Cisco at RSA, February 24-28, 2014 • San Francisco

Intelligent Cybersecurity for the Real World...


Before, During, and After an Attack

Sophisticated threats and any-to-any infrastructures are creating significant cybersecurity challenges. Adding to these challenges is the increased motivation of attackers. They understand classic security technologies and applications, and know how to exploit the gaps between them. Specifically, security practitioners are faced with:

  • Changing business models and attack vectors
  • A dynamic threat landscape
  • Complexity and fragmentation of security solutions

Practitioners need to address these challenges and security gaps across broad range of attack vectors with solutions that operate everywhere a threat can manifest itself – on the network, at endpoints, virtually, on mobile devices, and in the cloud or the data center.

At RSA Conference 2014, we showed how Cisco security solutions and services help protect against threats across the attack continuum – before, during and after an attack. Learn about these security approaches:

Visibility-Driven
Accurately see what's really happening, and gain visibility from the network fabric, endpoints, mobile devices, virtual environments, and the cloud.

Threat-Focused
Detect, understand, and stop threats using continuous analysis and real-time security intelligence, delivered from the cloud that is shared across all products for improved efficacy.

Platform-Based
Security requires an integrated system of agile and open platforms that cover traditional networks, software- defined networks, devices and the cloud. These platforms need to be simplified and extensible, built for scale, and centrally managed for unified policy and consistent controls. All of this creates an intelligent approach to cybersecurity for the real world that is integrated, open, pervasive and continuous.

Cisco Demonstrations


ASAv and Sourcefire/Securing ACI Data Centers
In this demo, attendees will be able to preview the new ASAv, designed for both traditional and SDN data center environments. Attendees will see how ASAv and Sourcefire virtual IPS can be dynamically integrated into a service chain within the new ACI intelligent fabric data center infrastructure for instant drag-and-drop provisioning. Additionally, ASAv's dynamic SSL VPN capabilities will be demonstrated.

ASA 5585-X with Clustering
The ASA 5585-X is Cisco's most powerful firewall solution, designed specifically for the high-performance and dynamic provisioning demands of today's data center environments. With its new advanced clustering capabilities, the ASA-5585-X can support up to a 16-node clustering solution within a single or multisite.

Simplified Data Center Security Orchestration
The Cisco Secure Data Center for Enterprise Solution provides design and implementation guidance for enterprises that want to deploy a virtualized data center with a comprehensive set of security capabilities to protect against the exponential growth of advanced data security threats. This demo portrays Cisco premier next-generation firewalls (5585-x) operating as a cluster with Cisco TrustSec and IPS services to protect a virtualized Cisco UCS server farm using the Cisco Nexus 7k and 1Kv. Server deployment and policy are managed with Cisco UCS Director and Cisco ISE.
In the demo, access to financial information is restricted to authorized users only, but deployment of new servers is permitted by operations personnel.

ASA NGFW
ASA 5500-X Next-Generation Firewall enables administrators to get increased visibility and control of applications, users, and threats. Also, this demo will show how AVC, WSE, and new integrated NGFW IPS together with the power of SIO delivered through reputation analysis can stop known and unknown threats.

Open AppID/Snort
OpenAppID is a powerful new app-focused detection language that enables the automatic detection of many different categories of applications: client apps, web apps, web app behaviors, and server apps. This allows users to create, share and implement custom application detection. The OpenAppID demonstration will provide the participants with a high-level understanding of OpenAppID architecture. The demonstration will show alerts and application statistics generated in real-time by sample application traffic. The demonstration will also show how application statistics and alerts can be streamed to data visualization products such as Splunk.

FirePOWER 8300 Series
The new Sourcefire FirePOWER 8300 Series appliances extend performance leadership by 50 percent over our industry-leading FirePOWER 8200 Series to address the network security needs of the highest capacity data centers and enterprise deployments. The FirePOWER 8300 Series are stackable to 120+ Gbps of throughput. Experience the superior visibility that FireSIGHT and FirePOWER can bring to your organization.

Meraki
Cisco Meraki Cloud Managed Security Appliances offer a complete unified threat management solution, including application control, URL filtering, anti-virus, and Sourcefire SNORT based Intrusion Prevention.

ISR G2 with CWS Connector
Learn how you can use the ubiquitous ISR G2 router to securely provide a rich direct Internet access experience from your branch/retail store/remote site using a cloud-delivered web security solution. This solution enables you to reserve your expensive links that connect the branch to the HQ/DC for business-critical application traffic because you no longer have to backhaul Internet-bound traffic to your HQ/DC, resulting in huge bandwidth savings.

AMO with WSA, ESA, and CWS (with Cognitive)

  • Cisco Cloud Web Security (CWS) delivers complete protection across the attack continuum–before, during, and after an attack–with easier deployment and substantially lower costs than on-premises products. Visit the booth for a demo of the new capabilities now available on Cisco CWS, including Advanced Malware Protection from Sourcefire, and cognitive threat analytics for reduced time to discovery of threats inside your network.
  • Email Security
    Stop blended threats and targeted email attacks with Cisco Email Security. Learn about Cisco's industry-leading approach to blocking unwanted messages, catching advanced malware, and disarming malicious links. Visit the booth to get a walkthrough of Cisco's unmatched threat visibility and drill-down reporting capabilities.
  • Web Security
    Cisco's industry-leading Web Security Appliance (WSA) now includes Advanced Malware Protection (AMP) from Sourcefire. Learn more about how you can benefit from the unique capabilities of AMP through a simple license add-on to WSA. Visit the demo for a preview of AMP on Cisco WSA, including file reputation scoring and blocking, file behavioral analysis, and retrospective alerting.

ISE
Cisco Identity Services Engine and Cisco TrustSec provide policy-based secure access, traffic enforcement, and segmentation. We have two demos to illustrate (1) how administrators can use ISE to easily profile devices, check posture, and deploy MDM software to a new mobile device on the network and (2) how Cisco TrustSec enables the automatic security provisioning of new servers or VMS that allows new workloads to be accessible through firewalls.

ISE + Lancope
Demonstration of Cisco's Cyber Threat Defense Solution, using NetFlow behavior analytics to identify modern threats inside the network, without relying on signatures or traditional network control points. Includes integration with ISE, ASA, and the latest software release of Lancope StealthWatch.

Annual Security Report
The Annual Security Report pod showcases Cisco threat research that highlights trending security concerns such as attacks against the Internet infrastructure, trusted applications exploiting gaps in perimeter security, and indicators of longstanding undetected compromise across multinational organizations.

Trustworthy Systems
Trustworthy Systems is Cisco's companywide initiative to provide secure foundations in all Cisco products.
Trustworthy Infrastructure Elements, the basis for Cisco's Security Model, proactively protects the infrastructure and the information passing through or at rest.
Check out Cisco's Secure Development Lifecycle, Trust Anchor Technologies, and NextGen encryption, including a demo of the new IETF RFC 7030 Enrollment over Secure Transport (EST).

Solution Design Center
Cisco's Security Services architects can help address your security and network design questions, including planning, design, implementation, and optimization.

Sourcefire Booth

FirePOWER NGIPS and NGFW
Sourcefire Next-Generation Network Security solutions set a new standard for advanced threat protection, integrating real-time contextual awareness, intelligent security automation, and unprecedented performance.

FireAMP
Sourcefire FireAMP is the only solution that provides the device-based visibility and control you need to stop threats missed by other security layers for protection before, during, and after an attack.

Cisco Content Security Appliances with Advanced Malware Protection
By combining Sourcefire's deep knowledge of advanced threats and analytics expertise with Cisco's industry-leading email and web security solutions, customers benefit from superior protection across the attack continuum with the most cost-effective, seamless approach to advanced malware protection.

Partners


LogRhythm  

LogRhythm

LogRhythm is the Security Intelligence company. LogRhythm's enterprise-class security intelligence platform uniquely combines next-generation Security Information & Event Management (SIEM), Log Management, File Integrity Monitoring, Host Forensics and Network Forensics in a highly scalable, fully integrated solution that empowers organizations to detect today's most sophisticated cyber threats and breaches faster and with greater accuracy than previously possible. LogRhythm's award-winning platform also delivers unparalleled compliance automation and assurance, as well as deep visibility and insight into IT operations issues. More than 1,500 customers on six continents rely on LogRhythm solutions, including Global 2000 businesses, government agencies and Managed Security Service Providers. The company holds multiple patents for advanced cyber security and has been widely recognized for its security thought leadership, including being designated a "Leader" in Gartner's 2013 SIEM Magic Quadrant.



Bayshore Networks  

Bayshore Networks

Bayshore Networks is a leading provider of deep content inspection technology for converged Information Technology and Operational Technology networks. Bayshore's technology platform is developed exclusively in the United States and is trusted by Fortune 500 enterprises, government agencies, and critical infrastructure organizations.

Bayshore's Layer 7 content inspection technology implements advanced behavioral analysis, application discovery and profiling. This complements signature-based solutions to provide complete data control within networks. Bayshore's high-speed, multi-protocol technology is aimed at securing the converged IT and operational technology networks in the enterprise core rather than at the network perimeter.

Bayshore's flagship product is the SingleKey™ appliance, which provides data-level controls at line rate in enterprise and industrial control organizations. Bayshore's Pallaton™, an innovative policy-expression language, enables SingleKey to provide full-content inspection and policy enforcement at more than 10 Gbps. For more information follow Bayshore Networks on Twitter @bayshorenet or visit here.



Fiberlink  

Fiberlink

MaaS360 by Fiberlink, an IBM company, is the trusted enterprise mobility management solution to thousands of customers worldwide -- from Fortune 500 companies to small businesses. We make working in the mobile age simple and safe by delivering comprehensive mobile security and management for applications, documents, email, and devices. Instantly accessible from the web, MaaS360 is easy to use and maintain and provides the flexibility organizations need to fully embrace mobility in every aspect of their business. Backed by the most responsive support in the industry, we put our customers first by providing them with the best user experience for IT and employees. Learn more.



MobileIron  

MobileIron

The leader in security and management for mobile apps, content, and devices, MobileIron's mission is to enable organizations around the world to embrace mobility as their primary IT platform in order to transform their businesses and increase their competitiveness. Leading global companies rely on MobileIron's scalable architecture, rapid innovation, and best practices as the foundation for their Mobile First initiatives. For more information, please visit here.



Cisco and Sourcefire Speaking Sessions


The New Model of Security

Speakers: Padmasree Warrior ,Chief Technology & Strategy Officer (CTSO) and
Christopher Young, Cisco Senior Vice President Security Business Group
Date: Thursday, February 27, 2014
Time: 3:05 p.m. PST

Abstract: The pace of change in technology is accelerating and security is no different, with attackers innovating faster than the industry. Join Cisco's Christopher Young, Senior Vice President, Security Business Group, and Padmasree Warrior, Chief Technology and Strategy Officer to learn how this phenomenon has driven defenders to challenge today's security assumptions and approach security differently.

Executive briefing center slot (Cisco)

Speakers: Martin Roesch
Date: Wednesday, February 26, 2014
Time: 10:40 a.m. PST
Topic: A Threat-Centric Approach to Security

Abstract: If you knew your organization would be compromised, would you do security differently? It's no longer a matter of when you will be attacked; it's a matter of when. Martin Roesch, Sourcefire Founder and Vice President, and Chief Architect of the Cisco Security Business Group, discusses the dynamic threat landscape and security approaches that protect across the attack continuum – before, during, and after an attack.

Executive briefing center slot (Sourcefire)

Speakers: CP Morey, Senior Director, Product and Solutions Marketing
Date: Tuesday, February 25, 2014
Time: 1:20 p.m. PST
Topic: The Battle for Information Superiority in Cybersecurity

Abstract: Advanced threats and attacks evade security measures as attackers know more about networks than the owner. This session will cover:

  • The evolving nature of security and malware
  • What information superiority is
  • Its significance for protecting cyber environments before, during, and after attacks
  • Existing technologies to reduce impacts of attacks

Security Basics Seminar (Part of RSA Conference)

Speakers: Jason Brvenik, Principle Engineer
Date: Monday, February 24, 2014
Time: 11:15 a.m. PST

Abstract: Organizations only spend 10 percent of what they spend on network security on application security. However, a recent survey by Quotium found that 40 percent of organizations are targeted daily by an application attack. Also, about 99 percent of applications have at least one security vulnerability.

In 2012, XSS vulnerabilities were the most common, accounting for more than 25 percent of application vulnerabilities, followed closely by information leaks and session management errors.

Shockingly, the Ponemon Institute found that only 43 percent of organizations have any kind of security process in place to prevent flaws and bugs during the application creation process, and many of these processes are unofficial guidelines as opposed to strict standards.

Organizations must implement comprehensive security policies. These include threat modeling, penetration testing, code reviews and analyses, vulnerability scanning, application firewalls, and intrusion prevention systems. They also should cover training for necessary employees and integration of security and development teams. These policies are critical for protecting organizations against this influx of application security vulnerabilities.

Internet of Things... Promising but Let's Not Forget Security Please!

Speakers: Erik Vyncke, Distinguished Engineer, Cisco
Date: Monday, February 24, 2014
Time: 2:25 p.m. PST

Abstract: The Internet of Things (IoT) brings a lot of promises of a fully connected world: from city lights to smart cars. It consists of a huge network of small and cheap endpoints (things). What are the properties of those endpoints that impact the security of the IoT? This session will explore the IoT from the security point of view.

Roadster Amongst the Tonka Trucks

Speakers: Michele Guel, Distinguished IT Engineer and Senior Security Architect
Date: Tuesday, February 25, 2014
Time: 4:00 p.m. PST

Abstract: The goal is to encourage women to embrace their passion and excel in their fields, especially male dominated files fields such Information and Network Security. Often, women find themselves among the very small minority in senior technical meetings and feel like they are navigating in a sea of Tonka Trucks. This session will provide an interesting and humorous insight into one woman's journey.

Oh the Humanity! Building Reliable Cultural Firewalls

Speakers: Lance Hayden, Solutions Architect, Cisco
Date: Thursday, February 27, 2014
Time: 8:00 a.m. PST

Abstract: Security is a cultural as much as technological challenge. Culture is defined as shared values and behaviors that create everyday organizational reality. No policy or technology can overcome weak security culture. This session will provide an empirically grounded model for creating cultural firewalls, measurable infrastructures that improve security and reduce risk at the level of human behavior.

Network Security Smackdown: Which Technologies Will Survive?

Panel: Moderator:
Jon Oltsik, Senior Principal Analyst, Enterprise Strategy Group, Inc.
Panelists:
Martin Brown , Global Practice Head, Security Futures and Capabilities, BT Security Enterprise
Bret Hartman, Vice President and Security CTO, Cisco Systems
Christofer Hoff, Vice President Strategy and Planning, Security Business Unit, Juniper Networks
Date: Thursday, February 27, 2014 and Friday, February 28, 2014
Time: 10:40 a.m. PST and 9:00 a.m. PST

Abstract: We will have a lively debate on the future of network security. If you're in a security startup, where should you focus? If you're investing in security technology, where are you wasting your money? The panelists are thought leaders from the world's biggest vendor and service provider network companies – driving billions of dollars of security investments. What are their next moves?

Meet with Cisco Experts


Cisco and Sourcefire executives and subject-matter experts will be available to meet with you one-on-one at the RSA Conference. To request a meeting at the conference, send us us email at rsa2014_meetingrequest@cisco.com.

Please include the following in your email:

  • Name
  • Company
  • Title
  • Topic
  • Would you like to meet with a Cisco or Sourcefire executive?

We look forward to seeing you there.

Event Location


RSA Conference 2014 will take place at Moscone Center in San Francisco, California.


View Larger Map

  

Moscone Center
747 Howard Street,
at the corner of Third & Howard streets
San Francisco, CA 94103

Moscone West
800 Howard St
at the corner of Fourth & Howard streets
San Francisco, CA 94103

Frequently Asked Questions


Detailed information and answers to common questions. Learn More

Contacts


For questions regarding registration or event details, contact our team at emailalias@domain.com or 1-800-555-5555

Watch our Keynote

Christopher Young, SVP, Cisco Security Business Group, and Padmasree Warrior, CTO, discuss the "The New Model of Security"

Register and View Now