PWW

Portfolio AI Insights

pww.comCisco Systems, Inc. - Special Call - SEHK:4333

SEHK:4333

Mark Watts [Executives] đź’¬

During the transcript of the special call for Cisco Systems, Inc. on June 5, 2024, Mark Watts, identified as an executive, provided the following statements:

  1. Opening Remarks

    • Greeted attendees and introduced himself as the Webex producer.
    • Indicated he would hand over the session to Cam Dunn after providing housekeeping notes.
  2. Housekeeping Notes

    • Provided operator instructions.
    • Mentioned a survey would automatically pop up at the end of the session in the attendees' browsers, requesting participants to complete it.
  3. Transition to Presentation

    • Confirmed readiness to begin and handed over the session to Cam Dunn.
  4. Closing Remarks

    • Noted there were no outstanding questions at the moment but encouraged attendees to submit any questions.
    • Complimented Cam Dunn on covering the topics comprehensively.
    • Thanked attendees for participating in the event and expressed appreciation to the speakers and panelists.
    • Reminded attendees to complete the confidential survey posted in the chat panel and that it would also pop up in their browsers upon exiting.
    • Wished everyone a great day.
  5. Additional Note

    • At the end of the session, thanked everyone for attending and hoped they found the event informative.

Cameron Dunn [Executives] đź’¬

Cameron Dunn provided an extensive presentation on Cisco Vulnerability Management and its integration with Cisco Secure Endpoint. Here’s a detailed summary of his remarks:

Introduction

  • Cameron Dunn welcomed attendees to the webinar titled “Expanding Cisco's Secure Endpoint to Effectively Manage Vulnerabilities with Cisco Vulnerability Management.”
  • He acknowledged that attendees are existing Secure Endpoint customers and outlined the agenda for the webinar.

Agenda

  • The agenda included discussions on the current vulnerability management landscape, an overview of Cisco Vulnerability Management, Secure Endpoint integration, a demonstration of the platform, and a Q&A session.

Current Vulnerability Management Landscape

  • Mentioned that there are over 250,000 registered vulnerabilities in the National Vulnerability Database.
  • Noted that approximately one-third of all known vulnerabilities were released in the last three years.
  • Highlighted the exponential growth in the number of vulnerabilities, with over 100 CVEs being released daily.
  • Discussed the challenges organizations face in managing and prioritizing vulnerabilities.

Cisco Vulnerability Management Overview

  • Explained that Cisco Vulnerability Management (formerly Kenna Security) focuses on identifying which vulnerabilities are truly risky.
  • Shared statistics indicating that 95% of assets have at least one highly exploitable vulnerability and organizations typically remediate only 1 in 10 vulnerabilities.
  • Described the scoring system used by Cisco Vulnerability Management to prioritize vulnerabilities based on exploitability and risk.

Scoring Mechanism Comparison

  • Compared the scoring mechanisms of CVSS, traditional scanners, and Cisco Vulnerability Management, highlighting the latter's accuracy in identifying high-risk vulnerabilities.
  • Showcased a customer example where Cisco Vulnerability Management identified only 2,000 out of 180,000 vulnerabilities as high risk, compared to 100,000 by CVSS and 136,000 by a traditional scanner.

Methodology Behind Scoring

  • Detailed the various sources and intelligence feeds Cisco Vulnerability Management uses to determine the risk of vulnerabilities, including MITA, NVD, social media, and threat actor activities.
  • Mentioned the use of machine learning and data science, with eight patents supporting the scoring methodology.

Integration with Tools and Data Sources

  • Emphasized the vendor-agnostic nature of Cisco Vulnerability Management, capable of integrating with various vulnerability scanners, endpoints, and network discovery tools.
  • Explained the consolidation and normalization of data from multiple sources into a unified dashboard.

Integration with Cisco Secure Endpoint

  • Described the integration between Cisco Secure Endpoint and Cisco Vulnerability Management, enabling the ingestion of endpoint data for vulnerability assessment.
  • Walked through the data flow process, including querying endpoints, producing application inventories, and querying vulnerabilities based on collected data.

Platform Demonstration

  • Provided a demonstration of the Cisco Vulnerability Management platform, showcasing features such as risk meter scoring, prioritization, and guided remediation.
  • Showed how to filter vulnerabilities by risk level and create risk meters for specific groups of assets.
  • Illustrated the use of guided remediation to identify the most impactful vulnerabilities to address.

Conclusion

  • Summarized the use cases and benefits of Cisco Vulnerability Management, including improved risk reduction, centralized vulnerability management, and cost savings.

  • Mentioned a Forrester report indicating a 125% ROI within six months of implementing Cisco Vulnerability Management.

  • Concluded the presentation and invited attendees to submit questions for the Q&A session.

Feedback