Avatar

Jeff Aboud

IoT Security Manager

Internet of Things Technologies

Jeff Aboud works in Cisco’s “Internet of Things” solutions group, focusing on IoT architecture and the security ramifications of IoT adoption. He teaches IT and operations professionals that in addition to traditional physical and network security solutions, supplemental layers of security are required to securely embrace IoT – including device-level controls, end-to-end data encryption, and network-wide security policies.

Jeff's security experience spans from the desktop to the cloud, including desktop AV, gateway hardware and software, and encryption technologies. He has published numerous articles and white papers, including feature articles for UK-based Virus Bulletin. He routinely meets with business and IT leaders to discuss their real-world security challenges, and helps develop solutions based on those needs.

 

Articles

October 8, 2014

DIGITAL TRANSFORMATION

Drop the IT-Centric Mindset: Securing IoT Networks Requires New Thinking

The Internet of Things (IoT) has become a popular topic of discussion amongst security company executives, analysts, and other industry pundits. But when they begin discussing the technical details, it quickly becomes evident that many of the most experienced security professionals still approach Io…

October 7, 2014

SECURITY

To Succeed with Big Data, Enterprises Must Drop an IT-Centric Mindset; Securing IoT Networks Requires New Thinking

To help organizations who aspire to apply the power of big data enterprise-wide, Cisco provides a powerful, efficient, and secure infrastructure and a wide array of analytics solutions. In our previous blogs, others have highlighted the benefits of Cisco’s ability to provide the scalability, ability…

HAVEX Proves (Again) that the Airgap is a Myth: Time for Real Cybersecurity in ICS Environments

The HAVEX worm is making the rounds again. As Cisco first reported back in September 2013, HAVEX specifically targets supervisory control and data acquisition (SCADA), industrial control system (ICS), and other operational technology (OT) environments. In the case of HAVEX, the energy industry, and…

June 16, 2014

SECURITY

Summary: Extended By Popular Demand: The Cisco IoT Security Grand Challenge

Since its announcement at the RSA 2014 conference, the security community has been actively involved in the Cisco IoT Security Grand Challenge. The response has been so great that we’ve decided to extend the deadline by two more weeks – so you now have until July 1st, 2014 to make your submiss…

Extended By Popular Demand: The Cisco IoT Security Grand Challenge

Since its announcement at the RSA 2014 conference, the security community has been actively involved in the Cisco IoT Security Grand Challenge, an industry-wide initiative to bring the best and brightest security minds to the table to help us find innovative IoT security solutions. Thus far, we’ve h…

May 2, 2014

SECURITY

Summary: Why Should You Participate in the Cisco IoT Security Grand Challenge?

Interested in learning more about the Cisco IoT Security Grand Challenge? Plan to attend a free one-hour webinar at 12 p.m. EDT Wednesday, May 7. Cisco Futurist Dave Evans and Dr. Tao Zhang, Chief Scientist for Smart Connected Vehicles at Cisco, will talk about why the Challenge is so important to t…

Why Should You Participate in the Cisco #IoT Security Grand Challenge?

Eight weeks ago, Cisco launched the Cisco IoT Security Grand Challenge, an industry-wide initiative to bring the global security community together to secure the IoT. Despite its overwhelming business benefits, IoT adoption also significantly increases security risks. So this Challenge is really jus…

April 23, 2014

SECURITY

Summary: The Extended Network Requires Security That’s the Same, Only Different

Information Technology (IT) and Operational Technology (OT) networks have historically been completely separate, with users of each living in blissful isolation. But the Internet of Things (IoT) is changing all of that! In the IoT paradigm, IT and OT professionals will need to work together to drive…

The Extended Network Requires Security That’s the Same, Only Different

When I was in grade school, my best friend had a favorite saying whenever he disagreed with somebody’s observation that two things were really similar. “It’s the same, only different,” he would quip. Though this phrase was mostly intended to be flippant and evoke an emotional response from the recip…