Top Banner
These investments, along with services like Technology Verification, help Cisco to provide a comprehensive answer about how and what we’re doing to support the security, trust, privacy, and resilience of our customers. Earning customer trust is about being transparent and accountable as we strive to connect everything securely. Security Trust Privacy Resilience 125,000 Combined Global Workforce 40,000 Routers 26,000 Remote Office Connections 26,000 Remote Office Connections 2,500 IT Applications 1,350 Engineering Labs 500 Cloud Applications Every day at Cisco, we protect our enterprise by securing: In 17 0 Countries around the globe Every day, this massive complex data system produces: 47TB of Traffic 15B Netflow Records 4.8B DNS Queries 75M Web Transactions Cybersecurity is our top priority From product development to operations to data protection, we are embedding security everywhere. This pervasive security mindset gives us the power to identify and pivot on issues faster and with greater confidence than ever before. Our commitment to invest across people, processes, technology and policies is helping us build the new secure enterprise. Policy Process The New Security Enterprise People Technology PEOPLE TECHNOLOGY PROCESSES POLICIES Pervasive security requires an army of advocates. Every Cisco employee, vendor, partner, and customer must understand their role in the cybersecurity equation. Processes are the backbone of pervasive security. Embedding processes into the business help us identify vulnerabilities and remediate issues quickly. Here are our favorites: Cisco is committed to ongoing investment in innovation that enhances the security and resilience of our products and helps to mitigate today’s advanced persistent threats. Policies not only set the rules for protecting the organization, but also protect investments across people, processes, and technology. FOUNDATIONAL SECURITY » Helps reduce security vulnerabilities » Provides an added layer of security to help protect against counterfeit and unauthorized versions of hardware and software TRUSTWORTHY TECHNOLOGIES » 150+ product lines with trustworthy capabilities to provide visibility into device integrity and protect against modern cyber attacks ADVANCED SECURITY RESEARCH » 20 research partnerships in 5 countries GLOBAL GOVERNMENT SECURITY CERTIFICATIONS » 175+ Cisco product lines certified 674 Security Advocates across multiple functions 100 Dedicated Incident Responders around the globe 500,000 Internal test phishing emails send last year 80 Pen Testers dedicated to attacking Cisco’s products & solutions 35,000 Employees Certified in the Security Ninja program Secure Development Lifecycle » In place for 10+ years » ISO 27034 compliant » Constantly evolving development techniques address emerging security threats Product Security Incident Response Team (PSIRT) » In place for 15+ years » Leads the industry » ISO 29147 compliant » Provides consistent management and reporting of vulnerabilities Data Protection Program » Robust, Enterprise-wide Program » Helps you understand what data you have and where it is » Helps you classify your data Value Chain Security » The right security in the right place at the right time » Continually assesses, monitors, and improves the security of our value chain throughout the entire lifecycle of Cisco solutions Design Plan Source Make Validate Deliver Sustain End of Life Employee and supplier codes of conduct signed annually 1 4 Enterprise information security and data protection policies aligned with ISO 27001 Continuous monitoring – 230 site audits last year Data protection policies and incident response in place trust.cisco.com © 2020 Cisco and/or its affiliates. All rights reserved.
1

Security & Trust - Cisco...These investments, along with services like Technology Verification, help Cisco to provide a comprehensive answer about how and what we’re doing to support

May 20, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security & Trust - Cisco...These investments, along with services like Technology Verification, help Cisco to provide a comprehensive answer about how and what we’re doing to support

These investments, along with services like Technology Verification, help Cisco to provide a comprehensive answer about how and what we’re doing to support the security, trust, privacy, and resilience of our customers. Earning customer trust is about being transparent and accountable as we strive to connect everything securely.

Security

Trust

Privacy

Resilience

125,000 Combined GlobalWorkforce

40,000Routers

26,000Remote OfficeConnections

26,000Remote OfficeConnections

2,500IT Applications

1,350Engineering

Labs

500Cloud

Applications

Every day at Cisco, we protect our

enterprise by securing:

In 170 Countries around the globeEvery day, this massive complex data system produces:

47TBof Traffic

15BNetflow Records

4.8BDNS Queries

75MWeb Transactions

Cybersecurity is our top priority From product development to operations to data protection, we are embedding security everywhere. This pervasive security mindset gives us the power to identify and pivot on issues faster and with greater confidence than ever before. Our commitment to invest across people, processes, technology and policies is helping us build the new secure enterprise.

Policy ProcessThe NewSecurity

Enterprise

People

Technology

PEOPLE

TECHNOLOGY

PROCESSES

POLICIES

Pervasive security requires an army of advocates. Every Cisco employee, vendor, partner, and customer must understand their role in the cybersecurity equation.

Processes are the backbone of pervasive security. Embedding processes into the business help us identify vulnerabilities and remediate issues quickly.Here are our favorites:

Cisco is committed to ongoing investment in innovation that enhances the security and resilience of our products and helps to mitigate today’s advanced persistent threats.

Policies not only set the rules for protecting the organization, but also protect investments across people, processes, and technology.

FOUNDATIONAL SECURITY» Helps reduce security vulnerabilities

» Provides an added layer of security tohelp protect against counterfeit andunauthorized versions of hardware andsoftware

TRUSTWORTHY TECHNOLOGIES» 150+ product lines with trustworthy

capabilities to provide visibility intodevice integrity and protect againstmodern cyber attacks

ADVANCED SECURITY RESEARCH» 20 research partnerships in 5 countries

GLOBAL GOVERNMENTSECURITY CERTIFICATIONS» 175+ Cisco product lines certified

674Security Advocates across multiple functions

100Dedicated Incident Responders around the globe

500,000Internal test phishing emails send last year

80Pen Testers dedicated to attacking Cisco’s products & solutions

35,000Employees Certified in the Security Ninja program

Secure Development Lifecycle» In place for 10+ years

» ISO 27034 compliant

» Constantly evolvingdevelopment techniquesaddress emergingsecurity threats

Product Security Incident Response Team (PSIRT)» In place for 15+ years

» Leads the industry

» ISO 29147 compliant

» Provides consistentmanagement andreporting of vulnerabilities

Data Protection Program» Robust, Enterprise-wide

Program

» Helps you understandwhat data you have andwhere it is

» Helps you classify yourdata

Value Chain Security» The right security in

the right place at theright time

» Continually assesses,monitors, and improvesthe security of our valuechain throughout theentire lifecycle of Ciscosolutions

Design Plan Source Make Validate Deliver Sustain End of Life

Employee and supplier codes of conduct signed annually

14 Enterprise information security and data protection policies aligned with ISO 27001

Continuous monitoring – 230 site audits last year

Data protection policies and incident response in place

trust.cisco.com© 2020 Cisco and/or its affiliates. All rights reserved.