risk

October 3, 2017

LIFE AT CISCO

Closing the Confidence Gap

In a world of scrolling through social media posts on our mobile devices, “thumb-stopping moments” are those that make you click with a purpose. That was what an article from the Atlantic was for me three years ago, “The Confidence Gap” made me slow my scroll. At the time, I was in the m…

July 5, 2017

SECURITY

GDPR: Start Your Privacy Protection Planning Now

One of the most talked about topics at the June Infosecurity Europe 2017 conference in London was the General Data Protection Regulation (GDPR). This is a new law concerning data privacy which will render the implications of a data breach much more severe and comes into force in all EU countries fro…

June 21, 2017

SECURITY

Control Your Own Security

Digitization continues to change business at an amazing rate and in many ways. As business leaders around the world embrace ‘Digital’ to simplify, automate, and deliver innovation, they’re no longer simply using Information Technology to run their businesses; IT is enabling it. IT is the vital lifeb…

March 5, 2017

INNOVATION

Laying the Groundwork for Organizational Change

An Innovation Funding Board (IFB) can play an effective role in reducing innovation-related struggles. In my second blog on this topic, I share key principles and questions to consider before putting an IFB in place. But first, it’s important to establish a little more clearly what an IFB is and whe…

June 28, 2016

GOVERNMENT

Don’t Risk IT: Cybersecurity Risk Driving IT Modernization

Many federal, state, and local government agencies are operating old, outdated and end-of-life network equipment. You may think this just means slower, less efficient operation – not worth the cost to refresh your infrastructure, right? Wrong. Outdated network equipment is actually a major cyb…

April 28, 2016

SECURITY

The Evolution of Scoring Security Vulnerabilities

The Common Vulnerability Scoring System (CVSS), which is used by many in the industry as a standard way to assess and score security vulnerabilities, is evolving to a new version known as CVSSv3. These changes addressed some of the challenges that existed in CVSSv2; CVSSv3 analyzes the scope of a vu…

Cisco Security Workshop at OilComm 2015

Get the edge and agility to innovate, compete, and win with Cisco’s digital solutions for oil and gas. Connect machines, assets, and people across your business with proven architectures and technologies. Secure it all from board room to field worker to remote, unmanned site. Ever wondered about how…

August 19, 2014

SECURITY

Cisco 2014 Midyear Security Report: Security Services and Risk Management

More organizations are starting to view cybersecurity as a strategic risk. They have to—it’s becoming unavoidable. Technology and the business are so intertwined. Regulators are issuing more compliance measures that include information security directives. And all the while, adversaries are re…

July 25, 2014

SECURITY

Cyber Threat Management from the Boardroom Risk: Lost in Translation

I was at the Gartner Security and Risk Management Summit at the Gaylord National Harbor and had the opportunity to attend the session, “Finding the Sweet Spot to Balance Cyber Risk,” which Tammie Leith was facilitating. During the session, the panel had been discussing how the senior le…