Cisco Security and Trust Organization

February 20, 2019

LIFE AT CISCO

Putting a Spotlight on Difficult Conversations

It’s hard to know where you might fit in at a major tech company when you eat, breathe, and sleep creativity. The two, usually, don’t go hand in hand and being able to use my creative eye had always been the backbone of my career. Working for a well-known, established, world-changing tech company se…

Do you Trust your IoT Device and its Vendor?

Does your vendor care about deploying security patches or firmware updates? Do they understand the constrains of an Internet of Things (IoT) architecture? Do they communicate important actions you need to take and are committed to conducting business at the highest standards? If you have not asked y…

April 18, 2018

SECURITY

Imagine Our Collective Impact on Cybersecurity

I just had a heart-to-heart talk with a few thousand of my fellow security professionals at the RSA Conference. We had a lot to discuss. As I walked off the stage, I was thinking about all of the people in our industry who weren’t in attendance, and all those who aren’t in our industry, yet still sh…

June 7, 2017

SECURITY

When Women Happen to Things, Things Happen

Leonardo Da Vinci once said, “It had long come to my attention that people of accomplishment rarely sat back and let things happen to them. They went out and happened to things.” Now is the time for women to make things happen. We have created a digital world knitted together by millions of connecte…

July 22, 2016

SECURITY

Keeping the “House” in Order: A Look Inside Cisco’s Data Protection Program

When I think of data protection, I think of it like the protection of our homes: We know burglars may be out there “watching” us where we live, picking up on our daily patterns and scouring our home’s exterior to find the easiest way “in.” Acknowledging this, we buy door and window locks, alarm syst…

July 20, 2016

SECURITY

How Cybersecurity is Enabling – not Defeating – Business Innovation

The Digital Economy is rapidly changing our world – seemingly as quickly as you can read this sentence there will be 50 billion devices connected to the Internet (Forecast by 2020: Cisco Internet Business Solutions Group). The Internet of Things (IoT), mobility, cloud, business intelligence and soci…

June 23, 2016

SECURITY

Connected Value Chains: The Pervasive Security Imperative

We can no longer debate the reality of digital disruption and its impact on each of us in all we do, at work, at home and at play. Today’s challenge is to embrace the connected world and address security on a comprehensive continuum to ensure its optimum impact. To do this, we must look at every tou…

May 25, 2016

SECURITY

The Second Law of IoT: Connect Consciously

In Part One of this Cybersecurity for IoT Blog Series, I noted that we should assume that everything will someday be connected—even those “things” designed without any networking capability. However, we should also be deliberate when deciding what to attach and what to isolate. When a link is establ…

May 2, 2016

SECURITY

5 Steps to an Effective Data Incident Response Program

All organizations depend, at least in part, on their data to carry out day-to-day operations. Yet new, high-profile data breaches are reported every week, and the costs of those breaches continue to rise The core elements of an incident response program are straightforward and quick to establish. Le…