Cisco Blogs


Cisco Blog > Government

Public Safety Blog Series–#IACP2013: Law Enforcement Professionals Unite

October 18, 2013 at 9:36 am PST

Even in the face of the U.S. government shutdown, law enforcement around the world continued undeterred. The 120th Annual International Association of Chiefs of Police (IACP) Conference and Law Enforcement Education and Technology Exposition will take place October 19-23, 2013 in Philadelphia.

A key event for law enforcement education, IACP 2013 topics will include everything from tracking officer injuries to understanding the power of social media.

One session we are especially excited about will be presented as part of the Chief Executive Track by Chief Todd Miller, Director of Public Safety at the Mankato Department of Public Safety, and his team.

 

This workshop will highlight strategies agencies are using to deal with mass shootings and individual crisis incidents. If you’re attending IACP2013, join this session to learn how to prepare for the resulting media frenzy and develop a community response -- Saturday, 10/19/2013 1:00PM -- 3:00PM, Room 115AB. Read More »

Tags: , , , , ,

National Cyber Security Awareness Month

This month, we are marking the tenth anniversary of National Cyber Security Awareness Month (NCSAM). The goal is to raise awareness and educate Americans about the importance of cyber security. Agencies and organizations are holding events and driving initiatives to engage Americans in a discussion about how to establish safer practices.

NCSAM sheds light on the most pressing topics in security, including mobility, education, cyber crime and critical infrastructure.  In alignment with NCSAM’s mission, we are sharing our own cyber security best practices, advice and resources.

Read More »

Tags: , , , , ,

Despite budget constraints, spending on cyber security set to increase according to Cisco study of government IT decision makers

While the shutdown challenges in the federal government over the past week have been top-of-mind, a recent Cisco survey has discovered that when operations resume, overall budget constraints are seen as the greatest challenge to government IT infrastructure, even ranking ahead of cyber attacks. This information was gathered through a third-party survey, the Cisco Connected Government Study, which was conducted last month by Clarus Research.

400 government IT decision makers (federal, state and local) were included, and the results show that reducing costs and increasing security continue to be top priorities for government IT decision makers. In the face of budget challenges, a majority (59%) of government IT decision makers said they are still likely to increase investment in cyber security over the next year, followed by cloud computing (45%) and networking (42%), according to a new Cisco Connected Government survey.

Read More »

Tags: , , , , ,

Two Cisco Blogs Named to StateTech Magazine’s “Top 50 Must-Read State and Local Government IT Blogs!”

The Cisco Government Blog and the Cisco Internet of Everything (IoE) Blog were both named to StateTech Magazine’s “Top 50 Must-Read State and Local Government IT Blogs.” This is a crowd-sourced list, where blogs were submitted and voted on, with the most useful and insightful blog sites for state and local government IT leaders making the top 50. So for those of you who voted for our blogs, thank you!

Read More »

Tags: , , , , ,

Cybersecurity Awareness Month: Unsampled Netflow – Why it’s Important for Cybersecurity

Quick question for IT leaders -- can the switches on your network report 100% unsampled netflow?  If they can’t, there may be elusive cybersecurity threats hiding within your network. Yes, inside your network.

Every week, I hear stories of intellectual property (IP) loss and personal identifying information (PII) being compromised. This is due in part to many agencies still approaching cybersecurity the way they always have -- guarding the edges to keep threats out. But that’s not enough anymore. With malware now being custom-written to bypass the perimeter, external drives plugged in, and the ever-present possibility of tricked or malicious insiders, monitoring inside the network is now one of the most effective ways to find and eliminate threats.

Read More »

Tags: , , ,