Cisco Blogs


Cisco Blog > Government

Driving Conversations on Cybersecurity in the Public Sector

Just like private businesses, public sector organizations are taking advantage of today’s “boundless” infrastructures. They also face the same challenging reality when implementing those networks: a threat to data security. For public sector, the stakes are especially high. The proliferation of hackers, inevitable human errors, bring-your-own-device initiatives and the ever-broadening need to share information weigh heavily on government and education organizations, and consume substantial resources.

Against this backdrop, it’s more important than ever to be constantly discussing and innovating cybersecurity measures to keep networks safe. Cisco is not only an industry leader when it comes to providing cybersecurity solutions and services for the public sector, but it is also helping drive conversations with government and technology leaders around the country. In fact, Cisco will be attending a number of cyber-focused events over the next few months:

Cisco is a proud sponsor of the RSA Conference, an event that helps drive the information security agenda worldwide and plays an integral role in keeping security professionals across the globe connected and educated. Speakers will discuss everything from cloud computing to quantitative security, and include Secretary Jeh Johnson, Department of Homeland Security.

This year’s CyberTexas conference will explore the intersection of cyber security and the ‘Internet of Things’. Cisco’s Kurt Harris, Senior Systems Engineering Manager, is presenting on This session will explore the importance of securing the IoT and how these security challenges impact the enormous opportunity presented by the IoE for public sector in the future. This session will explore the importance of securing the IoT and how these security challenges impact the enormous opportunity presented by the IoE for public sector in the future. This session will explore the importance of securing the IoT and how these security challenges impact the enormous opportunity presented by the IoE for public sector in the future. This session will explore the importance of securing the IoT and how these security challenges impact the enormous opportunity presented by the IoE for public sector in the future. the importance of securing the Internet of Things and how security challenges impact the enormous opportunity presented by the Internet of Everything for public sector in the future. Cisco is also sponsoring the “Securing the Internet of Things” track.

The 2015 Synergy Forum brings together government and industry practitioners driving our collective technology futures to examine the emerging fusion of physical and digital worlds. Gary Neal Akers, senior vice president of Advanced Security Initiatives, Cisco, will take part in a panel on security and the Internet of Things.

Linked by a commitment to cybersecurity, government agencies, intelligence personnel and industry leaders will gather at the 2015 Defensive Cyber Operations Symposium to discuss successful strategies for improving security. In addition to exhibiting its cybersecurity solutions at the symposium, Cisco’s Kapil Bakshi, Distinguished Architect, will be speaking on a panel titled “Secure, Operate and Defend in the Commercial Sector – How Do We Maintain and Increase Cyber Security While Providing Innovation in IT?”

Digital Government Institute’s 8th annual Cyber Security Conference will explore today’s cyber threats and offer an opportunity for those supporting government security initiatives to collaborate on how to detect, protect, and respond to these challenges. Peter Romness, cybersecurity solutions lead, U.S. Public Sector, will be presenting during the show. Cisco is a Gold Sponsor of the DGI Cyber Security Conference.

The NSA Information Assurance Symposium is a biannual forum hosted by the National Security Agency that brings, policy, governance, technology, hands-on training and networking opportunities to attendees from across government, industry and academia. Cisco will be exhibiting at the symposium.

That is quite the cyber roadshow! Also, don’t miss our webinar with GovLoop on April 30th for a discussion on how to stay secure and connected in the age of the Internet of Things. And of course, we will undoubtedly be talking cybersecurity during Cisco Live in San Diego, June 7-11th. If you are attending any of these events, please make sure to stop by and say hello!

 

Tags: , , , , , , , , , , , ,

IoE-Powered Business Transformation Boosts Agility and Efficiency for Oil and Gas Companies

This week I’m attending CERAWeek, the premier international gathering of energy industry leaders, experts, government officials, policymakers, and innovators. While this is the 34th annual CERAWeek conference, the mood is definitely not “business as usual.” The disruption and uncertainty created by plunging oil prices and shifting market dynamics has created the urgency throughout the industry to rethink strategies and adopt connected technologies to spur operational efficiencies.

But disruption can also create opportunity. Forward-thinking oil and gas (O&G) firms see today’s turbulent market as an opportunity to gain competitive advantage by harnessing new technologies. For example, in the Eagle Ford region in North America, improved drilling technologies are now enabling oil rigs to produce 18 times more efficiently than in 2008, and 65 percent more efficiently than in 2013.

A new study by Cisco highlights the opportunity to achieve even greater efficiencies through transformed business models and digital technologies powered by the Internet of Everything (IoE)—the networked connection of people process, data, and things.

With IoE, oil and gas firms have the opportunity to make IT services a commodity in the business, creating the potential for dramatic cost reduction and improved operational efficiency. The illustration below shows several ways O&G operations can benefit from connected technologies. To achieve these benefits, however, they will need to bring together both the IT and the operational technology (OT) sides of the business. Our survey indicates that oil and gas firms have a long way to go in breaking down the barriers between IT and OT. In fact, only 41 percent of respondents “completely” or “somewhat” agreed that their firms’ IT and OT strategies are aligned.

OandG_Digital_Tranform_01

Source: Cisco, 2015

Here are some examples of how IT-OT convergence can impact the areas of data, collaboration, and cybersecurity: Read More »

Tags: , , , , , , , , , , , , , , , ,

A Turning Point for Oil and Gas: Managing Through Turbulence to Digital Transformation

This is a big week for the global energy industry, as thousands of energy leaders, experts, technologists, and policymakers gather in Houston, Texas, for the 34th annual CERAWeek conference, the premier international event for the industry. As a corporate sponsor of the event, it’s also a big week for Cisco.

Just last week, Cisco released a new report focused on the need for digital transformation in the oil and gas industry. Based on a survey of oil and gas executives, analysts, and consultants in 14 countries, the paper validates CERAWeek’s “oil day” theme, “Turning Point for the Oil Industry.” For forward-thinking oil and gas companies, the price volatility and turbulence in the market could represent a turning point toward true digital transformation. Read More »

Tags: , , , , , , , , , , , , , , , ,

Should women consider a career in cybersecurity? Absolutely!

With the United Nations’ International Girls in ICT day fast approaching on April 23rd, this is a great opportunity to discuss how we can get young women involved in careers in technology. Cybersecurity is an ever-present issue with companies and individuals suffering attacks daily. At Cisco, we believe that protection from threats does not rely on a single technology or solution, it incorporates both the processes and of course, the people. It is predicted that by 2017, an additional two million security professionals will be needed, but what many young people – particularly women – underestimate, is how rewarding and far-reaching a career in cybersecurity can be.

Taking, the UK as one example, cybersecurity employs 40,000 people and is worth £6 billion to the economy. Yet according to the Cisco 2014 Annual Security Report, more than one million positions for information security professionals remain unfilled around the world. What’s more, is that female cybersecurity staff only account for 11 percent of the global workforce. In Europe, the figures are even worse, coming in at only 7 percent .

Today there still remains a notion that IT is a “man’s job”. Women thinking of applying are often dissuaded as they may lack the confidence needed at the very start to pursue this career path. Yet, not only is this job market growing, but these jobs pay higher than other industries. We must do what we can to encourage young women to be fearless and pursue these fields of study, because they add new perspectives in the workplace that benefit business outcomes.

Read More »

Tags: , , , , ,

Cybersecurity in the Post-Quantum Era

One of the great scientific challenges of our time is the construction of a practical quantum computer. Operating using the counterintuitive principles of quantum physics, such a device could rapidly explore an vast number of possible states. It could perform computational tasks that are far beyond our current capabilities, such as modeling molecules and designing new types of drugs—and breaking most of the cryptographic systems that are currently in use. Fortunately, no one has yet built a practical quantum computer, though many countries and companies are striving do just that. It has been claimed that the U.S. National Security Agency has a secret US$80M project with that aim, for example. Quantum computing is still an unproven technology, and it may not be practical for decades, but since it poses an existential threat to cryptography, we need to start preparing now for the possibility that one day the news will announce a breakthrough in quantum computing, and we will be living in a post-quantum world.

Read More »

Tags: , , , , ,