Infosecurity Europe 2015

Cisco Live: Security Everywhere

Discover the latest in threat protection and visibility for your business.

  • Date: Tuesday, June 2 – 
    Thursday, June 4
  • Location: Olympia London
    United Kingdom
  • Duration: Full day
  • Attendance: In Person
▲ Back to Top

Thank You

Infosecurity Europe 2015

Thank you for visiting Cisco at Infosecurity Europe 2015. We hope you were able to attend Strategy and Tech Talks, experience demonstrations, and talk to Cisco Security solutions experts about Cisco Threat-Centric Security Solutions.

To learn more about how to make security a growth engine and uncover new business opportunities with security everywhere, download a report.

Join Cisco Security Community and stay informed about new product announcements, upcoming industry events and live webcasts. Learn more.

▲ Back to Top

Cisco Speakers

Cisco Speakers

Terry Greer-King

Technology Is Not Enough: Full Security Relies on Processes and People

Terry Greer-King, Director, Cyber Security, Cisco

Date: June 3, 2015
Time: 3:20 p.m. – 3:45 p.m.

The conundrum today is how to empower employees to perform at their best in a digital world while simultaneously protecting the organization from ever more sophisticated, organized, and persistent threats. Many employees are complacent when it comes to security, yet they are in fact a crucial part of the solution. This talk will examine implementing a business process approach to security and how to shift toward a more behavior-centric approach.

View the presentation

Tech Talks sponsored by Cisco

Phil Wood

Minimising the Damage Caused by Malware When Infection is Inevitable

Phil Wood

Date: June 2, 2015
Time: 11:20 a.m. – 11:45 a.m.

Given that infection by malware is an inevitable event, this seminar will examine what organisations can do to lessen the impact of infection upon their organisation. Firstly, there are ways in which detection-based technologies can be used to maximise point-in-time protection, by using cloud-based systems and advanced analytics techniques. However, as we have seen throughout the history of detection innovation, be it signatures, heuristics, sandboxing etc., detection will only take you so far, particularly when it comes to targeted attacks. So this seminar will concentrate on what, for many organisations, if missing from their malware strategy - namely, how do you deal with an infection once it is in place? We will look at Cisco's Advanced Malware Protection (AMP) product and it's use of "Retrospection" to allow security administrators to examine past and current events in light of new intelligence gained from the Cisco Threat Intelligence Cloud. Retrospection is based upon the concept that if you can no longer automatically tell what's malware and what's not with an acceptable degree of accuracy to be relied upon, you must track all file events regardless of the assumed disposition of those files. Once the threat data is updated with new insight, it can then be applied to all previous events to see if there are any matches. This gives the security administrator warning about previously unknown breaches and actionable intelligence with which to inform his or her post breach activities.

View the presentation

 

Bill McGee

Building Security into Your Data Center DNA

Bill McGee

Date: June 3, 2015
Time: 11:20 a.m. – 11:45 a.m.

Part of the tension between IT and security has been the all-too-often correct perception that security interrupts and slows down business-critical applications and services. Nowhere is this more apparent than in the data center, where complex traffic, customized applications, virtualization, and dynamic resource scalability are essential to the health and success of the organization. In this presentation we will look at five common vulnerabilities that are at the root of most data center breaches, why they happen, and how to rethink the way your organization can weave security into your data center DNA without compromising the way you want to do business.

 

Leon Ward

Importance of Threat-Centric Security

Leon Ward

Date: June 4, 2015
Time: 11:20 a.m. – 11:45 a.m.

Today's sophisticated attacks have grown in frequency, severity and complexity. Evolving technologies are paving the way for new attack techniques we couldn't have anticipated a few years ago. To truly protect against all possible attack vectors, IT professionals must accept the nature of modern networked environments and devices and start thinking like an attacker. Learn about threat-centric security approaches that protect their environments across the attack continuum - before, during and after an attack.

View the presentation

▲ Back to Top

Demos

Demonstrations

Threat-Focused Next-Generation Firewall: Cisco ASA with FirePOWER Services

The new Cisco next-generation firewall delivers integrated threat defense across the entire attack continuum before, during, and after an attack. It combines the proven Cisco ASA firewall with industry-leading Sourcefire threat and advanced malware protection.

 

Limit the Spread of Threats: Cisco TrustSec Segmentation

Cisco TrustSec technology allows administrators to map business assets and functions directly to contextual access policies. These security policies can be used to segment the extended network, enforce resource usage, dynamically manage and simplify security configurations, and eliminate the need for complex network changes.

 

Edge-to-Core Threat Protection: Cisco FirePOWER Next-Generation IPS

Threat protection across the entire attack continuum: integrated visibility of your network before an attack, industry-best threat protection during an attack, and scoping and remediation after an attack.

 

Protect Against Blended Attacks and Malware: Cisco Cloud Web Security, Email Security Appliance, and Web Security Appliance

Cisco security solutions for web and email combine comprehensive defense with superior deployment flexibility to address these two major attack vectors. A combination of Cisco Advanced Malware Protection and cognitive-threat analytics provides detection, threat blocking, and remediation.

 

Advanced Malware Protection: AMP for Networks and Endpoints and Cisco AMP Threat Grid

Cisco Advanced Malware Protection provides protection before, during, and after an attack. Using unified malware analysis, deep threat analytics, continuous monitoring capabilities, and retrospective security, security teams can more quickly detect, track, respond to, and remediate advanced threats in their environments.

▲ Back to Top

Location

Conference Location

Olympia London

Address: Hammersmith Road, Kensington, London W14 8UX, United Kingdom
Telephone: +44 20 7385 1200
Website: olympia.co.uk

Conference Website: infosecurityeurope.com

▲ Back to Top

Resources

Event Resources