© 2010 Cisco Systems, Inc. All Rights Reserved. Cisco Public 1 2010 2011 2012 2013

© 2010 Cisco Systems, Inc. All Rights Reserved. Cisco Public 1 2010 2011 2012 2013

© 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 1 2010 2011 2012 2013 Who Moved My Cheese? Whyyyy The Security Industry Has Been Turned Upside Down Down Upside Upside John N. Stewart [email protected] Vice President Chief Security Officer FIRST Conference 2010 © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 2 Challenge Questions… © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 3 What is our adversary thinking… right… now… ? © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 4 5 6 Significant Security Challenge Transitions Cloud Virtualization Information Collaboration Application Security s kk Applications and Databases Ris Endpoint Security Mobility and Access Perimeter Security DtDatacen ter Cen titric Time DSTA 043010 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 7 Global Flow of Information 5 Exabytes 21 Exabytes 56 Exabytes per month per month per month 1.4 Billion DVDs 4.8 Billion DVDs 12.8 Billion DVDs crossing the Network crossing the Network crossing the Network Source: Cisco Visual Networking Index © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 8 Video Will Dominate the Information Flow Global Consumer Internet Traffic (Annual) 486 Exa by tes Video Traffic 180 Exabytes 91% ofllf all Consumer Internet Traffic will be Video 36 Exabytes in 2013 Source: Cisco Visual Networking Index © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 9 World of Connected Devices Total 500 Million Total 35 Billion Total 1 Trillion 1/10th of a Device per 5 Devices per 140 Devices per Person on Earth Person on Earth Person on Earth Source: Forrester Research, Cisco © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 10 World of Applications TOTAL iPHONE APPS MOBILE APPS APPS ALONE WORLDWIDE Source: Apple, Windows Mobile, Cisco Analysis (Forecast of 2013 assuming consistent growth trends) © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 11 Increase in Security Threats 624, 000 2, 600, 000 5, 700, 000 (projected) Source: Symantec and Cisco Analysis © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 12 And Beyond… PEOPLE TO PEOPLE THINGS TO THINGS High-Bandwidth Pipes Low-Bandwidth and Low-Power Rich/Real-Time Interaction Wireless Sensors Everywhere Enabling Media Experiences Non-Stop Flow of Data “SmartGrid is the “Video is the killer app” anc ho r use case” Business Internet Consumer Internet Industrial Internet © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 13 14 Asymmetric Problems in Assurance… Expensive To Protect, Trivial To Shake Confidence . WdWe spend an amaz ing amount protecting, and it is trivial to circumvent . Complexity is the enemy, and the opportunity . Our adversaries use our practice against us, especially when it is fixed © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 15 Technology Integration Is Complex Virus Scanning - Host & Server Vulnerability Scan Risk Management Physical Security Alerts SitSecurity Network Intrusion Compliance Protection Validation Unintentional Virus Loss Anomaly Detection Outbreak Access Control & &Miti& Mitiga tion Theft Video Surveillance DDoS Event Logging Endpoint Application Security Vulnerability Router/Switch Assessment One-Time Security Token Software Loss of Website Confidentiality Defacement Facility VPN Management User Transaction Firewall Security Manage m en t Application Multifunction Optimization Security Identity Application Management Security © 2010 Cisco Systems, Inc. All rights reserved. Cisco PublicEncryption Software 16 40,000 Routers on Cisco’ ssnetwork network © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 17 Network Layers are Complex © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 18 Hosts are Complex © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 19 Data is Complex 2,000,000 Higgyhly tuned IDS alerts per da y © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 20 “Traditional” Practice Is Losing Effectiveness www.shadowserver.org/ 14 June 2010 ~10 million new hashed binaries in 2010 to date; ~70 million total seen © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 21 Where we are good is not what we need Areas of Strength Today: Network and Device Security CSA Credent Device Security Altiris AV Application and Audit Audit Platf orm S ecurit y Service Security XML GW XML GW Data Security Email Encryption PGP NtNetwor k and Logging Logging Monitoring AD LDAP System Management Logging Logging Alerting Netwo rk Se rvices Cisco Network FW IDS DLP VPN …. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 22 Web Security – The Data Malicious Transactions Blocked . 600,000+ including: Malware downloads Browser hijacking software Unwanted advertisement software Botnet check-ins Troj(bkd)jan (backdoor) connec tions . Average response to client = 1.4 seconds . Average daily log data = 9Gb . Average a llowe d we b transac tions passe d = 500K/60 m inu tes Top 10 Blocked Web-based Top Malware Threats blocked Top 10 Blocked Domains Reputation Scoring © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 23 And Data is Moving Measure Manage Secure SlScale Sec Arch 061710 © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24 © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 25 The best way to predict the future is to invent it. --Alan Kay © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 26 Ask The Right Questions You Get What You Measure, No Matter What Always question what you are doing – some things have declining investment and results Stop asking for best practices – start asking “what’s effective and how effective is it?” What can I see, what don’t I know, how will I know it when I need to? What can I shamelessly copy from someone else? © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 27 See, Don’t Feel – Analyze Data Removes Emotion Understanding / Strategy / Hosting Net Team SecOps Others Action Information Event / Behavior Network Analysis System Analysis Correlation Security Vendor Others Identity Geo Proximity Homegrown Location Apps Data Sensor SCADA Others Logs “I have a series of questions, and the data gives the answers” ~ or ~ “I don’t know the questions yet; let’s look at the data” © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 28 A Trend is Emerging… Trusted System or Service Trusted Platform Software Supply Chain Independent • Authentication Assurance Security Product • Trojan Prevention • Threat Modeling • Preferred Suppliers CtifitiCertification • Strong Identity • Identity Assurance • Secure Logistics • Standards-Based • Secure Storage • Safe Libraries • Mutually Recognized • Monitoring • Run-Time Defenses • Hardware Assurance • Static Analysis • Security Defect Triage and Resolution • Compliance and Vulnerability Testing © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 29 My Responses The Hard Work… Has Just Begun Manual Automated Borders Everywhere Unknown Known/Assured © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 30 Enterprise Security Architecture Framework Alternate “Trusted Device Identity Storage Device Security Devices” & Access Platforms External Audit Inspection e ent Application and Personaent Mgmt Functionality Vehicles Platform c c m m m Service Security m Strong Orchestration Data Security Authentication Engines Classification ernan nage nage v Reggyulatory Data-Centricv a a a Data-Centrica Data Security Identity “Awareness” Policy Service Catalog Policy Cross-Product Library/Filters vice M ata Go Access Controlntity M Location rr NkNetwork and ee Data/Svc Contexting DD System Mgmnt Common Tracking Id Admin ExternalSe Framework Provisioning Cross-Product Capabilities Policy Engines IEN Policy Network Cisco Network Data “Tagging” Capabilities Enforcement Services © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 31 High-Level Targets Identity Management • Service opportunity for BUs • STBU SAML exploration • WebEx identityyp service concept • External identity architecture • External identity SOR • Standards for identity “realms” Data Governance • Explore encryption gateway • SSBU DLP capabilities • PMBU policy enhancements • External compliance effort • Introduce inspection capabilities Service Management • Update policy, RFIs, SLAs, SOWs • ACS/Positron integration (policy management) • NMTG data tagging/CMS integration • Security product integration with service mgmt • Develop portfolio of “Just Good Enoughs” (JGE) • Data model enhancements • Introduce regulatory capture © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 32 Future Client Platform Environment • Compliance • Management • Enforcement • Remediation Trusted layer Managed Platform Virtualized Environment Network Environment © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 33 Key Takeaways . Conclusions This Phase is Different Big changes are having a profound aaectosecutyffect on security “Know thyself” - attain a high degree of situational awareness Ask the right questions to get the right answers Look to the data to point the way © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 34 More Information Security Education Security Intelligence Operations www.cisco.com/go/securityeducation www.cisco . com/security Security Blog blogs.cisco.com/security 2009 Security Annual Report www.cisco.com/go/securityreport © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 35 © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 36.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    36 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us