Tuesday, 11 June 2024
Security, the cloud, and AI: building powerful outcomes while simplifying your experience
Saturday, 8 June 2024
Cisco AI Assistant for Managing Firewall Policies Is Now Available
Cisco AI Assistant is now available for Cisco XDR and Cisco Defense Orchestrator
Prerequisites
AI Assistant interaction
Thursday, 6 June 2024
Funding a Whole of State Approach for your Community
1. Understanding SLCGP funding
2. States select the vendors and cybersecurity services provided to local governments
3. Customer Cybersecurity Planning and Strategy
4. Compliance and Best Practices
5. Educational and Workforce Development
Tuesday, 4 June 2024
Cisco Defense Orchestrator’s Path to FedRAMP Authorization
Cisco Defense Orchestrator is a cloud-based multi-device manager that enables consistent policy implementation across highly distributed environments. CDO’s centralized management allows rapid deployment of policy changes when minutes matter, and reusing policy objects across all firewall form factors reduces both administrative effort and organizational risk. Security teams that adopt CDO spend less time deploying and maintaining their firewalls and more time optimizing policies and managing threats.
Moving forward on FedRAMP
Cisco has made great progress in moving a variety of our solutions through the FedRAMP process. Created to encourage use of cloud computing, FedRAMP serves to streamline the exchange of information and accelerate services within federal agencies, plus improve their interaction with the public. In 2023, the FedRAMP Authorization Act was passed, codifying the FedRAMP program as the authoritative standardized approach to security assessment and authorization for cloud products and offerings.
With FedRAMP, federal agencies are provided a uniform framework for evaluating, approving, and continually overseeing cloud services. This includes procedures for security assessments, authorizations, and ongoing surveillance of cloud services utilized by federal entities. In addition, you should understand the following:
- The US General Services Administration (GSA) administers FedRAMP in collaboration with the Department of Homeland Security (DHS) and the Department of Defense (DoD).
- The compliance parameters set by FedRAMP are in alignment with the National Institute of Standards and Technology (NIST) Special Publication 800-53, which outlines technical standards for cloud computing.
- FedRAMP also promotes adherence to the Federal Information Security Management Act (FISMA) and the OMB Circular A-130 by federal agencies.
The FedRAMP process and Cisco Defense Orchestrator
FedRAMP Authorization can be pursued with an individual agency sponsor or multi-agency authorization. For CDO, Cisco is working with the United States National Institute of Health (NIH) as the individual agency sponsor.
Preparation Phase
The initial phase with individual agency sponsorship is known as the Preparation Phase. It consists of two key steps if no sponsor agency is available: conducting a Readiness Assessment and engaging in Pre-Authorization activities.
Preparation Step 1: Readiness Assessment
The Readiness Assessment is an optional stage aimed at helping cloud offerings obtain a sponsor. Readiness assessments are performed by certified Third-Party Assessment Organizations (3PAOs), who produce a Readiness Assessment Report (RAR) that shows potential sponsoring agencies that the solution is ready to meet the federal government’s security standards.
- Demonstrated that the CDO for government solution is fully built and functional.
- Completed a CSP Information Form.
- Determined the security categorization of the data that will be placed within the system utilizing the FIPS 199 categorization template along with the appropriate guidance of FIPS 199 and NIST Special Publication 800-60 Volume 2 Revision 1 to correctly categorize the CDO system based on the types of information processed, stored, and transmitted.
Leveraging the Cisco Federal Ops Stack
Pushing forward on CDO FedRAMP compliance
Saturday, 1 June 2024
Managing Firewall complexity and Augmenting Effectiveness with AIOps for Cisco Firewall
What is AIOps for Cisco Firewalls?
Our Approach: The Path to an Autonomous Firewall Future
The Benefits for You
Beyond Management: AIOps for Cisco Firewall
Best Practice Recommendations & Feature Adoption for Stronger Defense
Policy Insights with Policy Analyzer & Optimizer
Traffic & Capacity Insights
Thursday, 30 May 2024
Navigating DORA (Digital Operational Resilience Act) with Secure Workload
1. Understanding Risk
2. Preventing and Mitigating Risk
3. Reporting Risk
- Security Dashboard: Provides a high-level overview of the security posture and hygiene of the environment.
- Vulnerability Dashboard: Displays current CVEs within the environment along with a detailed assessment of their potential impact on confidentiality, integrity, and availability. Additional metrics such as risk score, exploitability, and complexity are also included.
- Reporting Dashboard: Presents a detailed view tailored to specific roles like SecOps and NetOps. An important capability to mention here is how the security summary maps to a modern risk-based approach to detect adversaries MITRE ATT&CK framework. Secure Workload has multiple forensic rules mapped to the MITRE ATT&CK TTPs (Technique, Tactics, and Procedures) allowing one to identify an adversary and follow every single step taken to compromise, exploit, and exfiltrate data.
Key Takeaways
- Strategic Cyber Resilience: Secure Workload can be a strategic enabler for aligning with DORA’s vision. Transitioning from a reactive cybersecurity stance to a proactive, risk-based approach, prepares your organization to anticipate and counteract the evolving cyber threat landscape
- Comprehensive Risk Insights: With granular visibility into application workload communications, dependencies, and vulnerabilities, coupled with the implementation of robust microsegmentation and compensating controls, Secure Workload equips you with the capabilities to not only understand but also to effectively mitigate risks before they materialize into breaches.