SlideShare a Scribd company logo
1 of 21
Download to read offline
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Peter Watson
Cisco Head of Security Services APJC
27th March 2018
Strengthen Your Readiness and Response to Attacks
Cisco Incident Response Services
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Security is Fundamental to Digitization
2 in 5
Executives say privacy
and security restrict their
IoT investment
39%
“My organization halted a
mission-critical initiative
due to cybersecurity
concerns.”
71%
“Cybersecurity risks
and threats hinder
innovation in my organization.”
Innovations are moving forward,
but probably at 70%-80% of what they otherwise could if there were
better tools to deal with the dark cloud of cybersecurity threats.
Airline Industry CFO
“
”
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Slower Response = Greater Risk
66%
of breaches took
months or even
years to discover
60%
of breaches have
data exfiltrated in
first 24 hours
60,000
Number of alerts
hackers set off at
Global Retailer
184
Median number
of days advanced
attackers present
before detection
27
33%
Of organizations
discover
breaches through
their own
monitoring
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Time
ResponseDetection
Is Our Security Posture Effective?
Threat
Time to Detect, Time to Respond
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
You will get breached
Prevention is not a silver bullet
Detection is an absolute must
Speed to discovery and containment are critical
Intel isn’t just for spies anymore
Upfront Reality
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Detect
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cyber Security Monitoring
Focus on the anomalies
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
PROTECTING CISCO
THE ENVIRONMENT
‐ Each presents its own
specific set of security
challenges that needs
to be dealt with.
‐ Security events cross
multiple boxes.
USERS
138,771
VENDOR ORGS
2690
ADMIN ACCOUNTS
4474
SERVICE ACCOUNTS
13,096
DATA CENTERS
13
OFFICES
600
COUNTRIES
102
CITIES
343
EXTRANET PARTNERS
318
CSP
296
ACQUISITIONS
8 (AVG YR)
ENDPOINTS
127,454
MOBILES
73,162
INFRA DEVICES
194,875
BUSINESS GROUPS
13,899
LABS
2370
83,78243,672
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Threats Across
the Internet
Threats Inside
your Network
Hundreds of
Thousands
Customers
7.3T Threats
Blocked
Annually
250 Threat
Researchers
Tens of
Millions Users
Hundreds of
Threat Analytic
Engines
TALOS – Unmatched Visibility, Research, and
Analytics
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Internet Cisco Assets
Threats Prevented / QuarterThreat Defense
DNS RPZ
BGP Blackhole
WSA
ESA
AntiVirus
HIPS
EndPoint AMP
Prevention
1,558,649,099
39,778,560
242,805,292
229,012,330
25,802,498
3,364,08
720,52
9
Managed Incidents / Quarter  1,978Detection
CSIRT
Umbrella 421,000,000
The reverse pyramid
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Response
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Enhance
security
status with
regulators
Provides
protection
when its
needed most
Drives cross
architectural
and
organizational
integration
Quickly react
and respond
to security
incidents
Why Incident Response?
Every customer
should have
an Incident
Response
Plan
Open The Door
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
playbook |ˈplāˌbŏk|
(noun)
A prescriptive collection of repeatable queries
(reports) against security event data sources that
lead to incident detection and response.
Operationalizing and optimizing
Response Playbook
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Inventory of Control’s
Security as a Service
Controls Store
• Leverage existing investments
• Always have untapped features
• Control adoption as well as threat metrics
• Security posture against required goals.
• Shift focus from risk to compliance.
“More than a risk register”
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Leverage Automation
• Understanding the environment
• Testing, validation, applying a fix
• Filtering out data and helping identify what to look at
• Enable knowledge share and continuous investigations
• Update architecture templates and operational processes
• Tuning the plays and giving recommendations
AI and machine learning fail because its treated as “magic” instead of part of a
larger solution
Incident Response team members have to have the skills to determine if events
are true or false positives, and tune as necessary
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
IR Evolution & Maturity
Maturity
Level
Ad-hoc Maturing Strategic
As Needed
Dedicated
Part-Time Full-Time SOC/IR+ Fusion
CMM Equivalent Initial Repeatable Defined Managed Optimized
Existing IR
Capabilities
People
• 0-1 • 1-3
• Specialization
• 2-5
• Formal roles
• ~10
• Shifts (possible
24x7)
• 15+
• Intel, SOC, and IR
Teams
Process
• Chaotic and relying
on individual
heroics; reactive
• General purpose
run-book
• Tribal knowledge
• Situational run
books; some
consistency
• Email-based
processes
• Requirements and
Workflows
documented as
standard business
process
• Some improvement
over time
• Process is
measured via
metrics
• Minimal Threat
Sharing
• Shift turnover
• SLAs
• Processes are
constantly improved
and optimized
• Broad Threat
sharing
• Hunt teams
Technology
• AV
• Firewalls
• IDS/IPS
• SIEM
• Sandboxing
• Continuous
Monitoring
• Endpoint Forensics
• Tactical Intelligence
• Malware Analysis
• Additional
Intelligence
• IT Operations
Integration
• Intel+IR Drives
Security Program
• Strategic
Intelligence
• Coordination with
Physical
Security/Intelligenc
e
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
I need a plan for
when a data breach
occurs
IR Tabletop
Exercises
I want to know I
have a team
standing by
Incident Response
Retainers
In need help now
Emergency Incident
Response
I need to know what
is in my network
Proactive Threat
Hunting
I need to know if I
can respond
appropriately
IR Readiness
Assessments
Included in the IR Retainers
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
Cisco Incident Response Services
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
• Invest in Intel & IR; it can be measured, evolved, and simplified.
• Intel is more than a nice to have- it is a requirement
• Think beyond IT; Partnerships are critical to success. Educate and
form alliances in the business and externally (e.g. local Law
Enforcement office, competitors, colleges)
• Communicate findings back into other functions; Defense is a team
sport
• Reward your teams!
Final Thoughts
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

More Related Content

What's hot

Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXNetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WANCisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WANNetworkCollaborators
 
Cisco Connect 2018 Vietnam - data center transformation - vn
Cisco Connect 2018 Vietnam - data center transformation - vnCisco Connect 2018 Vietnam - data center transformation - vn
Cisco Connect 2018 Vietnam - data center transformation - vnNetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined AccessCisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined AccessNetworkCollaborators
 
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyCisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyNetworkCollaborators
 
Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition NetworkCollaborators
 
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...NetworkCollaborators
 
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellCisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellNetworkCollaborators
 
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia -  software-defined access-a transformational ap...Cisco Connect 2018 Indonesia -  software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...NetworkCollaborators
 
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationCisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationNetworkCollaborators
 
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformationCisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformationNetworkCollaborators
 
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy [Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy Nur Shiqim Chok
 
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4Nur Shiqim Chok
 
Cisco Connect 2018 Singapore - jordan koh
Cisco Connect 2018 Singapore -  jordan kohCisco Connect 2018 Singapore -  jordan koh
Cisco Connect 2018 Singapore - jordan kohNetworkCollaborators
 
Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseEnterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseRobb Boyd
 
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics Robb Boyd
 
New security solutions for next generation of IT
New security solutions for next generation of ITNew security solutions for next generation of IT
New security solutions for next generation of ITDATA SECURITY SOLUTIONS
 
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...NetworkCollaborators
 
Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynoteNur Shiqim Chok
 
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco #ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco ITSitio.com
 

What's hot (20)

Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
 
Cisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WANCisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WAN
 
Cisco Connect 2018 Vietnam - data center transformation - vn
Cisco Connect 2018 Vietnam - data center transformation - vnCisco Connect 2018 Vietnam - data center transformation - vn
Cisco Connect 2018 Vietnam - data center transformation - vn
 
Cisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined AccessCisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined Access
 
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyCisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
 
Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition
 
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
 
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellCisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernell
 
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia -  software-defined access-a transformational ap...Cisco Connect 2018 Indonesia -  software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
 
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationCisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
 
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformationCisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
 
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy [Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
 
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
 
Cisco Connect 2018 Singapore - jordan koh
Cisco Connect 2018 Singapore -  jordan kohCisco Connect 2018 Singapore -  jordan koh
Cisco Connect 2018 Singapore - jordan koh
 
Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseEnterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without Compromise
 
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics
 
New security solutions for next generation of IT
New security solutions for next generation of ITNew security solutions for next generation of IT
New security solutions for next generation of IT
 
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
 
Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynote
 
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco #ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
 

Similar to Cisco Connect 2018 Singapore - Cisco Incident Response Services

Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...NetworkCollaborators
 
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...NetworkCollaborators
 
Cisco Connect 2018 Philippines - security keynote
Cisco Connect 2018 Philippines -   security keynoteCisco Connect 2018 Philippines -   security keynote
Cisco Connect 2018 Philippines - security keynoteNetworkCollaborators
 
Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаИнтуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаCisco Russia
 
ICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness MeasurementICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness MeasurementAleksey Lukatskiy
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...Nur Shiqim Chok
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...Nur Shiqim Chok
 
Cisco Connect Ottawa 2018 data centre security
Cisco Connect Ottawa 2018 data centre securityCisco Connect Ottawa 2018 data centre security
Cisco Connect Ottawa 2018 data centre securityCisco Canada
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSMAU
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dcCisco Canada
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Cisco connect winnipeg 2018 introducing the network intuitive
Cisco connect winnipeg 2018   introducing the network intuitiveCisco connect winnipeg 2018   introducing the network intuitive
Cisco connect winnipeg 2018 introducing the network intuitiveCisco Canada
 
Mfg workshop security
Mfg workshop   securityMfg workshop   security
Mfg workshop securityRobert Albach
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksAngeloluca Barba
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Sirius
 
Achieving Visibility, Security and Real-Time Actionable Alerts Using VPC Flow...
Achieving Visibility, Security and Real-Time Actionable Alerts Using VPC Flow...Achieving Visibility, Security and Real-Time Actionable Alerts Using VPC Flow...
Achieving Visibility, Security and Real-Time Actionable Alerts Using VPC Flow...Amazon Web Services
 
Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Netpluz Asia Pte Ltd
 
AWS Summit Singapore 2019 | Learn How to Achieve Complete Visibility, Strong ...
AWS Summit Singapore 2019 | Learn How to Achieve Complete Visibility, Strong ...AWS Summit Singapore 2019 | Learn How to Achieve Complete Visibility, Strong ...
AWS Summit Singapore 2019 | Learn How to Achieve Complete Visibility, Strong ...AWS Summits
 

Similar to Cisco Connect 2018 Singapore - Cisco Incident Response Services (20)

Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
 
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
 
Cisco Connect 2018 Philippines - security keynote
Cisco Connect 2018 Philippines -   security keynoteCisco Connect 2018 Philippines -   security keynote
Cisco Connect 2018 Philippines - security keynote
 
Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаИнтуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнеса
 
ICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness MeasurementICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness Measurement
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
 
Cisco Connect Ottawa 2018 data centre security
Cisco Connect Ottawa 2018 data centre securityCisco Connect Ottawa 2018 data centre security
Cisco Connect Ottawa 2018 data centre security
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - Cisco
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dc
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Atelier Technique SYMANTEC ACSS 2018
Atelier Technique SYMANTEC ACSS 2018Atelier Technique SYMANTEC ACSS 2018
Atelier Technique SYMANTEC ACSS 2018
 
Cisco connect winnipeg 2018 introducing the network intuitive
Cisco connect winnipeg 2018   introducing the network intuitiveCisco connect winnipeg 2018   introducing the network intuitive
Cisco connect winnipeg 2018 introducing the network intuitive
 
Mfg workshop security
Mfg workshop   securityMfg workshop   security
Mfg workshop security
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
 
Achieving Visibility, Security and Real-Time Actionable Alerts Using VPC Flow...
Achieving Visibility, Security and Real-Time Actionable Alerts Using VPC Flow...Achieving Visibility, Security and Real-Time Actionable Alerts Using VPC Flow...
Achieving Visibility, Security and Real-Time Actionable Alerts Using VPC Flow...
 
Atelier Technique - Symantec - #ACSS2019
Atelier Technique - Symantec - #ACSS2019Atelier Technique - Symantec - #ACSS2019
Atelier Technique - Symantec - #ACSS2019
 
Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service
 
AWS Summit Singapore 2019 | Learn How to Achieve Complete Visibility, Strong ...
AWS Summit Singapore 2019 | Learn How to Achieve Complete Visibility, Strong ...AWS Summit Singapore 2019 | Learn How to Achieve Complete Visibility, Strong ...
AWS Summit Singapore 2019 | Learn How to Achieve Complete Visibility, Strong ...
 

More from NetworkCollaborators

Cisco Connect 2018 Philippines - ben green
Cisco Connect 2018 Philippines -  ben greenCisco Connect 2018 Philippines -  ben green
Cisco Connect 2018 Philippines - ben greenNetworkCollaborators
 
Cisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights onCisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights onNetworkCollaborators
 
Cisco Connect 2018 Philippines - jaymen quah
Cisco Connect 2018 Philippines - jaymen quahCisco Connect 2018 Philippines - jaymen quah
Cisco Connect 2018 Philippines - jaymen quahNetworkCollaborators
 
Cisco Connect 2018 Philippines - The workplace of the future
Cisco Connect 2018 Philippines - The workplace of the futureCisco Connect 2018 Philippines - The workplace of the future
Cisco Connect 2018 Philippines - The workplace of the futureNetworkCollaborators
 
Cisco Connect 2018 Philippines - fay ocampo
Cisco Connect 2018 Philippines - fay ocampoCisco Connect 2018 Philippines - fay ocampo
Cisco Connect 2018 Philippines - fay ocampoNetworkCollaborators
 
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...NetworkCollaborators
 
Cisco Connect 2018 Philippines - Microsoft azure stack
Cisco Connect 2018 Philippines - Microsoft azure stackCisco Connect 2018 Philippines - Microsoft azure stack
Cisco Connect 2018 Philippines - Microsoft azure stackNetworkCollaborators
 
Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...
Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...
Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...NetworkCollaborators
 
Cisco Connect 2018 Philippines - cybersecurity strategy
Cisco Connect 2018 Philippines - cybersecurity strategyCisco Connect 2018 Philippines - cybersecurity strategy
Cisco Connect 2018 Philippines - cybersecurity strategyNetworkCollaborators
 
Cisco Connect 2018 Philippines - next-generation customer care and the connec...
Cisco Connect 2018 Philippines - next-generation customer care and the connec...Cisco Connect 2018 Philippines - next-generation customer care and the connec...
Cisco Connect 2018 Philippines - next-generation customer care and the connec...NetworkCollaborators
 
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
 Cisco Connect 2018 Philippines - software-defined access-a transformational ... Cisco Connect 2018 Philippines - software-defined access-a transformational ...
Cisco Connect 2018 Philippines - software-defined access-a transformational ...NetworkCollaborators
 
Cisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assuranceCisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assuranceNetworkCollaborators
 
Cisco Connect 2018 Philippines - Trends transforming it network data into bus...
Cisco Connect 2018 Philippines - Trends transforming it network data into bus...Cisco Connect 2018 Philippines - Trends transforming it network data into bus...
Cisco Connect 2018 Philippines - Trends transforming it network data into bus...NetworkCollaborators
 
Cisco Connect 2018 Philippines - cisco cmx
Cisco Connect 2018 Philippines - cisco cmxCisco Connect 2018 Philippines - cisco cmx
Cisco Connect 2018 Philippines - cisco cmxNetworkCollaborators
 

More from NetworkCollaborators (14)

Cisco Connect 2018 Philippines - ben green
Cisco Connect 2018 Philippines -  ben greenCisco Connect 2018 Philippines -  ben green
Cisco Connect 2018 Philippines - ben green
 
Cisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights onCisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights on
 
Cisco Connect 2018 Philippines - jaymen quah
Cisco Connect 2018 Philippines - jaymen quahCisco Connect 2018 Philippines - jaymen quah
Cisco Connect 2018 Philippines - jaymen quah
 
Cisco Connect 2018 Philippines - The workplace of the future
Cisco Connect 2018 Philippines - The workplace of the futureCisco Connect 2018 Philippines - The workplace of the future
Cisco Connect 2018 Philippines - The workplace of the future
 
Cisco Connect 2018 Philippines - fay ocampo
Cisco Connect 2018 Philippines - fay ocampoCisco Connect 2018 Philippines - fay ocampo
Cisco Connect 2018 Philippines - fay ocampo
 
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
 
Cisco Connect 2018 Philippines - Microsoft azure stack
Cisco Connect 2018 Philippines - Microsoft azure stackCisco Connect 2018 Philippines - Microsoft azure stack
Cisco Connect 2018 Philippines - Microsoft azure stack
 
Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...
Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...
Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...
 
Cisco Connect 2018 Philippines - cybersecurity strategy
Cisco Connect 2018 Philippines - cybersecurity strategyCisco Connect 2018 Philippines - cybersecurity strategy
Cisco Connect 2018 Philippines - cybersecurity strategy
 
Cisco Connect 2018 Philippines - next-generation customer care and the connec...
Cisco Connect 2018 Philippines - next-generation customer care and the connec...Cisco Connect 2018 Philippines - next-generation customer care and the connec...
Cisco Connect 2018 Philippines - next-generation customer care and the connec...
 
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
 Cisco Connect 2018 Philippines - software-defined access-a transformational ... Cisco Connect 2018 Philippines - software-defined access-a transformational ...
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
 
Cisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assuranceCisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assurance
 
Cisco Connect 2018 Philippines - Trends transforming it network data into bus...
Cisco Connect 2018 Philippines - Trends transforming it network data into bus...Cisco Connect 2018 Philippines - Trends transforming it network data into bus...
Cisco Connect 2018 Philippines - Trends transforming it network data into bus...
 
Cisco Connect 2018 Philippines - cisco cmx
Cisco Connect 2018 Philippines - cisco cmxCisco Connect 2018 Philippines - cisco cmx
Cisco Connect 2018 Philippines - cisco cmx
 

Recently uploaded

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Recently uploaded (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Cisco Connect 2018 Singapore - Cisco Incident Response Services

  • 1. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 2. Peter Watson Cisco Head of Security Services APJC 27th March 2018 Strengthen Your Readiness and Response to Attacks Cisco Incident Response Services
  • 3. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Security is Fundamental to Digitization 2 in 5 Executives say privacy and security restrict their IoT investment 39% “My organization halted a mission-critical initiative due to cybersecurity concerns.” 71% “Cybersecurity risks and threats hinder innovation in my organization.” Innovations are moving forward, but probably at 70%-80% of what they otherwise could if there were better tools to deal with the dark cloud of cybersecurity threats. Airline Industry CFO “ ”
  • 4. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Slower Response = Greater Risk 66% of breaches took months or even years to discover 60% of breaches have data exfiltrated in first 24 hours 60,000 Number of alerts hackers set off at Global Retailer 184 Median number of days advanced attackers present before detection 27 33% Of organizations discover breaches through their own monitoring
  • 5. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Time ResponseDetection Is Our Security Posture Effective? Threat Time to Detect, Time to Respond
  • 6. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential You will get breached Prevention is not a silver bullet Detection is an absolute must Speed to discovery and containment are critical Intel isn’t just for spies anymore Upfront Reality
  • 7. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Detect
  • 8. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cyber Security Monitoring Focus on the anomalies
  • 9. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential PROTECTING CISCO THE ENVIRONMENT ‐ Each presents its own specific set of security challenges that needs to be dealt with. ‐ Security events cross multiple boxes. USERS 138,771 VENDOR ORGS 2690 ADMIN ACCOUNTS 4474 SERVICE ACCOUNTS 13,096 DATA CENTERS 13 OFFICES 600 COUNTRIES 102 CITIES 343 EXTRANET PARTNERS 318 CSP 296 ACQUISITIONS 8 (AVG YR) ENDPOINTS 127,454 MOBILES 73,162 INFRA DEVICES 194,875 BUSINESS GROUPS 13,899 LABS 2370 83,78243,672
  • 10. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Threats Across the Internet Threats Inside your Network Hundreds of Thousands Customers 7.3T Threats Blocked Annually 250 Threat Researchers Tens of Millions Users Hundreds of Threat Analytic Engines TALOS – Unmatched Visibility, Research, and Analytics
  • 11. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential The Internet Cisco Assets Threats Prevented / QuarterThreat Defense DNS RPZ BGP Blackhole WSA ESA AntiVirus HIPS EndPoint AMP Prevention 1,558,649,099 39,778,560 242,805,292 229,012,330 25,802,498 3,364,08 720,52 9 Managed Incidents / Quarter  1,978Detection CSIRT Umbrella 421,000,000 The reverse pyramid
  • 12. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Response
  • 13. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Enhance security status with regulators Provides protection when its needed most Drives cross architectural and organizational integration Quickly react and respond to security incidents Why Incident Response? Every customer should have an Incident Response Plan Open The Door
  • 14. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential playbook |ˈplāˌbŏk| (noun) A prescriptive collection of repeatable queries (reports) against security event data sources that lead to incident detection and response. Operationalizing and optimizing Response Playbook
  • 15. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Inventory of Control’s Security as a Service Controls Store • Leverage existing investments • Always have untapped features • Control adoption as well as threat metrics • Security posture against required goals. • Shift focus from risk to compliance. “More than a risk register”
  • 16. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Leverage Automation • Understanding the environment • Testing, validation, applying a fix • Filtering out data and helping identify what to look at • Enable knowledge share and continuous investigations • Update architecture templates and operational processes • Tuning the plays and giving recommendations AI and machine learning fail because its treated as “magic” instead of part of a larger solution Incident Response team members have to have the skills to determine if events are true or false positives, and tune as necessary
  • 17. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential IR Evolution & Maturity Maturity Level Ad-hoc Maturing Strategic As Needed Dedicated Part-Time Full-Time SOC/IR+ Fusion CMM Equivalent Initial Repeatable Defined Managed Optimized Existing IR Capabilities People • 0-1 • 1-3 • Specialization • 2-5 • Formal roles • ~10 • Shifts (possible 24x7) • 15+ • Intel, SOC, and IR Teams Process • Chaotic and relying on individual heroics; reactive • General purpose run-book • Tribal knowledge • Situational run books; some consistency • Email-based processes • Requirements and Workflows documented as standard business process • Some improvement over time • Process is measured via metrics • Minimal Threat Sharing • Shift turnover • SLAs • Processes are constantly improved and optimized • Broad Threat sharing • Hunt teams Technology • AV • Firewalls • IDS/IPS • SIEM • Sandboxing • Continuous Monitoring • Endpoint Forensics • Tactical Intelligence • Malware Analysis • Additional Intelligence • IT Operations Integration • Intel+IR Drives Security Program • Strategic Intelligence • Coordination with Physical Security/Intelligenc e
  • 18. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential I need a plan for when a data breach occurs IR Tabletop Exercises I want to know I have a team standing by Incident Response Retainers In need help now Emergency Incident Response I need to know what is in my network Proactive Threat Hunting I need to know if I can respond appropriately IR Readiness Assessments Included in the IR Retainers © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public Cisco Incident Response Services
  • 19. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential • Invest in Intel & IR; it can be measured, evolved, and simplified. • Intel is more than a nice to have- it is a requirement • Think beyond IT; Partnerships are critical to success. Educate and form alliances in the business and externally (e.g. local Law Enforcement office, competitors, colleges) • Communicate findings back into other functions; Defense is a team sport • Reward your teams! Final Thoughts
  • 20.
  • 21. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential