SlideShare a Scribd company logo
July 8, 2024
Redefining Cybersecurity with AI
Capabilities
A Platform Approach
Samir Kumar Mishra
Director – Cybersecurity Business
Cisco India & SAARC
Cybersecurity Trends 2024
90%
of data breaches
will include a
human element
Spent on battling
malinformation by
2028
45%
of CISOs’ remits will
expand beyond
cybersecurity by 2027
$30B
Sources: Forrester Predictions 2024: Cybersecurity, Risk, And Privacy ; Gartner's Top Strategic Predictions for 2024 and Beyond
© 2024 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Trust is no longer just an emotion
Installed IoT devices
in 2025
46B
of Indian organizations
reported malicious
insider activity
(vs. 38% globally)
50%
of Indian companies say
employees are logging
into work platforms from
unregistered devices
95%
Everyone is
an insider
Businesses are
competing as ecosystems
Hybrid work is
here to stay
Sources: IDC, Worldwide IDC Global DataSphere IoT Device Installed Base and Data Generated Forecast, 2022-2026, IoT Analytics Research 2022, Cisco Annual Internet Report
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
of Security leaders not
adequately prepared to
handle cybersecurity
threats
Source: Cisco Cybersecurity Readiness Index (2023)
Cybersecurity Readiness Gap is massive
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLiveAPJC
Security Readiness: The gap is alarming
Companies that expect a
cybersecurity incident to
disrupt their business in the
next 12 to 24 months
90%
Source: Cisco Cybersecurity Readiness Index (2023)
The ability to identify, respond, and recover swiftly
from an IT security incident.
Building cyber resilience includes making a risk-focused plan that
assumes the business will at some point face a breach or an
attack.
Cyber Resilience
RANSOMWARE
SPAM
Security innovation is a
patchwork.
WEB THREATS
paloalto
zscaler
HUNTRESS
Multiple clouds makes tool sprawl worse
Security
Network
Compute
Storage
Other Services
Infrastructure
as a Service
Applications
Services
Platform as a Service
Software as a Service
…
…
Different platforms, different
controls
PRIVATE
AZURE
Introducing Cisco Security Cloud
Security
Network
Compute
Storage
Other Services
Infrastructure
as a Service
Security and Networking
as a Service
Cisco Security Cloud
Applications
Services
Platform as a Service
Software as a Service
…
…
PRIVATE
AZURE
Cisco Networking Cloud
Posture & Auth Management Endpoint Security
Email Security Experience Insights
Remote Browser Isolation Security Service Edge
Application Security
Vulnerability Management Attack Surface Management
Workload Security
Multicloud Defense
Extended Detection & Response Ransomware Recovery
Security that only Cisco can deliver
Firewall Protection
Cisco Security Cloud
Cisco Breach Protection
Powered by the Talos threat intelligence team
Cisco Cloud Protection
Cisco User Protection
Posture & Auth Management Endpoint Security
Email Security Experience Insights
Remote Browser Isolation Network Access Control
Security Service Edge
Application Security
Vulnerability Management Full Stack Observability
Workload Security
Multicloud Defense
Firewall Protection
Cisco Security Cloud
Extended Detection & Response
Cisco Breach Protection
Cisco Cloud Protection
Cisco User Protection
Cisco Security Cloud delivers
Users
Developers and
DevSecOps
IT
Security Ops
Center
Network Application
Client Broadband
WiFi
User
Cisco ensures a great user experience
Built into Cisco
SD-WAN
Robust, fault tolerant
global network
Target latency of ~40ms or
less for 99% of users
Built on industry leading
QUIC protocol
ThousandEyes
B
security events observed daily
500
threat researchers
AI
powered algorithms
SOC
Talos powers the Cisco portfolio with intelligence
https://talosintelligence.com/
© 2024 Cisco and/or its affiliates. All rights reserved. Cisco Confidential cs.co/talosyearinreview
Privacy’s importance to customer trust
Source: Cisco 2024 Data Privacy Benchmark Study
94% 98% 97%
Of customers won’t
buy if their data is not
properly protected
External privacy certifications
are important when choosing
a vendor
Our organization has a
responsibility to use
data ethically
trust.cisco.com
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
Artificial Intelligence: Hype is driving urgency
14%
of organizations globally are
fully prepared to deploy and
leverage Artificial Intelligence
(AI)-powered technologies
Considerable gaps exist in readiness across infrastructure, data, governance, and culture aspects
97%
Readiness is critical: as 97% said
the urgency to deploy AI-
powered technologies has
increased in their company in the
past 6 months
Companies are racing against
time: 61% said they have a
maximum of 1 year to deploy
their AI strategy else it will have
a negative impact on business
61%
Source: Cisco AI Readiness Index (2023)
Three Pillars of AI for a CISO
Enable the Business
to Use AI
Use AI to Defend
Think Like an Adversary
to Inform Strategy
1 2 3
Generative AI
Creation, Reinvention
Generative AI focuses on learning a representation
of artifacts from data and using it to create
completely original artifacts that preserve a
likeness to original data
Generative AI focuses on learning a representation
of artifacts from data and using it to create
completely original artifacts that preserve a
likeness to original data
Predictive AI
Prediction, Recommendation
Predictive AI focuses on analyzing existing data
that can be used for predictions and automation
Predictive AI focuses on analyzing existing data
that can be used for predictions and automation
Responsible AI
Security. Simplified.
The Next Decade In Enterprise AI
More Data Fewer Products
Enterprise adoption of AI
will accelerate over the
next decade
Products built with broader
data stores will have bigger
success in the market
Consolidation of the security
stack will continue
More AI
What?
Assist
AI Assistants that change the way humans and
machines interact with each other
Why? How?
Augment Automate
Correlating insights at
machine-speed, creating a 10x
return on human effort
Automating complex workflows
that make the lives of security
admins easier
Efficacy
Economics
Experience
Governance
Data
Models
AI
AI Assistant Experience
AI Powered Detection
Autonomous Actions
Give your admins superpowers.
Simplify management, improve outcomes.
Correlate 550B security events at
machine-speed.
Learn from human-to-machine
interactions to automate complex
playbooks.
Augment
Automate
Assist
Breach Protection
User Protection
Cloud Protection
Firewall Foundation
Cisco Security Cloud
We Are Injecting AI Across The Portfolio
AI Powered Detection
Correlate 550B security events at machine-
speed.
Autonomous Actions
Learn from human-to-machine interactions to
automate complex playbooks.
Give your admins superpowers.
Simplify management, improve outcomes.
Dec 2023 Mar 2024
SOC
Summarization
Aug 2023
LLMs
for DLP
Ensemble
Detectors
LLMs
for BEC
Playbook Automation
Playbook Recommendation
+18-24 months
+18-24 months
+18-24 months
Firewall XDR Duo SSE CISO Dashboard
AI Assistant Experience
Docs AI
Encrypted
Visibility Engine
SLMs
for 0-Days
Next Best Action
Automated Summaries
We Are Injecting AI Across The Portfolio
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
Firewall Admin
Growing rule set with
limited insight
Manual configurations &
troubleshooting
increases risk
Hard to get to root
cause and resolution
Introducing Firewall Policy Assistant
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Redefining Cybersecurity with AI Capabilities
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
SOC Analyst
Increased attack
sophistication with AI
Hard to prioritize
alert storms
Increasing workloads and
lack of talent
Siloed tools lack
full context
Introducing Cisco SOC Assistant
© 2024 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Redefining Cybersecurity with AI Capabilities
Bolstering our AI capabilities with acquisitions and
investments
Acquisitions Investments
Sampling of Cisco acquisitions with AI capabilities Sampling of current portfolio companies with AI capabilities
Cisco Security Innovation Momentum 2023
Cisco Multicloud
Defense
Cisco Secure Access
Cisco XDR
Risk-Based
Authentication
Cisco Access
Management
Cisco Secure Firewall
4200 & 7.4 OS
Business Risk
Observability
EMEA USA
PINACL
Cisco Security Suites
Cisco Partner Summit
Acquisitions
February March September
May July
Isovalent
DEFEND
Cisco by driving pervasive
security throughout our
global organization
SECURE
Cisco’s products
through trustworthy
technologies and it’s
secure development
lifecycle
PROTECT
our customers, keep
and earn their trust
every single day
People Process Technology Policy
Our Mission
Cisco Security & Trust Organization
57%
17%
26%
Data Centers
13+
Cloud Accounts
~12K
Daily VPNs
~60K
Global Cisco Distribution
Americas
APJC
EMEAR
34%
29%
21%
16%
Connected
Stakeholders
131,000
83,000+
Employee Distribution
Engineering
Sales &
Marketing
Customer
Experience
Corporate
Functions
Employees
Offices
300+
Countries
80+
Applications
Global Labs
(in 60 countries)
~1200
CVO / MVOs
11K+
4,000
© 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public
INVESTMENT
• Critical digital infrastructure – Data centers
for Webex, AppDynamics, DUO & security
• Country Digitization Acceleration
(50+ projects) across healthcare, agriculture,
logistics, etc.
• Corporate Development - Acquired four
companies in India
INNOVATION
• Significant R&D base – Second-largest for
Cisco globally
• ~1,500 patents filed from India
• Building an ecosystem of innovation through
Cisco for Startups – 60+ startups accelerated
• ThingQbator program – 2000+ ideas, 40,000+
students reached, 23 active startups to date
• Customer & Partner Ecosystem: Bringing best-in-
class digital capabilities like 5G, hybrid work, and
cybersecurity to critical sectors (public sector, BFSI,
manufacturing, etc.)
• Community: Goal of impacting 50 million lives by
2025 – Over 30 million impacted to date
• Skill Development: 1.7M through Networking
Academy; goal to train 500k in cybersecurity in
three years
• Sustainability: 172k tonnes of CO2 savings in
FY22
IMPACT
Cisco for Secure Digital India
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CiscoLiveAPJC
Cisco is your trusted partner.
Enabling you to digitize securely and
freeing you to achieve what’s possible.
https://www.cisco.com/go/security
Redefining Cybersecurity with AI Capabilities
Ad

More Related Content

Similar to Redefining Cybersecurity with AI Capabilities (20)

Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynote
Nur Shiqim Chok
 
Role of Generative AI in Strengthening Cybersecurity Measures | USCSI®
Role of Generative AI in Strengthening Cybersecurity Measures | USCSI®Role of Generative AI in Strengthening Cybersecurity Measures | USCSI®
Role of Generative AI in Strengthening Cybersecurity Measures | USCSI®
United States Cybersecurity Institute (USCSI®)
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-final
Wendy Murphy
 
The Most Trusted Cyber Threat Solution Providers in India.pdf
The Most Trusted Cyber Threat Solution Providers in India.pdfThe Most Trusted Cyber Threat Solution Providers in India.pdf
The Most Trusted Cyber Threat Solution Providers in India.pdf
insightssuccess2
 
Is Agentic AI a Threat to Cybersecurity of Business Enterprises? | USCSI®
Is Agentic AI a Threat to Cybersecurity of Business Enterprises? | USCSI®Is Agentic AI a Threat to Cybersecurity of Business Enterprises? | USCSI®
Is Agentic AI a Threat to Cybersecurity of Business Enterprises? | USCSI®
United States Cybersecurity Institute (USCSI®)
 
Cloud security: Industry Trends and Research Challenges
Cloud security: Industry Trends and Research ChallengesCloud security: Industry Trends and Research Challenges
Cloud security: Industry Trends and Research Challenges
Dr. Rajesh P Barnwal
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
Cisco Canada
 
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
United States Cybersecurity Institute (USCSI®)
 
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdfUNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
United States Cybersecurity Institute (USCSI®)
 
Generative AI Cybersecurity Solutions Shaping the Future of Cyber Protection ...
Generative AI Cybersecurity Solutions Shaping the Future of Cyber Protection ...Generative AI Cybersecurity Solutions Shaping the Future of Cyber Protection ...
Generative AI Cybersecurity Solutions Shaping the Future of Cyber Protection ...
Austin Joy
 
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy
NetworkCollaborators
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
Amrit Chhetri
 
IoT Day 2019 Naples - Microsoft Azure Shpere
IoT Day 2019 Naples - Microsoft Azure ShpereIoT Day 2019 Naples - Microsoft Azure Shpere
IoT Day 2019 Naples - Microsoft Azure Shpere
Mirco Vanini
 
Ijisa
IjisaIjisa
Ijisa
ijfcst journal
 
Beyond Security Article_Cyber Security_April_2015
Beyond Security Article_Cyber Security_April_2015Beyond Security Article_Cyber Security_April_2015
Beyond Security Article_Cyber Security_April_2015
RAVI PRAKASH
 
cyber security analyst certification
cyber security analyst certificationcyber security analyst certification
cyber security analyst certification
Vskills
 
Winning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsWinning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud Environments
Carl De Groote
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Enterprise Management Associates
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
Cisco XDR 2024 Cisco XDR 2024 Cisco XDR 2024
Cisco XDR 2024 Cisco XDR 2024 Cisco XDR 2024Cisco XDR 2024 Cisco XDR 2024 Cisco XDR 2024
Cisco XDR 2024 Cisco XDR 2024 Cisco XDR 2024
MichaelLee15927
 
Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynote
Nur Shiqim Chok
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-final
Wendy Murphy
 
The Most Trusted Cyber Threat Solution Providers in India.pdf
The Most Trusted Cyber Threat Solution Providers in India.pdfThe Most Trusted Cyber Threat Solution Providers in India.pdf
The Most Trusted Cyber Threat Solution Providers in India.pdf
insightssuccess2
 
Cloud security: Industry Trends and Research Challenges
Cloud security: Industry Trends and Research ChallengesCloud security: Industry Trends and Research Challenges
Cloud security: Industry Trends and Research Challenges
Dr. Rajesh P Barnwal
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
Cisco Canada
 
Generative AI Cybersecurity Solutions Shaping the Future of Cyber Protection ...
Generative AI Cybersecurity Solutions Shaping the Future of Cyber Protection ...Generative AI Cybersecurity Solutions Shaping the Future of Cyber Protection ...
Generative AI Cybersecurity Solutions Shaping the Future of Cyber Protection ...
Austin Joy
 
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy
NetworkCollaborators
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
Amrit Chhetri
 
IoT Day 2019 Naples - Microsoft Azure Shpere
IoT Day 2019 Naples - Microsoft Azure ShpereIoT Day 2019 Naples - Microsoft Azure Shpere
IoT Day 2019 Naples - Microsoft Azure Shpere
Mirco Vanini
 
Beyond Security Article_Cyber Security_April_2015
Beyond Security Article_Cyber Security_April_2015Beyond Security Article_Cyber Security_April_2015
Beyond Security Article_Cyber Security_April_2015
RAVI PRAKASH
 
cyber security analyst certification
cyber security analyst certificationcyber security analyst certification
cyber security analyst certification
Vskills
 
Winning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsWinning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud Environments
Carl De Groote
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Enterprise Management Associates
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
ijfcst journal
 
Cisco XDR 2024 Cisco XDR 2024 Cisco XDR 2024
Cisco XDR 2024 Cisco XDR 2024 Cisco XDR 2024Cisco XDR 2024 Cisco XDR 2024 Cisco XDR 2024
Cisco XDR 2024 Cisco XDR 2024 Cisco XDR 2024
MichaelLee15927
 

More from Priyanka Aash (20)

Keynote : Presentation on SASE Technology
Keynote : Presentation on SASE TechnologyKeynote : Presentation on SASE Technology
Keynote : Presentation on SASE Technology
Priyanka Aash
 
Keynote : AI & Future Of Offensive Security
Keynote : AI & Future Of Offensive SecurityKeynote : AI & Future Of Offensive Security
Keynote : AI & Future Of Offensive Security
Priyanka Aash
 
Demystifying Neural Networks And Building Cybersecurity Applications
Demystifying Neural Networks And Building Cybersecurity ApplicationsDemystifying Neural Networks And Building Cybersecurity Applications
Demystifying Neural Networks And Building Cybersecurity Applications
Priyanka Aash
 
Finetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and DefendingFinetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and Defending
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Workshop _ Most Dangerous Attack Technique...
(CISOPlatform Summit & SACON 2024) Workshop _ Most Dangerous Attack Technique...(CISOPlatform Summit & SACON 2024) Workshop _ Most Dangerous Attack Technique...
(CISOPlatform Summit & SACON 2024) Workshop _ Most Dangerous Attack Technique...
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Gen AI & Deepfake In Overall Security.pdf
(CISOPlatform Summit & SACON 2024) Gen AI & Deepfake In Overall Security.pdf(CISOPlatform Summit & SACON 2024) Gen AI & Deepfake In Overall Security.pdf
(CISOPlatform Summit & SACON 2024) Gen AI & Deepfake In Overall Security.pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Incident Response .pdf
(CISOPlatform Summit & SACON 2024) Incident Response .pdf(CISOPlatform Summit & SACON 2024) Incident Response .pdf
(CISOPlatform Summit & SACON 2024) Incident Response .pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) GRC.pdf
(CISOPlatform Summit & SACON 2024) GRC.pdf(CISOPlatform Summit & SACON 2024) GRC.pdf
(CISOPlatform Summit & SACON 2024) GRC.pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Orientation by CISO Platform_ Using CISO P...
(CISOPlatform Summit & SACON 2024) Orientation by CISO Platform_ Using CISO P...(CISOPlatform Summit & SACON 2024) Orientation by CISO Platform_ Using CISO P...
(CISOPlatform Summit & SACON 2024) Orientation by CISO Platform_ Using CISO P...
Priyanka Aash
 
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
Priyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
Priyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
Priyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
Priyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
Priyanka Aash
 
Keynote : Presentation on SASE Technology
Keynote : Presentation on SASE TechnologyKeynote : Presentation on SASE Technology
Keynote : Presentation on SASE Technology
Priyanka Aash
 
Keynote : AI & Future Of Offensive Security
Keynote : AI & Future Of Offensive SecurityKeynote : AI & Future Of Offensive Security
Keynote : AI & Future Of Offensive Security
Priyanka Aash
 
Demystifying Neural Networks And Building Cybersecurity Applications
Demystifying Neural Networks And Building Cybersecurity ApplicationsDemystifying Neural Networks And Building Cybersecurity Applications
Demystifying Neural Networks And Building Cybersecurity Applications
Priyanka Aash
 
Finetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and DefendingFinetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and Defending
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Workshop _ Most Dangerous Attack Technique...
(CISOPlatform Summit & SACON 2024) Workshop _ Most Dangerous Attack Technique...(CISOPlatform Summit & SACON 2024) Workshop _ Most Dangerous Attack Technique...
(CISOPlatform Summit & SACON 2024) Workshop _ Most Dangerous Attack Technique...
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Gen AI & Deepfake In Overall Security.pdf
(CISOPlatform Summit & SACON 2024) Gen AI & Deepfake In Overall Security.pdf(CISOPlatform Summit & SACON 2024) Gen AI & Deepfake In Overall Security.pdf
(CISOPlatform Summit & SACON 2024) Gen AI & Deepfake In Overall Security.pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Incident Response .pdf
(CISOPlatform Summit & SACON 2024) Incident Response .pdf(CISOPlatform Summit & SACON 2024) Incident Response .pdf
(CISOPlatform Summit & SACON 2024) Incident Response .pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) GRC.pdf
(CISOPlatform Summit & SACON 2024) GRC.pdf(CISOPlatform Summit & SACON 2024) GRC.pdf
(CISOPlatform Summit & SACON 2024) GRC.pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Orientation by CISO Platform_ Using CISO P...
(CISOPlatform Summit & SACON 2024) Orientation by CISO Platform_ Using CISO P...(CISOPlatform Summit & SACON 2024) Orientation by CISO Platform_ Using CISO P...
(CISOPlatform Summit & SACON 2024) Orientation by CISO Platform_ Using CISO P...
Priyanka Aash
 
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
Priyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
Priyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
Priyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
Priyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
Priyanka Aash
 
Ad

Recently uploaded (20)

Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Ad

Redefining Cybersecurity with AI Capabilities

  • 1. July 8, 2024 Redefining Cybersecurity with AI Capabilities A Platform Approach Samir Kumar Mishra Director – Cybersecurity Business Cisco India & SAARC
  • 2. Cybersecurity Trends 2024 90% of data breaches will include a human element Spent on battling malinformation by 2028 45% of CISOs’ remits will expand beyond cybersecurity by 2027 $30B Sources: Forrester Predictions 2024: Cybersecurity, Risk, And Privacy ; Gartner's Top Strategic Predictions for 2024 and Beyond
  • 3. © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Trust is no longer just an emotion Installed IoT devices in 2025 46B of Indian organizations reported malicious insider activity (vs. 38% globally) 50% of Indian companies say employees are logging into work platforms from unregistered devices 95% Everyone is an insider Businesses are competing as ecosystems Hybrid work is here to stay Sources: IDC, Worldwide IDC Global DataSphere IoT Device Installed Base and Data Generated Forecast, 2022-2026, IoT Analytics Research 2022, Cisco Annual Internet Report
  • 4. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public of Security leaders not adequately prepared to handle cybersecurity threats Source: Cisco Cybersecurity Readiness Index (2023) Cybersecurity Readiness Gap is massive
  • 5. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLiveAPJC Security Readiness: The gap is alarming Companies that expect a cybersecurity incident to disrupt their business in the next 12 to 24 months 90% Source: Cisco Cybersecurity Readiness Index (2023)
  • 6. The ability to identify, respond, and recover swiftly from an IT security incident. Building cyber resilience includes making a risk-focused plan that assumes the business will at some point face a breach or an attack. Cyber Resilience
  • 7. RANSOMWARE SPAM Security innovation is a patchwork. WEB THREATS paloalto zscaler HUNTRESS
  • 8. Multiple clouds makes tool sprawl worse Security Network Compute Storage Other Services Infrastructure as a Service Applications Services Platform as a Service Software as a Service … … Different platforms, different controls PRIVATE AZURE
  • 9. Introducing Cisco Security Cloud Security Network Compute Storage Other Services Infrastructure as a Service Security and Networking as a Service Cisco Security Cloud Applications Services Platform as a Service Software as a Service … … PRIVATE AZURE Cisco Networking Cloud
  • 10. Posture & Auth Management Endpoint Security Email Security Experience Insights Remote Browser Isolation Security Service Edge Application Security Vulnerability Management Attack Surface Management Workload Security Multicloud Defense Extended Detection & Response Ransomware Recovery Security that only Cisco can deliver Firewall Protection Cisco Security Cloud Cisco Breach Protection Powered by the Talos threat intelligence team Cisco Cloud Protection Cisco User Protection
  • 11. Posture & Auth Management Endpoint Security Email Security Experience Insights Remote Browser Isolation Network Access Control Security Service Edge Application Security Vulnerability Management Full Stack Observability Workload Security Multicloud Defense Firewall Protection Cisco Security Cloud Extended Detection & Response Cisco Breach Protection Cisco Cloud Protection Cisco User Protection
  • 12. Cisco Security Cloud delivers Users Developers and DevSecOps IT Security Ops Center
  • 13. Network Application Client Broadband WiFi User Cisco ensures a great user experience Built into Cisco SD-WAN Robust, fault tolerant global network Target latency of ~40ms or less for 99% of users Built on industry leading QUIC protocol ThousandEyes
  • 14. B security events observed daily 500 threat researchers AI powered algorithms SOC Talos powers the Cisco portfolio with intelligence https://talosintelligence.com/
  • 15. © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Confidential cs.co/talosyearinreview
  • 16. Privacy’s importance to customer trust Source: Cisco 2024 Data Privacy Benchmark Study 94% 98% 97% Of customers won’t buy if their data is not properly protected External privacy certifications are important when choosing a vendor Our organization has a responsibility to use data ethically trust.cisco.com
  • 17. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public Artificial Intelligence: Hype is driving urgency 14% of organizations globally are fully prepared to deploy and leverage Artificial Intelligence (AI)-powered technologies Considerable gaps exist in readiness across infrastructure, data, governance, and culture aspects 97% Readiness is critical: as 97% said the urgency to deploy AI- powered technologies has increased in their company in the past 6 months Companies are racing against time: 61% said they have a maximum of 1 year to deploy their AI strategy else it will have a negative impact on business 61% Source: Cisco AI Readiness Index (2023)
  • 18. Three Pillars of AI for a CISO Enable the Business to Use AI Use AI to Defend Think Like an Adversary to Inform Strategy 1 2 3
  • 19. Generative AI Creation, Reinvention Generative AI focuses on learning a representation of artifacts from data and using it to create completely original artifacts that preserve a likeness to original data Generative AI focuses on learning a representation of artifacts from data and using it to create completely original artifacts that preserve a likeness to original data Predictive AI Prediction, Recommendation Predictive AI focuses on analyzing existing data that can be used for predictions and automation Predictive AI focuses on analyzing existing data that can be used for predictions and automation Responsible AI
  • 20. Security. Simplified. The Next Decade In Enterprise AI More Data Fewer Products Enterprise adoption of AI will accelerate over the next decade Products built with broader data stores will have bigger success in the market Consolidation of the security stack will continue More AI
  • 21. What? Assist AI Assistants that change the way humans and machines interact with each other Why? How? Augment Automate Correlating insights at machine-speed, creating a 10x return on human effort Automating complex workflows that make the lives of security admins easier Efficacy Economics Experience Governance Data Models AI
  • 22. AI Assistant Experience AI Powered Detection Autonomous Actions Give your admins superpowers. Simplify management, improve outcomes. Correlate 550B security events at machine-speed. Learn from human-to-machine interactions to automate complex playbooks. Augment Automate Assist Breach Protection User Protection Cloud Protection Firewall Foundation Cisco Security Cloud We Are Injecting AI Across The Portfolio
  • 23. AI Powered Detection Correlate 550B security events at machine- speed. Autonomous Actions Learn from human-to-machine interactions to automate complex playbooks. Give your admins superpowers. Simplify management, improve outcomes. Dec 2023 Mar 2024 SOC Summarization Aug 2023 LLMs for DLP Ensemble Detectors LLMs for BEC Playbook Automation Playbook Recommendation +18-24 months +18-24 months +18-24 months Firewall XDR Duo SSE CISO Dashboard AI Assistant Experience Docs AI Encrypted Visibility Engine SLMs for 0-Days Next Best Action Automated Summaries We Are Injecting AI Across The Portfolio
  • 24. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public Firewall Admin Growing rule set with limited insight Manual configurations & troubleshooting increases risk Hard to get to root cause and resolution
  • 25. Introducing Firewall Policy Assistant © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 27. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public SOC Analyst Increased attack sophistication with AI Hard to prioritize alert storms Increasing workloads and lack of talent Siloed tools lack full context
  • 28. Introducing Cisco SOC Assistant © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 30. Bolstering our AI capabilities with acquisitions and investments Acquisitions Investments Sampling of Cisco acquisitions with AI capabilities Sampling of current portfolio companies with AI capabilities
  • 31. Cisco Security Innovation Momentum 2023 Cisco Multicloud Defense Cisco Secure Access Cisco XDR Risk-Based Authentication Cisco Access Management Cisco Secure Firewall 4200 & 7.4 OS Business Risk Observability EMEA USA PINACL Cisco Security Suites Cisco Partner Summit Acquisitions February March September May July Isovalent
  • 32. DEFEND Cisco by driving pervasive security throughout our global organization SECURE Cisco’s products through trustworthy technologies and it’s secure development lifecycle PROTECT our customers, keep and earn their trust every single day People Process Technology Policy Our Mission Cisco Security & Trust Organization
  • 33. 57% 17% 26% Data Centers 13+ Cloud Accounts ~12K Daily VPNs ~60K Global Cisco Distribution Americas APJC EMEAR 34% 29% 21% 16% Connected Stakeholders 131,000 83,000+ Employee Distribution Engineering Sales & Marketing Customer Experience Corporate Functions Employees Offices 300+ Countries 80+ Applications Global Labs (in 60 countries) ~1200 CVO / MVOs 11K+ 4,000 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public
  • 34. INVESTMENT • Critical digital infrastructure – Data centers for Webex, AppDynamics, DUO & security • Country Digitization Acceleration (50+ projects) across healthcare, agriculture, logistics, etc. • Corporate Development - Acquired four companies in India INNOVATION • Significant R&D base – Second-largest for Cisco globally • ~1,500 patents filed from India • Building an ecosystem of innovation through Cisco for Startups – 60+ startups accelerated • ThingQbator program – 2000+ ideas, 40,000+ students reached, 23 active startups to date • Customer & Partner Ecosystem: Bringing best-in- class digital capabilities like 5G, hybrid work, and cybersecurity to critical sectors (public sector, BFSI, manufacturing, etc.) • Community: Goal of impacting 50 million lives by 2025 – Over 30 million impacted to date • Skill Development: 1.7M through Networking Academy; goal to train 500k in cybersecurity in three years • Sustainability: 172k tonnes of CO2 savings in FY22 IMPACT Cisco for Secure Digital India
  • 35. © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public #CiscoLiveAPJC Cisco is your trusted partner. Enabling you to digitize securely and freeing you to achieve what’s possible. https://www.cisco.com/go/security