Cisco Blogs


Cisco Blog > Corporate Social Responsibility

Cisco Prepares Young People for Cyber Security Careers

The Internet is evolving, and its next phase – the Internet of Everything – brings together people, process, data and things to create opportunities that benefit people, communities, and the environment. Cisco estimates that 50 billion devices will be connected to the Internet by 2020, making cybersecurity more vital than ever before. Cisco is engaged in several efforts to prepare young people for careers in the field.

First, Cisco has partnered with CyberPatriot, the national youth cyber education program. Bernie Skoch, CyberPatriot National Commissioner, emphasizes the need for cybersecurity training as breaches and threats become more common on the Internet.

“There are 15,000 attacks per second in the United States by people who would do ill to our systems,” Skoch said. “We have a dire need for cybersecurity professionals in the United States, but we frankly aren’t drawing enough young men and young women to be the designers, to be the planners, to be the operators of these very technical systems.”

Read More »

Tags: , , , , ,

#SmartConnectedCity Series: Dallas, Big Smart Things Happen Here

NewCitiesSummit2014If Dallas only brings images of football games and TV soap operas to mind, it’s time to re-consider this southern city.

A year ago, Dallas faced some challenges adopting comprehensive sustainability programs. But since then, the city has not stagnated in its journey to become smart and connected. Recently, Dallas has caught the attention of large technology companies, won grants, and been selected to hold thought leadership events.

This week, Dallas hosted the annual New Cities Summit, joining past host cities and world capitals Paris and São Paulo. The summit sponsor, New Cities Foundation, founded by Cisco and Ericsson, strives to incubate, promote, and scale urban innovations. The selection of Dallas as the summit’s 2014 location indicates its position as a city well on its way to becoming a technology hub. Read More »

Tags: , , , , ,

Summary: Extended By Popular Demand: The Cisco IoT Security Grand Challenge

June 16, 2014 at 8:49 am PST

Since its announcement at the RSA 2014 conference, the security community has been actively involved in the Cisco IoT Security Grand Challenge. The response has been so great that we’ve decided to extend the deadline by two more weeks -- so you now have until July 1st, 2014 to make your submission! Visit www.CiscoSecurityGrandChallenge.com for full details about the challenge and prepare your response. Good luck!

Read the full blog for more information.

Tags: , , , , , , , , , , ,

Extended By Popular Demand: The Cisco IoT Security Grand Challenge

June 16, 2014 at 5:00 am PST

Since its announcement at the RSA 2014 conference, the security community has been actively involved in the Cisco IoT Security Grand Challenge, an industry-wide initiative to bring the best and brightest security minds to the table to help us find innovative IoT security solutions. Thus far, we’ve had dozens of wonderful submissions and they’re still coming in.

Cisco_extension-banner

The initial deadline to make a submission was this coming Tuesday, June 17th. However, the challenge has been so popular that we’ve decided to extend the deadline by two more weeks, to July 1st, to give you an opportunity to complete your best work. After all, we all benefit by ensuring that the things we connect are secure. And with billions of objects networked all over the world, many of which will reside in insecure locations, security is arguably more important for IoT than it has been for any other technology in history.

Cisco will select up to six winners, each of whom will be awarded between $50,000 and $75,000 USD. The winners will be announced, and will have an opportunity to present their winning submission, at the IoT World Forum in Chicago, October 14-16, 2014!

Interested in participating? Visit www.CiscoSecurityGrandChallenge.com for full details about the challenge and prepare your response. Good luck!

Tags: , , , , , , , , , ,

#HigherEdThursdays – Cybersecurity for Higher Education: Is your network protected?

Cybersecurity is a hot topic and a major concern for all organizations.  No one is immune, and indeed, higher education institutions can fall victim to large breaches as well.  In fact, according to PrivacyRights.org, below are a few examples from the last 6 months:

Date Name

Records Lost

22-Apr-14 Iowa State University

29,780

27-Mar-14 The University of Wisconsin-Parkside

15,000

20-Mar-14 Auburn University

Unknown

6-Mar-14 North Dakota State University

290,000

26-Feb-14 Indiana University

146,000

19-Feb-14 University of Maryland

309,079

27-Nov-13 Maricopa County Community College District

2,490,000

Theft, intellectual property loss, and loss of individual’s personal data affect all organizations in varying degrees.  While higher education institutions face many of the same challenges as government and commercial organizations, they also have worries that are unique to their environments. Some of the higher education specific cybersecurity topics include:

  • Data Privacy & Security – Colleges posses the Personal Identifying Information (PII) of their students AND students parents, faculty and alumni – the numbers add up quickly.  In addition to the usual PII, this can also include: medical, financial, academic and other data.
  • Device Mobility – The average student currently has 3 devices and this is expected to grow to 5 devices in the next few years.
  • Application Protection & Control – Education specific applications have become a target for bad actors and file sharing sites cause concern of digital rights violations in Higher Education.
  • Digital Learning & Assessment – On-line classes and testing provide one-to-one learning opportunities, more choice, and cost reduction in Higher Education.  It must be secure
  • Protecting Intellectual Capital – Research universities have become a prime target for intellectual property theft.   They risk loosing valuable data and the possibility of losing grant funding.

Threats have become more sophisticated and protecting the enterprise with these topics in mind needs to be more sophisticated also.  It is no longer enough to harden access to the network and think you are OK.  Because the bad guys trying to steal your data are using so many different types of attack, effective defense requires a multi-level approach.

Cisco recently acquired SourceFire, and we have adopted their frequent question to customers: “If you knew you were going to be breached, what would you do differently?”  The 2014 Cisco Annual Security Report studied the web traffic of corporate networks and every one had connections to domains that are known malware threat sites or threat vectors – an indication that bad things are on every one of these networks and likely on most networks.  Think about the question again – what would YOU do differently?  That is what we all should be doing.

We recommend looking at the Attack Continuum of  “Before, During, and After” with the following actions for each phase:

  • Before an attack you want to harden your network, to enforce security policies with controlled, segmented access to resources.
  • During an attack you want to defend your network by detecting the threats and blocking them from getting in.
  • After an attack you want to contain the threat, determine the scope of the problem, remediate the damage, and get back to educating students.

The conventional perimeter protections such as firewalls, intrusion prevention, and anti-virus are still part of a good defense in depth framework, but more is now needed.  We offer many parts of the solution, of course, and have experts who work with universities to address their specific security needs. But no matter who you work with, please look carefully at what you can do differently to protect your students and your institution from these new, advanced threats.

Our upcoming whitepaper will focus on some of these trends, challenges and strategies for higher education. You can register to receive the whitepaper as well as a compilation of all the #HigherEdThursdays blog series upon completion.  Reserve your copy now.

Happy #HigherEdThursdays!

Tags: , , , , ,