© 2013 Cisco and/or its affiliates. All rights reserved. 1 Cisco Public Building Trustworthy Systems Overview and Strategy 2013 RSA Conference January.

Slides:



Advertisements
Similar presentations
TRACK and Trace with Holograms. Track & Trace Counterfeit products are challenging today’s global market place, threating revenue streams, eroding margins,
Advertisements

Global Marketing Overview of Supply Chain Security Assurance Certification/membership in supply chain security programs –Different programs focus on particular.
1 Trusted Systems in Networking Infrastructure Rafael Mantilla Montalvo Cisco Systems June 2013.
Building and Deploying the world’s first commercial application to address product authentication, brand protection and anti-counterfeiting Alpharetta.
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Trusted Hardware: Can it be Trustworthy? Design Automation Conference 5 June 2007 Karl Levitt National Science Foundation Cynthia E. Irvine Naval Postgraduate.
Security Controls – What Works
Enterprise and Global Management of e-Business Technology
Interoperability. Industry Enterprise Application Component Specifications Requirements Competitive Strategy.
Critical Drivers to be Managed for IT Managed as a Business IT Success Elements IT Overview.
2 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
Information Technology in a Supply Chain
Frederiek Toney Executive Director, Material Planning & Logistics
Getting Smarter with Information An Information Agenda Approach
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Welcome to the Cloud Era Mohammed Owais.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Internet Trust Defined. Delivered. Electronic Business the Way It Was Meant to Be.
Marketing of Information Security Products. The business case for Information Security Management.
BUSINESS DRIVEN TECHNOLOGY
Delivering an Architecture for the Social Enterprise Alpesh Doshi, Fintricity Information Age Social&Mobile Business Conference Tuesday 31st January 2012.
12 Enterprise and Global Management of e-Business Technology.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
April 9,  Employers  IS Careers  Business Support  Key Trends  Manage your career  Questions 2.
International MIS International Dimension. ID-2 Study Questions Q1: How does the global economy impact organizations and processes? Q2: What are the characteristics.
© 2003, Cisco Systems, Inc. All rights reserved _03_2003_c4 © 2003, Cisco Systems, Inc. All rights reserved _03_2003_c4.
Slide 1 Using Models Introduced in ISA-d Standard: Security of Industrial Automation and Control Systems (IACS) Rahul Bhojani ISA SP99 WG4 Meeting.
Chapter 8 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Operations Management and Supply Chain Management.
Keogh and Associates Copyright 2003 Sellers, Resellers, Integrators, Consultants What Are Their Roles?? Presenter Colin Keogh Keogh and Associates.
Avtech Systems Limited Presented by Syndicate 1 Entrepreneurship Eunice Ronoh, Anne Mwangi, Mary Luseka, Peter Mahinda, Ashford Karuga, Stan Ngure and.
Cisco Confidential 1 © 2011 Cisco and/or its affiliates. All rights reserved. Customer Name Date Cisco Transformative Networking Lifecycle Financing that.
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 End to End Security on the Smart Grid Perry Jurancich Utilities Vertical Market Development Verizon.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 3-1 BUSINESS DRIVEN TECHNOLOGY Chapter Three: Strategic Initiatives for Implementing.
C 3 : A Formula For Success Coverage, Customization & Collaboration Pete Peterson SVP, U.S. Sales, Tech Data.
Enterprise and Global Management of e-Business Technology
WORKSHOP Laredo 28 th May OBJECTIVES To provide an interactive forum to discuss the developments of Logistics Cities To share experiences – good,
“New” Business Model Focused Responsive Variable production Resilient.
Identity Assurance Emory University Security Conference March 26, 2008.
Chapter 7 Enterprise Resource Planning (ERP). Objectives After studying the chapter, students should be able to.. Explain definition of Enterprise Resource.
From Information Assurance to Trusted Systems – A Strategic Shift Patricia A. Muoio Chief, NSA Trusted Systems Research (formerly known as National Information.
Building a Fully Trusted Authentication Environment
Michael Przytula Senior Solution Architect HP Services, Asia-Pacific & Japan.
How to Sell: Errol Hayward, Marketing Manager January 2015 Cisco CCNA Collaboration and CCNP Collaboration Training.
Supply Function Evaluation and Trends
Hollings Manufacturing Extension Partnership MEP Overview 2015.
Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 1 Jeff McEachern Business Development Manager Smart Services Smart Care.
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
Copyright © 2007 Raytheon Company. All rights reserved. Customer Success Is Our Mission is a trademark of Raytheon Company. May 2007 Company Overview.
Company Profile SUNShine-Car Inc.. Introduction  Environment  Technology  Innovation.
The Business Research Company Technology. Technology Industry Taxonomy TBRC Business Research. All Rights Reseserved 2 Technology Computer Hardware &
2016. Our Focus -Data Management Solutions & Analytics Datacentre Security Analytics.
Overview + Digital Strategy + Interactive Engineering + Experience Design + Product Incubation + Data Visualization and Discovery + Data Management.
Driving Digitization Powered by Our Partner Ecosystem and Innovation Denny Trevett, Vice President, Global ISVs & Technology Partners
Cisco Capital Easy Pay to support Cisco DNA (Core Refresh)
Organization Universidad de los Andes Headquarters Bogota, Colombia
7.00 Understand marketing and business management.
Information Technology Sector
Reduce Security Risks to Protect Your Network
7.00 Understand marketing and business management.
7.00 Understand marketing and business management
Best Tax Software in Bahrain
National Defense Industrial Association
Managing Technology at Plantronics
7.00 Understand marketing and business management.
An Urgent National Imperative
Cloud adoption NECOOST Advisory | June 2017.
We secure the communication
I4.0 in Action The importance of people and culture in the Industry 4.0 transformation journey Industry 4.0 Industry 3.0 Industry 2.0 Industry 1.0 Cyber.
Presentation transcript:

© 2013 Cisco and/or its affiliates. All rights reserved. 1 Cisco Public Building Trustworthy Systems Overview and Strategy 2013 RSA Conference January 2013

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 1. Transparent – Proactive responses to customer issue 2. Responsible – Knows & exceeds customer expectations 3. Embedded Security – Architected into the products 4. Standardized – Adherence to industry & Gov. requirements 5. Assured – Secure processes throughout the product lifecycle 6. Proactive – Timely updates & maintenance 7. Ability to Execute – Global products & services reach How Does Cisco Define Trustworthy Systems

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Company Culture Trustworthy Vendor Policies Processes Technologies Genuine Products with Embedded Security Supply Chain Security Solutions Trusted Systems: The Trusted Network Foundation Individual and Group Threats Gray Market/ Counterfeit Software Manipulation Software Manipulation Espionage Hardware Tampering Disruption

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public Cisco’s Supply Chain Lifecycle Plan/Order Source Make Quality Delivery Service/ EOL Trust and the Supply Chain LifecycleTrust and the Supply Chain Lifecycle Protection of High Value/IP Scrap Management Secure Inventory Locations Physical Plant Security Limited Systems Access to Key Personnel Vulnerability Testing & Threat Modeling Design/ Develop Physical Security Practices + Security Technology Innovations + Logical Security Processes Customs & Border Protection Collaboration

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public Design/ Develop Trust and the Supply Chain Lifecycle - Product ArchitectureTrust and the Supply Chain Lifecycle - Product Architecture

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public Message to Our Customers….Cisco Is Your Trustworthy Partner © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 Company Culture Trustworthy Vendor Policies Processes Technologies Genuine Products with Embedded Security Supply Chain Security Solutions Trust is something you have to earn. Cisco strives to prove this every day.

Doing the right things the right way