SlideShare a Scribd company logo
Pichaiwood Prabudhanitisarn
Cybersecurity Specialist
April 2018
Creating an Effective Security Architecture
Cybersecurity Strategy
An Integrated Approach
Last 20 years of security:
Got a problem?
Buy a Box
Firewall
Same Old Song and Dance
2000’s
Application
Control
FW/VPN
IDS / IPS
UTM
NAC
AV
PKI
1980’s
2010’s
1990’s
Sandboxing
The Existing Security Stack

Firewall
VPN
Email Security
Web Security
DLP
SIEM
Replacement Box
Failover
Persistent Threats
IDS
Firewall 2.0
VPN 2.0
Email Security 2.0
Web Security 2.0
DLP 2.0
SIEM 2.0
Replacement Box 2.0
Failover 2.0
Persistent Threats 2.0
IDS 2.0
Why a Security Architecture?
Ability to Defend Getting More Complex
‱ Attack Surface Diversity: Growing exponentially
due to IoT, SaaS / IaaS, and personal device
trends
‱ Threats: Continuous rise in sophistication
of attackers combined with rapid evolution
of attacker techniques and tools
‱ Detection: Efficacy of classical detection
methods eroding
‱ User Behavior: No longer constrained to
IT controlled places, apps or devices
The Security
Effectiveness Gap
Process of Attacks
Research, and
select targets
Pair remote access
malware with exploits
Deliver
cyberweapons by
email, website and
attachments
Install payloads to
gain persistent
access
Source: Verizon 2014 Data Breach Investigations Report
Time to compromise
Time to discovery25%
50%
75%
100%
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
Percent of breaches where time to compromise (orange)/
time to discovery (blue) was days or less
Time to Detection
100Industry Days
Industry Result
Integration = Effective Security
API’s Alone
are not the Answer
Multiple features
within the
same product
Solution
Management
Multiple
products that
work together
Unified
configuration
and reporting
Functional
Integration has to have Layers
Event information
improves visibility
Threat Intelligence
speeds time to detection
Automated Policy
changes allow faster
response
Contextual Awareness
builds granular controls
across the network
Sharing Data Through Integration
Threat Grid
Sourcefire
2013 2016
Portcullis
OpenDNS
Lancope
Neohapsis
Cloudlock
2014 2015
AMP
Everywhere;
OpenAppID
Talos
established
Cisco ASA
with
Firepower
Services
Integrated
Threat Defense
Vision; AMP
Threat Grid
Firepower
NGFW
unveiled
Network as a
Sensor and
Enforcer
Cisco
Umbrella
SIG
Identity
Services
Engine 2.0
Integration has Driven Cisco’s Portfolio Growth
Unified Management
Endpoint CloudNetwork
Visibility
Threat Intelligence -
Services
Integrated Architectural Approach
UTM
Network
Analytics
Advanced Malware
Secure Internet Gateway
WebW W W
Policy and Access
Email
NGFW/ NGIPS
Cloud Access Security
Premiere Portfolio in the Industry
Functional Integration: Talos Threat Intelligence
221BTotal Threats
1.4M
AV Blocks Per
Day
2.6M
Blocks Per
Second
9.9B
Total Blocks Per
Month
1.5M
Malware Samples
Per Day
1.8B
Spyware Blocks
Per Month
8.2B
Web Filtering
Blocks Per Month
991MWeb + Malware
Threats
19.7BThreats Per Day
1B
Sender Base
Reputation Queries
Per Day
Shared intelligence
Shared contextual
awareness
Consistent policy
enforcement
Cisco Firepowerℱ Management Center
Functional Integration: Firepower Threat Defense
Talos
Firepower 4100 Series Firepower 9300 Platform
Visibility
Radware
DDoS
Network
analysis Email Threats
Identity
and NAC DNS FirewallURL
Application Control
WAN Optimization, Traffic
Shaping, Content Filtering
Security
NG Firewall, Client VPN,
Site to Site VPN, IDS/IPS
Networking
NAT/DHCP, 3G/4G Cellular,
Static Routing, Link Balancing
Functional Integration: Meraki
Network
ISR/ASR
Advanced
Malware
Umbrella
Web
W W W
ISE
Email
NGFW/ NGIPS
Threat Grid
Stealthwatch
Event
Threat Intel
Policy
Context
Meraki
Cloudlock
Solution Integration: Cisco Portfolio
AMP Threat
Intelligence Cloud
Windows OS Android Mobile Virtual MAC OS
CentOS, Red Hat
Linux for servers
and datacenters
AMP on Web and Email
Security Appliances
AMP on ASA with Firepowerℱ
Services
AMP Private Cloud
Virtual Appliance
AMP on Firepower
NGIPS Appliance
AMP on Cloud Web Security
and Hosted Email
CWS/
CTA
Threat Grid
Malware Analysis +
Threat Intelligence
AMP on ISR with
Firepower Services
AMP for Endpoints
AMP for Endpoints
Remote Endpoints
AMP for Endpoints can
be launched from Cisco
AnyConnectÂź
AMP on MerakiÂź MX
Solution Integration: Advanced Malware Protection
Cisco WSA (Web Security Appliance)
External Telemetry (BlueCoat Sec. GW)
Cisco CWS (Cloud Web Security)
Cisco
Cognitive Threat
Analytics (CTA)
Confirmed Threats
Detected Threats
Incident
Response
Threat Alerts
HQ
STIX / TAXII API
CTACTACTA
HQ
Web Security
Gateways
Cloud
Web Security
Gateways
Web Access Logs
Breach Detection &
Advanced Threat Visibility
Solution Integration: Web and Endpoint
Stealthwatch
Campus/DC
Switches/WLC
Cisco Routers /
3rd Vendor Devices
Network Sensors Network Enforcers
Policy & Context
Sharing
NGIPS
ISE/
TrustSec
NGFW
Solution Integration: Network Security
Firepower Device
Manager
Easy management of
common security and
policy tasks
Comprehensive security
administration and
automation of multiple
appliances
Firepower Management
Center
Cisco Defense
Orchestrator
Centralized cloud-based
policy management of
multiple deployments
On-box Centralized Cloud-based
Management Integration: Security Architecture
Single interface to manage policy for:
‱ ASA/ ASAv
‱ ASA with Firepowerℱ Services
‱ Cisco Firepowerℱ NGFW
‱ Cisco¼ Web Security Appliance
‱ Cisco Umbrella
Management Integration: Cisco Defense Orchestrator
Prove it.
Solution Integration: Rapid Threat Containment
Automatically Defend Against Threats with Firepower and ISE
FMC aggregates and
correlates sensor data
FMC alerts ISE. ISE
then changes the
user’s/device’s access
policy to suspicious
Corporate user
downloads file, not
knowing it’s actually
malicious
Based on the new
policy, network
enforcers
automatically restrict
access
Device is quarantined
for remediation or
mitigation
Endpoint User
Opened an email
Downloading malware
Which stole data
Integration in Action: The Attack
That visited a website
Through the firewall
AMP for Endpoints
And shares the event information
Firepower Management Console
Analyzes the file
with Threat Grid
Blocking the malware
retrospectively
Protecting the data center
Email Security
Web Security
Integration in Action: Sharing Events
Alerts are Snared Between Products Providing Visibility
Integration in Action: Sharing Events
Alerts are Snared Between Products Providing Visibility
Threat Grid
Firepower
Management
Console
Data Center
Email Security
Web Security
Shares a policy
update with the
Identity Services
Engine
Quarantining the
user automatically
Integration in Action: Sharing Policy
Automatic Response to Threats
Integration in Action: Sharing Policy
Automatic Response to Threats
Firepower
Management
Console
Threat Grid
Data Center
Email Security
Web Security
Identity Services
Engine
AMP for Endpoints
Cloud Security
Integration in Action: Threat Intelligence
Detect Once, Protect Everywhere
Firepower
Management
Console
Threat Grid
Data Center
Email Security
Web Security
Identity Services
Engine
AMP for Endpoints
Cloud Security
Integration in Action: Threat Intelligence
Profiling what users and devices are really on the network
Integration in Action: Sharing Context
Profiling What Users and Devices are Really on the Network
Integration in Action
AMP
TALOS
ISE
NGFW
Integration with
3rd Party Products
100 percent focused Cisco Security initiatives
Real integration benefit across portfolio
Coordinate support with key partners
Host community supported code
Identify candidates for deeper integration
Cisco Solution Partner Program (SPP) DevNet
Cisco Security
Technical Alliance
Program
Firepower
ISE
Threat Grid
FP9300
Content
ASA
AnyConnect
OpenDNS
pxGrid
Stealthwatch
Fore more information go to http://www.cisco.com/go/csta
3rd Party Integration: CSTA
Cisco Security Technical Alliance
‱ eStreamer API
‱ Send Firepower event data to SIEMs
‱ Host Input API
‱ Collect vulnerability and other other host info
‱ Remediation API
‱ Programmatic response to third parties from FireSIGHT
‱ JDBC Database Access API
‱ Supports queries from other applications
‱ Read/Write API for Firepower
‱ Supports FW and Risk Management technologies
‱ Threat Intelligence Director
‱ Collect, correlate, take action on third party Threat Intelligence
‱ Management API for ASA
‱ Third party management of ASA, policy auditing
‱ pxGrid
‱ Bi-directional context sharing framework for ISE, ecosystem partners
‱ MDM API
‱ Enables 3rd party MDM partners to make mobile device posture part
of ISE access policy
‱ External Restful Services (ERS)
‱ Adds 3rd party asset data to ISE inventory database
‱ AMP Cloud-based API
‱ Externalize event data for all 3rd party apps
‱ Ingest threat data from third parties
‱ Threat Grid API
‱ Hand off suspicious files for analysis
‱ Queries entire dataset for correlation or historical/geographic significance
‱ Automate submission of files for analysis
‱ Create custom or batch threat feeds
‱ FirePOWER 9300 (SSP) REST API
‱ Cisco and third party applications in service chain configuration
‱ AnyConnect Network Visibility Module Collection
‱ AnyConnect provides IPFIX data
‱ AnyConnect EDM/MDM
‱ VPN Services
‱ OpenDNS Investigate
‱ Query OpenDNS for threat intelligence
‱ OpenDNS Umbrella
‱ Add addresses to customer specific enforcement
‱ CloudLock Enterprise API
‱ Reporting/Management
‱ CloudLock Development APIs
‱ Access micro-services
‱ Other Integration Points
‱ ESA, WSA
3rd Party Integration: Open Standard API’s
EDM/MDM Endpoint and
Custom Detection
Forensics and IR Other SIEM & Analytics
NPM/APM and
Visualization
IAM/SSO
Threat
IntelligenceCASB
UEBA
Firewall and
Policy
Management
Deception
Orchestration
Vulnerability
Management
3rd Party Integration: Ecosystem Partners
Services Brings it All Together
Advisory
‱ Custom Threat Intelligence
‱ Cybersecurity Assessments
Integration
‱ Integration Services
‱ Security Optimization Services
Managed
‱ Managed Threat Defense
‱ Remote Managed Services
Cisco Security Services
Effective Security Needs to be
Simple
Security built into the
network and designed to
work together
1 2 3
Open
Integrate across the Cisco
portfolio and 3rd party products
Automated
Instantaneous remediation
reduce time to detection
save time and money
VS.
*Source Cisco Midyear Security Report, 2016
Industry Days
100 Cisco Hours
~13
Integrate Automate: Reduce Time to Detection
simple open automated
Effective Security

More Related Content

PPT
Cisco Security Technical Alliances
Cisco DevNet
 
PDF
Cyber Security and Cloud Computing
Keet Sugathadasa
 
PDF
Cisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approach
NetworkCollaborators
 
PPTX
DEVNET-1123 CSTA - Cisco Security Technical Alliances, New Program for Ecosys...
Cisco DevNet
 
PDF
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...
Priyanka Aash
 
PPT
Cisco Security Technical Alliance
Cisco DevNet
 
PDF
Microsoft threat protection + wdatp+ aatp overview
Allessandra Negri
 
PDF
Symantec Webinar Cloud Security Threat Report
Symantec
 
Cisco Security Technical Alliances
Cisco DevNet
 
Cyber Security and Cloud Computing
Keet Sugathadasa
 
Cisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approach
NetworkCollaborators
 
DEVNET-1123 CSTA - Cisco Security Technical Alliances, New Program for Ecosys...
Cisco DevNet
 
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...
Priyanka Aash
 
Cisco Security Technical Alliance
Cisco DevNet
 
Microsoft threat protection + wdatp+ aatp overview
Allessandra Negri
 
Symantec Webinar Cloud Security Threat Report
Symantec
 

What's hot (19)

PPTX
Managing Cloud Security Risks in Your Organization
Charles Lim
 
PDF
Cloud Security - Kloudlearn
KloudLearn
 
PDF
Cloud university intel security
Ingram Micro Cloud
 
PDF
How VPNs and Firewalls Put Your Organization at Risk
Cyxtera Technologies
 
PDF
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Skybox Security
 
PDF
Cisco Endpoint Security for MSSPs
Cisco Russia
 
PPTX
cloud security ppt
Devyani Vaidya
 
PPTX
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Cisco Security
 
PPTX
Cloud with Cyber Security
Niki Upadhyay
 
PPTX
Cloud security From Infrastructure to People-ware
Tzar Umang
 
PPTX
Cloud Security Demo
Cheah Eng Soon
 
PDF
Cloud Security Engineering - Tools and Techniques
Gokul Alex
 
PDF
Cloud Security: What you need to know about IBM SmartCloud Security
IBM Security
 
PPTX
Microsoft Cloud Application Security Overview
Syed Sabhi Haider
 
PPTX
Cloud Security
Giovanni Mazzeo
 
PDF
Introduction to Azure Sentinel
arnaudlh
 
PDF
Cisco amp for meraki
Cisco Canada
 
PPTX
Security on Cloud Computing
Reza Pahlava
 
PDF
Msft cloud architecture_security_commonattacks
Akram Qureshi
 
Managing Cloud Security Risks in Your Organization
Charles Lim
 
Cloud Security - Kloudlearn
KloudLearn
 
Cloud university intel security
Ingram Micro Cloud
 
How VPNs and Firewalls Put Your Organization at Risk
Cyxtera Technologies
 
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Skybox Security
 
Cisco Endpoint Security for MSSPs
Cisco Russia
 
cloud security ppt
Devyani Vaidya
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Cisco Security
 
Cloud with Cyber Security
Niki Upadhyay
 
Cloud security From Infrastructure to People-ware
Tzar Umang
 
Cloud Security Demo
Cheah Eng Soon
 
Cloud Security Engineering - Tools and Techniques
Gokul Alex
 
Cloud Security: What you need to know about IBM SmartCloud Security
IBM Security
 
Microsoft Cloud Application Security Overview
Syed Sabhi Haider
 
Cloud Security
Giovanni Mazzeo
 
Introduction to Azure Sentinel
arnaudlh
 
Cisco amp for meraki
Cisco Canada
 
Security on Cloud Computing
Reza Pahlava
 
Msft cloud architecture_security_commonattacks
Akram Qureshi
 
Ad

Similar to Cisco Connect 2018 Thailand - Cybersecurity strategy an integrated approach khun pichaiwood prabudhanitisarn_cisco (20)

PDF
CSTA - Cisco Security Technical Alliances, New Ecosystem Program Built on the...
Cisco DevNet
 
PDF
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Cisco do Brasil
 
PDF
Cisco NGFW AMP
Cisco Canada
 
PPTX
Isday 2017 - Atelier Cisco
Inforsud Diffusion
 
PDF
Cisco Security Architecture
Cisco Canada
 
PDF
Building a Security Architecture
Cisco Canada
 
PDF
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
United Technology Group (UTG)
 
PDF
BGA SOME/SOC Etkinliği - Tehdit Odaklı GĂŒvenlik Mimarisinde Sourcefire Yakla...
BGA Cyber Security
 
PDF
Next Generation Security
Cisco Canada
 
PDF
Cisco ASA con fire power services
Felipe Lamus
 
PDF
Scalar Security Roadshow - Toronto Presentation
Scalar Decisions
 
PDF
Advanced threat security - Cyber Security For The Real World
Cisco Canada
 
PDF
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
BGA Cyber Security
 
PDF
PresentaciĂłn - Cisco ASA with FirePOWER Services
Oscar Romano
 
PDF
Midsize Business Solutions: Cybersecurity
Cisco Security
 
PPTX
Scalar Security Roadshow - Calgary Presentation
Scalar Decisions
 
PPTX
Scalar Security Roadshow - Vancouver Presentation
Scalar Decisions
 
PPTX
Plnog13 2014 security intelligence_pkedra_v1
PROIDEA
 
PPT
Miben nyĂșjt többet a Cisco ASA + FirePOWER Services?
S&T Consulting Hungary
 
PPTX
Building Up Network Security: Intrusion Prevention and Sourcefire
Global Knowledge Training
 
CSTA - Cisco Security Technical Alliances, New Ecosystem Program Built on the...
Cisco DevNet
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Cisco do Brasil
 
Cisco NGFW AMP
Cisco Canada
 
Isday 2017 - Atelier Cisco
Inforsud Diffusion
 
Cisco Security Architecture
Cisco Canada
 
Building a Security Architecture
Cisco Canada
 
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
United Technology Group (UTG)
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı GĂŒvenlik Mimarisinde Sourcefire Yakla...
BGA Cyber Security
 
Next Generation Security
Cisco Canada
 
Cisco ASA con fire power services
Felipe Lamus
 
Scalar Security Roadshow - Toronto Presentation
Scalar Decisions
 
Advanced threat security - Cyber Security For The Real World
Cisco Canada
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
BGA Cyber Security
 
PresentaciĂłn - Cisco ASA with FirePOWER Services
Oscar Romano
 
Midsize Business Solutions: Cybersecurity
Cisco Security
 
Scalar Security Roadshow - Calgary Presentation
Scalar Decisions
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Decisions
 
Plnog13 2014 security intelligence_pkedra_v1
PROIDEA
 
Miben nyĂșjt többet a Cisco ASA + FirePOWER Services?
S&T Consulting Hungary
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Global Knowledge Training
 
Ad

More from NetworkCollaborators (20)

PDF
Cisco Connect 2018 Singapore - Cybersecurity strategy
NetworkCollaborators
 
PDF
Cisco Connect 2018 Singapore - Cisco Incident Response Services
NetworkCollaborators
 
PDF
Cisco Connect 2018 Singapore - Do more than keep the lights on
NetworkCollaborators
 
PDF
Cisco Connect 2018 Singapore - jordan koh
NetworkCollaborators
 
PDF
Cisco Connect 2018 Singapore - Changing the Security Equation
NetworkCollaborators
 
PDF
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
NetworkCollaborators
 
PDF
Cisco Connect 2018 Singapore - The Network Intuitive
NetworkCollaborators
 
PDF
Cisco Connect 2018 Singapore - Cisco CMX
NetworkCollaborators
 
PDF
Cisco Connect 2018 Singapore - Easing the Transition
NetworkCollaborators
 
PDF
Cisco Connect 2018 Singapore - Cisco SD-WAN
NetworkCollaborators
 
PDF
Cisco Connect 2018 Singapore - Cisco Software Defined Access
NetworkCollaborators
 
PDF
Cisco Connect 2018 Singapore - En06 jason pernell
NetworkCollaborators
 
PDF
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
NetworkCollaborators
 
PDF
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
NetworkCollaborators
 
PDF
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
NetworkCollaborators
 
PDF
Cisco Connect 2018 Singapore - delivering intent for data center networking
NetworkCollaborators
 
PDF
Cisco Connect 2018 Philippines - ben green
NetworkCollaborators
 
PDF
Cisco Connect 2018 Philippines - do more than keeping the lights on
NetworkCollaborators
 
PDF
Cisco Connect 2018 Philippines - jaymen quah
NetworkCollaborators
 
PDF
Cisco Connect 2018 Philippines - The workplace of the future
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Cybersecurity strategy
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco Incident Response Services
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Do more than keep the lights on
NetworkCollaborators
 
Cisco Connect 2018 Singapore - jordan koh
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Changing the Security Equation
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
NetworkCollaborators
 
Cisco Connect 2018 Singapore - The Network Intuitive
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco CMX
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Easing the Transition
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco SD-WAN
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco Software Defined Access
NetworkCollaborators
 
Cisco Connect 2018 Singapore - En06 jason pernell
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
NetworkCollaborators
 
Cisco Connect 2018 Singapore - delivering intent for data center networking
NetworkCollaborators
 
Cisco Connect 2018 Philippines - ben green
NetworkCollaborators
 
Cisco Connect 2018 Philippines - do more than keeping the lights on
NetworkCollaborators
 
Cisco Connect 2018 Philippines - jaymen quah
NetworkCollaborators
 
Cisco Connect 2018 Philippines - The workplace of the future
NetworkCollaborators
 

Recently uploaded (20)

PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PDF
Beyond Automation: The Role of IoT Sensor Integration in Next-Gen Industries
Rejig Digital
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
Doc9.....................................
SofiaCollazos
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
Software Development Company | KodekX
KodekX
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
This slide provides an overview Technology
mineshkharadi333
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PPTX
IoT Sensor Integration 2025 Powering Smart Tech and Industrial Automation.pptx
Rejig Digital
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PPTX
Comunidade Salesforce SĂŁo Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira JĂșnior
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
Beyond Automation: The Role of IoT Sensor Integration in Next-Gen Industries
Rejig Digital
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Doc9.....................................
SofiaCollazos
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Software Development Company | KodekX
KodekX
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
This slide provides an overview Technology
mineshkharadi333
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
IoT Sensor Integration 2025 Powering Smart Tech and Industrial Automation.pptx
Rejig Digital
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
Comunidade Salesforce SĂŁo Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira JĂșnior
 

Cisco Connect 2018 Thailand - Cybersecurity strategy an integrated approach khun pichaiwood prabudhanitisarn_cisco

  • 1. Pichaiwood Prabudhanitisarn Cybersecurity Specialist April 2018 Creating an Effective Security Architecture Cybersecurity Strategy An Integrated Approach
  • 2. Last 20 years of security: Got a problem? Buy a Box Firewall
  • 3. Same Old Song and Dance 2000’s Application Control FW/VPN IDS / IPS UTM NAC AV PKI 1980’s 2010’s 1990’s Sandboxing
  • 4. The Existing Security Stack
 Firewall VPN Email Security Web Security DLP SIEM Replacement Box Failover Persistent Threats IDS Firewall 2.0 VPN 2.0 Email Security 2.0 Web Security 2.0 DLP 2.0 SIEM 2.0 Replacement Box 2.0 Failover 2.0 Persistent Threats 2.0 IDS 2.0
  • 5. Why a Security Architecture? Ability to Defend Getting More Complex ‱ Attack Surface Diversity: Growing exponentially due to IoT, SaaS / IaaS, and personal device trends ‱ Threats: Continuous rise in sophistication of attackers combined with rapid evolution of attacker techniques and tools ‱ Detection: Efficacy of classical detection methods eroding ‱ User Behavior: No longer constrained to IT controlled places, apps or devices The Security Effectiveness Gap
  • 6. Process of Attacks Research, and select targets Pair remote access malware with exploits Deliver cyberweapons by email, website and attachments Install payloads to gain persistent access
  • 7. Source: Verizon 2014 Data Breach Investigations Report Time to compromise Time to discovery25% 50% 75% 100% 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 Percent of breaches where time to compromise (orange)/ time to discovery (blue) was days or less Time to Detection 100Industry Days Industry Result
  • 10. Multiple features within the same product Solution Management Multiple products that work together Unified configuration and reporting Functional Integration has to have Layers
  • 11. Event information improves visibility Threat Intelligence speeds time to detection Automated Policy changes allow faster response Contextual Awareness builds granular controls across the network Sharing Data Through Integration
  • 12. Threat Grid Sourcefire 2013 2016 Portcullis OpenDNS Lancope Neohapsis Cloudlock 2014 2015 AMP Everywhere; OpenAppID Talos established Cisco ASA with Firepower Services Integrated Threat Defense Vision; AMP Threat Grid Firepower NGFW unveiled Network as a Sensor and Enforcer Cisco Umbrella SIG Identity Services Engine 2.0 Integration has Driven Cisco’s Portfolio Growth
  • 13. Unified Management Endpoint CloudNetwork Visibility Threat Intelligence - Services Integrated Architectural Approach
  • 14. UTM Network Analytics Advanced Malware Secure Internet Gateway WebW W W Policy and Access Email NGFW/ NGIPS Cloud Access Security Premiere Portfolio in the Industry
  • 15. Functional Integration: Talos Threat Intelligence 221BTotal Threats 1.4M AV Blocks Per Day 2.6M Blocks Per Second 9.9B Total Blocks Per Month 1.5M Malware Samples Per Day 1.8B Spyware Blocks Per Month 8.2B Web Filtering Blocks Per Month 991MWeb + Malware Threats 19.7BThreats Per Day 1B Sender Base Reputation Queries Per Day
  • 16. Shared intelligence Shared contextual awareness Consistent policy enforcement Cisco Firepowerℱ Management Center Functional Integration: Firepower Threat Defense Talos Firepower 4100 Series Firepower 9300 Platform Visibility Radware DDoS Network analysis Email Threats Identity and NAC DNS FirewallURL
  • 17. Application Control WAN Optimization, Traffic Shaping, Content Filtering Security NG Firewall, Client VPN, Site to Site VPN, IDS/IPS Networking NAT/DHCP, 3G/4G Cellular, Static Routing, Link Balancing Functional Integration: Meraki
  • 18. Network ISR/ASR Advanced Malware Umbrella Web W W W ISE Email NGFW/ NGIPS Threat Grid Stealthwatch Event Threat Intel Policy Context Meraki Cloudlock Solution Integration: Cisco Portfolio
  • 19. AMP Threat Intelligence Cloud Windows OS Android Mobile Virtual MAC OS CentOS, Red Hat Linux for servers and datacenters AMP on Web and Email Security Appliances AMP on ASA with Firepowerℱ Services AMP Private Cloud Virtual Appliance AMP on Firepower NGIPS Appliance AMP on Cloud Web Security and Hosted Email CWS/ CTA Threat Grid Malware Analysis + Threat Intelligence AMP on ISR with Firepower Services AMP for Endpoints AMP for Endpoints Remote Endpoints AMP for Endpoints can be launched from Cisco AnyConnectÂź AMP on MerakiÂź MX Solution Integration: Advanced Malware Protection
  • 20. Cisco WSA (Web Security Appliance) External Telemetry (BlueCoat Sec. GW) Cisco CWS (Cloud Web Security) Cisco Cognitive Threat Analytics (CTA) Confirmed Threats Detected Threats Incident Response Threat Alerts HQ STIX / TAXII API CTACTACTA HQ Web Security Gateways Cloud Web Security Gateways Web Access Logs Breach Detection & Advanced Threat Visibility Solution Integration: Web and Endpoint
  • 21. Stealthwatch Campus/DC Switches/WLC Cisco Routers / 3rd Vendor Devices Network Sensors Network Enforcers Policy & Context Sharing NGIPS ISE/ TrustSec NGFW Solution Integration: Network Security
  • 22. Firepower Device Manager Easy management of common security and policy tasks Comprehensive security administration and automation of multiple appliances Firepower Management Center Cisco Defense Orchestrator Centralized cloud-based policy management of multiple deployments On-box Centralized Cloud-based Management Integration: Security Architecture
  • 23. Single interface to manage policy for: ‱ ASA/ ASAv ‱ ASA with Firepowerℱ Services ‱ Cisco Firepowerℱ NGFW ‱ CiscoÂź Web Security Appliance ‱ Cisco Umbrella Management Integration: Cisco Defense Orchestrator
  • 25. Solution Integration: Rapid Threat Containment Automatically Defend Against Threats with Firepower and ISE FMC aggregates and correlates sensor data FMC alerts ISE. ISE then changes the user’s/device’s access policy to suspicious Corporate user downloads file, not knowing it’s actually malicious Based on the new policy, network enforcers automatically restrict access Device is quarantined for remediation or mitigation
  • 26. Endpoint User Opened an email Downloading malware Which stole data Integration in Action: The Attack That visited a website Through the firewall
  • 27. AMP for Endpoints And shares the event information Firepower Management Console Analyzes the file with Threat Grid Blocking the malware retrospectively Protecting the data center Email Security Web Security Integration in Action: Sharing Events Alerts are Snared Between Products Providing Visibility
  • 28. Integration in Action: Sharing Events Alerts are Snared Between Products Providing Visibility
  • 29. Threat Grid Firepower Management Console Data Center Email Security Web Security Shares a policy update with the Identity Services Engine Quarantining the user automatically Integration in Action: Sharing Policy Automatic Response to Threats
  • 30. Integration in Action: Sharing Policy Automatic Response to Threats
  • 31. Firepower Management Console Threat Grid Data Center Email Security Web Security Identity Services Engine AMP for Endpoints Cloud Security Integration in Action: Threat Intelligence Detect Once, Protect Everywhere
  • 32. Firepower Management Console Threat Grid Data Center Email Security Web Security Identity Services Engine AMP for Endpoints Cloud Security Integration in Action: Threat Intelligence Profiling what users and devices are really on the network
  • 33. Integration in Action: Sharing Context Profiling What Users and Devices are Really on the Network
  • 36. 100 percent focused Cisco Security initiatives Real integration benefit across portfolio Coordinate support with key partners Host community supported code Identify candidates for deeper integration Cisco Solution Partner Program (SPP) DevNet Cisco Security Technical Alliance Program Firepower ISE Threat Grid FP9300 Content ASA AnyConnect OpenDNS pxGrid Stealthwatch Fore more information go to http://www.cisco.com/go/csta 3rd Party Integration: CSTA Cisco Security Technical Alliance
  • 37. ‱ eStreamer API ‱ Send Firepower event data to SIEMs ‱ Host Input API ‱ Collect vulnerability and other other host info ‱ Remediation API ‱ Programmatic response to third parties from FireSIGHT ‱ JDBC Database Access API ‱ Supports queries from other applications ‱ Read/Write API for Firepower ‱ Supports FW and Risk Management technologies ‱ Threat Intelligence Director ‱ Collect, correlate, take action on third party Threat Intelligence ‱ Management API for ASA ‱ Third party management of ASA, policy auditing ‱ pxGrid ‱ Bi-directional context sharing framework for ISE, ecosystem partners ‱ MDM API ‱ Enables 3rd party MDM partners to make mobile device posture part of ISE access policy ‱ External Restful Services (ERS) ‱ Adds 3rd party asset data to ISE inventory database ‱ AMP Cloud-based API ‱ Externalize event data for all 3rd party apps ‱ Ingest threat data from third parties ‱ Threat Grid API ‱ Hand off suspicious files for analysis ‱ Queries entire dataset for correlation or historical/geographic significance ‱ Automate submission of files for analysis ‱ Create custom or batch threat feeds ‱ FirePOWER 9300 (SSP) REST API ‱ Cisco and third party applications in service chain configuration ‱ AnyConnect Network Visibility Module Collection ‱ AnyConnect provides IPFIX data ‱ AnyConnect EDM/MDM ‱ VPN Services ‱ OpenDNS Investigate ‱ Query OpenDNS for threat intelligence ‱ OpenDNS Umbrella ‱ Add addresses to customer specific enforcement ‱ CloudLock Enterprise API ‱ Reporting/Management ‱ CloudLock Development APIs ‱ Access micro-services ‱ Other Integration Points ‱ ESA, WSA 3rd Party Integration: Open Standard API’s
  • 38. EDM/MDM Endpoint and Custom Detection Forensics and IR Other SIEM & Analytics NPM/APM and Visualization IAM/SSO Threat IntelligenceCASB UEBA Firewall and Policy Management Deception Orchestration Vulnerability Management 3rd Party Integration: Ecosystem Partners
  • 39. Services Brings it All Together
  • 40. Advisory ‱ Custom Threat Intelligence ‱ Cybersecurity Assessments Integration ‱ Integration Services ‱ Security Optimization Services Managed ‱ Managed Threat Defense ‱ Remote Managed Services Cisco Security Services
  • 41. Effective Security Needs to be Simple Security built into the network and designed to work together 1 2 3 Open Integrate across the Cisco portfolio and 3rd party products Automated Instantaneous remediation reduce time to detection save time and money
  • 42. VS. *Source Cisco Midyear Security Report, 2016 Industry Days 100 Cisco Hours ~13 Integrate Automate: Reduce Time to Detection