Contraception JUNIOR/SENIOR HEALTH PERIODS 2 & 5- MR. HAMILL.
Your Time Is Now - · PDF file- One slug pistol, in a sock ... Olga Komova Alleged amount...
Transcript of Your Time Is Now - · PDF file- One slug pistol, in a sock ... Olga Komova Alleged amount...
Cisco Confidential© 2016 Cisco and/or its affiliates. All rights reserved. 2
Cloud SecurityRodney HamillGeneral Manager – Cloud and Service Provider Channels
December 2016
@rodneyhamill
Cisco Confidential 4© 2016 Cisco and/or its affiliates. All rights reserved.
Wellington Chubb Robbery 2000- Crew of 6- 7 months of meticulous planning, surveillance
and dry runs- Chubb lookalike security uniforms- Council worker uniforms- Weapons:
- One slug pistol, in a sock- One crowbar- One ornately carved wooden Maori club. - Abseiling harnesses and ropes.
$940,404
Cisco Confidential 5© 2016 Cisco and/or its affiliates. All rights reserved.
Olga Komova
Alleged amount $28,000,000 (US)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6Cisco ConfidentialCisco Confidential© 20136 Cisco and/or its affiliates. All rights reserved. 6
“ On average, 51 Distributed denial-of-service attacks are investigated per day by one of New Zealand’
largest telecommunication companies.”
“Cybercrime in 2015 cost the New Zealand economy $257m and impacted 856,000 New Zealanders.”
HON AMY ADAMS MPMinister of Justice Minister for Courts
Minister of Broadcasting, and Minister for Communications.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
”The Treacherous Twelve”
1. Data Breaches
2. Weak Identity, Credential and Access Management3. Insecure API’s4. System and Application Vulnerabilities 5.Account Hijacking
6. Malicious Insiders
7. Data Loss
9. Insufficient Due Diligence
10. Abuse and Nefarious Use of Cloud Services
11. Denial of Service
12. Shared Technology Issues
6. Advanced Persistent Threats
Cloud Computing Top Threats in 2016
Source: https://cloudsecurityalliance.org/
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
80%Employees use software
not cleared by IT.
Study by Stratecast and Frost & Sullivan
83%IT Staff admit to using
unsanctioned software & services.
8%Enterprises understand impact of Shadow IT.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
15-25X more cloud
services purchased without
IT involvement
Shadow IT—Worse Than IT Thinks!
91Customer estimates:
Average number of cloud services used by their
organization
1,220Average cloud services
actually discovered (112% growth
year-over-year)
www.cisco.com/go/cloudconsumptionJanuary 2016
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
“The new King makers”
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
30,000+ Application Developers.
More Software Developers Than Google, and More Technologists Than Microsoft…
7200+ Apps. 32 Data Centers.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Application Evolution
Bare Metal / Virtual
DatabaseWebServers
AppServers
Physical Infrastructure
App App App
Service Orientated
WebServers
AppServersDatabaseApp
Cloud-Native
App ServiceServiceApp App
.rb .py .go Java
Runtime Micro-services on Containers
Monolithic
Physical Infrastructure
Enterprise Bus
Public Cloud
SaaS
Local
Service
Service
Service
Service
Service Orientated Micro services
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Users/Accounts Data
Same Best Practices, New Control Points
Applications
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
GovernanceAnd
Control
Top steps for secure cloud
Know Your
Network
SecureData
Storage
people, roles and
identities
Ensure Proper governance and
control
Know your network and
apps
Audit network flows to
understand what is
happening
Enforce your privacy policies
Ensure Cloud Networks are
secure
Data in motion
Ensure Data is encrypted
Data on rest
Manage people, roles and identities
Single Sign on with Cloud
Providers
Protect your users at the
edge
Many users will access
SaaS services
direct
Know your provider,
their security and audit
features UI and API
interaction
Privacy Policy
Secure Data
Networks
Protect your users
Know Your
Provider
Stealthwatch
Cisco TetrationAnalytics
Cisco Umbrella
Cisco ONE Enterprise Cloud
SuiteCisco DNA
In the Cloud e.g on AWS
CSR1kASA, NGFW
Cisco DNACisco ONE
Enterprise Cloud Suite
Stealthwatch
Cisco TetrationAnalytics