SlideShare a Scribd company logo
1© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Ghassan Dreibi
Manager, Business Development
Nov, 2015
CyberSecurity for the Real World
Network as a Sensor
2© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Donald Rumsfeld
Former US Defense Secretary
3© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Organizations are more confident
but increasingly vulnerable
4© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Medical
Devices
State-
sponsored
hacking
CryptoWall
Advanced
Malwares
Phishing
Attacks
EMV Chip
Cards
Automotive
hacking
Mobile
Devices
Industry
Infrastructure
Cloud
Computing
5© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
41%
Beware
Of Directed Cyber
Attacks Were Focused
On Organizations with
fewer than 500
Employees.
Smaller companies are a
vector into the networks of
larger companies
6© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
65% Of Net New Jobs in the
Country Since 1995.
50% Of the U.S. Private
Sector Workforce is
Employed By Small
Business.
Creating Nearly
Protect
Larger companies are
equipped to absorb the cost
of a large security breach.
Smaller companies face
complete devastation upon
suffering a single large
security breach.
7© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
100%
of top 500 companies with
malicious connection
detected
60%
“collected”
in hours
54%
of new
Threats Discovered
after months
8© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
9© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
New surface for threats
10© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Advanced Persistent Threats
11© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Gain access to the Network
12© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Social Medias | PEN Drives | Social Engineering
13© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Suspected VPN connections
14© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Time to reach the target….
15© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Time to be detected….
16© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Security Strategy
17© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Point in
Time
Solution
Fragmented
Complex
Requires additional
management
17© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
18© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Scope
Contain
Remediate
Continuous
Solution
Discover
Enforce
Harden
Detect
Block
Defend
18© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
19© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Advanced Malware Protection
Network Behavior Analysis
NGFW
UTM
NAC + Identity Services
VPN
Firewall
NGIPS
Web Security
Email Security
Continuous
Solution
19© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
20© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Coverage | Automation
More Sensors
More Sensors | Global
Intelligence
Continuous
Solution
20© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
21© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network
Servers
Operating
Systems
Routers
and
Switches
Mobile
Devices
Printers
VoIP
Phones
Virtual
Machines
Client
Applications
Files
Users
Web
Applications
Application
Protocols
Services
Malware
Command
and Control
Servers
Vulnerabilities
NetFlow
Network
Behavior
Processes
22© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
See more …
23© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Reducing the scope of attack
24© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Understand the scope of attack
25© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Better information…Better decision
26© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network
as Sensor
Network as
Enforcer
27© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Performance | Capacity | SLA
28© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Thank You

More Related Content

PDF
Garantice la continuidad de su negocio Damian Prieto
PPTX
New security solutions for next generation of IT
PDF
Cisco Connect 2018 Singapore - The Network Intuitive
PDF
GDPR aneb jak umí Veritas pomoci být v souladu s tímto nařízením
PDF
Cisco Connect 2018 Singapore - Cisco Incident Response Services
PDF
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
PPTX
[Cisco Connect 2018 - Vietnam] Minh dang hcmc_cisco aci_delivering intent for...
PDF
Cisco Connect 2018 Vietnam - cisco aci_delivering intent for data center netw...
Garantice la continuidad de su negocio Damian Prieto
New security solutions for next generation of IT
Cisco Connect 2018 Singapore - The Network Intuitive
GDPR aneb jak umí Veritas pomoci být v souladu s tímto nařízením
Cisco Connect 2018 Singapore - Cisco Incident Response Services
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Minh dang hcmc_cisco aci_delivering intent for...
Cisco Connect 2018 Vietnam - cisco aci_delivering intent for data center netw...

What's hot (19)

PDF
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
PPTX
[Cisco Connect 2018 - Vietnam] Huyen duong hn_cisco aci_delivering intent for...
PDF
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
PPT
Conquest Security Capabilities
PPTX
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
PDF
Cisco Live Cancun Collaboration Press
PDF
Protect your sensitive data against data leaks with Safetica DLP
PPTX
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
PDF
Cisco Connect 2018 Vietnam - data center transformation - vn
PPTX
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
PPTX
NEW - Nos webinar architecture strategy and planning what's your game plan ...
PPTX
Nos webinar architecture strategy and planning what's your game plan fina lv3
PPTX
TEST -- Nos webinar architecture test
PPTX
Nos webinar architecture strategy and planning what's your game plan fina lv3
PDF
Cisco Connect 2018 Singapore - delivering intent for data center networking
PDF
NG EXPERTS Services and Solutions
PDF
Cisco Connect 2018 Singapore - Cisco SD-WAN
PDF
Cisco Connect 2018 Singapore - Cisco CMX
PDF
[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data center
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
[Cisco Connect 2018 - Vietnam] Huyen duong hn_cisco aci_delivering intent for...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Conquest Security Capabilities
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Live Cancun Collaboration Press
Protect your sensitive data against data leaks with Safetica DLP
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
Cisco Connect 2018 Vietnam - data center transformation - vn
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
NEW - Nos webinar architecture strategy and planning what's your game plan ...
Nos webinar architecture strategy and planning what's your game plan fina lv3
TEST -- Nos webinar architecture test
Nos webinar architecture strategy and planning what's your game plan fina lv3
Cisco Connect 2018 Singapore - delivering intent for data center networking
NG EXPERTS Services and Solutions
Cisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco CMX
[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data center
Ad

Similar to Network as a sensor (20)

PDF
Tomorrow Starts Here - Security Everywhere
PPTX
Idc security roadshow may2015 Adrian Aron
PPTX
Cisco Security as a foundation for SP Digitization
PDF
PDF TEST
PPTX
PPT TEST
PPTX
NOS Webinar: Reduce Security Risks to Protect Your Network Final
PDF
Cisco Cybersecurity #10YearChallenge
PPTX
Cisco Live LatAm - Mexico Executive Symposium on Digitization
PPTX
Sntcapril2 decreasenetworkriskwithalertmanagementdraftv2-150417114740-convers...
PPTX
Sntc April 2: Decrease Network Risk with Alert Management Draft v2
PDF
Protegendo sua rede
PDF
Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans...
PDF
Intelligent Cybersecurity for the Real World
PPTX
Top Predictions for the Internet of Everything Era
PDF
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
PDF
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
PDF
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
PDF
PuppetConf 2016: Application Centric Automation with Puppet & Cisco – Farid J...
PPTX
The Future Of Information Technology: Welcome… to the Digital Age
PDF
Brink sanders cisco architecture keynote
Tomorrow Starts Here - Security Everywhere
Idc security roadshow may2015 Adrian Aron
Cisco Security as a foundation for SP Digitization
PDF TEST
PPT TEST
NOS Webinar: Reduce Security Risks to Protect Your Network Final
Cisco Cybersecurity #10YearChallenge
Cisco Live LatAm - Mexico Executive Symposium on Digitization
Sntcapril2 decreasenetworkriskwithalertmanagementdraftv2-150417114740-convers...
Sntc April 2: Decrease Network Risk with Alert Management Draft v2
Protegendo sua rede
Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans...
Intelligent Cybersecurity for the Real World
Top Predictions for the Internet of Everything Era
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
PuppetConf 2016: Application Centric Automation with Puppet & Cisco – Farid J...
The Future Of Information Technology: Welcome… to the Digital Age
Brink sanders cisco architecture keynote
Ad

More from Cisco do Brasil (20)

PDF
Revista Cisco Live ed 25 oficial
PDF
Revista Cisco Live Ed 24
PDF
Revista Cisco Live Ed 23
PDF
Revista Cisco Live Ed 22
PDF
Revista Cisco Live Ed 21
PDF
Revista cisco live ed 20
PDF
O seu DNS está protegido
PDF
Cisco Live Magazine ed 19
PDF
Rio 2016 em Números - Cisco
PDF
Cisco Tetration Analytics
PDF
Revista Cisco Live ed 18
PDF
Brazilian Scenario - Trends and Challenges to keep IT investments
PDF
Cloud Computing: a chave para inovar durante a crise
PDF
Vença o jogo da rede
PDF
Transforme sua rede em um mecanismo de inovação
PDF
5 perguntas para ajudar você a escolher uma rede na nuvem ou no local
PDF
5 principais maneiras de extrair informações da sua rede
PDF
5 motivos para atualizar sua rede
PDF
5 formas de simplificar as operações e economizar seu orçamento
PDF
A transformação digital com a internet de todas as coisas
Revista Cisco Live ed 25 oficial
Revista Cisco Live Ed 24
Revista Cisco Live Ed 23
Revista Cisco Live Ed 22
Revista Cisco Live Ed 21
Revista cisco live ed 20
O seu DNS está protegido
Cisco Live Magazine ed 19
Rio 2016 em Números - Cisco
Cisco Tetration Analytics
Revista Cisco Live ed 18
Brazilian Scenario - Trends and Challenges to keep IT investments
Cloud Computing: a chave para inovar durante a crise
Vença o jogo da rede
Transforme sua rede em um mecanismo de inovação
5 perguntas para ajudar você a escolher uma rede na nuvem ou no local
5 principais maneiras de extrair informações da sua rede
5 motivos para atualizar sua rede
5 formas de simplificar as operações e economizar seu orçamento
A transformação digital com a internet de todas as coisas

Recently uploaded (20)

PDF
Machine learning based COVID-19 study performance prediction
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Big Data Technologies - Introduction.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
MYSQL Presentation for SQL database connectivity
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Advanced IT Governance
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
KodekX | Application Modernization Development
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Machine learning based COVID-19 study performance prediction
Review of recent advances in non-invasive hemoglobin estimation
Big Data Technologies - Introduction.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
MYSQL Presentation for SQL database connectivity
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
cuic standard and advanced reporting.pdf
NewMind AI Monthly Chronicles - July 2025
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
GamePlan Trading System Review: Professional Trader's Honest Take
Understanding_Digital_Forensics_Presentation.pptx
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Advanced IT Governance
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
Advanced methodologies resolving dimensionality complications for autism neur...
KodekX | Application Modernization Development
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...

Network as a sensor

  • 1. 1© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Ghassan Dreibi Manager, Business Development Nov, 2015 CyberSecurity for the Real World Network as a Sensor
  • 2. 2© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Donald Rumsfeld Former US Defense Secretary
  • 3. 3© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Organizations are more confident but increasingly vulnerable
  • 4. 4© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Medical Devices State- sponsored hacking CryptoWall Advanced Malwares Phishing Attacks EMV Chip Cards Automotive hacking Mobile Devices Industry Infrastructure Cloud Computing
  • 5. 5© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41% Beware Of Directed Cyber Attacks Were Focused On Organizations with fewer than 500 Employees. Smaller companies are a vector into the networks of larger companies
  • 6. 6© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65% Of Net New Jobs in the Country Since 1995. 50% Of the U.S. Private Sector Workforce is Employed By Small Business. Creating Nearly Protect Larger companies are equipped to absorb the cost of a large security breach. Smaller companies face complete devastation upon suffering a single large security breach.
  • 7. 7© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 100% of top 500 companies with malicious connection detected 60% “collected” in hours 54% of new Threats Discovered after months
  • 8. 8© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 9. 9© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential New surface for threats
  • 10. 10© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Advanced Persistent Threats
  • 11. 11© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Gain access to the Network
  • 12. 12© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Social Medias | PEN Drives | Social Engineering
  • 13. 13© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Suspected VPN connections
  • 14. 14© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Time to reach the target….
  • 15. 15© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Time to be detected….
  • 16. 16© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Security Strategy
  • 17. 17© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Point in Time Solution Fragmented Complex Requires additional management 17© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 18. 18© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Scope Contain Remediate Continuous Solution Discover Enforce Harden Detect Block Defend 18© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 19. 19© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Advanced Malware Protection Network Behavior Analysis NGFW UTM NAC + Identity Services VPN Firewall NGIPS Web Security Email Security Continuous Solution 19© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 20. 20© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Coverage | Automation More Sensors More Sensors | Global Intelligence Continuous Solution 20© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 21. 21© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Servers Operating Systems Routers and Switches Mobile Devices Printers VoIP Phones Virtual Machines Client Applications Files Users Web Applications Application Protocols Services Malware Command and Control Servers Vulnerabilities NetFlow Network Behavior Processes
  • 22. 22© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential See more …
  • 23. 23© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Reducing the scope of attack
  • 24. 24© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Understand the scope of attack
  • 25. 25© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Better information…Better decision
  • 26. 26© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network as Sensor Network as Enforcer
  • 27. 27© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Performance | Capacity | SLA
  • 28. 28© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Thank You