Application Virtualization: What its all about and how do you manage it?
Application Virtualization: What its all about and how do you manage it?
ย 
How taking a strategic approach to WAN optimization supports application deli...
How taking a strategic approach to WAN optimization supports application deli...How taking a strategic approach to WAN optimization supports application deli...
How taking a strategic approach to WAN optimization supports application deli...
ย 
FAN - An Architecture for Data Management
FAN - An Architecture for Data ManagementFAN - An Architecture for Data Management
FAN - An Architecture for Data Management
ย 
10GE Challenges, Opportunities, Vision
10GE Challenges, Opportunities, Vision10GE Challenges, Opportunities, Vision
10GE Challenges, Opportunities, Vision
ย 
Virtualization and WAN Optimization
Virtualization and WAN OptimizationVirtualization and WAN Optimization
Virtualization and WAN Optimization
ย 
The Industrialisation of Software Development
The Industrialisation of Software DevelopmentThe Industrialisation of Software Development
The Industrialisation of Software Development
ย 
The Impact of SOA on Traditional Middleware Technologies
The Impact of SOA on Traditional Middleware TechnologiesThe Impact of SOA on Traditional Middleware Technologies
The Impact of SOA on Traditional Middleware Technologies
ย 
Software 2008: The Convergence of Open Source & SaaS
Software 2008: The Convergence of Open Source & SaaSSoftware 2008: The Convergence of Open Source & SaaS
Software 2008: The Convergence of Open Source & SaaS
ย 
The Open Source & SaaS Revolution
The Open Source & SaaS RevolutionThe Open Source & SaaS Revolution
The Open Source & SaaS Revolution
ย 
Sinking like a BRIC: Better Choices than Brazil, Russia,
Sinking like a BRIC: Better Choices than Brazil, Russia,Sinking like a BRIC: Better Choices than Brazil, Russia,
Sinking like a BRIC: Better Choices than Brazil, Russia,
ย 
Lost in Translation: Unique issues in tech vendor
Lost in Translation: Unique issues in tech vendorLost in Translation: Unique issues in tech vendor
Lost in Translation: Unique issues in tech vendor
ย 
Adaptive Access Contextual Security for Application Delivery Networks
Adaptive Access Contextual Security for Application Delivery NetworksAdaptive Access Contextual Security for Application Delivery Networks
Adaptive Access Contextual Security for Application Delivery Networks
ย 
Virtualized Data Centers
Virtualized Data CentersVirtualized Data Centers
Virtualized Data Centers
ย 
The On-Demand Project Execution Company
The On-Demand Project Execution CompanyThe On-Demand Project Execution Company
The On-Demand Project Execution Company
ย 
Architectures for IP Telephony Deployment
Architectures for IP Telephony DeploymentArchitectures for IP Telephony Deployment
Architectures for IP Telephony Deployment
ย 
Outsourcing 3.0: India the Market and the Factory for Software Products
Outsourcing 3.0: India the Market and the Factory for Software ProductsOutsourcing 3.0: India the Market and the Factory for Software Products
Outsourcing 3.0: India the Market and the Factory for Software Products
ย 
Virtualization: The Best Initiative to Alleviate the Power Crisis in the Data...
Virtualization: The Best Initiative to Alleviate the Power Crisis in the Data...Virtualization: The Best Initiative to Alleviate the Power Crisis in the Data...
Virtualization: The Best Initiative to Alleviate the Power Crisis in the Data...
ย 

Recently uploaded

Vip Call US ๐Ÿ“ž 7738631006 โœ…Call Girls In Sakinaka ( Mumbai )
Vip Call US ๐Ÿ“ž 7738631006 โœ…Call Girls In Sakinaka ( Mumbai )Vip Call US ๐Ÿ“ž 7738631006 โœ…Call Girls In Sakinaka ( Mumbai )
Vip Call US ๐Ÿ“ž 7738631006 โœ…Call Girls In Sakinaka ( Mumbai )Pooja Nehwal
ย 
VIP Call Girl in Mira Road ๐Ÿ’ง 9920725232 ( Call Me ) Get A New Crush Everyday ...
VIP Call Girl in Mira Road ๐Ÿ’ง 9920725232 ( Call Me ) Get A New Crush Everyday ...VIP Call Girl in Mira Road ๐Ÿ’ง 9920725232 ( Call Me ) Get A New Crush Everyday ...
VIP Call Girl in Mira Road ๐Ÿ’ง 9920725232 ( Call Me ) Get A New Crush Everyday ...dipikadinghjn ( Why You Choose Us? ) Escorts
ย 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfMichael Silva
ย 
VIP Independent Call Girls in Mumbai ๐ŸŒน 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai ๐ŸŒน 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Mumbai ๐ŸŒน 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai ๐ŸŒน 9920725232 ( Call Me ) Mumbai Escorts ...dipikadinghjn ( Why You Choose Us? ) Escorts
ย 
Business Principles, Tools, and Techniques in Participating in Various Types...
Business Principles, Tools, and Techniques  in Participating in Various Types...Business Principles, Tools, and Techniques  in Participating in Various Types...
Business Principles, Tools, and Techniques in Participating in Various Types...jeffreytingson
ย 
VIP Call Girl Service Andheri West โšก 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West โšก 9920725232 What It Takes To Be The Best ...VIP Call Girl Service Andheri West โšก 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West โšก 9920725232 What It Takes To Be The Best ...dipikadinghjn ( Why You Choose Us? ) Escorts
ย 
Top Rated Pune Call Girls Sinhagad Road โŸŸ 6297143586 โŸŸ Call Me For Genuine S...
Top Rated  Pune Call Girls Sinhagad Road โŸŸ 6297143586 โŸŸ Call Me For Genuine S...Top Rated  Pune Call Girls Sinhagad Road โŸŸ 6297143586 โŸŸ Call Me For Genuine S...
Top Rated Pune Call Girls Sinhagad Road โŸŸ 6297143586 โŸŸ Call Me For Genuine S...Call Girls in Nagpur High Profile
ย 
VIP Independent Call Girls in Taloja ๐ŸŒน 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Taloja ๐ŸŒน 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Taloja ๐ŸŒน 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Taloja ๐ŸŒน 9920725232 ( Call Me ) Mumbai Escorts ...dipikadinghjn ( Why You Choose Us? ) Escorts
ย 
VIP Call Girl in Mumbai ๐Ÿ’ง 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai ๐Ÿ’ง 9920725232 ( Call Me ) Get A New Crush Everyday Wit...VIP Call Girl in Mumbai ๐Ÿ’ง 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai ๐Ÿ’ง 9920725232 ( Call Me ) Get A New Crush Everyday Wit...dipikadinghjn ( Why You Choose Us? ) Escorts
ย 
Call Girls in New Friends Colony Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9205541914 ๐Ÿ”( Delhi) Escort...
Call Girls in New Friends Colony Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9205541914 ๐Ÿ”( Delhi) Escort...Call Girls in New Friends Colony Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9205541914 ๐Ÿ”( Delhi) Escort...
Call Girls in New Friends Colony Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9205541914 ๐Ÿ”( Delhi) Escort...Delhi Call girls
ย 
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
ย 
VIP Call Girl in Mumbai Central ๐Ÿ’ง 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central ๐Ÿ’ง 9920725232 ( Call Me ) Get A New Crush Ever...VIP Call Girl in Mumbai Central ๐Ÿ’ง 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central ๐Ÿ’ง 9920725232 ( Call Me ) Get A New Crush Ever...dipikadinghjn ( Why You Choose Us? ) Escorts
ย 
Bandra High Profile Sexy Call Girls,9833754194-Khar Road Speciality Call Girl...
Bandra High Profile Sexy Call Girls,9833754194-Khar Road Speciality Call Girl...Bandra High Profile Sexy Call Girls,9833754194-Khar Road Speciality Call Girl...
Bandra High Profile Sexy Call Girls,9833754194-Khar Road Speciality Call Girl...priyasharma62062
ย 
Top Rated Pune Call Girls Viman Nagar โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex...Call Girls in Nagpur High Profile
ย 
Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...
Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...
Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...priyasharma62062
ย 
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...Call Girls in Nagpur High Profile
ย 
20240419-SMC-submission-Annual-Superannuation-Performance-Test-โ€“-design-optio...
20240419-SMC-submission-Annual-Superannuation-Performance-Test-โ€“-design-optio...20240419-SMC-submission-Annual-Superannuation-Performance-Test-โ€“-design-optio...
20240419-SMC-submission-Annual-Superannuation-Performance-Test-โ€“-design-optio...Henry Tapper
ย 

Recently uploaded (20)

Vip Call US ๐Ÿ“ž 7738631006 โœ…Call Girls In Sakinaka ( Mumbai )
Vip Call US ๐Ÿ“ž 7738631006 โœ…Call Girls In Sakinaka ( Mumbai )Vip Call US ๐Ÿ“ž 7738631006 โœ…Call Girls In Sakinaka ( Mumbai )
Vip Call US ๐Ÿ“ž 7738631006 โœ…Call Girls In Sakinaka ( Mumbai )
ย 
VIP Call Girl in Mira Road ๐Ÿ’ง 9920725232 ( Call Me ) Get A New Crush Everyday ...
VIP Call Girl in Mira Road ๐Ÿ’ง 9920725232 ( Call Me ) Get A New Crush Everyday ...VIP Call Girl in Mira Road ๐Ÿ’ง 9920725232 ( Call Me ) Get A New Crush Everyday ...
VIP Call Girl in Mira Road ๐Ÿ’ง 9920725232 ( Call Me ) Get A New Crush Everyday ...
ย 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdf
ย 
VIP Independent Call Girls in Mumbai ๐ŸŒน 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai ๐ŸŒน 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Mumbai ๐ŸŒน 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai ๐ŸŒน 9920725232 ( Call Me ) Mumbai Escorts ...
ย 
Business Principles, Tools, and Techniques in Participating in Various Types...
Business Principles, Tools, and Techniques  in Participating in Various Types...Business Principles, Tools, and Techniques  in Participating in Various Types...
Business Principles, Tools, and Techniques in Participating in Various Types...
ย 
(INDIRA) Call Girl Srinagar Call Now 8617697112 Srinagar Escorts 24x7
(INDIRA) Call Girl Srinagar Call Now 8617697112 Srinagar Escorts 24x7(INDIRA) Call Girl Srinagar Call Now 8617697112 Srinagar Escorts 24x7
(INDIRA) Call Girl Srinagar Call Now 8617697112 Srinagar Escorts 24x7
ย 
VIP Call Girl Service Andheri West โšก 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West โšก 9920725232 What It Takes To Be The Best ...VIP Call Girl Service Andheri West โšก 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West โšก 9920725232 What It Takes To Be The Best ...
ย 
Top Rated Pune Call Girls Sinhagad Road โŸŸ 6297143586 โŸŸ Call Me For Genuine S...
Top Rated  Pune Call Girls Sinhagad Road โŸŸ 6297143586 โŸŸ Call Me For Genuine S...Top Rated  Pune Call Girls Sinhagad Road โŸŸ 6297143586 โŸŸ Call Me For Genuine S...
Top Rated Pune Call Girls Sinhagad Road โŸŸ 6297143586 โŸŸ Call Me For Genuine S...
ย 
W.D. Gann Theory Complete Information.pdf
W.D. Gann Theory Complete Information.pdfW.D. Gann Theory Complete Information.pdf
W.D. Gann Theory Complete Information.pdf
ย 
VIP Independent Call Girls in Taloja ๐ŸŒน 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Taloja ๐ŸŒน 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Taloja ๐ŸŒน 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Taloja ๐ŸŒน 9920725232 ( Call Me ) Mumbai Escorts ...
ย 
VIP Call Girl in Mumbai ๐Ÿ’ง 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai ๐Ÿ’ง 9920725232 ( Call Me ) Get A New Crush Everyday Wit...VIP Call Girl in Mumbai ๐Ÿ’ง 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai ๐Ÿ’ง 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
ย 
Call Girls in New Friends Colony Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9205541914 ๐Ÿ”( Delhi) Escort...
Call Girls in New Friends Colony Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9205541914 ๐Ÿ”( Delhi) Escort...Call Girls in New Friends Colony Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9205541914 ๐Ÿ”( Delhi) Escort...
Call Girls in New Friends Colony Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9205541914 ๐Ÿ”( Delhi) Escort...
ย 
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
ย 
VIP Call Girl in Mumbai Central ๐Ÿ’ง 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central ๐Ÿ’ง 9920725232 ( Call Me ) Get A New Crush Ever...VIP Call Girl in Mumbai Central ๐Ÿ’ง 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central ๐Ÿ’ง 9920725232 ( Call Me ) Get A New Crush Ever...
ย 
Bandra High Profile Sexy Call Girls,9833754194-Khar Road Speciality Call Girl...
Bandra High Profile Sexy Call Girls,9833754194-Khar Road Speciality Call Girl...Bandra High Profile Sexy Call Girls,9833754194-Khar Road Speciality Call Girl...
Bandra High Profile Sexy Call Girls,9833754194-Khar Road Speciality Call Girl...
ย 
Top Rated Pune Call Girls Viman Nagar โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex...
ย 
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
ย 
Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...
Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...
Navi Mumbai Cooperetive Housewife Call Girls-9833754194-Natural Panvel Enjoye...
ย 
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
ย 
20240419-SMC-submission-Annual-Superannuation-Performance-Test-โ€“-design-optio...
20240419-SMC-submission-Annual-Superannuation-Performance-Test-โ€“-design-optio...20240419-SMC-submission-Annual-Superannuation-Performance-Test-โ€“-design-optio...
20240419-SMC-submission-Annual-Superannuation-Performance-Test-โ€“-design-optio...
ย 

The Business Relevance of Security: Challenges & Solutions

  • 1. The Business Relevance of Security: Challenges Solutions Fred Kost and Calvin Chai Interop Las Vegas April 30, 2008 1 ยฉ 2008 Cisco Systems, Inc. All rights reserved. Cisco Public
  • 2. How Many of You Haveโ€ฆ been notified of a potential identity breach? been notified of a potential breach of payment card information? been a victim of malware or lured to a phishing site? 2 ยฉ 2008 Cisco Systems, Inc. All rights reserved. Cisco Public
  • 3. Security 2007: A Year In Review 3 ยฉ 2008 Cisco Systems, Inc. All rights reserved. Cisco Public