Integrated Threat Defense
Cisco at GISEC 2016
March 29 – 31 – Dubai World Trade Centre
Date: March 29 – 31
Location: Dubai World Trade Centre
Time: 10:00 – 17:00
Cisco will participate in the Gulf Information Security Expo & Conference, GISEC, which will be held at Dubai World Trade Centre from March 29-31, 2016 with the aim of showcasing and delivering its strategy of Security Everywhere – from the cloud, network and endpoints with new security products and features and a threat awareness service as organizations execute on their digital transformation.
- Cisco will showcase our extensive security portfolio during the exhibition
- Adam Philpott, Cisco Sales Director, EMEAR Cyber Security will deliver a keynote address on March 31
- Cisco are pleased to host Industry Magician Ken Newman to support our on-stand presentations
- Join us at Stand #C-100 to meet our Cisco security specialists and partners
Cisco is extending Security Everywhere with new capabilities and services that deliver greater visibility, context and control from the cloud to the network to the endpoint, for organizations of all sizes. At GISEC 2016, Cisco will demonstrate and showcase how its products and solutions can support its customers safely and securely through digital transformation and how they can weave in the security techniques and deployment as part of it.
The value of Cisco architecture is its emphasis on embedding security spanning the extended network – including routers, switches and the data center – closing gaps across the attack continuum – before, during and after – and significantly reducing time to detection and remediation.
Follow the conversation: #CiscoGisec
Adam Philpott, Cisco – Sales Director, EMEAR Cyber Security will deliver a keynote address on March 31, 2016
Cisco - Director, EMEAR Cyber Security
Adam entered the IT industry initially through channel sales in distribution. His first exposure to Security and Networking was as the Cisco Sales Manager at Sphinx CST, a division which was then acquired by Ingram Micro.
In 2002 he relocated to Australia and joined Cisco, first in direct sales and then in sales management, running the Mid Market sales team. As part of the ANZ leadership team, he was an active member of ANZ sales council – responsible for sales strategy and execution across the region. Whilst in Australia, Adam also took an active role in corporate social responsibility as member of ANZ Civic Council. This involved a variety of philanthropic activities including working with indigenous job seekers and in healthcare projects with Sydney's homeless.
After 8 years in Sydney, Adam relocated within Cisco to Singapore to lead strategy and business development across Cisco's core portfolio of Switching, Routing, Wireless and Security, in the nascent Borderless Networks organization. His role spanned Asia, India, Australia, China and Japan.
Most recently, Adam returned to his native UK to lead Cisco's Security practice across Europe, Middle East, Africa and Russia. His primary objective is to enhance Cisco's Security Architecture business by helping customers defend themselves before, during and after security incidents. He is active in promoting Security information sharing and thought leadership within the security and networking community through social media, press, blogs and events.
He is married with two children and enjoys music and Muay Thai.
Annual Security Report
Annual Security Report
The Cisco® 2016 Annual Security Report examines threat intelligence and cybersecurity trends, reveals that only 45 percent of organizations worldwide are confident in their security posture as today's attackers launch more sophisticated, bold and resilient campaigns.
While executives may be uncertain about their security strength, 92 percent of them agree that regulators and investors will expect companies to manage cybersecurity risk exposure. These leaders are increasing measures to secure their organizations' future, particularly as they digitize their operations.
The report highlights the challenges businesses face due to the rapid advancements of attackers. Hackers increasingly tap into legitimate resources to launch effective campaigns for profit-gain. Additionally, direct attacks by cybercriminals, leveraging ransomware alone, put $34 million a year per campaign into their hands. These miscreants continue to operate unconstrained by regulatory barriers.
Businesses are up against security challenges that inhibit their ability to detect, mitigate and recover from common and professional cyberattacks. Aging infrastructure and outdated organizational structure and practices are putting them at risk.
The study sounds a global call-to-arms for greater collaboration and investment in the processes, technologies and people to protect against industrialized adversaries.
Top Research Findings
- Decreasing confidence, increasing transparency: Less than half of businesses surveyed were confident in their ability to determine the scope of a network compromise and to remediate damage. But, an overwhelming majority of finance and line-of-business executives agreed that regulators and investors expect companies to provide greater transparency on future cybersecurity risk. This points to security as a growing boardroom concern.
- Aging infrastructure: Between 2014 and 2015, the number of organizations that said their security infrastructure was up-to-date dropped by 10 percent. The survey discovered that 92 percent of Internet devices are running known vulnerabilities. Thirty-one percent of all devices analyzed are no longer supported or maintained by the vendor.
- SMBs as a potential weak link: As more enterprises look closely at their supply chain and small business partnerships, they are finding that these organizations use fewer threat defense tools and processes. For example, from 2014 to 2015 the number of SMBs that used web security dropped more than 10 percent. This indicates potential risk to enterprises due to structural weaknesses.
- Outsourcing on the rise: As part of a trend to address the talent shortage, enterprises of all sizes are realizing the value of outsourcing services to balance their security portfolios. This includes consulting, security auditing and incident response. SMBs, which often lack resources for an effective security posture, are improving their security approach, in part, by outsourcing, which is up to 23 percent in 2015 over 14 percent the previous year.
- Shifting server activity: Online criminals have shifted to compromised servers, such as those for WordPress, to support their attacks, leveraging social media platforms for nefarious purposes. For example, the number of WordPress domains used by criminals grew 221 percent between February and October 2015.
- Browser-based data leakage: While often viewed by security teams as a low-level threat, malicious browser extensions have been a potential source of major data leaks, affecting more than 85 percent of organizations. Adware, malvertising, and even common websites or obituary columns have led to breaches for those who do not regularly update their software.
- Time to detection faster: The industry estimate for time to detection of a cybercrime is an unacceptable 100 to 200 days. Cisco has further reduced this figure from 46 to 17.5 hours, since the 2015 Cisco Midyear Security Report was released. Shrinking the time to detection has been shown to minimize cyberattack damage, lowering risk and impact to customers and infrastructures worldwide.
- Trust matters: With organizations increasingly adopting digitization strategies for their operations, the combined volume of data, devices, sensors, and services are creating new needs for transparency, trustworthiness, and accountability for customers.
For a complete copy of the 2016 Cisco Annual Security Research report, and to read more about Cisco's recommendations as to what businesses can do to mitigate against risk, click here.
|Time||Tuesday 3/29/2016||Wednesday 3/30/2016||Thursday 3/31/2016|
|10:30 – 10:50||Osama Al-Zoubi, Exponential Security for the Digital World|
|11:00 – 11:20||Wissam El Charif, Addressing The Full Attack Continuum with Cisco's Next Generation Firewalls||Hakan Tagmac Cisco 2016 Annual Security Report -The Highlights||Wissam El Charif, Addressing the full attack continuum with Cisco's Next Generation Firewalls|
|12:00 – 12:20||Sameh Emam, Security in the Era of the 'Internet of Everything'||Mahmoud Rabi, AMP Everywhere||Seif Ibrahim, Comprehensive Security in a Single Box - Meraki|
|1:00 – 1:20||Lunch||Lunch||Lunch|
|2:00 – 2:20||Hanna Jabbour, Network Visibility for Cyber Threat Defense||Ehsan Moghaddam, Defending against modern threats with Content Security||Marcus Josefsson -Cyber Threat Defense in Depth|
|15:00 – 15:20||Mohamed El Shenawy, Evolution of Security for the Data Centre||Paolo Passeri, Identifying Attacks with Predictive Detectors and 3D Visualization||Maher Al-Sharif, Building Modern SOCs and Incident Response|
|16:00||Kerry Singleton, Context Aware Security with Netflow||Sherif El Shourafah Next Generation NAC with TrustSec||Paolo Passeri, Identifying Attacks with Predictive Detectors and 3D Visualization|
|18:00||Show Ends||Show Ends|
Dubai World Trade Centre
United Arab Emirates