Towards Effective Security - AFCEASource: Cisco Annual Security Report, 2016 100 VS. Less than DAYS...

Post on 14-Jul-2020

0 views 0 download

Transcript of Towards Effective Security - AFCEASource: Cisco Annual Security Report, 2016 100 VS. Less than DAYS...

Martin Roesch

Vice President and Chief Architect, Cisco Security Business Group

April 22, 2016

AFCEA Defensive Cyber Operations Symposium

Towards Effective Security

Security Perspective

2

The Problem is THREATS

The Global Hacker Economy is

3x to 5x the size of the security industry.

Industrialization of Hacking.

Source: Center for Strategic and International Studies, 2014

Cisco ASR 2016 Findings: Attack Awareness Fades Confidence

59% confident in having the latest technology

51% have strong confidence in ability to detect a security weakness in advance

54% have strong confidence in ability to defend against attacks

45% have strong confidence in ability to scope and contain an attack

54% have strong confidence in ability to verify an attack

56% review security policies on a regular basis

-5% 0% -4%

-1% +0% +0%

If you knew you

were going to be

compromised,

would you do

security differently?

Source: Cisco Annual Security Report, 2016

Less than 100 VS. DAYS

Industry Cisco

Timeliness Counts

1 Day

Reduced Time to Detection

No Customer is an Island World-Class Threat Research

19.7B Threats Per Day

1.4M

1.1M

1.8B

1B

8.2B

Incoming Malware

Samples Per Day Sender Base

Reputation Queries

Per Day

Web Filtering

Blocks Per Month

AV Blocks

Per Day

Spyware Blocks

Per Month

260+ Threat Researchers

100 TB Threat Intelligence

The Threat-Centric Security Model

Visibility and Context

Firewall

App Control

VPN

Patch Mgmt

Vuln Mgmt

IAM/NAC

IPS

Antivirus

Email/Web

IDS

FPC

Forensics

AMD

Log Mgmt

SIEM

Attack Continuum

Discover Enforce Harden

Detect Block

Defend

Scope Contain

Remediate

The Threat-Centric Security Model

Attack Continuum

Network Endpoint Mobile Virtual Cloud

Point in Time Continuous

Discover Enforce Harden

Detect Block

Defend

Scope Contain

Remediate

THE STATE OF SECURITY

The Security

Effectiveness Gap Incremental Capability

Mountains of Complexity

The Security Effectiveness Gap Goal for Effective Security

Integration

Effective Security Requires

Consolidation Automation

Faster Time to Detection, Faster Time to Remediate

Cisco Confidential

Integrated Threat Defense Architecture

Visibility Control Intelligence Context

Integrated Threat Defense: Future Direction Visibility, Analytics, and Automation to Simplify and Increase Security Efficacy

Integrated

Management Visibility

Real-time map of the operational environment

API

Config Impact IOC Apps… Apps/Automation

Te

lem

etr

y Inte

llige

nce

Global

Intelligence

Control

Broker access between users, applications, data, devices

Threat

Defeat known Threats

Breach

Scope, Contain, Remediate

Before After During

API

Simplicity at Scale