SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Downloaden Sie, um offline zu lesen
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Changing The Security Equation
Demetris Booth
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Evolution of security and the internet
Don’t get into strangers’ cars
Don’t meet people
from the internet
Don’t put your sensitive financial
information on the internet
Literally summon strangers from
the internet to get into their car and
have them bill your credit card
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Global security challenges
People
• Talent Crunch
• High Demanded Expertise
• Increased Costs
Digital Disruption,
Massive Scale
• 50B Devices
Connected by 2020
• $19T Opportunity
Security Industry
• Rapidly expanding number
of security companies
• Not interoperable
• Not open
Active Adversaries
• Attack surface
• Threat Actors
• Attack Sophistication
Dynamic
Threat
Landscape
Changing
Business Models
Complexity and
Fragmentation
Shortage of
Cybersecurity
Experts
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Current situation and outlook
ASEAN is a prime target for cyber attack...
... and the threat landscape is bound to
escalate over time
Rising Systemic Risk
• Increasing trade and business linkages will make the region as
strong as its weakest link
Sustained under-investment
• Diverging national priorities and different paces of digital evolution
will lead to persistent under-investment
Persistently porous cyber defenses
• Caused by limited intelligence sharing, increasing vulnerability to
Advanced Persistent Threats
Larger attack surfaces leading to complexity in
monitoring and response
• Due to technology developments (IT/OT convergence, Multi-cloud,
increased share of encrypted traffic)
Policy preparedness and institutional oversight is
extremely low
• Lack of strategic mindset around policy and governance
• Absence of a unifying framework
• Significant under-investment
Absence of a holistic approach by businesses
• Cyber risk is seen as IT rather than business risk
Nascent local cybersecurity industry together with
limited buyer awareness
• Fragmentation
• Multi vendor/product landscape leading to operational complexity
• Paucity of skilled talent
Cybersecurity in ASEAN
1. Based on Market capitalization of Top 1000 listed companies across SEA in 2017
Source: A.T. Kearney interviews and analysis
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
ASEAN countries have emerged as launchpads for
cyber attack either as vulnerable hotbeds or as trusted,
well-connected hubs
Blocked suspicious web activity by country of origin (expected ratio = 1.0)
Chile
Peru
Panama
Belize
United States
Canada
Venezuela
Italy
France
Germany
Ukraine
Turkey
Romania
Russia
China
Malaysia
Australia
Indonesia
Vietnam
• Malaysia and Indonesia
are global hotspots for
major blocked
suspicious web
activities—up to 3.5
times the standard ratio
• Vietnam is amongst the
top 5 countries from
which attacks on IoT
devices originated
Source: A.T. Kearney research report
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
National
Strategy
development
Legislation
Governance
and operational
entities
International
cooperation
Awareness
Capacity
building
Sector –
specific focus
Singapore Malaysia Philippines Thailand Indonesia Vietnam Rest of ASEAN
Absent Initiated / Proposed Established & Operational
Level of policy preparedness across ASEAN remains low
across most countries, with lack of a unifying framework
Only Singapore and
Malaysia have operational
National strategies
Progress on legislation
and governance remains
fairly slow
Source:
A.T. Kearney, Interviews, Press clippings
Most regional efforts
focused on
Capacity Building
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Identify
Identify End Point Network Content Cloud Analytics IOT SIEM Managed & Professional Security Services
Protect
Defect
Respond
Recover
Product Design & Development Services
Vendor positioning across the security value chain
Product/Product
Implementation &/or
Monitoring Services
Technology
Capability Specialist
Holistic Solutions
Provider
Regional System
Integrators &
Managed Service
Providers
Consulting &
Services Providers
Product & Technology of others
Product & Technology of others
Focused on limited set of
products they supply
Fragmented vendor landscape with few
holistic providers …
Large number of localized MSS
providers with limited regional
mobility
Source: Industry interviews, A.T.Kearney analysis
…and several hundred small
niche players Rely on others
Large number of product
specialists with varied
capabilities
Very few holistic solutions
providers, perpetuating “best of
breed as an industry practice”
Emerging regional systems
integrators facing challenges in
expanding across the value chain.
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Urgent call to action across ASEAN
Source: A.T. Kearney analysis
Secure sustained regional
commitment for cybersecurity
• Pursue a commitment to address the regional cybersecurity spending gap
• Define and track impact-oriented cybersecurity metrics through a cyber-
hygiene dashboard
Elevate cybersecurity on
the regional policy agenda
• Concerted coordination to steer the implementation of an Rapid Action
Cybersecurity (RAC) Framework
• Elevate cybersecurity to the top of the agenda in economic dialogue (i.e.
Establish regional co-ordination platform, multilateral agreement to have
“cybersafe” trading partners)
Build the next wave of
cybersecurity capability
• Develop the next generation of security professionals
• Strengthen the local cybersecurity industry through deeper
cooperation and collaboration with global players
• Drive R&D around emerging threat vectors (AI, etc.)
• Implement an active defense mindset in corporate sector
• Instill a culture around sharing threat intelligence
• Extend cyber resilience across the supply chain (i.e. to business partners, etc.)
• Implement Regional PPP and encourage Industry alliances
Fortify the Ecosystem
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Changing the equation
People Policy & Process Technology
• Networking Academy 20 years
• 7.8 million students across 180
countries
• 1.26 million students in Asia
Pacific & Japan
• 90,000 security students trained
globally in FY17 & 10,000
students in Asia Pacific & Japan
• Security & Trust Organization
• Engages world
governments to help shape
national cybersecurity policy
agenda
• INTERPOL collaboration to
share threat intelligence &
best practices
• Integrated architectural
approach
• New era of networking
& security is
foundational
• Security enables
digital transformation
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco’s Security architecture –
security that works together
Threat Intelligence –
Services
Endpoint CloudNetwork
4.6 Hours Reduced Time To Detection | On Average 184 Days To Detect A Breach In ASEAN
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Security capabilities integrated throughout
the network
Digital Network Architecture
Network visibility Network Segmentation
360° visibility
Real-time analysis of data and traffic to provide
visibility and intelligence across the network
Dynamic control
Software-defined segmentation for effective and
consistent policy application
Comprehensive automation
Integrated solutions that augment your
capabilities and reduce manual processes
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Malicious binaries and encryption
Increase
November 2016
Attackers embrace encryption to conceal command-and-control activity
19%
12% Increase
268%70%
50%
38%
Global Encrypted Web Traffic Malicious Sandbox Binaries with Encryption
October 2017
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Cisco network with Encrypted Traffic Analytics
Known
malware traffic
Known
benign traffic
Extract
observable
features
in the data
Employ
machine learning
techniques
to build detectors
Malware
detected in
Encrypted
Traffic
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Deep Visibility
Context
Control
Malware will get in. You must prevent what you can, but you can never prevent 100% of attacks.
So what’s needed to protect against threats that get in?
Securing the endpoint
PC
MobileLinux
Mac
on the
endpoint
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
AMP for Endpoints
Prevent
Prevent attacks and block
malware in real time
Detect
Continuously monitor
to reduce time
to detection
Respond
Accelerate investigations
and remediate faster and
more effectively
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
SEE
Once
Threat
Endpoint security in action
17
AMP Cloud1
Threat Grid2
Security
Intelligence
Endpoint
AMP for Endpoint
Enforce
Everywhere
3
Endpoint CloudNetwork
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco AMP for Endpoints Excels
in ‘The Evolving Effectiveness of
Endpoint Protection Solutions’ Report
AMP for Endpoints
named a Leader
Cisco named a Visionary
for AMP for Endpoints
Gartner 2018 Magic
Quadrant for Endpoint
Protection Platforms
Gartner evaluated 12 endpoint
security products, including Cisco
AMP for Endpoints
IDC Marketscape: Worldwide Endpoint
Specialized Threat Analysis and
Protection 2017 Vendor Assessment
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
It’s a multicloud world
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Modern data centers are incredibly complex
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Securing the data center
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Security everywhere architecture
W W W
22
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
PROTECTING YOUR NETWORK
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Deeper data + more context = better security
We analyze massive
amounts of data —
19.7 billion threats
blocked daily
Our real-time
datasets are diverse,
global, and live
600 Billion
Email samples
16 Billion
Web requests
3.4 Billion
AMP queries
160
Countries
worldwide
100 Billion
Internet
requests
12,000
Enterprise
customers
80 Million
Daily active
users
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Why Cisco Security
5K
People Strong
#1
Cisco Priority
Threat Researchers
250
Invested
Billions
Sourcefire
Lancope
Neohapsis
OpenDNS
ThreatGRID
Cognitive
Portcullis
CloudLock
Faster Finding
Breaches
100x
Ongoing
Innovation
Best of breed
portfolio
Integrated
Threats Blocked
Daily
19.7B
Fortune 100 use
Cisco Security
88%
Security
Effectiveness
99%
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_cisco_no video

Weitere ähnliche Inhalte

Was ist angesagt?

An Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial ServicesAn Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial ServicesForcepoint LLC
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Eric Vanderburg
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...Eric Vanderburg
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceNational Retail Federation
 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingPhil Agcaoili
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Yuri Anisimov
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)Gopal Choudhary
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategyBenjamin Ang
 
DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDawn Yankeelov
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgEric Vanderburg
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistMatthew Rosenquist
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001PECB
 
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCBIZ, Inc.
 
Cyber Security Threats Facing Small Businesses--June 2019
Cyber Security Threats Facing Small Businesses--June 2019Cyber Security Threats Facing Small Businesses--June 2019
Cyber Security Threats Facing Small Businesses--June 2019Dawn Yankeelov
 
Cloud Computing & Cybersecurity
Cloud Computing & CybersecurityCloud Computing & Cybersecurity
Cloud Computing & CybersecurityDavid Sweigert
 
FireEye investis case study
FireEye investis case studyFireEye investis case study
FireEye investis case studycnnetwork
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?PECB
 

Was ist angesagt? (20)

An Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial ServicesAn Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial Services
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
The State of Cyber
The State of CyberThe State of Cyber
The State of Cyber
 
Webinar–Why All Open Source Scans Aren't Created Equal
Webinar–Why All Open Source Scans Aren't Created EqualWebinar–Why All Open Source Scans Aren't Created Equal
Webinar–Why All Open Source Scans Aren't Created Equal
 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter Meeting
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security Strategy
 
DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber Resilience
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.Rosenquist
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
 
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measures
 
Cyber Security Threats Facing Small Businesses--June 2019
Cyber Security Threats Facing Small Businesses--June 2019Cyber Security Threats Facing Small Businesses--June 2019
Cyber Security Threats Facing Small Businesses--June 2019
 
Cloud Computing & Cybersecurity
Cloud Computing & CybersecurityCloud Computing & Cybersecurity
Cloud Computing & Cybersecurity
 
FireEye investis case study
FireEye investis case studyFireEye investis case study
FireEye investis case study
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
 

Ähnlich wie Cisco Connect 2018 Thailand - Changing the security equation demetris booth_cisco_no video

Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationNetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response ServicesCisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response ServicesNetworkCollaborators
 
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...NetworkCollaborators
 
Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаИнтуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаCisco Russia
 
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyCisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyNetworkCollaborators
 
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...Cohesive Networks
 
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4Nur Shiqim Chok
 
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Singapore -   delivering intent for data center networkingCisco Connect 2018 Singapore -   delivering intent for data center networking
Cisco Connect 2018 Singapore - delivering intent for data center networkingNetworkCollaborators
 
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...NetworkCollaborators
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldNetworkCollaborators
 
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking NetworkCollaborators
 
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...NetworkCollaborators
 
Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynoteNur Shiqim Chok
 
Next Dimension + Cisco Smart Manufacturing
Next Dimension + Cisco Smart ManufacturingNext Dimension + Cisco Smart Manufacturing
Next Dimension + Cisco Smart ManufacturingNext Dimension Inc.
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSMAU
 
Cisco Connect 2018 Malaysia - Emerging technologies are game-changers for te...
Cisco Connect 2018 Malaysia -  Emerging technologies are game-changers for te...Cisco Connect 2018 Malaysia -  Emerging technologies are game-changers for te...
Cisco Connect 2018 Malaysia - Emerging technologies are game-changers for te...NetworkCollaborators
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Cisco Canada
 
Bridgera enterprise IoT Software Solutions
Bridgera enterprise IoT Software SolutionsBridgera enterprise IoT Software Solutions
Bridgera enterprise IoT Software SolutionsRon Pascuzzi
 
Cisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights onCisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights onNetworkCollaborators
 
[Cisco Connect 2018 - Vietnam] Jinjun cai print -cisco connect 2018 vn-cisc...
[Cisco Connect 2018 - Vietnam] Jinjun cai   print -cisco connect 2018 vn-cisc...[Cisco Connect 2018 - Vietnam] Jinjun cai   print -cisco connect 2018 vn-cisc...
[Cisco Connect 2018 - Vietnam] Jinjun cai print -cisco connect 2018 vn-cisc...Nur Shiqim Chok
 

Ähnlich wie Cisco Connect 2018 Thailand - Changing the security equation demetris booth_cisco_no video (20)

Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
 
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response ServicesCisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response Services
 
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
 
Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаИнтуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнеса
 
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyCisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
 
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
 
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
 
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Singapore -   delivering intent for data center networkingCisco Connect 2018 Singapore -   delivering intent for data center networking
Cisco Connect 2018 Singapore - delivering intent for data center networking
 
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
 
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
 
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
 
Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynote
 
Next Dimension + Cisco Smart Manufacturing
Next Dimension + Cisco Smart ManufacturingNext Dimension + Cisco Smart Manufacturing
Next Dimension + Cisco Smart Manufacturing
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - Cisco
 
Cisco Connect 2018 Malaysia - Emerging technologies are game-changers for te...
Cisco Connect 2018 Malaysia -  Emerging technologies are game-changers for te...Cisco Connect 2018 Malaysia -  Emerging technologies are game-changers for te...
Cisco Connect 2018 Malaysia - Emerging technologies are game-changers for te...
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
Bridgera enterprise IoT Software Solutions
Bridgera enterprise IoT Software SolutionsBridgera enterprise IoT Software Solutions
Bridgera enterprise IoT Software Solutions
 
Cisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights onCisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights on
 
[Cisco Connect 2018 - Vietnam] Jinjun cai print -cisco connect 2018 vn-cisc...
[Cisco Connect 2018 - Vietnam] Jinjun cai   print -cisco connect 2018 vn-cisc...[Cisco Connect 2018 - Vietnam] Jinjun cai   print -cisco connect 2018 vn-cisc...
[Cisco Connect 2018 - Vietnam] Jinjun cai print -cisco connect 2018 vn-cisc...
 

Mehr von NetworkCollaborators

Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy NetworkCollaborators
 
Cisco Connect 2018 Singapore - jordan koh
Cisco Connect 2018 Singapore -  jordan kohCisco Connect 2018 Singapore -  jordan koh
Cisco Connect 2018 Singapore - jordan kohNetworkCollaborators
 
Cisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network IntuitiveCisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network IntuitiveNetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXNetworkCollaborators
 
Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition NetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WANCisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WANNetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined AccessCisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined AccessNetworkCollaborators
 
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellCisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellNetworkCollaborators
 
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureCisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureNetworkCollaborators
 
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...NetworkCollaborators
 
Cisco Connect 2018 Philippines - ben green
Cisco Connect 2018 Philippines -  ben greenCisco Connect 2018 Philippines -  ben green
Cisco Connect 2018 Philippines - ben greenNetworkCollaborators
 
Cisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights onCisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights onNetworkCollaborators
 
Cisco Connect 2018 Philippines - jaymen quah
Cisco Connect 2018 Philippines - jaymen quahCisco Connect 2018 Philippines - jaymen quah
Cisco Connect 2018 Philippines - jaymen quahNetworkCollaborators
 
Cisco Connect 2018 Philippines - The workplace of the future
Cisco Connect 2018 Philippines - The workplace of the futureCisco Connect 2018 Philippines - The workplace of the future
Cisco Connect 2018 Philippines - The workplace of the futureNetworkCollaborators
 
Cisco Connect 2018 Philippines - fay ocampo
Cisco Connect 2018 Philippines - fay ocampoCisco Connect 2018 Philippines - fay ocampo
Cisco Connect 2018 Philippines - fay ocampoNetworkCollaborators
 
Cisco Connect 2018 Philippines - Microsoft azure stack
Cisco Connect 2018 Philippines - Microsoft azure stackCisco Connect 2018 Philippines - Microsoft azure stack
Cisco Connect 2018 Philippines - Microsoft azure stackNetworkCollaborators
 
Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...
Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...
Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...NetworkCollaborators
 
Cisco Connect 2018 Philippines - cybersecurity strategy
Cisco Connect 2018 Philippines - cybersecurity strategyCisco Connect 2018 Philippines - cybersecurity strategy
Cisco Connect 2018 Philippines - cybersecurity strategyNetworkCollaborators
 
Cisco Connect 2018 Philippines - next-generation customer care and the connec...
Cisco Connect 2018 Philippines - next-generation customer care and the connec...Cisco Connect 2018 Philippines - next-generation customer care and the connec...
Cisco Connect 2018 Philippines - next-generation customer care and the connec...NetworkCollaborators
 
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
 Cisco Connect 2018 Philippines - software-defined access-a transformational ... Cisco Connect 2018 Philippines - software-defined access-a transformational ...
Cisco Connect 2018 Philippines - software-defined access-a transformational ...NetworkCollaborators
 

Mehr von NetworkCollaborators (20)

Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy
 
Cisco Connect 2018 Singapore - jordan koh
Cisco Connect 2018 Singapore -  jordan kohCisco Connect 2018 Singapore -  jordan koh
Cisco Connect 2018 Singapore - jordan koh
 
Cisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network IntuitiveCisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network Intuitive
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
 
Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition
 
Cisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WANCisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WAN
 
Cisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined AccessCisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined Access
 
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellCisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernell
 
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureCisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
 
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
 
Cisco Connect 2018 Philippines - ben green
Cisco Connect 2018 Philippines -  ben greenCisco Connect 2018 Philippines -  ben green
Cisco Connect 2018 Philippines - ben green
 
Cisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights onCisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights on
 
Cisco Connect 2018 Philippines - jaymen quah
Cisco Connect 2018 Philippines - jaymen quahCisco Connect 2018 Philippines - jaymen quah
Cisco Connect 2018 Philippines - jaymen quah
 
Cisco Connect 2018 Philippines - The workplace of the future
Cisco Connect 2018 Philippines - The workplace of the futureCisco Connect 2018 Philippines - The workplace of the future
Cisco Connect 2018 Philippines - The workplace of the future
 
Cisco Connect 2018 Philippines - fay ocampo
Cisco Connect 2018 Philippines - fay ocampoCisco Connect 2018 Philippines - fay ocampo
Cisco Connect 2018 Philippines - fay ocampo
 
Cisco Connect 2018 Philippines - Microsoft azure stack
Cisco Connect 2018 Philippines - Microsoft azure stackCisco Connect 2018 Philippines - Microsoft azure stack
Cisco Connect 2018 Philippines - Microsoft azure stack
 
Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...
Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...
Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...
 
Cisco Connect 2018 Philippines - cybersecurity strategy
Cisco Connect 2018 Philippines - cybersecurity strategyCisco Connect 2018 Philippines - cybersecurity strategy
Cisco Connect 2018 Philippines - cybersecurity strategy
 
Cisco Connect 2018 Philippines - next-generation customer care and the connec...
Cisco Connect 2018 Philippines - next-generation customer care and the connec...Cisco Connect 2018 Philippines - next-generation customer care and the connec...
Cisco Connect 2018 Philippines - next-generation customer care and the connec...
 
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
 Cisco Connect 2018 Philippines - software-defined access-a transformational ... Cisco Connect 2018 Philippines - software-defined access-a transformational ...
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
 

Kürzlich hochgeladen

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Kürzlich hochgeladen (20)

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Cisco Connect 2018 Thailand - Changing the security equation demetris booth_cisco_no video

  • 1.
  • 2. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Changing The Security Equation Demetris Booth
  • 3. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Evolution of security and the internet Don’t get into strangers’ cars Don’t meet people from the internet Don’t put your sensitive financial information on the internet Literally summon strangers from the internet to get into their car and have them bill your credit card
  • 4. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Global security challenges People • Talent Crunch • High Demanded Expertise • Increased Costs Digital Disruption, Massive Scale • 50B Devices Connected by 2020 • $19T Opportunity Security Industry • Rapidly expanding number of security companies • Not interoperable • Not open Active Adversaries • Attack surface • Threat Actors • Attack Sophistication Dynamic Threat Landscape Changing Business Models Complexity and Fragmentation Shortage of Cybersecurity Experts
  • 5. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Current situation and outlook ASEAN is a prime target for cyber attack... ... and the threat landscape is bound to escalate over time Rising Systemic Risk • Increasing trade and business linkages will make the region as strong as its weakest link Sustained under-investment • Diverging national priorities and different paces of digital evolution will lead to persistent under-investment Persistently porous cyber defenses • Caused by limited intelligence sharing, increasing vulnerability to Advanced Persistent Threats Larger attack surfaces leading to complexity in monitoring and response • Due to technology developments (IT/OT convergence, Multi-cloud, increased share of encrypted traffic) Policy preparedness and institutional oversight is extremely low • Lack of strategic mindset around policy and governance • Absence of a unifying framework • Significant under-investment Absence of a holistic approach by businesses • Cyber risk is seen as IT rather than business risk Nascent local cybersecurity industry together with limited buyer awareness • Fragmentation • Multi vendor/product landscape leading to operational complexity • Paucity of skilled talent Cybersecurity in ASEAN 1. Based on Market capitalization of Top 1000 listed companies across SEA in 2017 Source: A.T. Kearney interviews and analysis
  • 6. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential ASEAN countries have emerged as launchpads for cyber attack either as vulnerable hotbeds or as trusted, well-connected hubs Blocked suspicious web activity by country of origin (expected ratio = 1.0) Chile Peru Panama Belize United States Canada Venezuela Italy France Germany Ukraine Turkey Romania Russia China Malaysia Australia Indonesia Vietnam • Malaysia and Indonesia are global hotspots for major blocked suspicious web activities—up to 3.5 times the standard ratio • Vietnam is amongst the top 5 countries from which attacks on IoT devices originated Source: A.T. Kearney research report
  • 7. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential National Strategy development Legislation Governance and operational entities International cooperation Awareness Capacity building Sector – specific focus Singapore Malaysia Philippines Thailand Indonesia Vietnam Rest of ASEAN Absent Initiated / Proposed Established & Operational Level of policy preparedness across ASEAN remains low across most countries, with lack of a unifying framework Only Singapore and Malaysia have operational National strategies Progress on legislation and governance remains fairly slow Source: A.T. Kearney, Interviews, Press clippings Most regional efforts focused on Capacity Building
  • 8. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Identify Identify End Point Network Content Cloud Analytics IOT SIEM Managed & Professional Security Services Protect Defect Respond Recover Product Design & Development Services Vendor positioning across the security value chain Product/Product Implementation &/or Monitoring Services Technology Capability Specialist Holistic Solutions Provider Regional System Integrators & Managed Service Providers Consulting & Services Providers Product & Technology of others Product & Technology of others Focused on limited set of products they supply Fragmented vendor landscape with few holistic providers … Large number of localized MSS providers with limited regional mobility Source: Industry interviews, A.T.Kearney analysis …and several hundred small niche players Rely on others Large number of product specialists with varied capabilities Very few holistic solutions providers, perpetuating “best of breed as an industry practice” Emerging regional systems integrators facing challenges in expanding across the value chain.
  • 9. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Urgent call to action across ASEAN Source: A.T. Kearney analysis Secure sustained regional commitment for cybersecurity • Pursue a commitment to address the regional cybersecurity spending gap • Define and track impact-oriented cybersecurity metrics through a cyber- hygiene dashboard Elevate cybersecurity on the regional policy agenda • Concerted coordination to steer the implementation of an Rapid Action Cybersecurity (RAC) Framework • Elevate cybersecurity to the top of the agenda in economic dialogue (i.e. Establish regional co-ordination platform, multilateral agreement to have “cybersafe” trading partners) Build the next wave of cybersecurity capability • Develop the next generation of security professionals • Strengthen the local cybersecurity industry through deeper cooperation and collaboration with global players • Drive R&D around emerging threat vectors (AI, etc.) • Implement an active defense mindset in corporate sector • Instill a culture around sharing threat intelligence • Extend cyber resilience across the supply chain (i.e. to business partners, etc.) • Implement Regional PPP and encourage Industry alliances Fortify the Ecosystem
  • 10. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Changing the equation People Policy & Process Technology • Networking Academy 20 years • 7.8 million students across 180 countries • 1.26 million students in Asia Pacific & Japan • 90,000 security students trained globally in FY17 & 10,000 students in Asia Pacific & Japan • Security & Trust Organization • Engages world governments to help shape national cybersecurity policy agenda • INTERPOL collaboration to share threat intelligence & best practices • Integrated architectural approach • New era of networking & security is foundational • Security enables digital transformation
  • 11. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco’s Security architecture – security that works together Threat Intelligence – Services Endpoint CloudNetwork 4.6 Hours Reduced Time To Detection | On Average 184 Days To Detect A Breach In ASEAN
  • 12. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Security capabilities integrated throughout the network Digital Network Architecture Network visibility Network Segmentation 360° visibility Real-time analysis of data and traffic to provide visibility and intelligence across the network Dynamic control Software-defined segmentation for effective and consistent policy application Comprehensive automation Integrated solutions that augment your capabilities and reduce manual processes
  • 13. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Malicious binaries and encryption Increase November 2016 Attackers embrace encryption to conceal command-and-control activity 19% 12% Increase 268%70% 50% 38% Global Encrypted Web Traffic Malicious Sandbox Binaries with Encryption October 2017
  • 14. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential The Cisco network with Encrypted Traffic Analytics Known malware traffic Known benign traffic Extract observable features in the data Employ machine learning techniques to build detectors Malware detected in Encrypted Traffic
  • 15. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Deep Visibility Context Control Malware will get in. You must prevent what you can, but you can never prevent 100% of attacks. So what’s needed to protect against threats that get in? Securing the endpoint PC MobileLinux Mac on the endpoint
  • 16. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential AMP for Endpoints Prevent Prevent attacks and block malware in real time Detect Continuously monitor to reduce time to detection Respond Accelerate investigations and remediate faster and more effectively
  • 17. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential SEE Once Threat Endpoint security in action 17 AMP Cloud1 Threat Grid2 Security Intelligence Endpoint AMP for Endpoint Enforce Everywhere 3 Endpoint CloudNetwork
  • 18. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco AMP for Endpoints Excels in ‘The Evolving Effectiveness of Endpoint Protection Solutions’ Report AMP for Endpoints named a Leader Cisco named a Visionary for AMP for Endpoints Gartner 2018 Magic Quadrant for Endpoint Protection Platforms Gartner evaluated 12 endpoint security products, including Cisco AMP for Endpoints IDC Marketscape: Worldwide Endpoint Specialized Threat Analysis and Protection 2017 Vendor Assessment
  • 19. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential It’s a multicloud world
  • 20. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Modern data centers are incredibly complex
  • 21. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Securing the data center
  • 22. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 Security everywhere architecture W W W 22
  • 23. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential PROTECTING YOUR NETWORK
  • 24. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Deeper data + more context = better security We analyze massive amounts of data — 19.7 billion threats blocked daily Our real-time datasets are diverse, global, and live 600 Billion Email samples 16 Billion Web requests 3.4 Billion AMP queries 160 Countries worldwide 100 Billion Internet requests 12,000 Enterprise customers 80 Million Daily active users
  • 25. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Why Cisco Security 5K People Strong #1 Cisco Priority Threat Researchers 250 Invested Billions Sourcefire Lancope Neohapsis OpenDNS ThreatGRID Cognitive Portcullis CloudLock Faster Finding Breaches 100x Ongoing Innovation Best of breed portfolio Integrated Threats Blocked Daily 19.7B Fortune 100 use Cisco Security 88% Security Effectiveness 99%