Cisco Connect 2018 Philippines -   security keynote
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Changing The Security Equation
Stephen Dane
Managing Director, Security, Asia Pacific & Japan
March 2018
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
Global security challenges
People
• Talent Crunch
• High Demanded Expertise
• Increased Costs
Digital Disruption,
Massive Scale
• 50B Devices
Connected by 2020
• $19T Opportunity
Security Industry
• Rapidly expanding number
of security companies
• Not interoperable
• Not open
Active Adversaries
• Attack surface
• Threat Actors
• Attack Sophistication
Dynamic
Threat
Landscape
Changing
Business Models
Complexity and
Fragmentation
Shortage of
Cybersecurity
Experts
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
Current situation and outlook
ASEAN is a prime target for cyber attack...
... and the threat landscape is bound to
escalate over time
Rising Systemic Risk
• Increasing trade and business linkages will make the region as
strong as its weakest link
Sustained under-investment
• Diverging national priorities and different paces of digital evolution
will lead to persistent under-investment
Persistently porous cyber defenses
• Caused by limited intelligence sharing, increasing vulnerability to
Advanced Persistent Threats
Larger attack surfaces leading to complexity in
monitoring and response
• Due to technology developments (IT/OT convergence, Multi-cloud,
increased share of encrypted traffic)
Policy preparedness and institutional oversight is
extremely low
• Lack of strategic mindset around policy and governance
• Absence of a unifying framework
• Significant under-investment
Absence of a holistic approach by businesses
• Cyber risk is seen as IT rather than business risk
Nascent local cybersecurity industry together with
limited buyer awareness
• Fragmentation
• Multi vendor/product landscape leading to operational complexity
• Paucity of skilled talent
Cybersecurity in ASEAN
1. Based on Market capitalization of Top 1000 listed companies across SEA in 2017
Source: A.T. Kearney interviews and analysis
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
ASEAN countries have emerged as launchpads for
cyber attack either as vulnerable hotbeds or as trusted,
well-connected hubs
Blocked suspicious web activity by country of origin (expected ratio = 1.0)
0.83Chile
1.43Peru
1.46Panama
1.54Belize
1.20United States
2.11Canada
1.15 Venezuela
1.22Italy
0.87
France
Germany
Ukraine
Turkey
Romania
0.94 Russia
1.31 China
Malaysia
1.60 Australia
Indonesia
Vietnam
3.52
2.84
1.07
3.88
1.47
1.00
2.77
• Malaysia and Indonesia
are global hotspots for
major blocked
suspicious web
activities—up to 3.5
times the standard ratio
• Vietnam is amongst the
top 5 countries from
which attacks on IoT
devices originated
Source: A.T. Kearney research report
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
National
Strategy
development
Legislation
Governance
and operational
entities
International
cooperation
Awareness
Capacity
building
Sector –
specific focus
Singapore Malaysia Philippines Thailand Indonesia Vietnam Rest of ASEAN
Absent Initiated / Proposed Established & Operational
Level of policy preparedness across ASEAN remains low
across most countries, with lack of a unifying framework
Only Singapore and
Malaysia have operational
National strategies
Progress on legislation
and governance remains
fairly slow
Source:
A.T. Kearney, Interviews, Press clippings
Most regional efforts
focused on
Capacity Building
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
Identify
Identify End Point Network Content Cloud Analytics IOT SIEM Managed & Professional Security Services
Protect
Defect
Respond
Recover
Share of ASEAN cyber security
spend, 2017
x% Product Design & Development 70% Services 30%
Vendor positioning across the security value chain
Product/Product
Implementation &/or
Monitoring Services
Technology
Capability Specialist
Holistic Solutions
Provider
Regional System
Integrators &
Managed Service
Providers
Consulting &
Services Providers
Product & Technology of others
Product & Technology of others
Focused on limited set of
products they supply
Fragmented vendor landscape with few
holistic providers …
Large number of localized MSS
providers with limited regional
mobility
Source: Industry interviews, A.T.Kearney analysis
…and several hundred small
niche players Rely on others
Large number of product
specialists with varied
capabilities
Very few holistic solutions
providers, perpetuating “best of
breed as an industry practice”
Emerging regional systems
integrators facing challenges in
expanding across the value chain.
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
Urgent call to action across ASEAN
Source: A.T. Kearney analysis
Secure sustained
regional
commitment for
cybersecurity
Elevate
cybersecurity on the
regional policy
agenda
Build the next wave
of cybersecurity
capability
Fortify the
Ecosystem
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
Changing the equation
People
Policy & Process
Technology
Networking Academy 20 years
students across
180 countries
7.8 million
students in
Asia Pacific & Japan
1.26 million
Security students
trained globally in FY17
90,000
students in Asia
Pacific & Japan
10,000and
Security & Trust Organization
Integrated architectural approach
Engages world governments
to help shape national cybersecurity policy agenda
INTERPOL collaboration
to share threat intelligence & best practices
New era of networking
security is foundational
Security
enables digital transformation
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
Cisco’s Security architecture
Security that works together
Threat Intelligence –
Services
Endpoint CloudNetwork
4.6 Hours Reduced Time To Detection | On Average 184 Days To Detect A Breach In ASEAN
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
Security capabilities integrated throughout
the network
Digital Network Architecture
Network visibility Network Segmentation
360° visibility
Real-time analysis of data and traffic to provide
visibility and intelligence across the network
Dynamic control
Software-defined segmentation for effective and
consistent policy application
Comprehensive automation
Integrated solutions that augment your
capabilities and reduce manual processes
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
Malicious binaries and encryption
Increase
November 2016
Attackers embrace encryption to conceal command-and-control activity
19%
12% Increase
268%70%
50%
38%
Global Encrypted Web Traffic Malicious Sandbox Binaries with Encryption
October 2017
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
The Cisco network with Encrypted Traffic Analytics
Known
malware traffic
Known
benign traffic
Extract
observable
features in
the data
Employ
machine learning
techniques
to build detectors
Malware
detected in
Encrypted
Traffic
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
Deep Visibility
Context
Control
Malware will get in. You must prevent what you can, but you can never prevent 100% of attacks.
So what’s needed to protect against threats that get in?
Securing the endpoint
PC
MobileLinux
Mac
on the
endpoint
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
AMP for Endpoints
Prevent
Prevent attacks and block
malware in real time
Detect
Continuously monitor
to reduce time
to detection
Respond
Accelerate investigations and
remediate faster and more
effectively
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
SEE
Once
Threat
Endpoint security in action
17
AMP Cloud1
Threat Grid2
Security
Intelligence
Endpoint
AMP for Endpoint
Enforce
Everywhere
3
Endpoint CloudNetwork
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
Cisco AMP for Endpoints Excels
in ‘The Evolving Effectiveness of
Endpoint Protection Solutions’ Report
AMP for Endpoints
named a Leader
Cisco named a Visionary
for AMP for Endpoints
Gartner 2018 Magic
Quadrant for Endpoint
Protection Platforms
Gartner evaluated 12 endpoint
security products, including Cisco
AMP for Endpoints
IDC Marketscape: Worldwide Endpoint
Specialized Threat Analysis and
Protection 2017 Vendor Assessment
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
It’s a multicloud world
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
Modern data centers are incredibly complex
Big and Fast Data
Virtualization
Expanded attack surface
Increase in east-west traffic
Hybrid Cloud
Multi cloud orchestration
Workload portability
Zero trust model
Application Architecture
Continuous development | Micro Services | APIs
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
Visibility
“See Everything”
Complete visibility of users,
devices, networks, applications,
workloads and processes
Threat protection
“Stop the Breach”
Quickly detect, block, and respond to
attacks before hackers can steal data
or disrupt operations
Segmentation
“Reduce the Attack Surface”
Prevent attackers from moving
laterally east-west with application
whitelisting and micro-segmentation
Securing the data center
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
Attack Continuum
Before During After
Security everywhere architecture
22
Branch IOTCloudData CenterEndpoint CampusEdge
Web
Network Analytics
Advanced Malware
Secure Internet Gateway
UTMW W W
Policy & Access
Email
NGFW + NGIPS
Cloud Security
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
PROTECTING YOUR NETWORK
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
Deeper data + more context = better security
We analyze massive
amounts of data —
19.7 billion threats
blocked daily
Our real-time
datasets are diverse,
global, and live
600 Billion
Email samples
16 Billion
Web requests
3.4 Billion
AMP queries
160
Countries
worldwide
100 Billion
Internet
requests
12,000
Enterprise
customers
80 Million
Daily active
users
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO CONNECT 2018 . IT’S ALL YOU
Why Cisco Security
5K
People Strong
#1
Cisco Priority
Threat Researchers
250
Invested
Billions
Sourcefire
Lancope
Neohapsis
OpenDNS
ThreatGRID
Cognitive
Portcullis
CloudLock
Faster Finding
Breaches
100x
Ongoing
Innovation
Best of breed
portfolio
Integrated
Threats Blocked
Daily
19.7B
Fortune 100 use
Cisco Security
88%
Security
Effectiveness
99%
Cisco Connect 2018 Philippines -   security keynote

More Related Content

PDF
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
PPTX
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
PDF
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
PDF
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
PDF
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
PPTX
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
PDF
Cisco Connect 2018 Vietnam - data center transformation - vn
PDF
Cisco Connect 2018 Singapore - Cisco CMX
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Vietnam - data center transformation - vn
Cisco Connect 2018 Singapore - Cisco CMX

What's hot (19)

PPTX
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
PDF
From Cybersecurity to Cyber Resilience
PDF
Google peter logli & jake shea
PDF
Cyber Security Strategies and Approaches
PDF
Cloud Computing & Cybersecurity
PDF
CWIN17 Rome / A holostic cybersecurity
PDF
Future of Cybersecurity 2016 - M.Rosenquist
PPTX
CSA Atlanta Q1'2016 Chapter Meeting
PDF
Top Cyber Security Trends for 2016
PDF
FireEye investis case study
PDF
CWIN17 New-York / Transforming enterprises with blockchain
PDF
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
PDF
Outpost24 webinar - Busting the myths of cloud security
PDF
Outside the (Black) Box: Protecting Core Operations in Energy
PPTX
Cloud Security for Dummies Webinar — The Identity Edition
PPTX
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
PDF
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
PPTX
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
PDF
The State of Cyber
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
From Cybersecurity to Cyber Resilience
Google peter logli & jake shea
Cyber Security Strategies and Approaches
Cloud Computing & Cybersecurity
CWIN17 Rome / A holostic cybersecurity
Future of Cybersecurity 2016 - M.Rosenquist
CSA Atlanta Q1'2016 Chapter Meeting
Top Cyber Security Trends for 2016
FireEye investis case study
CWIN17 New-York / Transforming enterprises with blockchain
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
Outpost24 webinar - Busting the myths of cloud security
Outside the (Black) Box: Protecting Core Operations in Energy
Cloud Security for Dummies Webinar — The Identity Edition
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
The State of Cyber
Ad

Similar to Cisco Connect 2018 Philippines - security keynote (20)

PDF
Cisco Connect 2018 Singapore - Changing the Security Equation
PPTX
Isday 2017 - Atelier Cisco
PDF
Security Everywhere: A Growth Engine for the Digital Economy
PDF
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
PDF
Tomorrow Starts Here - Security Everywhere
PPTX
Cybersecurity: Protection strategies from Cisco and Next Dimension
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Intelligent Cybersecurity for the Real World
PDF
Cisco Connect 2018 Singapore - delivering intent for data center networking
PDF
Cisco Connect 2018 Singapore - Cisco Incident Response Services
PPTX
Cisco Security DNA
PPTX
Idc security roadshow may2015 Adrian Aron
PDF
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
PPTX
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
PPTX
Scalar Security Roadshow - Vancouver Presentation
PPTX
Scalar Security Roadshow - Calgary Presentation
PDF
Cisco's 2016 Annual Security report
PPTX
Add-Structure-and-Credibility-to-Your-Security-Portfolio-with-CIS-Controls-v8...
PDF
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
PPTX
AMP_Security_ Malware Protection Presentatiion
Cisco Connect 2018 Singapore - Changing the Security Equation
Isday 2017 - Atelier Cisco
Security Everywhere: A Growth Engine for the Digital Economy
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
Tomorrow Starts Here - Security Everywhere
Cybersecurity: Protection strategies from Cisco and Next Dimension
Redefining Cybersecurity with AI Capabilities
Intelligent Cybersecurity for the Real World
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Security DNA
Idc security roadshow may2015 Adrian Aron
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Calgary Presentation
Cisco's 2016 Annual Security report
Add-Structure-and-Credibility-to-Your-Security-Portfolio-with-CIS-Controls-v8...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
AMP_Security_ Malware Protection Presentatiion
Ad

More from NetworkCollaborators (20)

PDF
Cisco Connect 2018 Singapore - Cybersecurity strategy
PDF
Cisco Connect 2018 Singapore - Do more than keep the lights on
PDF
Cisco Connect 2018 Singapore - jordan koh
PDF
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
PDF
Cisco Connect 2018 Singapore - The Network Intuitive
PDF
Cisco Connect 2018 Singapore - Easing the Transition
PDF
Cisco Connect 2018 Singapore - Cisco SD-WAN
PDF
Cisco Connect 2018 Singapore - Cisco Software Defined Access
PDF
Cisco Connect 2018 Singapore - En06 jason pernell
PDF
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
PDF
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
PDF
Cisco Connect 2018 Philippines - ben green
PDF
Cisco Connect 2018 Philippines - do more than keeping the lights on
PDF
Cisco Connect 2018 Philippines - jaymen quah
PDF
Cisco Connect 2018 Philippines - The workplace of the future
PDF
Cisco Connect 2018 Philippines - fay ocampo
PDF
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
PDF
Cisco Connect 2018 Philippines - Microsoft azure stack
PDF
Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...
PDF
Cisco Connect 2018 Philippines - cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - jordan koh
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
Cisco Connect 2018 Philippines - ben green
Cisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - jaymen quah
Cisco Connect 2018 Philippines - The workplace of the future
Cisco Connect 2018 Philippines - fay ocampo
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - Microsoft azure stack
Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...
Cisco Connect 2018 Philippines - cybersecurity strategy

Recently uploaded (20)

PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PPTX
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
DOCX
Basics of Cloud Computing - Cloud Ecosystem
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
Co-training pseudo-labeling for text classification with support vector machi...
Auditboard EB SOX Playbook 2023 edition.
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
Early detection and classification of bone marrow changes in lumbar vertebrae...
Introduction to MCP and A2A Protocols: Enabling Agent Communication
Improvisation in detection of pomegranate leaf disease using transfer learni...
Enhancing plagiarism detection using data pre-processing and machine learning...
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
Connector Corner: Transform Unstructured Documents with Agentic Automation
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
Rapid Prototyping: A lecture on prototyping techniques for interface design
4 layer Arch & Reference Arch of IoT.pdf
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
Basics of Cloud Computing - Cloud Ecosystem

Cisco Connect 2018 Philippines - security keynote

  • 2. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Changing The Security Equation Stephen Dane Managing Director, Security, Asia Pacific & Japan March 2018
  • 3. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU Global security challenges People • Talent Crunch • High Demanded Expertise • Increased Costs Digital Disruption, Massive Scale • 50B Devices Connected by 2020 • $19T Opportunity Security Industry • Rapidly expanding number of security companies • Not interoperable • Not open Active Adversaries • Attack surface • Threat Actors • Attack Sophistication Dynamic Threat Landscape Changing Business Models Complexity and Fragmentation Shortage of Cybersecurity Experts
  • 4. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU Current situation and outlook ASEAN is a prime target for cyber attack... ... and the threat landscape is bound to escalate over time Rising Systemic Risk • Increasing trade and business linkages will make the region as strong as its weakest link Sustained under-investment • Diverging national priorities and different paces of digital evolution will lead to persistent under-investment Persistently porous cyber defenses • Caused by limited intelligence sharing, increasing vulnerability to Advanced Persistent Threats Larger attack surfaces leading to complexity in monitoring and response • Due to technology developments (IT/OT convergence, Multi-cloud, increased share of encrypted traffic) Policy preparedness and institutional oversight is extremely low • Lack of strategic mindset around policy and governance • Absence of a unifying framework • Significant under-investment Absence of a holistic approach by businesses • Cyber risk is seen as IT rather than business risk Nascent local cybersecurity industry together with limited buyer awareness • Fragmentation • Multi vendor/product landscape leading to operational complexity • Paucity of skilled talent Cybersecurity in ASEAN 1. Based on Market capitalization of Top 1000 listed companies across SEA in 2017 Source: A.T. Kearney interviews and analysis
  • 5. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU ASEAN countries have emerged as launchpads for cyber attack either as vulnerable hotbeds or as trusted, well-connected hubs Blocked suspicious web activity by country of origin (expected ratio = 1.0) 0.83Chile 1.43Peru 1.46Panama 1.54Belize 1.20United States 2.11Canada 1.15 Venezuela 1.22Italy 0.87 France Germany Ukraine Turkey Romania 0.94 Russia 1.31 China Malaysia 1.60 Australia Indonesia Vietnam 3.52 2.84 1.07 3.88 1.47 1.00 2.77 • Malaysia and Indonesia are global hotspots for major blocked suspicious web activities—up to 3.5 times the standard ratio • Vietnam is amongst the top 5 countries from which attacks on IoT devices originated Source: A.T. Kearney research report
  • 6. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU National Strategy development Legislation Governance and operational entities International cooperation Awareness Capacity building Sector – specific focus Singapore Malaysia Philippines Thailand Indonesia Vietnam Rest of ASEAN Absent Initiated / Proposed Established & Operational Level of policy preparedness across ASEAN remains low across most countries, with lack of a unifying framework Only Singapore and Malaysia have operational National strategies Progress on legislation and governance remains fairly slow Source: A.T. Kearney, Interviews, Press clippings Most regional efforts focused on Capacity Building
  • 7. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU Identify Identify End Point Network Content Cloud Analytics IOT SIEM Managed & Professional Security Services Protect Defect Respond Recover Share of ASEAN cyber security spend, 2017 x% Product Design & Development 70% Services 30% Vendor positioning across the security value chain Product/Product Implementation &/or Monitoring Services Technology Capability Specialist Holistic Solutions Provider Regional System Integrators & Managed Service Providers Consulting & Services Providers Product & Technology of others Product & Technology of others Focused on limited set of products they supply Fragmented vendor landscape with few holistic providers … Large number of localized MSS providers with limited regional mobility Source: Industry interviews, A.T.Kearney analysis …and several hundred small niche players Rely on others Large number of product specialists with varied capabilities Very few holistic solutions providers, perpetuating “best of breed as an industry practice” Emerging regional systems integrators facing challenges in expanding across the value chain.
  • 8. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU Urgent call to action across ASEAN Source: A.T. Kearney analysis Secure sustained regional commitment for cybersecurity Elevate cybersecurity on the regional policy agenda Build the next wave of cybersecurity capability Fortify the Ecosystem
  • 9. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU Changing the equation People Policy & Process Technology Networking Academy 20 years students across 180 countries 7.8 million students in Asia Pacific & Japan 1.26 million Security students trained globally in FY17 90,000 students in Asia Pacific & Japan 10,000and Security & Trust Organization Integrated architectural approach Engages world governments to help shape national cybersecurity policy agenda INTERPOL collaboration to share threat intelligence & best practices New era of networking security is foundational Security enables digital transformation
  • 10. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU Cisco’s Security architecture Security that works together Threat Intelligence – Services Endpoint CloudNetwork 4.6 Hours Reduced Time To Detection | On Average 184 Days To Detect A Breach In ASEAN
  • 11. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU Security capabilities integrated throughout the network Digital Network Architecture Network visibility Network Segmentation 360° visibility Real-time analysis of data and traffic to provide visibility and intelligence across the network Dynamic control Software-defined segmentation for effective and consistent policy application Comprehensive automation Integrated solutions that augment your capabilities and reduce manual processes
  • 12. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU Malicious binaries and encryption Increase November 2016 Attackers embrace encryption to conceal command-and-control activity 19% 12% Increase 268%70% 50% 38% Global Encrypted Web Traffic Malicious Sandbox Binaries with Encryption October 2017
  • 13. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU The Cisco network with Encrypted Traffic Analytics Known malware traffic Known benign traffic Extract observable features in the data Employ machine learning techniques to build detectors Malware detected in Encrypted Traffic
  • 14. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU Deep Visibility Context Control Malware will get in. You must prevent what you can, but you can never prevent 100% of attacks. So what’s needed to protect against threats that get in? Securing the endpoint PC MobileLinux Mac on the endpoint
  • 15. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU AMP for Endpoints Prevent Prevent attacks and block malware in real time Detect Continuously monitor to reduce time to detection Respond Accelerate investigations and remediate faster and more effectively
  • 16. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU SEE Once Threat Endpoint security in action 17 AMP Cloud1 Threat Grid2 Security Intelligence Endpoint AMP for Endpoint Enforce Everywhere 3 Endpoint CloudNetwork
  • 17. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU Cisco AMP for Endpoints Excels in ‘The Evolving Effectiveness of Endpoint Protection Solutions’ Report AMP for Endpoints named a Leader Cisco named a Visionary for AMP for Endpoints Gartner 2018 Magic Quadrant for Endpoint Protection Platforms Gartner evaluated 12 endpoint security products, including Cisco AMP for Endpoints IDC Marketscape: Worldwide Endpoint Specialized Threat Analysis and Protection 2017 Vendor Assessment
  • 18. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU It’s a multicloud world
  • 19. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU Modern data centers are incredibly complex Big and Fast Data Virtualization Expanded attack surface Increase in east-west traffic Hybrid Cloud Multi cloud orchestration Workload portability Zero trust model Application Architecture Continuous development | Micro Services | APIs
  • 20. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU Visibility “See Everything” Complete visibility of users, devices, networks, applications, workloads and processes Threat protection “Stop the Breach” Quickly detect, block, and respond to attacks before hackers can steal data or disrupt operations Segmentation “Reduce the Attack Surface” Prevent attackers from moving laterally east-west with application whitelisting and micro-segmentation Securing the data center
  • 21. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU Attack Continuum Before During After Security everywhere architecture 22 Branch IOTCloudData CenterEndpoint CampusEdge Web Network Analytics Advanced Malware Secure Internet Gateway UTMW W W Policy & Access Email NGFW + NGIPS Cloud Security
  • 22. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU PROTECTING YOUR NETWORK
  • 23. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU Deeper data + more context = better security We analyze massive amounts of data — 19.7 billion threats blocked daily Our real-time datasets are diverse, global, and live 600 Billion Email samples 16 Billion Web requests 3.4 Billion AMP queries 160 Countries worldwide 100 Billion Internet requests 12,000 Enterprise customers 80 Million Daily active users
  • 24. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CISCO CONNECT 2018 . IT’S ALL YOU Why Cisco Security 5K People Strong #1 Cisco Priority Threat Researchers 250 Invested Billions Sourcefire Lancope Neohapsis OpenDNS ThreatGRID Cognitive Portcullis CloudLock Faster Finding Breaches 100x Ongoing Innovation Best of breed portfolio Integrated Threats Blocked Daily 19.7B Fortune 100 use Cisco Security 88% Security Effectiveness 99%