Effective Cybersecurity for the Internet of Things (IoT)...Effective Cybersecurity for the Internet...

20
Effective Cybersecurity for the Internet of Things (IoT) Bret Hartman Vice President and Chief Technology Officer, Cisco Security Business Group November 21, 2014

Transcript of Effective Cybersecurity for the Internet of Things (IoT)...Effective Cybersecurity for the Internet...

Page 1: Effective Cybersecurity for the Internet of Things (IoT)...Effective Cybersecurity for the Internet of Things (IoT) Bret Hartman ... Physical Devices and Objects Connected to the Internet

Effective Cybersecurity for the Internet of Things (IoT)

Bret Hartman

Vice President and Chief Technology Officer, Cisco Security Business Group

November 21, 2014

Page 2: Effective Cybersecurity for the Internet of Things (IoT)...Effective Cybersecurity for the Internet of Things (IoT) Bret Hartman ... Physical Devices and Objects Connected to the Internet

Cisco Confidential 2 ©2014 Cisco and/or its affiliates. All rights reserved. CONNECTED THINGS

Page 3: Effective Cybersecurity for the Internet of Things (IoT)...Effective Cybersecurity for the Internet of Things (IoT) Bret Hartman ... Physical Devices and Objects Connected to the Internet

Cisco Confidential 3 ©2014 Cisco and/or its affiliates. All rights reserved.

Security is Foundational to Gain Greater Value from IoE

Networked Connection of People, Process, Data, Things

People Connecting People in More

Relevant, Valuable Ways

Process Delivering the Right Information

to the Right Person (or Machine)

at the Right Time

Data Leveraging Data into

More Useful Information

for Decision Making

Things Physical Devices and Objects

Connected to the Internet and

Each Other for Intelligent

Decision Making

IoE

Page 4: Effective Cybersecurity for the Internet of Things (IoT)...Effective Cybersecurity for the Internet of Things (IoT) Bret Hartman ... Physical Devices and Objects Connected to the Internet

Cisco Confidential 4 ©2014 Cisco and/or its affiliates. All rights reserved.

New Risks Present New Challenges

Changing

Business Models

Dynamic

Threat Landscape

Complexity

& Fragmentation

Cisco Confidential 4 ©2014 Cisco and/or its affiliates. All rights reserved.

Page 5: Effective Cybersecurity for the Internet of Things (IoT)...Effective Cybersecurity for the Internet of Things (IoT) Bret Hartman ... Physical Devices and Objects Connected to the Internet

Cisco Confidential 5 ©2014 Cisco and/or its affiliates. All rights reserved.

Security Policies IT Network IoT Network

Focus Protecting Intellectual

Property and Company Assets

24/7 Operations, High OEE, Safety, and Ease of Use

Implications of a Device Failure

Continues to Operate Could Stop Processes, Impact

Markets, Physical Harm

Threat Protection Shut Down Access to Detected Threat and

Remediate

Potentially Keep Operating with a Detected Threat

Infrastructure Life Cycle

Equipment upgrades and refresh <5 years

Avoid Equipment upgrades (lifespan 15+ years)

New Challenges Require a Shift in Priorities

Page 6: Effective Cybersecurity for the Internet of Things (IoT)...Effective Cybersecurity for the Internet of Things (IoT) Bret Hartman ... Physical Devices and Objects Connected to the Internet

Cisco Confidential 6 ©2014 Cisco and/or its affiliates. All rights reserved.

Enterprise Network

DMZ

Supervisory Network

Control System Network

Web

Server

App Server

SCADA Historian

Database

Historian HMI

IEDs/PLCs

Remote Facility

VPN

Field Network

IEDs/PLCs

Cloud Systems

Internet

The Attack Surface Grows and Evolves in IoT

Threats through

Remote Access

Threats from Infected HMI’s

Threats from Unauthorized Control

Threats from Cloud Services and Internet

Threats from Unauthorized Control Uncontrolled Access

Exfiltration attacks

Page 7: Effective Cybersecurity for the Internet of Things (IoT)...Effective Cybersecurity for the Internet of Things (IoT) Bret Hartman ... Physical Devices and Objects Connected to the Internet

Cisco Confidential 7 ©2014 Cisco and/or its affiliates. All rights reserved.

Threat-Centric Security Approach

BEFORE Discover

Enforce

Harden

AFTER Scope

Contain

Remediate

Attack Continuum

Detect

Block

Defend

DURING

Point in Time Continuous

Endpoint Network Mobile Virtual Cloud

Page 8: Effective Cybersecurity for the Internet of Things (IoT)...Effective Cybersecurity for the Internet of Things (IoT) Bret Hartman ... Physical Devices and Objects Connected to the Internet

Cisco Confidential 8 ©2014 Cisco and/or its affiliates. All rights reserved.

Comprehensive Security Product Portfolio

IPS & NGIPS

• Cisco IPS 4300 Series

• Cisco ASA 5500-X Series integrated IPS

• FirePOWER NGIPS

• FirePOWER NGIPS w/ Application Control

• FirePOWER Virtual NGIPS

NAC + Identity Services

• Cisco Identity Services Engine (ISE)

• Cisco Access Control Server (ACS)

Email Security

• Cisco Email Security Appliance (ESA)

• Cisco Virtual Email Security Appliance (vESA)

• Cisco Cloud Email Security

Web Security

• Cisco Web Security Appliance (WSA)

• Cisco Virtual Web Security Appliance (vWSA)

• Cisco Cloud Web Security

UTM

• Meraki MX

Advanced Malware Protection

• AMP for Networks

• AMP for Endpoints

• AMP for Private Cloud / Virtual Appliance

VPN

• Cisco AnyConnect VPN

Firewall & NGFW

• Cisco ASA 5500-X Series

• Cisco ASA 5500-X w/ NGFW

license

• Cisco ASA 5585-X w/ NGFW

blade

• Cisco ASA with FirePOWER Services

Page 9: Effective Cybersecurity for the Internet of Things (IoT)...Effective Cybersecurity for the Internet of Things (IoT) Bret Hartman ... Physical Devices and Objects Connected to the Internet

Cisco Confidential 9 ©2014 Cisco and/or its affiliates. All rights reserved.

Platform-Based Threat-Focused Visibility-Driven

Strategic Imperatives

Broad Sensor Base,

Context and Automation

Continuous Advanced Threat

Protection, Cloud-Based

Security Intelligence

Agile and Open Platforms,

Built for Scale, Consistent

Control, Management

Endpoint Network Mobile Virtual Cloud

Page 10: Effective Cybersecurity for the Internet of Things (IoT)...Effective Cybersecurity for the Internet of Things (IoT) Bret Hartman ... Physical Devices and Objects Connected to the Internet

Cisco Confidential 10 ©2014 Cisco and/or its affiliates. All rights reserved.

Threat Centric Security at Work

HEARTBLEED

STRING OF PAERLS

SNOWSHOE SPAM

CRYPTOLOCKER

Page 11: Effective Cybersecurity for the Internet of Things (IoT)...Effective Cybersecurity for the Internet of Things (IoT) Bret Hartman ... Physical Devices and Objects Connected to the Internet

Cisco Confidential 11 ©2014 Cisco and/or its affiliates. All rights reserved.

Advanced Malware Protection Everywhere

Dedicated FirePOWER Appliance

Web & Email Security Appliances

Private Cloud

Cloud Based Web Security & Hosted Email

Mac OS X

Virtual Mobile PC

NGIPS /NGFW on FirePOWER

Enterprise

Capabilities

Continuous &

Zero-Day Detection Advanced Analytics

And Correlation

Page 12: Effective Cybersecurity for the Internet of Things (IoT)...Effective Cybersecurity for the Internet of Things (IoT) Bret Hartman ... Physical Devices and Objects Connected to the Internet

Cisco Confidential 12 ©2014 Cisco and/or its affiliates. All rights reserved.

Collective Security Intelligence

Future Security Platforms Will Reduce Complexity and Increase Capability

Centralized Management Appliances, Virtual

Network/DC Control Platform

Appliances, Virtual

Device Control Platform

Host, Mobile, Virtual

Cloud Services Control Platform

Hosted

Page 13: Effective Cybersecurity for the Internet of Things (IoT)...Effective Cybersecurity for the Internet of Things (IoT) Bret Hartman ... Physical Devices and Objects Connected to the Internet

Cisco Confidential 13 ©2014 Cisco and/or its affiliates. All rights reserved.

Cisco ASA with FirePOWER Services Industry’s First Threat-Focused Next-Generation Firewall

Cisco ASA firewalling combined with Sourcefire Next-Generation IPS

Advanced Malware Protection (AMP)

Best-in-class security intelligence, application visibility and control (AVC), and URL filtering

Superior, multilayered threat protection

Unprecedented network visibility

Integrated threat defense across the entire attack continuum

Reduced cost and complexity

Page 14: Effective Cybersecurity for the Internet of Things (IoT)...Effective Cybersecurity for the Internet of Things (IoT) Bret Hartman ... Physical Devices and Objects Connected to the Internet

Cisco Confidential 14 ©2014 Cisco and/or its affiliates. All rights reserved.

How

What

Who

Where

When

Cisco Identity Services Engine (ISE) Delivering the Visibility and Control for Secure Network Access

Network

Partner Context Data

Cisco ISE

Consistent Secure Access Policy

Page 15: Effective Cybersecurity for the Internet of Things (IoT)...Effective Cybersecurity for the Internet of Things (IoT) Bret Hartman ... Physical Devices and Objects Connected to the Internet

Cisco Confidential 15 ©2014 Cisco and/or its affiliates. All rights reserved.

The Security Perimeter in the Cloud

Cloud Connected Network

Collective Security Intelligence

Telemetry Data Threat Research Advanced Analytics

Mobile Router Firewall

Millions Cloud Web Security Users

6GB Web Traffic Examined, Protected Every Hour

75M Unique Hits Every Hour

10M Blocks Enforced Every Hour

The Distributed Perimeter

Page 16: Effective Cybersecurity for the Internet of Things (IoT)...Effective Cybersecurity for the Internet of Things (IoT) Bret Hartman ... Physical Devices and Objects Connected to the Internet

Cisco Confidential 16 ©2014 Cisco and/or its affiliates. All rights reserved.

Provisioning

Simplified Service Chaining

Dynamic Policy Management

Rapid Instantiation

Performance

On Demand Scalability

Increased Clustering Size

Multi-Site Clustering

Protection

Integrated Security and Consistent Policy Enforcement (Physical & Virtual)

Active Monitoring & Comprehensive Diagnostics for Threat Mitigation

Cisco Security Integrated into ACI

Intelligent

Fabric Security

Page 17: Effective Cybersecurity for the Internet of Things (IoT)...Effective Cybersecurity for the Internet of Things (IoT) Bret Hartman ... Physical Devices and Objects Connected to the Internet

Cisco Confidential 17 ©2014 Cisco and/or its affiliates. All rights reserved.

FY15 Security Services

Managed Integration Advisory

Custom Threat Intelligence

Technical Security

Assessments

Integration Services

Security Optimization

Services

Managed Threat Defense

Remote Managed

Services

Page 18: Effective Cybersecurity for the Internet of Things (IoT)...Effective Cybersecurity for the Internet of Things (IoT) Bret Hartman ... Physical Devices and Objects Connected to the Internet

Cisco Confidential 18 ©2014 Cisco and/or its affiliates. All rights reserved.

Conclusion

• IoT advances present new risks and unique cybersecurity challenges

• To address these challenges requires visibility, continuous control and advanced threat protection across the entire attack continuum—before, during and after an attack

• Cisco is focused on delivering cybersecurity advancements to protect all of the interactions of the IoT

Page 19: Effective Cybersecurity for the Internet of Things (IoT)...Effective Cybersecurity for the Internet of Things (IoT) Bret Hartman ... Physical Devices and Objects Connected to the Internet

Cisco Confidential 19 ©2014 Cisco and/or its affiliates. All rights reserved.

Reliable Partner

Proven Innovator

Global Operations

Talent

E2E Security

Top Products

COMPANY TECHNOLOGY OUTCOMES

Your Number One Partner for Security

Page 20: Effective Cybersecurity for the Internet of Things (IoT)...Effective Cybersecurity for the Internet of Things (IoT) Bret Hartman ... Physical Devices and Objects Connected to the Internet

Thank you.