There is $1.3 trillion value at stake in the financial services industry projected by 2022. Capturing this value requires embracing today’s digital disruption and the major technology transitions of mobility, collaboration, cloud, big data analytics, and security.
Join us at Cisco Live Berlin 2016 from February 15th -19th to learn how Cisco can help you on your digital business transformation journey.
Read More »
Tags: #CLEUR, customer experience, digital, digital bank, digital solutions, remote expert, security, virtual expertise
As I shared in my last blog, cloud use is rampant, pervasive, exploding! As a short recap, large organization are now using an average of 1,220 cloud services (most unknown to IT departments). The tremendous spike in cloud service usage presents challenges for IT including higher business risks, costs, and a shortage of IT resources to manage a multi-cloud environment.
At Cisco Live Berlin and Cisco Live Cloud Day this week I will be meeting with customers to share how we can help organizations manage the massive influx of cloud services within their organization.
The lines of business have spoken. The sheer number of services being used highlights that lines of business are rapidly turning to cloud to improve business agility, enable new digital business models, and improve performance.
You can’t manage what you can’t see! The first step in managing cloud use is to put in place capabilities to monitor and manage cloud use within an organization. At this week’s event, we’ll be demonstrating how Cisco Cloud Consumption as a Service can help IT leaders understand and manage their cloud use.
Cloud Consumption as a Service discovers and continually monitors public cloud use across an organization. When combined with detailed analytics and benchmarking from Cisco, this insight helps businesses reduce security risks and better understand and manage costs. This enables IT teams to partner more effectively with business groups and make educated decisions about the right cloud services.
Attending Cisco Live Berlin?
- Attend our Session: I’ll be hosting a 90 minute breakout on “Managing the Hyper Adoption and Business Risks of Cloud” (BRKCLD-4002) on Wednesday, February 17, 2016 at 11:30 a.m. This session will provide an in-depth look at public cloud adoption within organizations and a 5-step approach to managing cloud service adoption and reducing business risk.
- Visit our booth at Cisco Live Berlin to see a demonstration of Cloud Consumption as a Service and learn more about professional services that can help you establish cloud monitoring and cloud lifecycle management.
As always, feel free to chat with me for questions and comments.
Tags: cisco live, cloud, cloud consumption as a service, cloud services, security, Shadow IT
How much time do you spend at work?
For some the answer is too much! No matter how much time you spend, I’m willing to guess that it’s an important part of your week. Your work is part of who you are, where you go, and what you do.
That is why Cisco is proud to join the National Cybersecurity Alliance in its support of White House efforts to improve online security. Today’s announcement will educate and raise awareness about the importance of cybersecurity topics at home, and at work.
Our businesses help create the jobs, innovation, and economy that will underpin our future. Our homes help us foster the relationships that are the foundation of our society. As technology pushes both forward, it is clear that cybersecurity in one, without the other, is impossible.
Every day, our home and work lives get closer together. Smartphones and online collaboration services, like Cisco WebEx and Spark, increasingly allow us to work and play from anywhere. And with this added flexibility comes a shared responsibility to protect yourself and your colleagues.
Cybersecurity techniques, like Two Factor Authentication, may look a little different in the business world. At home you will receive a code in an email or SMS to access an online service or social media account. These same techniques are used by our OpenDNS and Meraki services. But at work you might supplement your network password with a security token or a smartcard.
Multifactor authentication can also be directly integrated into work tools. Cisco’s collaboration products are a great example, as they support standards-based identity authentication and authorization exchange techniques. These allow our customers to quickly and securely integrate these services into their existing identity-proofing methods.
Because our home and work lives get closer every day, we support the President’s focus on increasing general cybersecurity awareness. Stop. Think. Connect. is the common thread, and describes the basic steps needed to ensure our entire digital selves can remain safe and secure.
Tags: 2FA, connect, cyber, cybersecurity, security, Stop, Think, Two Factor Authentication, White House
As Mike Riegel pointed out in his recent blog, ‘Financial services is the prime example of an IT-intensive industry.’ Financial institutions rely on consistent technology and innovation to compete and to ensure compliance with regulatory requirements. Customers put a lot of trust in their financial services provider to secure their data and privacy.
On the other hand, cyber criminals put financial institutions in their sights in efforts that, when successful, can damage customer trust and an institution’s reputation. Financial institutions around the world are targets for malware, phishing, ransomware, and ATM skimming. The most serious losses come from targeted attacks. According to the Cisco 2016 Annual Security Report, malware is becoming increasingly sophisticated and cyber criminals are launching attacks through a variety of attack vectors, including tools that users trust or view as benign. Furthermore, targeted attacks are on the rise and the cyber criminals are unrelenting in the execution their mission.
Read More »
Tags: #SecurityEverywhere, Bill Fearnley Jr, Chris Christiansen, Christian Christiansen, Cisco, ciscochat, cybersecurity, digital, digital bank, Financial Services, IDC, security
On January 20, 2016, a new Linux Kernel zero-day vulnerability (CVE-2016-0728) was disclosed by Perception Point. The vulnerability has the potential to allow attackers to gain root on affected devices by running a malicious Android or Linux application.
Our investigation is ongoing; however, at this time we have not identified any Cisco products as exploitable. Should this change, we will publish a Security Advisory on the Cisco Security Portal.
Read More »
Tags: Cisco, CVE-2016-0728, security