View
0
Download
0
Category
Preview:
Citation preview
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved.
Jiří Devát, generální ředitel
Cisco Systems
Praha, 4. února 2014
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
• Bezpečnostní hrozby a zranitelnost nejvyšší od roku 2000
• 95% velkých společností se stalo cílem zákeřných útoků
• 100% podnikových sítí zaznamenalo interakci s malware
• DDoS útoky narostly v objemu i závažnosti
• Celosvětově nedostatek více než 1 000 000 bezpečnostních profesionálů
• 95% veškerého mobilního malware míří na zařízení se systémem Android
Cisco Confidential 4 © 2010 Cisco and/or its affiliates. All rights reserved.
Riziko
malware
záznamů
podle odvětví,
2013
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Cisco Confidential 6 © 2010 Cisco and/or its affiliates. All rights reserved.
Stolní počítače
Mobilita BYOD
Internet věcí
Internet of Everything
200 mil
10 mld
50 mld
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
• V České republice od roku 2001
• 73 Cisco Networking Academies, 31 tisíc studentů
• Nový Cyber Security program připravovaný ve spolupráci s Univerzitou obrany
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Vývoj produktů
Partnerství
Vzdělávání
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Cisco Confidential 15 © 2010 Cisco and/or its affiliates. All rights reserved.
Indicators of
Compromise
By Type
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Cisco Confidential 17 © 2010 Cisco and/or its affiliates. All rights reserved.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
• Organizations need to come to an agreement as to what is most important from a cybersecurity perspective
• Organizations need to examine their security model holistically and gain visibility across the entire attack continuum
• Technology vendors must help assure customers that security is a priority in their manufacturing processes—and be prepared to back up those assurances
• NEED BULLET ON TALENT SHORTAGE
Thank you.
Cisco Confidential 21 © 2010 Cisco and/or its affiliates. All rights reserved.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Cisco Confidential 25 © 2010 Cisco and/or its affiliates. All rights reserved.
Top Android
Malware
Families
Observed,
2013
Recommended