Cisco Systems, Inc. - Special Call - SEHK:4333
SEHK:4333
Mark Watts [Executives] đź’¬
During the transcript of the special call for Cisco Systems, Inc. on June 5, 2024, Mark Watts, identified as an executive, provided the following statements:
-
Opening Remarks
- Greeted attendees and introduced himself as the Webex producer.
- Indicated he would hand over the session to Cam Dunn after providing housekeeping notes.
-
Housekeeping Notes
- Provided operator instructions.
- Mentioned a survey would automatically pop up at the end of the session in the attendees' browsers, requesting participants to complete it.
-
Transition to Presentation
- Confirmed readiness to begin and handed over the session to Cam Dunn.
-
Closing Remarks
- Noted there were no outstanding questions at the moment but encouraged attendees to submit any questions.
- Complimented Cam Dunn on covering the topics comprehensively.
- Thanked attendees for participating in the event and expressed appreciation to the speakers and panelists.
- Reminded attendees to complete the confidential survey posted in the chat panel and that it would also pop up in their browsers upon exiting.
- Wished everyone a great day.
-
Additional Note
-
At the end of the session, thanked everyone for attending and hoped they found the event informative.
-
Cameron Dunn [Executives] đź’¬
Cameron Dunn provided an extensive presentation on Cisco Vulnerability Management and its integration with Cisco Secure Endpoint. Here’s a detailed summary of his remarks:
Introduction
- Cameron Dunn welcomed attendees to the webinar titled “Expanding Cisco's Secure Endpoint to Effectively Manage Vulnerabilities with Cisco Vulnerability Management.”
- He acknowledged that attendees are existing Secure Endpoint customers and outlined the agenda for the webinar.
Agenda
- The agenda included discussions on the current vulnerability management landscape, an overview of Cisco Vulnerability Management, Secure Endpoint integration, a demonstration of the platform, and a Q&A session.
Current Vulnerability Management Landscape
- Mentioned that there are over 250,000 registered vulnerabilities in the National Vulnerability Database.
- Noted that approximately one-third of all known vulnerabilities were released in the last three years.
- Highlighted the exponential growth in the number of vulnerabilities, with over 100 CVEs being released daily.
- Discussed the challenges organizations face in managing and prioritizing vulnerabilities.
Cisco Vulnerability Management Overview
- Explained that Cisco Vulnerability Management (formerly Kenna Security) focuses on identifying which vulnerabilities are truly risky.
- Shared statistics indicating that 95% of assets have at least one highly exploitable vulnerability and organizations typically remediate only 1 in 10 vulnerabilities.
- Described the scoring system used by Cisco Vulnerability Management to prioritize vulnerabilities based on exploitability and risk.
Scoring Mechanism Comparison
- Compared the scoring mechanisms of CVSS, traditional scanners, and Cisco Vulnerability Management, highlighting the latter's accuracy in identifying high-risk vulnerabilities.
- Showcased a customer example where Cisco Vulnerability Management identified only 2,000 out of 180,000 vulnerabilities as high risk, compared to 100,000 by CVSS and 136,000 by a traditional scanner.
Methodology Behind Scoring
- Detailed the various sources and intelligence feeds Cisco Vulnerability Management uses to determine the risk of vulnerabilities, including MITA, NVD, social media, and threat actor activities.
- Mentioned the use of machine learning and data science, with eight patents supporting the scoring methodology.
Integration with Tools and Data Sources
- Emphasized the vendor-agnostic nature of Cisco Vulnerability Management, capable of integrating with various vulnerability scanners, endpoints, and network discovery tools.
- Explained the consolidation and normalization of data from multiple sources into a unified dashboard.
Integration with Cisco Secure Endpoint
- Described the integration between Cisco Secure Endpoint and Cisco Vulnerability Management, enabling the ingestion of endpoint data for vulnerability assessment.
- Walked through the data flow process, including querying endpoints, producing application inventories, and querying vulnerabilities based on collected data.
Platform Demonstration
- Provided a demonstration of the Cisco Vulnerability Management platform, showcasing features such as risk meter scoring, prioritization, and guided remediation.
- Showed how to filter vulnerabilities by risk level and create risk meters for specific groups of assets.
- Illustrated the use of guided remediation to identify the most impactful vulnerabilities to address.
Conclusion
-
Summarized the use cases and benefits of Cisco Vulnerability Management, including improved risk reduction, centralized vulnerability management, and cost savings.
-
Mentioned a Forrester report indicating a 125% ROI within six months of implementing Cisco Vulnerability Management.
-
Concluded the presentation and invited attendees to submit questions for the Q&A session.