Avatar

Jeff Moncrief

Consulting Systems Engineer

Global Security Sales

Jeff Moncrief is a Consulting Systems Engineer in the Global Security Sales Organization’s Security Analytics team. He specializes in the Network Visibility and Segmentation solution, with an expertise in the Stealthwatch portfolio. He is both a leader and member of several internal technical security advisory groups within Cisco.

Jeff is a Cisco Live Distinguished Speaker, a routine presenter at security conferences and customer briefings globally. He has over 18 years of Information Security Industry experience holding leadership roles in Support, Sales Engineering, and Pre/Post-Sales Technical Account Management. Jeff’s specializations include compliance, cloud security, incident response, and security architecture. Jeff is a CISSP and holds a variety of industry certifications.

In addition, Jeff has a BBA from Georgia State University. Jeff lives in Suwanee, GA (a metro Atlanta suburb) with his wife and 4 children.

Articles

June 28, 2019

SECURITY

Using Amazon Web Services? Cisco Stealthwatch Cloud has all your security needs covered

Like many consumers of public cloud infrastructure services, organizations that run workloads in Amazon Web Services (AWS) face an array of security challenges that span from traditional threat vectors to the exploitation of more abstract workloads and entry points into the infrastructure. This week…

December 13, 2018

SECURITY

How Stealthwatch Cloud protects against the most critical Kubernetes vulnerability to-date, CVE-2018-1002105

The increasing popularity of traditional cloud computing technologies such as server-less, on-demand compute and containerized environments has made technologies like Kubernetes part of our daily vernacular as it relates to running our applications and workloads. Kubernetes solves many of the proble…

November 26, 2018

SECURITY

A new way to think about security in AWS

Amazon Web Services (AWS) provides numerous benefits to customers, allowing companies to be more responsive, available, and cost-efficient. It also provides a number of security capabilities, including strong identity and access management, granular activity logs, and strong policy enforcement. Howe…

November 6, 2018

SECURITY

A Required Cloud Native Security Mindset Shift

There has been a significant shift in the public cloud infrastructure offerings landscape in the last 3-5 years. With that shift we as Information Security practitioners must also fundamentally shift our tactics and view of how these new services can be leveraged as a whole new landscape of possible…

September 19, 2018

SECURITY

Automated Policy & Segmentation Violation Alerting with Stealthwatch Cloud

Stealthwatch Cloud is best known for network behavioral anomaly detection and entity modeling, but the level network visibility value it provides far exceeds these two capabilities. The underlying traffic dataset provides an incredibly accurate recording for every network conversation that has trans…

September 6, 2018

SECURITY

Deploying Stealthwatch Cloud in a Google GKE Kubernetes Cluster

Cisco Stealthwatch Cloud has the unique ability to provide an unprecedented level of visibility and security analytic capabilities within a Kubernetes cluster. It really doesn’t matter where the cluster resides, whether on-premise or in any public cloud environment. Stealthwatch Cloud deploys as a d…

August 9, 2018

SECURITY

Protecting Kubernetes environments with Stealthwatch Cloud

Container orchestration and automation is taking the DevOps world by storm. Docker is the de-facto standard in the realm of containers. When a parallel for container orchestration is drawn, Kubernetes is the go-to orchestration solution for automating and scaling a container deployment, be it on-pre…