POPULARITY
AB sits down with Matt Caulfield, VP of Identity and Duo, Cisco Security, to talk about the vision and strategy for Cisco's identity portfolio. This insightful conversation spans various topics, including multi-factor authentication (MFA), social engineering, and the integration of artificial intelligence (AI) in identity security technologies.
AB sits down with Matt Caulfield, VP of Identity and Duo, Cisco Security, to talk about the vision and strategy for Cisco's identity portfolio. This insightful conversation spans various topics, including multi-factor authentication (MFA), social engineering, and the integration of artificial intelligence (AI) in identity security technologies.
A través de una cartera unificada de seguridad, Cisco ha lanzado Cisco Security Cloud para mejorar la protección de los clientes con inteligencia artificial y asociaciones estratégicas, ofreciendo una defensa integral adaptada a un entorno digital en constante cambio.
Technovation with Peter High (CIO, CTO, CDO, CXO Interviews)
871: In the age of artificial intelligence, cybersecurity has become of utmost importance to protect private information and customer data. In this episode of Technovation, host Peter High speaks with Gafnit Amiga, leader of the security research group at Outshift by Cisco, where they delve into the evolving landscape of cloud and artificial intelligence security. Gafnit, having a substantial background in application and cloud security, shares her journey from Lightspin to Cisco, highlighting her team's focus on identifying and mitigating potential security vulnerabilities in cloud services, Kubernetes, software supply chains, and AI. She shares insights on the unique challenges AI presents to security, the importance of observability, and the continuous game of staying ahead of threats. Gafnit also discusses the diversity and approach of her research team in tackling security challenges, reflecting on the transition from a startup to being part of Cisco, and offers advice to CIOs and CISOs on safeguarding against emerging security threats.
Technovation with Peter High (CIO, CTO, CDO, CXO Interviews)
871: In the age of artificial intelligence, cybersecurity has become of utmost importance to protect private information and customer data. In this episode of Technovation, host Peter High speaks with Gafnit Amiga, leader of the security research group at Outshift by Cisco, where they delve into the evolving landscape of cloud and artificial intelligence security. Gafnit, having a substantial background in application and cloud security, shares her journey from Lightspin to Cisco, highlighting her team's focus on identifying and mitigating potential security vulnerabilities in cloud services, Kubernetes, software supply chains, and AI. She shares insights on the unique challenges AI presents to security, the importance of observability, and the continuous game of staying ahead of threats. Gafnit also discusses the diversity and approach of her research team in tackling security challenges, reflecting on the transition from a startup to being part of Cisco, and offers advice to CIOs and CISOs on safeguarding against emerging security threats.
IT Setup & Cybersecurity w/ Luciano Aguayo of Redgear AZ TRT S05 EP07 (222) 2-18-2024 What We Learned This Week RedGear provides turnkey IT solutions for clients. Outsource IT to shift liability IT often an afterthought, when it should be a major priority - lifestyle of tech in a business Data is lifeblood of a company, need security Cybersecurity is just one part, need to monitor physical location, who has access, email, etc Guest: Luciano Aguayo of Redgear https://redgear.com/ Luciano Aguayo is a Texas native, and an active member and contributor to the Southwest Technology community. His professional career spans a diverse industry portfolio and has held various titles and certifications at the senior engineering and senior management levels. Luciano specializes in designing and implementing turnkey complex infrastructure solutions. For the past 20 years Luciano has designed and implemented numerous infrastructures for regional and local school districts, has a diverse portfolio of local and international businesses, including the federal government, and key Southwest landmarks and attractions. After several years in the private sector and after building a loyal customer base, Luciano launched RedGear in 2016. RedGear is a regional business to business technology solutions company. Since its inception, RedGear has quickly grown to 4 locations, 50+ employees, and recently opened a regional office in Phoenix, Arizona. Luciano remains active in the technology industry helping oversee the portfolio of one of Southwest's largest developers. He also is an active member of El Paso Community College ITSC Advisory Committee He also owns and operates El Paso's newest carrier neutral datacenter. He brings effective and proven leadership and mentoring qualities and has an eye for detail when managing projects. He has a passion for technology, giving back to the community, and mentoring the future generations of Engineers. 20+ years experience in: Cisco CCNP Routing and Switching, Cisco Nexus Datacenter, CCNP Voice, CCDA, Cisco Security, Cisco WLAN, Cisco Unified Communications (VoIP), Citrix CCA, Citrix Xen Desktop, Citrix XenApp, MCSE, MCSA, Operating Systems Troubleshooting, Hardware/Software Troubleshooting, Advanced Windows Server Configuration and Troubleshooting, VM Ware, Enterprise Design, Implementation, solutions, IT Consulting, and much more. RedGear RedGear provides professional technology services, equipment, and consulting in the Southwest US region. Our entire culture is built around supporting business infrastructures, while building relationships and delivering an exceptional customer service experience and always keeping our customers best interest a top priority. We've built our success by reputation, quality of work, professionalism, and always being there for clients every step of the way whenever they need us. Our services, certifications, experience, and expertise cover the entire spectrum of Information Technology that no other regional technology service provider can match. We manage all aspects of Technology so the customer can focus on running their business. Our company vision is based on delivering premier customer service by employing and retaining top talent that believes in our mission, we work hard to provide trusted, honest, immediate, and excellent IT services to every client, no matter how big or small. No more wondering what kind of support you will receive. Our staff is certified in numerous fields, to offer the upmost reliable support. Our experience is vast covering all sizes of organizations and industries. Notes: Seg 2 Redgear IT company responsible for security of their clients. IT is a lifestyle. RedGear value proposition is turkey solutions. They are your smart friend to help with tech. Support IT for small businesses. They also have larger enterprise type clients. They act as a consultant, and can screen for a CTO or a CIO for a company. IT should be a priority of companies yet, it is often an afterthought. Need to understand how to secure an IT room, not just in software, but also the actual room itself. Who has access? RedGear works in the tech and security industry which is the backbone of all organizations and compliance. People hire RedGear to outsource and shift liability. IT in its simplest form is anything that you plug into the wall and connect to the Internet. It can also mean security. Trust of your IT provider, and keeping business contingency. Question, businesses always have to answer is how long can they stay down with an interruption and survive. Plus what is their plan for data retention. IT can be about network, connections, computers, hardware, and the actual Physical IT room. Can also deal in cyber security and password resets. IT has both software as well as hardware like servers and programming applications. Luciano has 20+ years of experience working in IT and technology. Information Technology not always the priority of many companies but it really should be. Need a plan going forward to manage security and data in all businesses. You have to determine what's going to be your budget based on the size of the business. Not uncommon to outsource to companies like RedGear. Also need to think about the physical aspects of IT, like is your room secure? What type of energy your BTU air conditioner usage are you using? Who has control, how cool is it. Who has access to the room? What is your electrical circuit set up? Do you have redundancy? Or electrical circuit separate and dedicated to the IT. What is your data or cloud storage like? Seg 3 IT is the backbone of many organizations and should be a priority. Need to hire trustworthy people, as well as outsource IT to trustworthy companies. There's no perfect set up. Unfortunately, security breaches are more question of When, and not if. One of the worst stories about IT Luciano ever heard of was the janitor storage closet was the same as the IT room. Another issue with a lot of IT rooms is they don't have good cooling. IT should be a separate room with good security. You want to also have video security and badge access. Physical access of an IT room is very underrated. Security is the biggest threat to the end-user. You have to know when a breach happens. How did it happen? It could be software but often it's actually the employees as a threat. They need to pay attention to what is going on and types of emails they get. Also, sometimes security breaches are an inside job. Companies need to test and educate their staff about IT. Once Malware gets in to the system it can take over accounts and send email as the person. Phishing scams unfortunately are still very popular with emails. Good email security typically will filter out malicious emails. Then you waitlist your contact, so you know who it's OK to email. All these need to examine emails. Seg 4 IT reviews & monitors compliance, so a company must determine a budget. Data is the gold of companies now. Data contains the companies processes, industry secrets, and private employee and customer info. It is crucial to have a backup of company data, typically onsite and secured, plus offsite in the cloud. You'll always want to build in redundancy and have backup servers for data. Good IT set up will have disaster recovery. As for the physical set up and protecting data, you want to be aware of how your sprinkler system is set up. You always have to guard against disgruntled employees, who could steal or delete company data. Your IT provider needs to know the industry and have good experience to engineer the proper solution. RedGear has worked with some top level clients, including the DEA in Washington DC on a federal level. Their cyber security needs to be top-of-the-line. It is not in common for the average big company to deal with corporate attacks where hackers try to steal data, and then even hold it hostage for ransom. Common practice nowadays is for a business to have cyber security liability insurance. The application for the insurance will ask about the physical environment and the set up of the IT and data. The medical industry has updated cyber and HIPAA compliance. It is essential to have good IT, hospitals and any major medical office. RedGear is your IT smart friends. They will always give you recommendations of good better and best. Seg 1. – Related IT Clips from: Phishing, Malware & Cybersecurity - Try Not to Get Pwned - BRT S02 EP47 (94) 11-21-2021 What We Learned This Week: Have I been Pwned? Means have I been breached / hacked – did someone hack my email or website Phishing – most common type of email threat, like when you receive a strange email with a link – Do Not Open – DELETE (and alert other office staff of the email) Ramsonware – hack your website, or data – hold it hostage for an extortion ‘ransom' payment Dark Web – where stolen data, & info is being bought & sold VPN Connections – direct and secure Guests: Vince Matteo, Seven Layer Networks, Inc. https://sevenlayers.com/ There are many different types of cyber attacks from a password breach, website hack to email phishing scams. Vince Matteo of Seven Layers (.com) gives advice on what to be on the lookout for, tips for protection, and some reference sites for more info. We discuss Email Phishing scams, spearphishing attack, password breaches, website hacks, data breaches, ramsonware, software and VPNs. Full Show: HERE Cybersecurity, Disruption, Blockchain & Terrorism w Ari Redbord of TRM Labs - BRT S02 EP31 (78) 8-1-2021 What We Learned This Week Cybersecurity is extremely important industry for national security TRM Labs startup in cyber-security, monitors blockchain OFAC - Gov't administers economic and trade sanctions Ransomeware – specific breach, takeover of a computer system, holds data hostage Programatic Money Laundering – bad guys create new addresses, create ‘shell' companies Guest: Ari Redbord, Head of Legal and Government Affairs w/ TRM Labs https://www.linkedin.com/in/ari-redbord-4054381b4/ https://www.trmlabs.com/post/trm-labs-appoints-ari-redbord-as-head-of-legal-government-affairs Ari is formerly a US Attorney, and worked in the Treasury Department, now advises the Government on cybersecurity, and Blockchain. Cybersecurity is a fast growing and extremely important industry for national security, and corporate interests. There are Nation States acting as bad players in the cyber realm and targeting the US Government and US business. We discuss the advancements in technology on cyber crime, blockchain, crypto, and online fraud. How is the FBI dealing with Ransomware, and other cyber attacks on prime targets like the Colonial Pipeline, or other big corps. What Regulations are coming in banking, and Fintech, with KYC (Know Your Customer), plus the big banks like JP Morgan Chase and Goldman are on board. What the blockchain ledger can help solve in security, to monitor criminal activity in real time with the help of crypto exchanges like Coinbase. Lastly, what TRM Labs does for clients, how they advise, operate, and who they work with. Notes: TRM Labs – blockchain security biz, works with law enforcement and businesses. Financial exchanges and Regulators. Monitor cyber-security - TRM – startup, 3 yrs old, Ari joined 2021. Monitor risk in crypto currency. Full Show: HERE Best of Biotech from AZ Bio & Life Sciences to Jellatech: HERE Biotech Shows: HERE AZ Tech Council Shows: https://brt-show.libsyn.com/size/5/?search=az+tech+council *Includes Best of AZ Tech Council show from 2/12/2023 ‘Best Of' Topic: https://brt-show.libsyn.com/category/Best+of+BRT Thanks for Listening. Please Subscribe to the BRT Podcast. AZ Tech Roundtable 2.0 with Matt Battaglia The show where Entrepreneurs, Top Executives, Founders, and Investors come to share insights about the future of business. AZ TRT 2.0 looks at the new trends in business, & how classic industries are evolving. Common Topics Discussed: Startups, Founders, Funds & Venture Capital, Business, Entrepreneurship, Biotech, Blockchain / Crypto, Executive Comp, Investing, Stocks, Real Estate + Alternative Investments, and more… AZ TRT Podcast Home Page: http://aztrtshow.com/ ‘Best Of' AZ TRT Podcast: Click Here Podcast on Google: Click Here Podcast on Spotify: Click Here More Info: https://www.economicknight.com/azpodcast/ KFNX Info: https://1100kfnx.com/weekend-featured-shows/ Disclaimer: The views and opinions expressed in this program are those of the Hosts, Guests and Speakers, and do not necessarily reflect the views or positions of any entities they represent (or affiliates, members, managers, employees or partners), or any Station, Podcast Platform, Website or Social Media that this show may air on. All information provided is for educational and entertainment purposes. Nothing said on this program should be considered advice or recommendations in: business, legal, real estate, crypto, tax accounting, investment, etc. Always seek the advice of a professional in all business ventures, including but not limited to: investments, tax, loans, legal, accounting, real estate, crypto, contracts, sales, marketing, other business arrangements, etc.
At Cisco Live 2023, Cisco unveiled a range of solutions for SSE, network management, observability, and a new cloud-native application security solution called Panoptica. The event, which includes a performance by comedian Jim Gaffigan, highlighted Cisco's focus on simplifying user experiences and addressing the evolving needs of organizations. The security service edge (SSE) solution aims to streamline access and enhance hybrid work experiences, while the integration of generative AI into the Security Cloud improves security operations and efficiency. Cisco Networking Cloud offers a unified platform for network management, addressing challenges of complexity and fragmentation. The Full-Stack Observability (FSO) Platform brings together data from multiple domains, enabling comprehensive insights, while Panoptica provides end-to-end lifecycle protection for cloud native applications. We're getting more details on all of these products as part of Tech Field Day at Cisco Live, which included presentations from Cisco Security, ThousandEyes, and Enterprise Networking yesterday and cloud and compute, secure policy, and IoT today. Time Stamps: 0:00 - Welcome to the Rundown 1:03 - Riverbed Technology to be Acquired by Vector Capital 2:36 - China Cyber Actor Living Off The Land 6:30 - NetApp and Pure Storage Report Declines 9:43 - Cisco to Acquire Armorblox 12:53 - Nvidia briefly joins $1 trillion valuation club 16:04 - BlueCat Acquires Indeni 19:06 - Cisco Live Announcements 30:10 - The Weeks Ahead 32:11 - Thanks for Listening Follow our Hosts on Social Media Tom Hollingsworth: https://www.twitter.com/NetworkingNerd Stephen Foskett: https://www.twitter.com/SFoskett Jeff Ton: https://www.linkedin.com/in/jtonindy/ Follow Gestalt IT Website: https://www.GestaltIT.com/ Twitter: https://www.twitter.com/GestaltIT LinkedIn: https://www.linkedin.com/company/GestaltIT Tags: #Rundown, @Riverbed @VectorCapitalAE, #China, @NetApp, @Cisco, @Armorblox, #AISecurity, #Cloud, @NVIDIA, @BlueCatNetwork, @Indeni, #CiscoLive, #CiscoLive2023, #TFDx
Abby interviews Vibhuti Garg, Senior Product Marketing Manager at Cisco Security. Vibhuti explains how security is no longer an option but a must for all organizations. With a long career path in IT management and security, Vibhuti spotlights how building trust relationships with each client, providing real value, and tailoring solutions to their needs is today's best marketing.
Ninety-four percent of recent survey respondents are concerned that TLS 1.3 will break their existing security controls. With the ever-expanding amount of encrypted network traffic mandated, it's important to understand how to balance user and customer privacy with security controls. Join experts from Cisco Security and EMA Research as they discuss the rise in compliance mandates, the benefits, and the risks of uninspected encrypted traffic as adoption of TLS 1.3 grows. Join this episode to learn: -Details surrounding the rise of encrypted traffic -Sources and meaning of mandates for internal and external compliance -Different approaches to managing encrypted data/traffic Learn more Cisco Secure Firewall solutions: See, Try, or Buy https://www.cisco.com/c/en/us/products/security/firewalls/get-started.html?ccid=cc000155&dtid=odicdc000509&oid=trlsc027054 Cisco Champion Hosts Adam Hollifield (twitter.com/adambomb1219), Insight Enterprises, Architect Marc Luescher (twitter.com/LuescherMarc), Fresenius Medical Care, Network/ Email Security Architect Guests Alex Tatischeff, Cisco, Technical Marketing Engineering Leader Moderator Amilee San Juan (twitter.com/amileesan1), Cisco, Customer Voices and Cisco Champion Program
In this two-part Hybrid Work Special episode, Collette and Rosie recruit some of their favourite (and funny) Cisco colleagues from around the business to tell us all about how hybrid working is having an impact on businesses from all different technology perspectives. In this first installment they are joined by Paul Quinn from Cisco's Enterprise Networking team and Steve McKee from Cisco Security where they chat all things hybrid work, reminisce on nostalgic office memories and take part in a very fun game of Ping 2 Win!
Off the heels of the Explore Security 2022 Virtual Summit, AB sat down with Janey Hoe, Vice President Corporate Development and Cisco Investments, and Dug Song, Chief Strategy Officer, Cisco Security, for a candid and insightful conversation into cybersecurity trends ranging from investment and acquisitions to innovation, all with a focus on achieving Cisco's mission to power a more inclusive future for all.
Off the heels of the Explore Security 2022 Virtual Summit, AB sat down with Janey Hoe, Vice President Corporate Development and Cisco Investments, and Dug Song, Chief Strategy Officer, Cisco Security, for a candid and insightful conversation into cybersecurity trends ranging from investment and acquisitions to innovation, all with a focus on achieving Cisco's mission to power a more inclusive future for all.
This time we're joined by the Cisco security team to discuss both the implications and solutions involved in making sure that security teams not only protect their endpoints, applications and teams but also leverage additional insights and control through end to end visibility and segmentation.
Zero Trust security architecture models are becoming more popular as organizations seek to reduce risk. But what are both the business and cultural implications of deperimiterization? Enjoy this engaging conversation with Thycotic's Advisory CISO, and Chief Security Scientist, Joseph Carson, and his doppelgänger, Dave Lewis, the Global Security CISO at Cisco Security. Learn how a Zero Trust mindset involves not only technical solutions such as network zone segmentation, but also human-centered security awareness training and mentorship. Don't forget to rate, review & subscribe to us on Apple Podcasts, Spotify, and YouTube! Follow Dave on Social Media! ~LinkedIn ~Twitter Follow Joe on Twitter ~@joe_carson Follow us on Social!! ~Cybrary Twitter ~Thycotic Twitter ~Instagram ~Facebook ~YouTube ~Cybrary LinkedIn ~Thycotic LinkedIn
00:00 The big stories of the day 14:00 Jerry Gamblin, Director of Research, Cisco Security
SDxCentral 2-Minute Weekly Wrap Podcast for Sept. 24, 2021 Plus, the vendor is doubling-down on security, and Nokia launched a new programmable chipCisco overhauls its security management team at a critical junction; and Nokia refreshed its service provider routing silicon. Cisco Security Shakeup: Rittenhouse Out, Shankar In Cisco Targets $80B Security Opportunity, Doubles Down On Zero Trust Nokia Refreshes Service Provider Routing Silicon Learn more about your ad choices. Visit megaphone.fm/adchoices
In celebration of Women in IT Day 2021, two women Cisco Architects - Ashritha Ganapathy and Manasi Jain, Solutions and Security Architect - talk with the Principal Architect - Mikhail Mooney, on their roles as Architects and some exciting projects that are keeping them busy currently. The host is Shaun Roberts, Principal Engineer, Cisco Customer Experience Centers Call to Action Visit these pages to learn about SASE and Cisco Security offerings: https://umbrella.cisco.com/info/secure-access-service-edge-sase-for-dummies-ebook https://www.cisco.com/c/en_in/products/security/what-is-sase-secure-access-service-edge.html https://www.cisco.com/c/en_in/products/security/sase.html
The book The Hard Thing about Hard Things, by Ben Horowitz, narrates the trials and tribulations of a startup journey and the mindset required to be a founding CEO of a startup. Ben who is currently the Partner at Andreeson Horowitz shares tough learning lessons from his experience building several companies. This episode features Jeetu Patel, EVP & GM of Cisco Security and Collaboration Business Units at Cisco, who shares key insights and deep admiration for the book The Hard Thing about Hard Things. An entrepreneur himself, Jeetu talks about wartime mode vs peacetime mode of operation, managing our psychology as a leader and the importance of setting up a communication framework across the company. Jeetu also elaborates an interesting 6 part stack rank of what a company needs for business success.
On this episode of Break I.T. Down, we break down Smart Cities for non-tech listeners and techies alike. We would like to thank Cisco Security for sponsoring this episode.
On this episode of Break I.T. Down, we break down Smart Vehicles for non-tech listeners and techies alike. We would like to thank Cisco Security for sponsoring this episode.
Folge 01 - Ein Plausch mit Sarah Wambach über Cisco Security
On this episode of Break I.T. Down, we break down Edge Computing for non-tech listeners and techies alike. We would like to thank Cisco Security for sponsoring this episode.
On this episode of Break I.T. Down, we break down SD-WAN for non-tech listeners and techies alike. We would like to thank Cisco Security for sponsoring this episode.
Wade and Ben give Jay a "behind the scenes" look at the survey creation, collection, analysis and all the other work that went into the Cisco Security Outcomes Study that was released early December, 2020. https://blogs.cisco.com/security/introducing-the-new-cisco-security-outcomes-study
On this episode of Break I.T. Down, we break down Blockchain for non-tech listeners and techies alike. We would like to thank Cisco Security for sponsoring this episode.
On this episode of Break I.T. Down, we break down Cybersecurity for non-tech listeners and techies alike. We would like to thank Cisco Security for sponsoring this episode.
In this episode, part two of a two-part podcast, host Ron Temske continues his discussion with Aaron Woland, Principal Engineer, Cisco Security & Integrations Group, about the Zero Trust security concept and taking a practical and pragmatic approach to implementing Zero Trust in your organization.
Vulnerable Cellular Routers Targeted in Latest Attacks on Israel Water Facilities, Fugitive Wirecard Executive Jan Marsalek Was Involved In Attempt to Purchase Hacking Team Spyware, 8 Cybersecurity Themes to Expect at Black Hat USA 2020, Twitter says hackers viewed 36 accounts' private messages, and how Thieves Are Emptying ATMs Using a New Form of Jackpotting! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/psw659
Vulnerable Cellular Routers Targeted in Latest Attacks on Israel Water Facilities, Fugitive Wirecard Executive Jan Marsalek Was Involved In Attempt to Purchase Hacking Team Spyware, 8 Cybersecurity Themes to Expect at Black Hat USA 2020, Twitter says hackers viewed 36 accounts' private messages, and how Thieves Are Emptying ATMs Using a New Form of Jackpotting! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/psw659
In this episode, part one of a two-part podcast, host Ron Temske interviews Aaron Woland, Principal Engineer, Cisco Security & Integrations Group, about the Zero Trust security concept - the fundamentals, history, and common use case scenarios.
Tune for the latest episode of Endace Packet Forensics Files vidcast series with this week’s guest Doug Hurd, Cisco Systems Security Solutions Snr Business Development Manager. Doug shares experience and insights on some of the most robust security stacks by best in class companies. He talks about some of the techniques companies are implementing to handle the sheer volume of threat alarms and efficiently work through them. Finally, Doug shares his insights into where companies - and vendors - are heading to help security teams stay in front of the latest cybersecurity threats.
Welcome to the first episode of our new fortnightly podcast, Security Stories. A podcast by the Cisco Security team, we use storytelling to talk about the past, present and future of cybersecurity. On this episode, our special guest is Mick Jenkins MBE, CISO for Brunel University London, former army officer and soldier, and author of several spy novels including The Kompromat Kill. Mick talks about his life, career, and how he has led some incredibly innovative changes at his organization to turn its cybersecurity approach around. In the pod booth, hosts Hazel and Ben chat about Cisco's latest 'Threat of the Month', Industrial IoT attacks, and why they're on the rise. Plus discover why March 16th 1971 was a momentous day for cybersecurity in our 'On This Day' feature.
Cisco Security Business Chief of Staff, Anna Birch, and Deidre discuss the importance of alignment to drive growth in large enterprise. An acquired team brought OKRs in and the Security Business embraced them to unlock faster growth. Anna shares their journey, including the initial leadership alignment breakthrough, and how they've operationalized leading for results. The Cisco Security Business OKR practice helps align teams on common growth objectives in a matrixed org with a deep product portfolio. Since the Security team brought OKRs and WorkBoard into Cisco, it's continued to spread across other business units -- especially those with collaboration and dependencies with Anna's group. Anna has been Chief of Staff for the Security Business Group GM since it acquired OpenDNS in 2015. At OpenDNS, she was VP of People Operations and Minister of Culture. These roles at the intersection of business outcomes and empowering people and culture to achieve them serve her well as she leads the OKR practice!
Recording from #CiscoChat Live. You may have heard that Cisco will release a new, consolidated CCNA exam on February 24, 2020. But if you’re working toward the current CCNA Security certification, you may have asked yourself, “What should I do? Should I just wait for the new CCNA exam to be released?” If these questions sound familiar, then this #CiscoChat is for you. Join Stefanie Garraffa, social media manager for Learning@Cisco and Omar Santos, principal engineer for Cisco Security Research and Operations to get the tips and tricks to help you pass the 210-260 IINS CCNA Security certification exam, gain insight behind the new CCNA certification exam and decide which route is best for your learning and certification path. For more on this topic, check out these links: www.cisco.com/go/nextlevel http://cs.co/90071HvZX http://cs.co/90001HvXC
We all can see that technology is constantly changing. Hardware and software alike are continually morphing to better serve enterprises and the individual. It only makes sense that pricing models adjust to this ever-evolving environment. Paul Sibick, Channel Account Specialist at Ingram Micro for Cisco Security, and Jan Engelbrecht, Director of Strategy and Planning at the Offer Monetization Office for Cisco, sit down to answer all our questions on managed service license agreements (MSLA). Follow Paul Sibick and Jan Engelbrecht on LinkedIn. Follow us on Twitter @IngramTechSol #B2BTechTalk
This video was sponsored by Cisco. Learn more about network programmability with Intent-Based Networking: http://cs.co/6001DvutX Check out the Cisco DNA Center: http://cs.co/6000DvuQo Are you interested in becoming a Network Security Engineer? Information Security Engineer? Cyber Security Engineer? Or are you currently in this role? Things are CHANGING!!! We've been hearing about this whole "Network Programmability" thing for a while now but it seemed to only be about the Route and Switch guys. But I'm here to tell you that automation and programmability is alive and kicking in the Information Security field!! In this video I talk about this amazing demo I saw at CiscoLive that utilized Cisco DNA Center and Cisco Stealthwatch to AUTOMATE SECURITY!! What does this mean for you? Well, getting your CCNA Security, CCNP Security…CCNA CyberOps…is GREAT…but you may want to learn some Python to get ahead of the curve!
The team goes on-site in the Cisco Live Speaker room in Orlando to pick the brains of some of the best in the business. Cisco Principal Engineers Aaron Woland and Jeff Fanelli fill us in on what's new in the Cisco Security space and give an inside look at the life of a Cisco Live Speaker.
With overlapping areas of interest, why should IBM Security and Cisco Security collaborate rather than compete? In this podcast, Dov Yoran, senior director of strategy and business development at Cisco Security, talks with IBM Security’s George Mina and Mitch Mayne about the need for strong partnerships in an infosec landscape that’s more complex than ever. Resources: Attend the June 15 Webinar, Cisco Security Integrations with IBM QRadar SIEM & IBM Resilient: http://bit.ly/2LJsQlf. Download the Cisco Firepower App: http://bit.ly/2GdESAe. Download the Cisco Identity Services Engine (ISE) pxGrid App: http://bit.ly/2La0e3r. Learn more about Cisco Security and IBM Security integrations: http://bit.ly/2LMGLqP.
What were the cybersecurity game changers in 2017? Which high profile ransomware attack didn’t have a way to accept the ransom? What was the worst thing to happen to the Internet? Who can consumers trust with their data? Craig Williams from Talos and Stephen Dane from Cisco Security chat with guest moderator Gwendolyn Regina about the latest cybersecurity insights, trends, stealthy attacks, global data breaches, the real meaning of hacker, cryptocurrency, and Star Wars. As cybersecurity experts, Craig and Stephen also predict security challenges that the world could face in a decade. Learn more about Talos at https://talosintelligence.com/
Craig Williams, Global Outreach Manager at Cisco Security, explains the need to protect connected holiday devices from cyber hacks. Eric Clark, Portfolio Manager at Rational Funds, discusses investing in “old” tech stocks. Bloomberg Stocks Editor Dave Wilson shares his “Chart of the Day.” Craig Giammona, Bloomberg News Consumer Reporter, tells us why the Amazon/Whole Foods deal is boosting delivery startups. Joerg Lamprecht, CEO at Dedrone, talks about using drones in defense and airspace security. And Carol and Cory hit today's Movers and Shakers on Wall Street and Dave Wilson has his “Stock of the Day.” Learn more about your ad-choices at https://www.iheartpodcastnetwork.com
Craig Williams, Global Outreach Manager at Cisco Security, explains the need to protect connected holiday devices from cyber hacks. Eric Clark, Portfolio Manager at Rational Funds, discusses investing in “old” tech stocks. Bloomberg Stocks Editor Dave Wilson shares his “Chart of the Day.” Craig Giammona, Bloomberg News Consumer Reporter, tells us why the Amazon/Whole Foods deal is boosting delivery startups. Joerg Lamprecht, CEO at Dedrone, talks about using drones in defense and airspace security. And Carol and Cory hit today’s Movers and Shakers on Wall Street and Dave Wilson has his “Stock of the Day.”
Security is an ongoing journey--and being secure today doesn’t guarantee your organization’s security tomorrow. Wanda Castelvecchi, Cisco Security Practice Lead at ePlus, explains how the proliferation of security point products is contributing to less effectiveness in many organizations’ security posture, and how concerns over budget and insufficient cybersecurity talent create a growing concern for all. Wanda will discuss specific ways ePlus and Cisco are helping address these specific challenges to ensure security and peace of mind for our clients.
With the WannaCry Cyber Attacks happening a few weeks ago, it’s a perfect opportunity to spend some time with our resident Cyber Security Expert @M_Jacks76 to explain what actually happened and can be done to help prevent it happening in the future. To find out more about Cisco Security click here --> http://www.cisco.com/c/en_uk/products/security/index.html
Is our heavily connected information society safe within the "Internet of Things?" How do we stop the rise of super sophisticated phishing schemes that have successfully hacked millions of users? Tom Gillis, a former VP of Cisco Security and now the founder of Bracket Computing, a cybersecurity company, tackles these questions and also explains what the world’s largest financial institutions need to do in order to protect their networks. Tom and Katie also chat about the cutting edge security software that Bracket Computing just unveiled at the RSA cybersecurity conference in San Francisco.
The podcast crew invites back a special return guest - Mr. Chris Romeo - to share with the world Cisco's Security Ninja program. Which is an educational arm of Cisco Secure Development Lifecycle (CSDL). The intent of this episode is to educate listeners about Cisco's internal Ninja program and to also help our listeners start their own Security education program within their company.
SDM (Cisco Router and Security Device Manager) est un outil Web de gestion de périphériques réseaux. Découvrez le à l'aide de ce podcast.