Engage virtually to learn more about Cisco Security strategy, hear the latest announcements, see new solutions in action and get answers to your questions from Cisco experts and your peers.
Join Cisco at Gartner Security and Risk Management Summit 2015, June 8-11, at Gaylord National, National Harbor, MD.
Our security experts will be in booth 101 showcasing advanced threat protection solutions and services that reduce complexity while offering unmatched visibility and consistent control.
In addition to stopping by our booth, be sure not to miss:
SPS: "Advanced Strategies for Defending Against Dynamic Attacks" Martin Roesch, Vice President and Chief Architect, Cisco Security Business Group, Tuesday, June 9, 9:15-10 a.m.
Cisco Biker Party, Tuesday, June 9, 6–9 p.m.
Boat Cruise, hosted by Gartner, Wednesday, June 10, 6-9 p.m.
Experienced Cisco security experts and leadership team members will be presenting the following sessions:
Martin Roesch, Vice President and Chief Architect, Cisco Security Business Group
Tuesday, June 9, 9:15-10 a.m. | Potomac B
If you knew you were going to be compromised would you do security differently? To evolve the practice of security requires an integrated approach to threat defense that responds faster to threats by accelerating detection and remediation. Roesch will outline an integrated architectural approach that addresses incidents efficiently, enables visibility, facilitates appropriate actions and supports business growth.
Martin Roesch is vice president and chief architect for Cisco Security Business Group. Roesch is responsible for shaping the technology strategy for the company’s security portfolio and also oversees threat research, including the Talos Security Intelligence and Research group. He joined Cisco through the acquisition of Sourcefire, which he founded in 2001. A respected authority on intrusion prevention, and detection technology and forensics, Roesch is the author and lead developer of the Snort® Intrusion Prevention and Detection System (www.snort.org) which forms the foundation for next-generation IPS.
John E. Ode, Field Product Manager, Cisco Security Business Group
Wednesday, June 10, 1:20 p.m. | Showcase Theater B, Prince George Ballroom
Cisco Advanced Malware Protection (AMP) for endpoints goes beyond point-in-time detection to analyze files and traffic continuously. This capability helps enable retrospective security. You can look back in time and trace processes, file activities, and communications to understand the full extent of an infection, establish root causes, and perform remediation. The result: more effective, efficient, and pervasive protection for your organization.
Bret Hartman, Vice President and Chief Technology Officer, Cisco Security Business Group
Boardroom 1: Monday, June 8, 4:45–5:15 p.m. | Chesapeake 8
Boardroom 2: Tuesday, June 9, 10:45–11:15 a.m. | Chesapeake 9
Boardroom 3: Tuesday, June 9, 5:00–5:30 p.m. | Chesapeake 6
Organizations are now tasked with defending against sophisticated, targeted attacks that can cause significant damage in minutes and take months to discover, contain, and remediate. Defending against these relentless attacks requires a threat-centric and operational approach that makes it easier to act more quickly and facilitate appropriate actions before, during, and after an attack. Bret Hartman will provide an overview of today’s dynamic threat landscape and outline how CISOs and CIOs can protect their environments across the attack continuum.
Jeff Fawcett, Director of Security Strategy and Planning, Cisco
Boardroom 4: Wednesday, June 10, 9:15–9:45 a.m. | Chesapeake 4
Organizations around the world are becoming digital to capitalize on the unprecedented opportunity brought about by the next wave of the Internet: the Internet of Everything (IoE). When people, processes, data, and things are connected, there is an incredible opportunity to promote both efficiency and value. However, securing this connectivity is vital. Your security needs to be as pervasive as the Internet of Everything itself. Security solutions need to work intelligently together, so you can take advantage of the opportunities of IoE while also managing security and risk.
Date: Tuesday, June 9, 2015
Time: 6–9 p.m.
Location: Hospitality Suite, National Harbor 11
Cruise on over to the Cisco Biker Party, where all are welcome to enjoy food, beverages, and a chance to win a new, custom 2014 Softail Slim Harley-Davidson motorcycle with blacked-out trim.
No purchase necessary to enter, but you must be present to win. Void where prohibited or restricted by law. Visit booth 101 to view the complete official rules for the sweepstakes.
Date: Wednesday, June 10, 2015
Location:Boat will depart from National Harbor; guests follow signs from the event venue to the pier.
Cisco will be receiving a small number of invitations. If you are interested in attending, contact your Cisco account manager.
Cisco booth 101 will feature live demonstrations, including:
Cisco Advanced Malware Protection provides protection before, during, and after an attack. Using unified malware analysis, deep threat analytics, continuous monitoring capabilities, and retrospective security, security teams can more quickly detect, track, respond to, and remediate advanced threats in their environment.
This is a demonstration of security services insertion in the ACI fabric to enable on-demand application-based security. It showcases how application admins can enable security templates for the delivery of new applications in the data center and how the security policy is decommissioned with application retirement.
Cisco’s next-generation firewall (NGFW) delivers integrated threat protection across the entire attack continuum: superior visibility of your network and granular application control for before an attack; industry-best threat protection of known and unknown threats for during an attack; and one-of-a-kind attack scoping, containment, and remediation for after any successful attack.
Controlling access with additional context outside and inside the network is critical for meeting compliance objectives in separating of user traffic and enforcing access to sensitive data. Cisco Identity Services Engine (ISE) provides secure access and policy management works with Cisco TrustSec to leverage the network to enforce Software-Defined Segmentation.
Private meetings with Cisco security executives and engineers are available. To confirm a date and time, contact your Cisco Account Manager.
If you require assistance, contact the Cisco Security Event Team at email@example.com.
At Citrix, we measure the value of technology by how it benefits people. It’s about what they need to do and what they need to achieve. This vision inspires us to build mobile workspace solutions that give people new ways to work better with seamless and secure access to the apps, files and services they need on any device, wherever they go.
Elastica started with a simple thought: Cloud services should be secure for businesses and their employees to use confidently, without any blind spots. We embarked on our mission to provide an elegantly simple security operations center for cloud services, the CloudSOC™ solution. Since then we have reimagined cloud security with the application of advanced data science and machine learning to provide a comprehensive, scalable security solutions with elegant visualization.
Lancope, Inc. is a leading provider of network visibility and security intelligence to defend enterprises against today’s top threats. By collecting and analyzing NetFlow, IPFIX and other types of flow data, Lancope’s StealthWatch® System helps organizations quickly detect a wide range of attacks from APTs and DDoS to zero-day malware and insider threats. Through pervasive insight across distributed networks, including mobile, identity and application awareness, Lancope accelerates incident response, improves forensic investigations and reduces enterprise risk. Lancope’s security capabilities are continuously enhanced with threat intelligence from the StealthWatch Labs research team.
LogRhythm, the leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s patented and award-winning platform uniquely unifies next-generation SIEM, log management, network and endpoint forensics, and advanced security analytics
NetIQ is a global enterprise software company that meets today’s hybrid IT demands with solutions for identity and access management, security and data center management. With NetIQ, customers and partners can align technologies and service delivery methods to provide strategic value at the speed of business.
Rapid7 is engineering better security with simple, innovative solutions for IT security's most critical challenges. Our security data and analytics solutions collect, contextualize, correlate, and analyze the security data you need to dramatically reduce threat exposure and detect compromise in real-time. They speed investigations so you can halt threats and clean up systems fast. Plus, our analytics give you the specific information you need to systematically improve security processes within your organization. Unlike traditional vulnerability assessment or incident management, Rapid7's comprehensive data collection, attacker intelligence and user-behavior analytics give you immediate insight into the security state of your assets and users from the endpoint to the cloud.
Splunk Inc. (NASDAQ: SPLK) provides the leading software platform for real-time Operational Intelligence. Splunk® software searches, monitors, analyzes and visualizes machine-generated big data coming from websites, applications, servers, networks, sensors and mobile devices. More than 8,400 organizations use Splunk software to deepen business and customer understanding, mitigate cybersecurity risk, prevent fraud, improve service performance and reduce costs. Splunk products include Splunk® Enterprise, Splunk Cloud™, Splunk Storm®, Hunk®: Splunk Analytics for Hadoop and premium Splunk Apps.
Founded in 2002, Tenable Network Security provides continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance. Relied upon by more than 20,000 organizations around the world, Tenable’s key clients include Fortune Global 500 companies across industries as well as the entire U.S. Department of Defense and many of the world’s leading governments.
Gartner Security & Risk Management Summit 2015 will be held at:
201 Waterfront Street
National Harbor, MD 20745
For more information, visit the Gartner event website: http://www.gartner.com/technology/summits/na/security/
Cisco Security April 2015 Announcements
Explore our video and our portfolio updates below for continuous threat protection against continuous attacks.
Advanced Malware Protection (AMP)
Cisco Advanced Malware Protection gives you the visibility and control to stop malware in its tracks. You get:
Engage with Us
Cisco Experts and your peers are available in the AMP community forum to discuss these announcements and answer your questions.
Endpoint Protection Across Campus
ASA with FirePOWER Services for SMB, Midsize, & Branch Offices
The new ASA models deliver superior threat protection including:
Cisco Midsize Business IT Assessment
Answer a few targeted questions to find out what security solutions are best for your organization.
Midsize Business Solutions Cybersecurity Infographic
Incident Response Services
Cisco Security Incident Response Services for your organization this means:
Incident Response in Action
Make Every Second Count
Engage with Us
Cisco Experts and your peers are available in the Solution Services community forum to discuss these announcements and answer your questions.
At-a-Glance: Incident Response
Security as a Growth Engine
Watch John Chambers discuss the Internet of Everything, how security can be a growth engine and Cisco security innovations protecting companies of all sizes before, during and after attacks.
After watching the video, please register to download our complementary white paper on addressing threats across the full attack continuum.
Thank you to all those who stopped by the Cisco booth, sessions, and special events at RSA Conference 2015, April 20–24, at the Moscone Center in San Francisco, where we showcased threat-centric security solutions that are integrated, pervasive, continuous, and open.
Experienced Cisco security experts, engineers, and partners will be presenting during RSA Conference 2015. Sessions are listed in the following. Additionally, the Cisco security team will be presenting sessions on more than twenty topics in our booth, including breach prevention, detection, response, and remediation; advanced malware protection; threat intelligence; data center security; next-generation firewalls; cloud, email, and web security; annual security report; and much more.
Keynote (now available on-demand):
“Advanced Strategies for Defending Against a New Breed of Attacks”
Martin Roesch, Vice President and Chief Architect, Cisco Security Business Group
Thursday, April 23, 2:40 p.m., South, Room: Live at Esplanade
Business leaders are now tasked with protecting their organizations from the effects of catastrophic attacks that cause significant losses in minutes and take months to discover, contain, and remediate. Roesch will outline strategies to evolve security to include new approaches that address incidents efficiently, enable visibility, facilitate appropriate actions, and support business growth.
Martin Roesch is vice president and chief architect for Cisco Security Business Group. Roesch is responsible for shaping the technology strategy and design of the company’s security portfolio and also oversees threat research, including the Talos Security Intelligence and Research Group. He joined Cisco through the acquisition of Sourcefire, which he founded in 2001. A respected authority on intrusion prevention, and detection technology and forensics, Roesch is the author and lead developer of the Snort Intrusion Prevention and Detection System (www.snort.org) that forms the foundation for Next-Generation Intrusion Prevention Systems (NGIPS).
Roesch has received many awards for his innovation and vision. Most recently, he was selected as one of the Top 25 Disrupters of 2013 by CRN Magazine and one of eWeek's Top 100 Most Influential People in IT.
Watch this session now.
Other Speaking Sessions Presented
|“Incident Response: A Test Pilot’s Perspective”||Steven Ransom-Jones, Senior Consultant for Risk and Advisory Services at Neohapsis (now part of Cisco)||Tuesday, April 21,|
1:10–2:00 p.m., North, Room: 131
|An effective incident response capability is becoming increasingly critical. High-profile breaches and increased oversight both amplify the importance of acting decisively and appropriately when an event occurs. We will review foundational elements of building a mature, adaptable incident response process, embracing complementary approaches used to manage operational risk in real-time.|
|“Cisco’s Security Dojo: Raising the Technical Security Awareness of 20,000+”||Christopher Romeo Chief Security Advocate, Cisco||Tuesday, April 21,|
2:20–3:10 p.m., West, Room: 2022
|More than 20,000 global Cisco employees and contractors improved their knowledge of product security in two years. How? Through creative and humorous technical security training delivered by experts throughout Cisco. The team captured, educated, and entertained a critical engineering audience. We share our “Top Ten Secrets of Success” with advice on how you can build this into your organization.|
|Panel: "From Nonexistent to Gartner's Number-One Security Technology in Three Years: What's a CASB?"||Moderated by Neil MacDonald, VP, Distinguished Analyst and Gartner Fellow Emeritus, Gartner||Tuesday, April 21, 2015, 3:30–4:20 p.m., West, Room: 2014||The rapid adoption of cloud services has led to a new class of security, compliance, and data governance headaches. Enter the cloud access security broker, or CASB. Learn why CASB is a critical security technology in your portfolio. World-renowned IT leaders will describe the cloud risks and opportunities that created the CASB market and will share their real-world experiences deploying a CASB. |
|Peer2Peer Session: “Effective Security Governance in Critical Infrastructure”||Jon Stanford, Principal, Cisco Security Solutions||Wednesday, April 22, 11:30 a.m.–12:20 p.m., West, Room: 3010, P2P-W04C||Today’s threats to critical infrastructure (for example, oil and gas, utilities, manufacturing, chemical) require boards and executives to extend governance into their operational technology (OT) environments. These include control systems and networks with unique requirements and challenges. This session facilitates dialog around the characteristics of effective OT security governance implementation.|
|Panel: “Deconstructing Incident Response”||Moderated by|
Bret Hartman, Vice President and Security CTO, Cisco
|Thursday, April 23, 10:20–11:10 a.m.||Highly visible security breaches have serious consequences for organizations, such as lost revenue and stolen intellectual property. The security industry is improving its effectiveness at collecting and analyzing security telemetry, resulting in better detection rates of malicious attacks. We will explore why breaches occur at an alarming rate despite this progress, and what we should do about it.|
Martin Nystrom, Cisco Managed Threat Defense
Richard George, Senior Advisor for Cyber Security, Johns Hopkins University Applied Physics Lab
Colby Clark, Director of Solutions Architecture, Advanced Cyber Threats, FishNet Security
Martin Brown, Chief Security Futures Architect, BT
|“Making Threat Intelligence Actionable: Recommending Responses with STIX”||David McGrew, Cisco Fellow, Cisco and Jyoti Verma, Technical Leader, Cisco||Thursday, April 23, 11:30 a.m.–12:20 p.m., West, Room: 2009||To accelerate the response to newly detected incidents and new types of threat indicators, we developed ways to express recommended actions in the Structured Threat Information Expression (STIX) language, which can be reviewed and selected by an operator and then executed by a threat defense system. We demonstrate how our extensions provide actionable details to go along with the threat information in STIX and point the way towards better automation.|
|“A Case Study for Building Cybersecurity Policies for Industrial Robots”||Bryce Barnes, IoT Solutions Architect, Manufacturing and Energy, Cisco and Francis Cianfrocca</>, Founder and Chief Executive Officer, Bayshore Networks||Friday, April 24,|
11:20 a.m.–12:10 p.m., West, Room: 3008
|The industrial robot is no longer an isolated system. It is part of a highly integrated and increasingly flexible model, which extends from the production line to private clouds beyond the plant. Robots not only share data, but also function with other robots and systems beyond their local reach. Presenters will look at how to design a multitiered security architecture to meet this challenge.|
Dark Arts Party hosted by Cisco
Music · Food · Drink · Entertainment
For everyone who dropped by, thank you for making the Cisco Dark Arts Party such a memorable evening. To view party photos and tweets, visit our security social media communities:
Cisco booth N3801 featured hardware viewing, a session theater, giveaways, daily raffles, and live demonstrations.
|Control Secure Access with Context: Cisco Identity Services Engine and Cisco ISE Ecosystem Integrations**||With Cisco Identity Services Engine (ISE) 1.3, we will demonstrate simplified secure access for bring-your-own-device (BYOD) programs, including integration with Cisco Meraki Systems Manager for MDM.|
|Threat-Focused Next-Generation Firewall: Cisco ASA with FirePOWER Services**||The new Cisco next-generation firewall delivers integrated threat defense across the entire attack continuum, before, during, and after an attack. It combines the proven Cisco ASA firewall with industry-leading Sourcefire threat and advanced malware protection.|
|Limit the Spread of Threats: Cisco TrustSec Segmentation||Cisco TrustSec technology allows administrators to map business assets and functions directly to contextual access policies. These security policies can be used to segment the extended network, enforce resource usage, dynamically manage and simplify security configurations, and eliminate the need for complex network changes.|
|Edge-to-Core Threat Protection: Cisco FirePOWER Next-Generation IPS**||Threat protection across the entire attack continuum: integrated visibility of your network before an attack, industry-best threat protection during an attack, and scoping and remediation after an attack.|
|Protect Against Blended Attacks and Malware: Cisco Cloud Web Security, Email Security Appliance, and Web Security Appliance**||Cisco security solutions for web and email combine comprehensive defense with superior deployment flexibility to address these two major attack vectors. A combination of Cisco Advanced Malware Protection and cognitive-threat analytics provides detection and threat blocking, and remediation.|
|Advanced Malware Protection: AMP For Networks and Endpoints and Cisco AMP Threat Grid**||Cisco Advanced Malware Protection provides protection before, during, and after an attack. Using unified malware analysis, deep threat analytics, continuous monitoring capabilities, and retrospective security, security teams can more quickly detect, track, respond to, and remediate advanced threats in their environments.|
|Real-Time Threat Monitoring: Cisco Managed Threat Defense Service||Cisco Managed Threat Defense (MTD) is a fully outsourced, managed security service that rapidly detects and responds to known intrusions, zero-day attacks, and advanced persistent threats by using big data analytics, expert staff, and global threat intelligence 24 hours a day, 7 days a week.|
|Hosted Security as a Service: Service Provider Cloud Security Services||The Cisco Hosted Security as a Service (HSS) solution enables service providers to provide cloud-based security services, such as email security, web security, and firewall and VPN services to their customers.|
|Secure Data Center for Cisco ACI: Security and Visibility for the Virtualized Data Center||This demonstration showcases our latest Cisco Secure Data Center Solution for virtualized environments. By combining the Cisco virtualized ASA, FirePOWER NGIPS, and Identity Services Engine appliances with Cisco open APIs--including Cisco pxGrid--this solution provides new levels of visibility to next-generation virtualized data centers, including Cisco Application Centric Infrastructure.|
|Securing Next Gen Data Centers: Cisco ASA and NGIPS for Cisco ACI and Amazon AWS||Securing Cisco ACI Fabric with ASA and NGIPS Security Services: This is a demonstration of security services insertion in the ACI fabric to enable on demand application based security. This will showcase how application administration will enable security templates for the delivery of new applications in the data center and how the security policy decommissioned with application retirement.|
|Building In Trust and Security: Trustworthy Systems||Visibility into technologies, processes, and policies that make Cisco solutions more trustworthy and secure. Trustworthy Systems demos Secure Boot, Simplified Secure Transport, and Trustworthy Cloud as examples of technologies used to secure and assure Cisco products. Mandating Cisco Secure Development Lifecycle and supply chain security along with these technologies, Cisco continually builds assurance and security in all its products and solutions.|
|Advanced Protection Starts Here: Cisco Cyber Threat Defense||Cisco Cyber Threat Defense (CTD) is a Cisco Validated Design that focuses on increasing your resiliency to attack, blocking known threats, and reducing the time to discovery and containment for advanced threats that have penetrated your defenses.|
Private meetings with Cisco security executives and engineers are available. To confirm a date and time, contact your account manager.
If you require assistance, contact the Cisco Security Event Team at firstname.lastname@example.org.
Bayshore (speaking session only)
Bayshore and Cisco are partnering on a speaking session during RSA:
Citrix (S314 South Expo)
Lancope (N4211 North Expo)
Logryhthym (S1207 South Expo)
MobileIron (S2432 South Expo)
NetIQ (S1621 South Expo)
Ping Identity (S1833 South Expo)
Splunk (N3321 North Expo)
Tenable (N3228 North Expo)
Free RSA Explorer expo-only passes are available for Cisco customers with the registration pass code X5SCISCO. This badge includes access to keynote speeches (Wednesday through Friday), sponsor session tracks, exhibit hall (Tuesday through Thursday), briefing center, South Expo Pub Crawl, The Sandbox, and shuttle service. The deadline to redeem is Monday, April 20, 2015.
RSA Conference 2015 will be held at:
747 Howard St
San Francisco, CA 94103
For more information about the location of RSA Conference 2015, including parking, shuttles, and more, visit the RSA website: www.rsaconference.com/events/us15/hotels-venue/directions
Check out the latest on-demand webcasts and live events from Cisco Security.
|On Demand Webcasts||Upcoming Events|
Advanced Malware Protection (AMP)
Advanced Malware Protection and the Sourcefire Acquisition
Learn how to evolve your security strategy to address attacks before, during, and after they occur.
Evaluating Leading Breach Detection Systems
Join Cisco and NSS Labs to learn how breach detection systems compare and how to evaluate them based on your environment.
The Sourcefire Security Advantage
See how to fight back against even the toughest malware threats with help from the latest tools.
> View Now
Explore Cisco Validated Designs for the Secure Data Center
Join this TechWiseTV workshop for an extensive discussion on the critical security solutions available for your data center.
> View Now
All About the Threats: How to Deploy the Industry's First Threat-Focused Next-Generation Firewall
Join view a demo and learn how Cisco is changing the way organizations protect against sophisticated threats with Cisco ASA with FirePOWER Services.
> View Now
Ask Cisco: 2015 Annual Security Report
In this live Q&A, security experts answered your questions about Cisco’s 2015 Annual Security Report.
First Look Cisco 2015 Annual Security Report
Discover how attackers profit from gaps between defender intent and actions.
Five Steps for Securing the Data Center
Learn best practices for integrating security into the data center environment, including a look at the new Secure Data Center Cisco Validated Design
Branch Security Made Simple
Learn how to deploy secure connectivity and comprehensive threat defense in your branches with the Cisco Integrated Services Router (ISR).
April 20-24, 2015
Interop Las Vegas
April 27-May 1, 2015
Dallas: Cisco Security Training
May 6-7, 2015
Washington, DC: Cisco Security Training
May 20-21, 2015
June 2-4, 2015
Toronto, Canada: Cisco Security Training
June 3-4, 2015
Cisco Live US
June 7-11, 2015
Gartner Security and Risk Management US
June 8-21, 2015
RSA Conference Asia Pacific
July 22-24, 2015
Black Hat USA
August 1-6, 2015
Los Angeles: Cisco Security Training
September 16-17, 2015
Chicago: Cisco Security Training
September 30-October 1, 2015
Check out the archives from previous announcements and launches. Watch and engage with us!