Suche senden
Hochladen
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_cisco_no video
•
0 gefällt mir
•
61 views
N
NetworkCollaborators
Folgen
Cisco Connect 2018 Thailand
Weniger lesen
Mehr lesen
Technologie
Melden
Teilen
Melden
Teilen
1 von 26
Jetzt herunterladen
Downloaden Sie, um offline zu lesen
Empfohlen
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
Nur Shiqim Chok
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
Nur Shiqim Chok
Cisco Connect 2018 Philippines - security keynote
Cisco Connect 2018 Philippines - security keynote
NetworkCollaborators
From Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber Resilience
accenture
Cyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
vngundi
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC Advisory Group
Cybersecurity Risks for Businesses
Cybersecurity Risks for Businesses
Alex Rudie
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
Phil Agcaoili
Empfohlen
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
Nur Shiqim Chok
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
Nur Shiqim Chok
Cisco Connect 2018 Philippines - security keynote
Cisco Connect 2018 Philippines - security keynote
NetworkCollaborators
From Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber Resilience
accenture
Cyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
vngundi
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC Advisory Group
Cybersecurity Risks for Businesses
Cybersecurity Risks for Businesses
Alex Rudie
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
Phil Agcaoili
An Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial Services
Forcepoint LLC
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Eric Vanderburg
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Eric Vanderburg
Cyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
National Retail Federation
The State of Cyber
The State of Cyber
businessforward
Webinar–Why All Open Source Scans Aren't Created Equal
Webinar–Why All Open Source Scans Aren't Created Equal
Synopsys Software Integrity Group
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter Meeting
Phil Agcaoili
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity
Yuri Anisimov
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
Gopal Choudhary
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security Strategy
Benjamin Ang
DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber Resilience
Dawn Yankeelov
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Eric Vanderburg
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
Cloud Expo
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.Rosenquist
Matthew Rosenquist
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
PECB
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measures
CBIZ, Inc.
Cyber Security Threats Facing Small Businesses--June 2019
Cyber Security Threats Facing Small Businesses--June 2019
Dawn Yankeelov
Cloud Computing & Cybersecurity
Cloud Computing & Cybersecurity
David Sweigert
FireEye investis case study
FireEye investis case study
cnnetwork
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
PECB
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
NetworkCollaborators
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response Services
NetworkCollaborators
Weitere ähnliche Inhalte
Was ist angesagt?
An Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial Services
Forcepoint LLC
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Eric Vanderburg
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Eric Vanderburg
Cyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
National Retail Federation
The State of Cyber
The State of Cyber
businessforward
Webinar–Why All Open Source Scans Aren't Created Equal
Webinar–Why All Open Source Scans Aren't Created Equal
Synopsys Software Integrity Group
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter Meeting
Phil Agcaoili
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity
Yuri Anisimov
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
Gopal Choudhary
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security Strategy
Benjamin Ang
DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber Resilience
Dawn Yankeelov
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Eric Vanderburg
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
Cloud Expo
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.Rosenquist
Matthew Rosenquist
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
PECB
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measures
CBIZ, Inc.
Cyber Security Threats Facing Small Businesses--June 2019
Cyber Security Threats Facing Small Businesses--June 2019
Dawn Yankeelov
Cloud Computing & Cybersecurity
Cloud Computing & Cybersecurity
David Sweigert
FireEye investis case study
FireEye investis case study
cnnetwork
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
PECB
Was ist angesagt?
(20)
An Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial Services
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Cyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
The State of Cyber
The State of Cyber
Webinar–Why All Open Source Scans Aren't Created Equal
Webinar–Why All Open Source Scans Aren't Created Equal
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter Meeting
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security Strategy
DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber Resilience
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.Rosenquist
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measures
Cyber Security Threats Facing Small Businesses--June 2019
Cyber Security Threats Facing Small Businesses--June 2019
Cloud Computing & Cybersecurity
Cloud Computing & Cybersecurity
FireEye investis case study
FireEye investis case study
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ähnlich wie Cisco Connect 2018 Thailand - Changing the security equation demetris booth_cisco_no video
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
NetworkCollaborators
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response Services
NetworkCollaborators
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
NetworkCollaborators
Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнеса
Cisco Russia
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
NetworkCollaborators
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
Cohesive Networks
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
Nur Shiqim Chok
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Singapore - delivering intent for data center networking
NetworkCollaborators
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
NetworkCollaborators
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
NetworkCollaborators
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
NetworkCollaborators
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
NetworkCollaborators
Brink sanders cisco architecture keynote
Brink sanders cisco architecture keynote
Nur Shiqim Chok
Next Dimension + Cisco Smart Manufacturing
Next Dimension + Cisco Smart Manufacturing
Next Dimension Inc.
Smau Padova 2018 - Cisco
Smau Padova 2018 - Cisco
SMAU
Cisco Connect 2018 Malaysia - Emerging technologies are game-changers for te...
Cisco Connect 2018 Malaysia - Emerging technologies are game-changers for te...
NetworkCollaborators
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
Cisco Canada
Bridgera enterprise IoT Software Solutions
Bridgera enterprise IoT Software Solutions
Ron Pascuzzi
Cisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights on
NetworkCollaborators
[Cisco Connect 2018 - Vietnam] Jinjun cai print -cisco connect 2018 vn-cisc...
[Cisco Connect 2018 - Vietnam] Jinjun cai print -cisco connect 2018 vn-cisc...
Nur Shiqim Chok
Ähnlich wie Cisco Connect 2018 Thailand - Changing the security equation demetris booth_cisco_no video
(20)
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнеса
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Brink sanders cisco architecture keynote
Brink sanders cisco architecture keynote
Next Dimension + Cisco Smart Manufacturing
Next Dimension + Cisco Smart Manufacturing
Smau Padova 2018 - Cisco
Smau Padova 2018 - Cisco
Cisco Connect 2018 Malaysia - Emerging technologies are game-changers for te...
Cisco Connect 2018 Malaysia - Emerging technologies are game-changers for te...
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
Bridgera enterprise IoT Software Solutions
Bridgera enterprise IoT Software Solutions
Cisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights on
[Cisco Connect 2018 - Vietnam] Jinjun cai print -cisco connect 2018 vn-cisc...
[Cisco Connect 2018 - Vietnam] Jinjun cai print -cisco connect 2018 vn-cisc...
Mehr von NetworkCollaborators
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy
NetworkCollaborators
Cisco Connect 2018 Singapore - jordan koh
Cisco Connect 2018 Singapore - jordan koh
NetworkCollaborators
Cisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network Intuitive
NetworkCollaborators
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
NetworkCollaborators
Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition
NetworkCollaborators
Cisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WAN
NetworkCollaborators
Cisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined Access
NetworkCollaborators
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernell
NetworkCollaborators
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
NetworkCollaborators
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
NetworkCollaborators
Cisco Connect 2018 Philippines - ben green
Cisco Connect 2018 Philippines - ben green
NetworkCollaborators
Cisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights on
NetworkCollaborators
Cisco Connect 2018 Philippines - jaymen quah
Cisco Connect 2018 Philippines - jaymen quah
NetworkCollaborators
Cisco Connect 2018 Philippines - The workplace of the future
Cisco Connect 2018 Philippines - The workplace of the future
NetworkCollaborators
Cisco Connect 2018 Philippines - fay ocampo
Cisco Connect 2018 Philippines - fay ocampo
NetworkCollaborators
Cisco Connect 2018 Philippines - Microsoft azure stack
Cisco Connect 2018 Philippines - Microsoft azure stack
NetworkCollaborators
Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...
Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...
NetworkCollaborators
Cisco Connect 2018 Philippines - cybersecurity strategy
Cisco Connect 2018 Philippines - cybersecurity strategy
NetworkCollaborators
Cisco Connect 2018 Philippines - next-generation customer care and the connec...
Cisco Connect 2018 Philippines - next-generation customer care and the connec...
NetworkCollaborators
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
NetworkCollaborators
Mehr von NetworkCollaborators
(20)
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - jordan koh
Cisco Connect 2018 Singapore - jordan koh
Cisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
Cisco Connect 2018 Philippines - ben green
Cisco Connect 2018 Philippines - ben green
Cisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - jaymen quah
Cisco Connect 2018 Philippines - jaymen quah
Cisco Connect 2018 Philippines - The workplace of the future
Cisco Connect 2018 Philippines - The workplace of the future
Cisco Connect 2018 Philippines - fay ocampo
Cisco Connect 2018 Philippines - fay ocampo
Cisco Connect 2018 Philippines - Microsoft azure stack
Cisco Connect 2018 Philippines - Microsoft azure stack
Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...
Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...
Cisco Connect 2018 Philippines - cybersecurity strategy
Cisco Connect 2018 Philippines - cybersecurity strategy
Cisco Connect 2018 Philippines - next-generation customer care and the connec...
Cisco Connect 2018 Philippines - next-generation customer care and the connec...
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
Kürzlich hochgeladen
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
charlottematthew16
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
Sergiu Bodiu
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
Zilliz
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Fwdays
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Scott Keck-Warren
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
Fwdays
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
charlottematthew16
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
Miki Katsuragi
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
carlostorres15106
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Mattias Andersson
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Kalema Edgar
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Slibray Presentation
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Mark Billinghurst
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
Fwdays
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
Manik S Magar
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
UiPathCommunity
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Memoori
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Hervé Boutemy
Kürzlich hochgeladen
(20)
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_cisco_no video
1.
2.
© 2017 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Changing The Security Equation Demetris Booth
3.
© 2017 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Evolution of security and the internet Don’t get into strangers’ cars Don’t meet people from the internet Don’t put your sensitive financial information on the internet Literally summon strangers from the internet to get into their car and have them bill your credit card
4.
© 2017 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Global security challenges People • Talent Crunch • High Demanded Expertise • Increased Costs Digital Disruption, Massive Scale • 50B Devices Connected by 2020 • $19T Opportunity Security Industry • Rapidly expanding number of security companies • Not interoperable • Not open Active Adversaries • Attack surface • Threat Actors • Attack Sophistication Dynamic Threat Landscape Changing Business Models Complexity and Fragmentation Shortage of Cybersecurity Experts
5.
© 2017 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Current situation and outlook ASEAN is a prime target for cyber attack... ... and the threat landscape is bound to escalate over time Rising Systemic Risk • Increasing trade and business linkages will make the region as strong as its weakest link Sustained under-investment • Diverging national priorities and different paces of digital evolution will lead to persistent under-investment Persistently porous cyber defenses • Caused by limited intelligence sharing, increasing vulnerability to Advanced Persistent Threats Larger attack surfaces leading to complexity in monitoring and response • Due to technology developments (IT/OT convergence, Multi-cloud, increased share of encrypted traffic) Policy preparedness and institutional oversight is extremely low • Lack of strategic mindset around policy and governance • Absence of a unifying framework • Significant under-investment Absence of a holistic approach by businesses • Cyber risk is seen as IT rather than business risk Nascent local cybersecurity industry together with limited buyer awareness • Fragmentation • Multi vendor/product landscape leading to operational complexity • Paucity of skilled talent Cybersecurity in ASEAN 1. Based on Market capitalization of Top 1000 listed companies across SEA in 2017 Source: A.T. Kearney interviews and analysis
6.
© 2017 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential ASEAN countries have emerged as launchpads for cyber attack either as vulnerable hotbeds or as trusted, well-connected hubs Blocked suspicious web activity by country of origin (expected ratio = 1.0) Chile Peru Panama Belize United States Canada Venezuela Italy France Germany Ukraine Turkey Romania Russia China Malaysia Australia Indonesia Vietnam • Malaysia and Indonesia are global hotspots for major blocked suspicious web activities—up to 3.5 times the standard ratio • Vietnam is amongst the top 5 countries from which attacks on IoT devices originated Source: A.T. Kearney research report
7.
© 2017 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential National Strategy development Legislation Governance and operational entities International cooperation Awareness Capacity building Sector – specific focus Singapore Malaysia Philippines Thailand Indonesia Vietnam Rest of ASEAN Absent Initiated / Proposed Established & Operational Level of policy preparedness across ASEAN remains low across most countries, with lack of a unifying framework Only Singapore and Malaysia have operational National strategies Progress on legislation and governance remains fairly slow Source: A.T. Kearney, Interviews, Press clippings Most regional efforts focused on Capacity Building
8.
© 2017 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Identify Identify End Point Network Content Cloud Analytics IOT SIEM Managed & Professional Security Services Protect Defect Respond Recover Product Design & Development Services Vendor positioning across the security value chain Product/Product Implementation &/or Monitoring Services Technology Capability Specialist Holistic Solutions Provider Regional System Integrators & Managed Service Providers Consulting & Services Providers Product & Technology of others Product & Technology of others Focused on limited set of products they supply Fragmented vendor landscape with few holistic providers … Large number of localized MSS providers with limited regional mobility Source: Industry interviews, A.T.Kearney analysis …and several hundred small niche players Rely on others Large number of product specialists with varied capabilities Very few holistic solutions providers, perpetuating “best of breed as an industry practice” Emerging regional systems integrators facing challenges in expanding across the value chain.
9.
© 2017 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Urgent call to action across ASEAN Source: A.T. Kearney analysis Secure sustained regional commitment for cybersecurity • Pursue a commitment to address the regional cybersecurity spending gap • Define and track impact-oriented cybersecurity metrics through a cyber- hygiene dashboard Elevate cybersecurity on the regional policy agenda • Concerted coordination to steer the implementation of an Rapid Action Cybersecurity (RAC) Framework • Elevate cybersecurity to the top of the agenda in economic dialogue (i.e. Establish regional co-ordination platform, multilateral agreement to have “cybersafe” trading partners) Build the next wave of cybersecurity capability • Develop the next generation of security professionals • Strengthen the local cybersecurity industry through deeper cooperation and collaboration with global players • Drive R&D around emerging threat vectors (AI, etc.) • Implement an active defense mindset in corporate sector • Instill a culture around sharing threat intelligence • Extend cyber resilience across the supply chain (i.e. to business partners, etc.) • Implement Regional PPP and encourage Industry alliances Fortify the Ecosystem
10.
© 2017 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Changing the equation People Policy & Process Technology • Networking Academy 20 years • 7.8 million students across 180 countries • 1.26 million students in Asia Pacific & Japan • 90,000 security students trained globally in FY17 & 10,000 students in Asia Pacific & Japan • Security & Trust Organization • Engages world governments to help shape national cybersecurity policy agenda • INTERPOL collaboration to share threat intelligence & best practices • Integrated architectural approach • New era of networking & security is foundational • Security enables digital transformation
11.
© 2017 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Cisco’s Security architecture – security that works together Threat Intelligence – Services Endpoint CloudNetwork 4.6 Hours Reduced Time To Detection | On Average 184 Days To Detect A Breach In ASEAN
12.
© 2017 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Security capabilities integrated throughout the network Digital Network Architecture Network visibility Network Segmentation 360° visibility Real-time analysis of data and traffic to provide visibility and intelligence across the network Dynamic control Software-defined segmentation for effective and consistent policy application Comprehensive automation Integrated solutions that augment your capabilities and reduce manual processes
13.
© 2017 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Malicious binaries and encryption Increase November 2016 Attackers embrace encryption to conceal command-and-control activity 19% 12% Increase 268%70% 50% 38% Global Encrypted Web Traffic Malicious Sandbox Binaries with Encryption October 2017
14.
© 2017 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential The Cisco network with Encrypted Traffic Analytics Known malware traffic Known benign traffic Extract observable features in the data Employ machine learning techniques to build detectors Malware detected in Encrypted Traffic
15.
© 2017 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Deep Visibility Context Control Malware will get in. You must prevent what you can, but you can never prevent 100% of attacks. So what’s needed to protect against threats that get in? Securing the endpoint PC MobileLinux Mac on the endpoint
16.
© 2017 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential AMP for Endpoints Prevent Prevent attacks and block malware in real time Detect Continuously monitor to reduce time to detection Respond Accelerate investigations and remediate faster and more effectively
17.
© 2017 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential SEE Once Threat Endpoint security in action 17 AMP Cloud1 Threat Grid2 Security Intelligence Endpoint AMP for Endpoint Enforce Everywhere 3 Endpoint CloudNetwork
18.
© 2017 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Cisco AMP for Endpoints Excels in ‘The Evolving Effectiveness of Endpoint Protection Solutions’ Report AMP for Endpoints named a Leader Cisco named a Visionary for AMP for Endpoints Gartner 2018 Magic Quadrant for Endpoint Protection Platforms Gartner evaluated 12 endpoint security products, including Cisco AMP for Endpoints IDC Marketscape: Worldwide Endpoint Specialized Threat Analysis and Protection 2017 Vendor Assessment
19.
© 2017 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential It’s a multicloud world
20.
© 2017 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Modern data centers are incredibly complex
21.
© 2017 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Securing the data center
22.
© 2016 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 22 Security everywhere architecture W W W 22
23.
© 2017 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential PROTECTING YOUR NETWORK
24.
© 2017 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Deeper data + more context = better security We analyze massive amounts of data — 19.7 billion threats blocked daily Our real-time datasets are diverse, global, and live 600 Billion Email samples 16 Billion Web requests 3.4 Billion AMP queries 160 Countries worldwide 100 Billion Internet requests 12,000 Enterprise customers 80 Million Daily active users
25.
© 2017 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Why Cisco Security 5K People Strong #1 Cisco Priority Threat Researchers 250 Invested Billions Sourcefire Lancope Neohapsis OpenDNS ThreatGRID Cognitive Portcullis CloudLock Faster Finding Breaches 100x Ongoing Innovation Best of breed portfolio Integrated Threats Blocked Daily 19.7B Fortune 100 use Cisco Security 88% Security Effectiveness 99%
Jetzt herunterladen