© 2017 Cisco and/or its affiliates. All rights reserved.© 2017 Cisco and/or its affiliates. All rights reserved.
Call Whiteboard Input
Marc Blackmer
Director, Security Business Group
March 2018
Changing the Equation
Cybersecurity in Digital Business
© 2017 Cisco and/or its affiliates. All rights reserved.
Data is
currency
© 2017 Cisco and/or its affiliates. All rights reserved.
TirelessRelentless vs
© 2017 Cisco and/or its affiliates. All rights reserved.
Tireless
Vs
Relentless Change
© 2017 Cisco and/or its affiliates. All rights reserved.
Information
overload
Skills gap
Evolving threats
© 2017 Cisco and/or its affiliates. All rights reserved.
How can we change
the equation?
© 2017 Cisco and/or its affiliates. All rights reserved.
Are We Secure?
© 2017 Cisco and/or its affiliates. All rights reserved.
Time
ResponseDetectionThreat
How effective are we?
© 2017 Cisco and/or its affiliates. All rights reserved.
Protecting the world as it is
© 2017 Cisco and/or its affiliates. All rights reserved.
Change the Equation: ask the right questions
How do you
control who gets
onto your network?
How do you
find and contain
problems fast?
How do you
simplify network
segmentation?
How do you
protect users
wherever they work?
How do you
stop threats
at the edge?
© 2017 Cisco and/or its affiliates. All rights reserved.
Cisco Security Architecture
Endpoint CloudNetwork
Threat Intelligence
Services
© 2017 Cisco and/or its affiliates. All rights reserved.© 2017 Cisco and/or its affiliates. All rights reserved.
Malware in
Encrypted Traffic
Security AND
Privacy
Detection
Accuracy
Detecting encrypted threats
© 2017 Cisco and/or its affiliates. All rights reserved.
See
once
Threat
Detect/Block1
Analyse2
See it once, protect everywhere
Endpoint
Security
intelligence
Enforce
everywhere
3
Endpoint CloudNetwork
© 2017 Cisco and/or its affiliates. All rights reserved.
Today’s perimeter
© 2017 Cisco and/or its affiliates. All rights reserved.
WANNACRY
© 2017 Cisco and/or its affiliates. All rights reserved.
Threat intelligence: get smarter every day
Cisco detects vulnerabilities
Customers are protected
Customers already protected
Plus
Cisco caught the payload and
Cisco blocked the callout
2017
Talos detects exploits
Customers are protected
Microsoft
vulnerability identified
Mar 14
Shadow Brokers
exploit leaked
Apr 14
WannaCry
ransomware released
May 12
© 2017 Cisco and/or its affiliates. All rights reserved.
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital business
© 2017 Cisco and/or its affiliates. All rights reserved.© 2017 Cisco and/or its affiliates. All rights reserved.
Thank you
© 2017 Cisco and/or its affiliates. All rights reserved.
Today, data is
where the money is
© 2017 Cisco and/or its affiliates. All rights reserved.
Next Generation Endpoint Security
Prevent
Prevent attacks
and block malware
in real time
Detect
Continuously monitor
to reduce time
to detection
Respond
Accelerate investigations
and remediate faster and
more effectively
© 2017 Cisco and/or its affiliates. All rights reserved.
It’s a
multi-cloud era
© 2017 Cisco and/or its affiliates. All rights reserved.
Multi-cloud transformation
PUBLIC
PRIVATE
User/PC Campus/
branch
WAN Data
center
Internet
Cloud
Consumer
User access
Provider
Applications
Cloud
SaaS
© 2017 Cisco and/or its affiliates. All rights reserved.
Multi-cloud transformation
WANCampus/
branch
Cloud edge
PUBLIC
Public cloud
SaaS
Internet
DC
User/devices
End to end
Enterprise Edge
© 2017 Cisco and/or its affiliates. All rights reserved.
Would you fly in a plane made of 50
different planes?

More Related Content

PDF
Intelligent Cybersecurity for the Real World
PPTX
Infosec Europe 2017 Highlights | Lastline, Inc.
PPTX
Embracing the Open Source Model
PPTX
The Australian Cyber Security Growth Network Strategy and Goals
PDF
ITAM AUS 2017 Harnessing the power of SAM Intelligence for Cyber Security
PDF
Security confessions of a small country
PPTX
Storage visibility and Optimization. A Story of Ceph
PPTX
Defining A Cyber Moonshot: Getting Safer in Five Years
Intelligent Cybersecurity for the Real World
Infosec Europe 2017 Highlights | Lastline, Inc.
Embracing the Open Source Model
The Australian Cyber Security Growth Network Strategy and Goals
ITAM AUS 2017 Harnessing the power of SAM Intelligence for Cyber Security
Security confessions of a small country
Storage visibility and Optimization. A Story of Ceph
Defining A Cyber Moonshot: Getting Safer in Five Years

What's hot (20)

PDF
Bill checkpoint
PPTX
Modern Security the way Equifax Should Have
PDF
Network as a sensor
PDF
Accelerating Incident Response in Organizations of Any Size
DOCX
Chris Ward Short Bio and CV 2016 (1)
PDF
Security is a process, not a plugin (WordCamp Oslo 2018)
PDF
Security is a process, not a plugin (WordCamp Torino 2018)
PDF
Security is a process, not a plugin (WordCamp London 2018)
PPTX
How Silicon Valley startups are approaching security differently
PPTX
Idc security roadshow may2015 Adrian Aron
PDF
Web hacking using Cyber range
PDF
DWS16 - Plenary - Privacy Paradox - Yannick Sadowy, Accenture
PDF
DWS16 - Plenary Privacy Paradox - Stephane Geyres, Accenture
PPTX
跟著Wade學習ASP.NET MVC + NHibernate - Day 9
PPTX
Cost of Cyber Crime UK Data
PDF
Cisco Connect 2018 Malaysia - Cisco meraki-an innovation journey to a smarter...
PDF
How Google Protects your Data
PDF
Why conquering complexity is a critical component of an effective security pr...
PPT
Securing the Web with the Crowd
PPTX
Angel at my Table 2014: Riscoveri
Bill checkpoint
Modern Security the way Equifax Should Have
Network as a sensor
Accelerating Incident Response in Organizations of Any Size
Chris Ward Short Bio and CV 2016 (1)
Security is a process, not a plugin (WordCamp Oslo 2018)
Security is a process, not a plugin (WordCamp Torino 2018)
Security is a process, not a plugin (WordCamp London 2018)
How Silicon Valley startups are approaching security differently
Idc security roadshow may2015 Adrian Aron
Web hacking using Cyber range
DWS16 - Plenary - Privacy Paradox - Yannick Sadowy, Accenture
DWS16 - Plenary Privacy Paradox - Stephane Geyres, Accenture
跟著Wade學習ASP.NET MVC + NHibernate - Day 9
Cost of Cyber Crime UK Data
Cisco Connect 2018 Malaysia - Cisco meraki-an innovation journey to a smarter...
How Google Protects your Data
Why conquering complexity is a critical component of an effective security pr...
Securing the Web with the Crowd
Angel at my Table 2014: Riscoveri
Ad

Similar to Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital business (20)

PDF
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
PDF
Tomorrow Starts Here - Security Everywhere
PDF
Pervasive Security Across Your Extended Network
PDF
Cisco Cybersecurity #10YearChallenge
PPTX
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
PDF
Cisco Connect 2018 Singapore - Cisco Incident Response Services
PDF
Security Everywhere: A Growth Engine for the Digital Economy
PDF
Mfg workshop security
PDF
CONFidence2015: Real World Threat Hunting - Martin Nystrom
PDF
Cisco Connect 2018 Singapore - delivering intent for data center networking
PDF
Cisco Connect 2018 Philippines - security keynote
PPTX
Cisco Security as a foundation for SP Digitization
PPTX
Cisco Security DNA
PDF
Redefining Cybersecurity with AI Capabilities
DOCX
© 2017 Cisco andor its affiliates. All rights reserved. Ci.docx
PPTX
Cybersecurity: Protection strategies from Cisco and Next Dimension
PDF
Cisco Advanced Services
PDF
Cisco Connect 2018 Malaysia - Cisco aci-delivering intent for data center net...
PDF
Интуитивная сеть как платформа для надежного бизнеса
PDF
Cisco - See Everything, Secure Everything
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Tomorrow Starts Here - Security Everywhere
Pervasive Security Across Your Extended Network
Cisco Cybersecurity #10YearChallenge
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Security Everywhere: A Growth Engine for the Digital Economy
Mfg workshop security
CONFidence2015: Real World Threat Hunting - Martin Nystrom
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Philippines - security keynote
Cisco Security as a foundation for SP Digitization
Cisco Security DNA
Redefining Cybersecurity with AI Capabilities
© 2017 Cisco andor its affiliates. All rights reserved. Ci.docx
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cisco Advanced Services
Cisco Connect 2018 Malaysia - Cisco aci-delivering intent for data center net...
Интуитивная сеть как платформа для надежного бизнеса
Cisco - See Everything, Secure Everything
Ad

More from NetworkCollaborators (20)

PDF
Cisco Connect 2018 Singapore - Cybersecurity strategy
PDF
Cisco Connect 2018 Singapore - Do more than keep the lights on
PDF
Cisco Connect 2018 Singapore - jordan koh
PDF
Cisco Connect 2018 Singapore - Changing the Security Equation
PDF
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
PDF
Cisco Connect 2018 Singapore - The Network Intuitive
PDF
Cisco Connect 2018 Singapore - Cisco CMX
PDF
Cisco Connect 2018 Singapore - Easing the Transition
PDF
Cisco Connect 2018 Singapore - Cisco SD-WAN
PDF
Cisco Connect 2018 Singapore - Cisco Software Defined Access
PDF
Cisco Connect 2018 Singapore - En06 jason pernell
PDF
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
PDF
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
PDF
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
PDF
Cisco Connect 2018 Philippines - ben green
PDF
Cisco Connect 2018 Philippines - do more than keeping the lights on
PDF
Cisco Connect 2018 Philippines - jaymen quah
PDF
Cisco Connect 2018 Philippines - The workplace of the future
PDF
Cisco Connect 2018 Philippines - fay ocampo
PDF
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - jordan koh
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
Cisco Connect 2018 Philippines - ben green
Cisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - jaymen quah
Cisco Connect 2018 Philippines - The workplace of the future
Cisco Connect 2018 Philippines - fay ocampo
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...

Recently uploaded (20)

DOCX
Basics of Cloud Computing - Cloud Ecosystem
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PDF
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PDF
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
CEH Module 2 Footprinting CEH V13, concepts
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PPTX
Module 1 Introduction to Web Programming .pptx
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
Basics of Cloud Computing - Cloud Ecosystem
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
4 layer Arch & Reference Arch of IoT.pdf
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
Advancing precision in air quality forecasting through machine learning integ...
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
NewMind AI Weekly Chronicles – August ’25 Week IV
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
Lung cancer patients survival prediction using outlier detection and optimize...
CEH Module 2 Footprinting CEH V13, concepts
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
LMS bot: enhanced learning management systems for improved student learning e...
Co-training pseudo-labeling for text classification with support vector machi...
Module 1 Introduction to Web Programming .pptx
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj

Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital business

  • 1. © 2017 Cisco and/or its affiliates. All rights reserved.© 2017 Cisco and/or its affiliates. All rights reserved. Call Whiteboard Input
  • 2. Marc Blackmer Director, Security Business Group March 2018 Changing the Equation Cybersecurity in Digital Business
  • 3. © 2017 Cisco and/or its affiliates. All rights reserved. Data is currency
  • 4. © 2017 Cisco and/or its affiliates. All rights reserved. TirelessRelentless vs
  • 5. © 2017 Cisco and/or its affiliates. All rights reserved. Tireless Vs Relentless Change
  • 6. © 2017 Cisco and/or its affiliates. All rights reserved. Information overload Skills gap Evolving threats
  • 7. © 2017 Cisco and/or its affiliates. All rights reserved. How can we change the equation?
  • 8. © 2017 Cisco and/or its affiliates. All rights reserved. Are We Secure?
  • 9. © 2017 Cisco and/or its affiliates. All rights reserved. Time ResponseDetectionThreat How effective are we?
  • 10. © 2017 Cisco and/or its affiliates. All rights reserved. Protecting the world as it is
  • 11. © 2017 Cisco and/or its affiliates. All rights reserved. Change the Equation: ask the right questions How do you control who gets onto your network? How do you find and contain problems fast? How do you simplify network segmentation? How do you protect users wherever they work? How do you stop threats at the edge?
  • 12. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Security Architecture Endpoint CloudNetwork Threat Intelligence Services
  • 13. © 2017 Cisco and/or its affiliates. All rights reserved.© 2017 Cisco and/or its affiliates. All rights reserved. Malware in Encrypted Traffic Security AND Privacy Detection Accuracy Detecting encrypted threats
  • 14. © 2017 Cisco and/or its affiliates. All rights reserved. See once Threat Detect/Block1 Analyse2 See it once, protect everywhere Endpoint Security intelligence Enforce everywhere 3 Endpoint CloudNetwork
  • 15. © 2017 Cisco and/or its affiliates. All rights reserved. Today’s perimeter
  • 16. © 2017 Cisco and/or its affiliates. All rights reserved. WANNACRY
  • 17. © 2017 Cisco and/or its affiliates. All rights reserved. Threat intelligence: get smarter every day Cisco detects vulnerabilities Customers are protected Customers already protected Plus Cisco caught the payload and Cisco blocked the callout 2017 Talos detects exploits Customers are protected Microsoft vulnerability identified Mar 14 Shadow Brokers exploit leaked Apr 14 WannaCry ransomware released May 12
  • 18. © 2017 Cisco and/or its affiliates. All rights reserved.
  • 20. © 2017 Cisco and/or its affiliates. All rights reserved.© 2017 Cisco and/or its affiliates. All rights reserved. Thank you
  • 21. © 2017 Cisco and/or its affiliates. All rights reserved. Today, data is where the money is
  • 22. © 2017 Cisco and/or its affiliates. All rights reserved. Next Generation Endpoint Security Prevent Prevent attacks and block malware in real time Detect Continuously monitor to reduce time to detection Respond Accelerate investigations and remediate faster and more effectively
  • 23. © 2017 Cisco and/or its affiliates. All rights reserved. It’s a multi-cloud era
  • 24. © 2017 Cisco and/or its affiliates. All rights reserved. Multi-cloud transformation PUBLIC PRIVATE User/PC Campus/ branch WAN Data center Internet Cloud Consumer User access Provider Applications Cloud SaaS
  • 25. © 2017 Cisco and/or its affiliates. All rights reserved. Multi-cloud transformation WANCampus/ branch Cloud edge PUBLIC Public cloud SaaS Internet DC User/devices End to end Enterprise Edge
  • 26. © 2017 Cisco and/or its affiliates. All rights reserved. Would you fly in a plane made of 50 different planes?