Your Time Is Now - · PDF file- One slug pistol, in a sock ... Olga Komova Alleged amount...

18
Cisco Confidential © 2016 Cisco and/or its affiliates. All rights reserved. 1 Your Time Is Now

Transcript of Your Time Is Now - · PDF file- One slug pistol, in a sock ... Olga Komova Alleged amount...

Cisco Confidential© 2016 Cisco and/or its affiliates. All rights reserved. 1

Your Time Is Now

Cisco Confidential© 2016 Cisco and/or its affiliates. All rights reserved. 2

Cloud SecurityRodney HamillGeneral Manager – Cloud and Service Provider Channels

December 2016

@rodneyhamill

Cisco Confidential 3© 2016 Cisco and/or its affiliates. All rights reserved.

Kevin Polwart

Cisco Confidential 4© 2016 Cisco and/or its affiliates. All rights reserved.

Wellington Chubb Robbery 2000- Crew of 6- 7 months of meticulous planning, surveillance

and dry runs- Chubb lookalike security uniforms- Council worker uniforms- Weapons:

- One slug pistol, in a sock- One crowbar- One ornately carved wooden Maori club. - Abseiling harnesses and ropes.

$940,404

Cisco Confidential 5© 2016 Cisco and/or its affiliates. All rights reserved.

Olga Komova

Alleged amount $28,000,000 (US)

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6Cisco ConfidentialCisco Confidential© 20136 Cisco and/or its affiliates. All rights reserved. 6

“ On average, 51 Distributed denial-of-service attacks are investigated per day by one of New Zealand’

largest telecommunication companies.”

“Cybercrime in 2015 cost the New Zealand economy $257m and impacted 856,000 New Zealanders.”

HON AMY ADAMS MPMinister of Justice Minister for Courts

Minister of Broadcasting, and Minister for Communications.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7

”The Treacherous Twelve”

1. Data Breaches

2. Weak Identity, Credential and Access Management3. Insecure API’s4. System and Application Vulnerabilities 5.Account Hijacking

6. Malicious Insiders

7. Data Loss

9. Insufficient Due Diligence

10. Abuse and Nefarious Use of Cloud Services

11. Denial of Service

12. Shared Technology Issues

6. Advanced Persistent Threats

Cloud Computing Top Threats in 2016

Source: https://cloudsecurityalliance.org/

Cisco ConfidentialCisco Confidential© 2016 Cisco and/or its affiliates. All rights reserved. 8

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9

80%Employees use software

not cleared by IT.

Study by Stratecast and Frost & Sullivan

83%IT Staff admit to using

unsanctioned software & services.

8%Enterprises understand impact of Shadow IT.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10

15-25X more cloud

services purchased without

IT involvement

Shadow IT—Worse Than IT Thinks!

91Customer estimates:

Average number of cloud services used by their

organization

1,220Average cloud services

actually discovered (112% growth

year-over-year)

www.cisco.com/go/cloudconsumptionJanuary 2016

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11

“The new King makers”

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12

30,000+ Application Developers.

More Software Developers Than Google, and More Technologists Than Microsoft…

7200+ Apps. 32 Data Centers.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13

Application Evolution

Bare Metal / Virtual

DatabaseWebServers

AppServers

Physical Infrastructure

App App App

Service Orientated

WebServers

AppServersDatabaseApp

Cloud-Native

App ServiceServiceApp App

.rb .py .go Java

Runtime Micro-services on Containers

Monolithic

Physical Infrastructure

Enterprise Bus

Public Cloud

SaaS

Local

Service

Service

Service

Service

Service Orientated Micro services

Cisco Confidential 14© 2016 Cisco and/or its affiliates. All rights reserved.

So, what can you do?

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15

Users/Accounts Data

Same Best Practices, New Control Points

Applications

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16

GovernanceAnd

Control

Top steps for secure cloud

Know Your

Network

SecureData

Storage

people, roles and

identities

Ensure Proper governance and

control

Know your network and

apps

Audit network flows to

understand what is

happening

Enforce your privacy policies

Ensure Cloud Networks are

secure

Data in motion

Ensure Data is encrypted

Data on rest

Manage people, roles and identities

Single Sign on with Cloud

Providers

Protect your users at the

edge

Many users will access

SaaS services

direct

Know your provider,

their security and audit

features UI and API

interaction

Privacy Policy

Secure Data

Networks

Protect your users

Know Your

Provider

Stealthwatch

Cisco TetrationAnalytics

Cisco Umbrella

Cisco ONE Enterprise Cloud

SuiteCisco DNA

In the Cloud e.g on AWS

CSR1kASA, NGFW

Cisco DNACisco ONE

Enterprise Cloud Suite

Stealthwatch

Cisco TetrationAnalytics

Thank you.

Cisco Confidential© 2016 Cisco and/or its affiliates. All rights reserved. 18

Your Time Is Now