S&TO
Tackling the Growing Threat Landscape of ICS and the IIoT
It is no secret that the proliferation of connected devices and sensors has introduced new and growing security challenges across every industry and enterprise. The question is no longer whether or not a device or sensor is digitally connected. Today’s focus must be on who has access to the operatio…
Disruption on High: Managing Cyber Risk in a Multicloud World
Digital transformation is happening and with it comes the pain of disruption. For many organizations around the world, it looks like this: your workforce is increasingly mobile, employees are using a variety of devices to access your network, and utilizing potentially an unknown amount of cloud serv…
Employees: Your Greatest Security Asset
As a CISO, I’m focused on the security of Cisco’s entire enterprise, not just our IT systems and infrastructure or the data our customers entrust in us. Because Cisco is a leading security technology provider, my team and I are fortunate to have the best tools to help prevent, detect and remediate c…
A Tough Conversation – Culture Shifts at Cisco
Have you ever sat down with so much to say, and then the second your fingers hit your keyboard –the words are almost too difficult to type? This is that post for me. It’s personal, and something I’m passionate about. It’s difficult because there are so many different perspectives to consider. And li…
Securing Critical Infrastructure in the Digital Age
We know adversaries have the expertise and tools necessary to take down critical infrastructure and systems that cripple entire regions. These critical systems are essential to our global economy, physical security, and health. We rely on them to provide electricity in our homes; transportation to w…
Build a Secure Cyber Foundation
October is Cybersecurity Awareness Month in the United States, European Union, and many countries around the world. Cybersecurity Awareness Month brings to light the many successes we’ve realized and the struggles we continue to face – a sobering reminder that our work is far from finished. This yea…
Cracking the Code – How to Measure the Real Value of Information Security Management
Measuring the success and value of an information security organization is a perennial challenge across all industries. Consistently tracking the effectiveness of Information Security Management Systems (ISMS) is hard enough. Add to that C-level expectations for accurate metrics that equate to value…
Paying It Forward – Investing in Cybersecurity’s Future with Summer Camp
Solving the cybersecurity skills gap is difficult – but as an industry, we have a responsibility to educate the next generation who grew up with technology that wasn’t necessarily designed for security! In July, Cisco partnered with the Texas Advanced Computing Center (TACC), to host a cybersecurity…
Laying the Foundation to Secure Critical Infrastructure
We know critical infrastructure is vulnerable to cyber-attacks. Widely discussed for more than a decade, the risk is well known to both the public and to risk management and cybersecurity experts. With the rising wave of global Digitization, Industry 4.0 and the Industrial Internet of Things (IIoT)…