Articles
A New Day for Critical Infrastructure Security & Resilience
It’s a new Day for National Critical Infrastructure Security and Resilience. While November is recognized as the month focused on this issue in the U.S., for some time, digital transformation has widened the aperture of our lens dramatically. This year, led by the new Department of Homeland Securit…
Security in A World of “WE” – Embracing Our Third Party Ecosystems
In our increasingly digital world, technological innovation not only presents new opportunities, but also raises new risks and challenges that must be addressed collaboratively by industry, buyers, users, and policymakers. Specifically, digitization demands that risk be addressed across a dramatical…
Collaboration Is Key to Driving Cyber Supply Chain Risk Management Worldwide
In our increasingly digital world, technological innovation not only presents new opportunities, but also raises new risks and challenges that must be addressed by industry, buyers, users, and policymakers. The need for collaboration and cooperation is critical to protecting our global, digital econ…
Tackling the Growing Threat Landscape of ICS and the IIoT
It is no secret that the proliferation of connected devices and sensors has introduced new and growing security challenges across every industry and enterprise. The question is no longer whether or not a device or sensor is digitally connected. Today’s focus must be on who has access to the operatio…
Value Chain Security: The Ultimate Team Sport
In a world of increasingly “extreme” sports, I offer the premise that security in a connected world is truly the most extreme team sport of all. Why? Because while it demands a tightly aligned team, often we do not even know who or what is part of our team. In order to reach the goal of security in…
The Ecosystem of Women in Cybersecurity – A Key to our Future!
Digitization is driving each of us across all industries to make dramatic changes to how we approach customers, products, services, and the always-on, real-time information rich marketplace. This digital economy is gender agnostic. And, it is highly dependent on a connected global ecosystem. The me…
Do You Know How Secure Your Software Vendors Are?
Third parties remain a critical source of security risk. The recent discovery of malware embedded within the consumer application CCleaner, discovered by Cisco’s Talos cybersecurity research team, reminds us that cyber hygiene lies not just within ourselves. Talos stated in its September 18th Updat…
Value Chain Security: Mid-Year 2017 Perspective
Value Chain Security is increasingly top of mind across industry and government. The word is out – the value chain must be addressed to ensure viable security. Whether the discussion is framed as third party risk, cybersecurity or critical infrastructure, Cisco is at the forefront of address…
National Cybersecurity: A Collaborative Approach is Required
As we wrap up National Cybersecurity Awareness Month in the U.S., cybersecurity continues to be a top-of-mind issue for business, government and consumers alike. In February 2016, President Obama announced a Cybersecurity National Action Plan to improve the United States’ cybersecurity posture. The…