Зарегистрируйтесь сейчас для лучшей персонализированной цитаты!

#CiscoChampion Radio S1|Ep10 Cyber Security

Apr, 29, 2014 Hi-network.com

#CiscoChampion Radio is a podcast series by Cisco Champions as technologists, hosted by Cisco's Amy Lewis (@CommsNinja). This week Chris Young, SVP Security Business Group Cisco, and Bill Carter, Senior Network Engineer and Cisco Champion, talk about Intelligent Cyber Security for the real world.

Listento the Podcast

Cisco Subject Matter Expert:Chris Young, SVP Security Business Group Cisco (@YoungDChris)
Cisco Champion:Bill Carter, Senior Network Engineer (@billyc5022)

Highlights:
How Cisco deals with fragmentation in Security market
Attack-driven model for Security, before, during and after
How Sourcefire acquisition fits in with Cisco Security
Open Source Security around Snort Community
OpenApp ID (application-focused detection language and processing module for Snort)

Transcripts:
CommsNinjaPoll for the people: do we focus more on personal device security than enterprise level? Discuss.
subnetworkI would say that personal device is driving a lot of change for the security aspects inside the network
LaurenFriedmanI live with Fyodor so I focus on Port Scanning!
subnetworkrather than the traditional enterprise focus on border security
saintdlewe've been trying to go with the theory that all end user devices are compromised, and therefore protect core systems that end user devices connect to
GideonTamI agree with subnetwork, as this is what I see in my organization and what I have been hearing from others.
subnetworksaintdie, I believe your approach is the only way to address things in the future
subnetworkit reminds me a lot of when I worked in education (UNC) years ago, where there was no hardened edge
saintdleits an L not i, haha sounds a bit sadistic otherwise saint-die haha, but yes, there are so many ways users can connect to your systems
saintdlei spent 3 years working in education
GideonTamThe BYOD before was only BYO-Laptops, which was easier to be handled by IT. Now the mobile devices (even multiple mobile devices per person)...
GideonTam... are a totally different landscape.
subnetworklol gotcha saintdLe...
scottm32768To some degree, I think enterprise border security is pretty much set. Not much going on there and it's relatively straight forward.
saintdleit was a minefield, especially because of the andriod market in terms of price of devices, but early versions have so many issues.
saintdleyes Scott, the border is defined in the way it needs to be set up to the public interface in a way
scottm32768The attack vectors are now centered around attacking apps and getting people to helpfully compromise their own device with the promise of flying bigs.
saintdlebut saying that i had a customer who messed up this "blueprint" ended up with a hacked PBX system
subnetworkI think the future looks more like every L3 device becomes a security device
scottm32768pigs, ratehr.
scottm32768/me fails typing for the day.
saintdlekeyboard hacked
saintdlei think we will see a rise of something like microsoft NPS working well again, where devices that need access into more "core systems" need to be....
saintdleensured they fit a certian level of patches etc
saintdlepreviously NPS for MS has been more of a headache to implement
scottm32768Problem with that is it essentially trusts the client to tell the truth.
amyengineerclients wouldn't lie, would they?
saintdleI think BYOD means we have a responsibility on educating the end user
saintdlea good number of risks can be mitigated by educating the user, dont open emails that you dont expect, i.e off the Tax office
amyengineereducating the user is ideal, but reaching all users can be problematic. Users have varying levels of comprehension as well...
scottm32768amen
saintdleyes, I dont expect we can hit every user, but some days you have issues, you sit down and you think "did i do everything I could have resonably done...
saintdleto have mitigated this issue"
saintdleobviously its a never ending circle
CommsNinjaMore questions for Chris? Now is your chance!
saintdleare cisco going to carry on developing miraki's mobile device management platform that was free previously?
subnetworkone of the concepts that is continually discussed in networking is the model of overlays.
subnetworkDo we see a future where network layer, application specific overlays become a security solution as well?
Billyc5022good question ^
subnetworkwith great complexity, comes great vulernabilities
amyengineerha! well stated!
saintdlejust remove wireless from your building,  stop your users accessing your system with their god damn tablets and phones
saintdleI joke I joke
saintdlejust to relate to real world, I had a small college in UK that was hacked from venuzela, SQL injection attack via their timetable page on their websit
subnetworkgood question!
saintdlewebsite*
@gallifreyanI like that question. Asked the BigSwitch guys that one at Interop
subnetwork@amyenginner...you haven't asked an awesome question yet...you always do...I'm waiting#nopressure
amyengineerhe just started talking about my question I was about to send, the internet of everything and security
CommsNinjaWe are wrapping in 5-7-now is the time for questions
amyengineerdidn't type fast enough
CommsNinjaI will unmute everyone in 2 minutes, so you can ask live.
saintdlemy worry is about companies running into "future" with technologies, giving all access, without fully understanding the technology,
amyengineerI worry that every manufacturer of any kind of widget is just slapping a NIC on it and calling it a day
amyengineerdav=day
CommsNinjaOkay, unmuting the audience.
amyengineermy typing was hacked today as well...
GideonTamHaha, amyengineer.
CommsNinjaGood Question


tag-icon Горячие метки: Cisco Security #CiscoChampionRadio Sourcefire Snort Chris Young

Copyright © 2014-2024 Hi-Network.com | HAILIAN TECHNOLOGY CO., LIMITED | All Rights Reserved.