Avatar

Jeff Aboud

IoT Security Manager

Internet of Things Technologies

Jeff Aboud works in Cisco’s “Internet of Things” solutions group, focusing on IoT architecture and the security ramifications of IoT adoption. He teaches IT and operations professionals that in addition to traditional physical and network security solutions, supplemental layers of security are required to securely embrace IoT – including device-level controls, end-to-end data encryption, and network-wide security policies.

Jeff's security experience spans from the desktop to the cloud, including desktop AV, gateway hardware and software, and encryption technologies. He has published numerous articles and white papers, including feature articles for UK-based Virus Bulletin. He routinely meets with business and IT leaders to discuss their real-world security challenges, and helps develop solutions based on those needs.

 

Articles

October 7, 2014

SECURITY

To Succeed with Big Data, Enterprises Must Drop an IT-Centric Mindset; Securing IoT Networks Requires New Thinking

4 min read

To help organizations who aspire to apply the power of big data enterprise-wide, Cisco provides a powerful, efficient, and secure infrastructure and a wide array of analytics solutions. In our previous blogs, others have highlighted the benefits of Cisco’s ability to provide the scalability, ability to process both real-time data and historical data with predictable, […]

October 8, 2014

DIGITAL TRANSFORMATION

Drop the IT-Centric Mindset: Securing IoT Networks Requires New Thinking

2 min read

The Internet of Things (IoT) has become a popular topic of discussion amongst security company executives, analysts, and other industry pundits. But when they begin discussing the technical details, it quickly becomes evident that many of the most experienced security professionals still approach IoT with an IT-centric mindset. That’s because they believe IoT is mostly […]

HAVEX Proves (Again) that the Airgap is a Myth: Time for Real Cybersecurity in ICS Environments

2 min read

The HAVEX worm is making the rounds again. As Cisco first reported back in September 2013, HAVEX specifically targets supervisory control and data acquisition (SCADA), industrial control system (ICS), and other operational technology (OT) environments. In the case of HAVEX, the energy industry, and specifically power plants based in Europe, seems to be the primary […]

June 16, 2014

SECURITY

Summary: Extended By Popular Demand: The Cisco IoT Security Grand Challenge

1 min read

Since its announcement at the RSA 2014 conference, the security community has been actively involved in the Cisco IoT Security Grand Challenge. The response has been so great that we’ve decided to extend the deadline by two more weeks – so you now have until July 1st, 2014 to make your submission! Visit www.CiscoSecurityGrandChallenge.com for […]

Extended By Popular Demand: The Cisco IoT Security Grand Challenge

1 min read

Since its announcement at the RSA 2014 conference, the security community has been actively involved in the Cisco IoT Security Grand Challenge, an industry-wide initiative to bring the best and brightest security minds to the table to help us find innovative IoT security solutions. Thus far, we’ve had dozens of wonderful submissions and they’re still […]

May 2, 2014

SECURITY

Summary: Why Should You Participate in the Cisco IoT Security Grand Challenge?

1 min read

Interested in learning more about the Cisco IoT Security Grand Challenge? Plan to attend a free one-hour webinar at 12 p.m. EDT Wednesday, May 7. Cisco Futurist Dave Evans and Dr. Tao Zhang, Chief Scientist for Smart Connected Vehicles at Cisco, will talk about why the Challenge is so important to the future of IoT, […]

Why Should You Participate in the Cisco #IoT Security Grand Challenge?

1 min read

Eight weeks ago, Cisco launched the Cisco IoT Security Grand Challenge, an industry-wide initiative to bring the global security community together to secure the IoT. Despite its overwhelming business benefits, IoT adoption also significantly increases security risks. So this Challenge is really just a blatant attempt to bring the best and brightest security minds to […]

April 23, 2014

SECURITY

Summary: The Extended Network Requires Security That’s the Same, Only Different

1 min read

Information Technology (IT) and Operational Technology (OT) networks have historically been completely separate, with users of each living in blissful isolation. But the Internet of Things (IoT) is changing all...

The Extended Network Requires Security That’s the Same, Only Different

2 min read

When I was in grade school, my best friend had a favorite saying whenever he disagreed with somebody’s observation that...