#CiscoChampion Radio S1|Ep10 Cyber Security
#CiscoChampion Radio is a podcast series by Cisco Champions as technologists, hosted by Cisco’s Amy Lewis (@CommsNinja). This week Chris Young, SVP Security Business Group Cisco, and Bill Carter, Senior Network Engineer and Cisco Champion, talk about Intelligent Cyber Security for the real world.
Listen to the Podcast
How Cisco deals with fragmentation in Security market
Attack-driven model for Security, before, during and after
How Sourcefire acquisition fits in with Cisco Security
Open Source Security around Snort Community
OpenApp ID (application-focused detection language and processing module for Snort)
CommsNinja Poll for the people: do we focus more on personal device security than enterprise level? Discuss.
subnetwork I would say that personal device is driving a lot of change for the security aspects inside the network
LaurenFriedman I live with Fyodor so I focus on Port Scanning!
subnetwork rather than the traditional enterprise focus on border security
saintdle we’ve been trying to go with the theory that all end user devices are compromised, and therefore protect core systems that end user devices connect to
GideonTam I agree with subnetwork, as this is what I see in my organization and what I have been hearing from others.
subnetwork saintdie, I believe your approach is the only way to address things in the future
subnetwork it reminds me a lot of when I worked in education (UNC) years ago, where there was no hardened edge
saintdle its an L not i, haha sounds a bit sadistic otherwise saint-die haha, but yes, there are so many ways users can connect to your systems
saintdle i spent 3 years working in education
GideonTam The BYOD before was only BYO-Laptops, which was easier to be handled by IT. Now the mobile devices (even multiple mobile devices per person)…
GideonTam … are a totally different landscape.
subnetwork lol gotcha saintdLe…
scottm32768 To some degree, I think enterprise border security is pretty much set. Not much going on there and it’s relatively straight forward.
saintdle it was a minefield, especially because of the andriod market in terms of price of devices, but early versions have so many issues.
saintdle yes Scott, the border is defined in the way it needs to be set up to the public interface in a way
scottm32768 The attack vectors are now centered around attacking apps and getting people to helpfully compromise their own device with the promise of flying bigs.
saintdle but saying that i had a customer who messed up this “blueprint” ended up with a hacked PBX system
subnetwork I think the future looks more like every L3 device becomes a security device
scottm32768 pigs, ratehr.
scottm32768 /me fails typing for the day.
saintdle keyboard hacked
saintdle i think we will see a rise of something like microsoft NPS working well again, where devices that need access into more “core systems” need to be….
saintdle ensured they fit a certian level of patches etc
saintdle previously NPS for MS has been more of a headache to implement
scottm32768 Problem with that is it essentially trusts the client to tell the truth.
amyengineer clients wouldn’t lie, would they?
saintdle I think BYOD means we have a responsibility on educating the end user
saintdle a good number of risks can be mitigated by educating the user, dont open emails that you dont expect, i.e off the Tax office
amyengineer educating the user is ideal, but reaching all users can be problematic. Users have varying levels of comprehension as well…
saintdle yes, I dont expect we can hit every user, but some days you have issues, you sit down and you think “did i do everything I could have resonably done…
saintdle to have mitigated this issue”
saintdle obviously its a never ending circle
CommsNinja More questions for Chris? Now is your chance!
saintdle are cisco going to carry on developing miraki’s mobile device management platform that was free previously?
subnetwork one of the concepts that is continually discussed in networking is the model of overlays.
subnetwork Do we see a future where network layer, application specific overlays become a security solution as well?
Billyc5022 good question ^
subnetwork with great complexity, comes great vulernabilities
amyengineer ha! well stated!
saintdle just remove wireless from your building, stop your users accessing your system with their god damn tablets and phones
saintdle I joke I joke
saintdle just to relate to real world, I had a small college in UK that was hacked from venuzela, SQL injection attack via their timetable page on their websit
subnetwork good question!
@gallifreyan I like that question. Asked the BigSwitch guys that one at Interop
subnetwork @amyenginner…you haven’t asked an awesome question yet…you always do…I’m waiting #nopressure
amyengineer he just started talking about my question I was about to send, the internet of everything and security
CommsNinja We are wrapping in 5-7–now is the time for questions
amyengineer didn’t type fast enough
CommsNinja I will unmute everyone in 2 minutes, so you can ask live.
saintdle my worry is about companies running into “future” with technologies, giving all access, without fully understanding the technology,
amyengineer I worry that every manufacturer of any kind of widget is just slapping a NIC on it and calling it a day
CommsNinja Okay, unmuting the audience.
amyengineer my typing was hacked today as well…
GideonTam Haha, amyengineer.
CommsNinja Good Question