Steve Martino

October 7, 2019

SECURITY

Bringing Cybersecurity Home

October is Cybersecurity Awareness Month, reminding us that cyber-attacks know no boundaries between work and home, so we need to be diligent about cyber hygiene across all environments. With the abundance of connected devices we all depend on, protecting your digital footprint is no longer optional…

September 25, 2019

SECURITY

DevSecOps: Blending Critical Operations and Cultures to Increase Data Security

Two major shifts are affecting organizational cybersecurity posture: digital product and service offerings are increasingly powered by mobile, cloud and data analytics; while developers of those products and services are migrating to Development Operations (DevOps) processes for greater agility and…

June 7, 2019

SECURITY

The Endless Scourge of Malicious Email

There is no question that unwanted email is a source of annoyance. It is also the biggest source of cyber threats. In fact, just last month, spam accounted for 85 percent of all email sent. Plus, according to Verizon’s 2018 Data Breach Investigations Report, email is the number one vector for both m…

February 28, 2019

SECURITY

Anticipating the Unknowns: 2019 Cisco CISO Benchmark Study

Today, we released our CISO Benchmark Study, an annual global survey of information security leaders working at organizations of all sizes and in all industries all over the world. With over 3200 respondents across 18 countries, the study offers a solid view of what’s on the minds and to-do lists of…

October 15, 2018

SECURITY

Employees: Your Greatest Security Asset

As a CISO, I’m focused on the security of Cisco’s entire enterprise, not just our IT systems and infrastructure or the data our customers entrust in us. Because Cisco is a leading security technology provider, my team and I are fortunate to have the best tools to help prevent, detect and remediate c…

September 11, 2018

SECURITY

Cracking the Code – How to Measure the Real Value of Information Security Management

Measuring the success and value of an information security organization is a perennial challenge across all industries. Consistently tracking the effectiveness of Information Security Management Systems (ISMS) is hard enough. Add to that C-level expectations for accurate metrics that equate to value…

April 7, 2017

SECURITY

The CISO Evolution – From IT Operations to Earning a Seat at the Table

With the escalation of cybercrime, the role of Chief Information Security Officer (CISO) is fast evolving beyond its traditional operational functions of monitoring, repelling and responding to cyber threats.  Continuous changes in our connected business landscape make customer data, intellectual pr…