Cisco Blogs

Cisco Blog > Inclusion and Diversity

Honoring Leadership: Advocating for Team Members with Disabilities

Two Cisco leaders were just recognized with high honors for their advocacy of inclusion and diversity at Cisco and within the community – leadership that champions the needs of our team members and friends with disabilities.

Greg Akers, senior vice president of Advanced Security Research and Government, and Mayte Cubino Gonzalez, a technical services manager in Belgium, are co-recipients of this year’s Diversity Best Practices “Above and Beyond” award from the Network & Affinity Leadership Congress (NALC). The NALC Diversity Award for Affinity Group Leadership is given to “individuals whose grit and determination has led to the creation, success and/or turnaround of their network/affinity group.”

One of Cisco’s key business objectives is to recruit, retain, and empower diverse, top talent through a culture of inclusion, diversity and collaboration. As members of the Connected Disability Awareness Network (CDAN) at Cisco, Greg and Mayte have made tangible progress towards this goal. Through their work on global workplace accessibility projects and initiatives, they are empowering people with disabilities and creating awareness of the unique perspectives disabled people bring to the workplace. Read More »

Tags: , , , , , , , ,

Before, During and After: How to Think About Complex Threats

I’m often asked how to deal with the security threat landscape within the context of running a business. The security threat landscape can seem like a highly complex challenge, yet as I’ve looked at it through my work with Cisco and the broader industry, it can actually be boiled down into three simple phases: before, during and after attack.

It sounds simple in theory, but in practice the conversation often focuses predominantly on the “before” phase; that is, minimizing a hacker’s chances of success. While this is clearly the most important phase, it’s also crucial to have a clear threat containment strategy for “during” an attack, and a visibility and forensics plan for “after” it as well. It seems complex, but it can be surprisingly simple. Take a look at a recent video blog I did on the topic.

Tags: , , , ,

Cisco Annual Security Report Live Broadcast – Recap

Last week, following the release of the 2014 Cisco Annual Security Report, my colleague Levi Gundert and I took questions from you, our partners and customers, about the report and its most interesting findings.

This year’s report highlighted a number of new trends and found unprecedented growth of threat alerts, which reached the highest level we’ve seen in more than a decade of monitoring.

Although the report paints a grim picture of the current state of cybersecurity, we are optimistic that there is hope for restoring trust in people, institutions, and technologies. This must start with empowering defenders with real-world knowledge about expanding attack surfaces. To truly protect against all of these possible attacks, defenders must understand the attackers, their motivations and their methods – before, during, and after an attack.

Here is a link to view the recording of the broadcast. If you have any questions that didn’t get answered, please leave them in the comments, and Levi or I will get back to you.

Tags: , , , , , , , , ,

2014: A Look Ahead

It’s December and the 2013 cyber security news cycle has just about run its course. We’ve seen more and increasingly virulent attacks, continued “innovation” by adversaries, and a minor revival of distributed denial of services (DDOS) actions perpetrated by hacktivists and other socio-politically motived actors.

Against this, Cisco stood up tall in recognizing the importance of strong security as both an ingredient baked into all Cisco products, services, and solutions, and a growing understanding of how to use the network to identify, share information about, and defeat threats to IT assets and value generation processes. I can also look back at 2013 as the year that we made internal compliance with the Cisco Secure Development Lifecycle (CSDL) process a stop-ship-grade requirement for all new Cisco products and development projects. Read More »

Tags: , , , , , ,

Summary : Sourcefire in our Data Center by Cisco Chief Security Officer








Last October , Cisco confirmed that Sourcefire was now part of our family of security products and solutions .

“With this acquisition, we take a significant and exciting step in our journey to define the future of security. As one company, we offer an unbeatable combination that will greatly accelerate our mission of delivering a new, threat-centric security model. Through the addition of Sourcefire’s competitive talent and technologies, I see vast opportunities to expand Cisco’s global security footprint in both new and emerging markets, broaden our solution sets and deepen our customer relationships “

Chris Young, Cisco Senior Vice President Security Group
in his blog “Delivers Threat-Centric Security Model “

“Beyond the technology, one of the things that is important to me is that Cisco and Sourcefire both share key values that transcend our company names, HQ locations and number of employees. Much like Sourcefire’s Firemen Principles, you can be confident that these values will continue as one team at Cisco.”

Martin Roesch, Sourcefire founder and CTO and now VP and Chief Architect of Cisco Security Group
in his blog ONE Team 

These days , John Stewart , Senior Vice President, Cisco Chief Security Officer , announced that we completed the  deployment of Sourcefire at Cisco . John Stewart oversees at Cisco the Threat Response, Intelligence and Development ( TRIAD ) organization .

The implementation is already giving us insights into our data center that we never had before

To know  more about this deployment and John’s first impressions check his blog
 The First Inline Production Deployment at Cisco 


The Cisco security architecture helps data center networking teams take advantage of security capabilities built into the underlying data center fabric, to accelerate safe data center innovation. There are three important security measures that every IT organization should follow to securely support data center innovation. 
To learn more, download the Cisco white paper “Three Must-Have Security Measures that Accelerate Data Center Innovation.”

Tell us what do you think of the acquisition of Sourcefire by Cisco .


Tags: , , , , , , , ,