BRKSEC-2139: Advanced Malware Protection
Presenter: Eric Howard, Techincal Marketing Engineer

“Why aren't we stopping all the malware???”
Presenter: Eric Howard, Techincal Marketing Engineer
“Why aren't we stopping all the malware???”
Presenters: Dave Zacks, Distinguished Engineer; Peter Zones, Principle Engineer
History has been: 10x performnce increase at 3x the cost. 40Gb broke that model -> 100Gb PHYs were very expensive; industry needed/wanted an intermediate step.
When I initially heard about the Internet of Things (IoT) sometime in the past few years, my initial reaction was okay here we go, we have another buzz word that means absolutely nothing. Add in Internet of Everything (IoE), it seemed even worse. After spending some time participating in an IoT Hackathon this past weekend in the DevNet Zone at Cisco Live, I can honestly say that my opinion has changed. Here’s why.
I was set to arrive at Cisco Live on Saturday to attend a DevOps forum on Sunday, but after booking travel and continuing to browse the Cisco Live website, I found out they were having an Internet of Things hackathon that would be starting on Saturday, go through the night, and finish on Sunday. It seemed intriguing because around the same time a highly valued peer of mine had just been telling me about a Cisco device that is still in beta, codename doublemint (more on this later), that is helping consume and deploy IoT-enabled devices. Now I needed to dig in and try to attend the hackathon. Being that I was set to arrive after the hackathon was to start, I emailed the DevNet team Continue reading
Presenter: Craig Williams (@security_craig) – Sr Technical Leader / Security Outreach Manager, Cisco TALOS
I’m from Talos. We love to stop bad guys.
Talos has a serious amount of data. For serious.
Data is key. It allows generation of real threat intel.
We basically have a bottomless pit of data
Talos vuln dev team:
With ransomware, you’re basically funding the malware underground.
Malvertizing:
Destructive/Wiper Malware:
BRKARC-2032 – Designing for Secure Convergence of Enterprise and Process Control Networks
Presenter: Chuck Stickney, Cisco SE
Handful of OT folks in the room; majority IT.
Convergence Benefits
PCN vs Enterprise
“Layer 2, Layer 3″ are not terms that OT folks understand. IT folks: speak a language your OT folks can understand.
PCN Characteristics
Rather than relying on point products, enterprises should let the network become a security sensor and enforcer, Cisco says.
In this article, I will do a walk-through of a logical network diagram. As I also said in the Physical Diagram article: I prefer to use the term “logical” instead of “L3″ because it is more easily understood by somebody unfamiliar with the OSI model. It also removes the assumption (made by many non-technical people) […]
The post Network Documentation Series: Logical Diagram appeared first on Packet Pushers Podcast and was written by John W Kerns.
Presenter: Markus Harbek, CCIE, CCDE
Who knows what SDN stands for?
APIC – Application Policy Infrastructure Controller
UCI – User Centric Infrastructure
APIC-EM – APIC Enterprise Module
Eventually, APIC and APIC-EM will have a common policy model so they can share policies across DC and enterprise. They will not integrate directly but will talk to a common policy orchestrator.
APIC-EM is really focussed on brownfield deployments because the assumption is that customers already have networks up and running hat APIC-EM needs to integrate into. APIC-EM won’t cconfigure OSPF and STP today, things like that, because they’re more than likely already running.
Imperative Control
Declarative control