Avatar

At Cisco, we talk a lot about cybersecurity as a strategic advantage for organizations. We believe that a strong security program must be an inherent component of a digitization strategy. There are consequences for organizations that don’t have a plan for addressing this risk. As Ashley Arbuckle, Vice President of Cisco Security Services, said in his blog post last week, “Organizations that have any doubt about their cybersecurity capabilities delay important digital initiatives and risk falling behind the competition tomorrow.”

The intertwining of business strategy and cybersecurity strategy is resonating more and more with our customers, and not just those who focus on security as their primary job role. This summer, at Cisco Live US, over 100 IT executives attended an Executive Symposium, and a good percentage of them stayed an extra day to attend a workshop on how to build a plan to protect their digitization strategy.

Since this month is National Cyber Security Awareness month, I took the opportunity to catch up with the security experts who presented the workshop: Patty Wright and Gary Alterson from Cisco’s Security Advisory Services group. Here’s what they say are the 3 things you need to do now to protect your organization’s digitization strategy.

picPatty Wright – Senior Director, Security Advisory Services

galterso Gary Alterson – Practice Lead, Strategy, Risk and Compliance

 

Once an organization has acknowledged cybersecurity as a critical component of their digitization strategy, what should they do about it? They probably already have some security measures in place. So, maybe the better question is, what should they do differently?

Patty: We talk to customers all the time, and they do have anti-virus, firewall, intrusion prevention and other security technologies in place. But, if the company is seeking a digitization strategy, they are going to need to do more than the basics. A basic strategy tends to be very reactive: a security issues comes up, the IT department applies a product or technology to resolve that particular situation. That approach is inflexible: it solved a point-in-time problem, but a week later, a month later – something in that environment will change and the security band-aid won’t work any more. Maybe they added a new application to improve customer experience. Maybe they merged with another company and now they have a blended IT environment. The original solution to the point-in-time problem doesn’t work. So, the first thing organizations need to do is to move beyond the basics.

Gary: A lot of organizations believe they have the basics in place, and they may have at one point in time, but the basics are a moving target, evolving as threats and technology evolve. For example, given the pervasive use of cloud, cloud security architecture and supporting controls should be a fundamental security basic, and we have a long way to go as an industry on that.

In addition to ensuring they have the right technology, implemented the right way, for the right business reasons, they still need to think about the people and the process elements of their programs. Do they have the right skills in place? Are they interlocked on security strategy not just within IT and security functions, but across business functions as well? Are there operational processes in place for security? How will they measure success of their program?

Patty: Many organizations built their security programs 8 or 10 years ago. They haven’t fully considered how they will manage risk within their digital process or how they will adapt to changing industry requirements. Even their governance models for security are likely to be inadequate because they do not allow for the agility required for today’s environment.

So, the first thing organizations need to do is move beyond the basics. What’s the second thing they should do?

Gary: Even when they have the basics in place, many organizations find themselves stuck fighting the last battle. They aren’t able to look ahead and proactively build a flexible and embedded security architecture. This is important. If security is going to be a business enabler, the architecture needs to support constantly evolving business processes and technology without being onerous to users. One of the primary reasons you hear CISOs being resistant to change is because they don’t know how to achieve an architecture that can securely support rapid change.

Patty: That means they need to have an architecture that differentiates between different people, devices, applications, and data and applies different sets of controls. So, it starts with being able to establish identity and trust, then enforcing specific policies while applying appropriate isolation at the network, system or data level. It also includes achieving appropriate levels of visibility and resilience.

Gary: The benefits of moving to embedded security and a flexible architecture are numerous. For example, threat analytics will have much higher fidelity, time to detect and time to respond [to threats] will be reduced. Resilience to security threats will be enhanced and the longtime goal of protecting data according to its value can actually be achieved.

And the third thing they can do?

Gary: Organizations need to address risk specifically within their digitized business process. This requires mapping that process out, identifying the information risks within the process itself, as well as evaluating the underlying infrastructure, applications, and IT operations that support that process end to end.

Patty: This will allow organizations that are pursuing digitization strategies to benefit from a much stronger ability to manage risk as they move into new business models or offer innovative new experience for their customers.

 

Join the National Cyber Security Month conversation on Twitter @CiscoSecurity #CyberAware.

Authors

Ann Swenson

Marketing

Global Marketing and Communications

Avatar

It’s difficult to imagine our world today without outdoor location-based services like maps and taxi-hailing apps. Indoor location-based services, however, have lagged behind as a technology despite its many uses. With the ability to track traffic flow and location-usage, comes data and metrics that can transform how we interact with the world.

Cisco CMX or Connected Mobile Experiences is all set to redefine and advance virtual-human interactions. The technology backbone supporting these mobile experiences is High Accuracy Location that combines ‘Hyperlocation’ and ‘Bluetooth Low Energy’ (BLE) technologies.

Hyperlocation and BLE have individual use cases that are driving tremendous disruption. However, their combined synergy can truly revolutionize indoor location-based services.

Accurate knowledge of locations within a facility can inform and transform our real-world interactions. A hospital manager can look at the concentration of activity within his facility and determine where bottlenecks are that could be removed, saving lives. A retail store owner can determine which areas of the store people tend to congregate in and move featured inventory for better display. An employer can better understand which areas of the workplace are most-conducive to teamwork and collaboration thereby improving productivity. Hyperlocation allows for geo-fencing and highly advanced location analytics that can yield a rich consumer experience. For instance, a college can text message all students within a geo-fence of a certain building or message students about overdue books when they are near the library. Not just content and targeted messages, but shopper analytics too can be conducted based on specific sections of the store visited.

1025959 - CMX Blog Image_101716The challenge, however, is usually on the infrastructure side – how can the wireless network leverage BLE in a scalable, reliable and cost-effective way?  Traditionally it has been very time consuming and expensive to deploy and manage physical beacons for BLE.  The installation often requires comprehensive site surveys, which have to be redone whenever beacon placement changes (or the RF environment is altered).  In addition, batteries in the beacons are expensive to replace, and the beacons themselves can be lost or stolen. With the introduction of Cisco Beacon Point, an industry-first Virtual Bluetooth Low Energy (VBLE) beacon consul, we have developed a unique and highly innovative solution to address this challenge.

Each beacon point can replace eight physical beacons with a software-defined beacon, allowing for battery-free use and operational simplicity. These software-defined beacons plug into a cloud-based portal that allows easy management of software-defined beacons while making available the reporting data. Cisco Beacon Point supports beaconing in Apple iBeacon, Google Eddystone and AltBeacon advertising formats.

There’s never been a better time to innovate and launch new technology. We predict new and creative ways to use High Accuracy Location that will open up as the technology goes mainstream. The possibilities are endless as technology changes the way we live, do business, and interact every day.

Would love to continue the discussion @aoswal1234.

https://www.youtube.com/watch?v=QeOWJL1QlEY

 

Authors

Anand Oswal

No Longer with Cisco

Avatar

The final sprint is on to the finish line spotlighting the world’s most disruptive digital innovators for industry.

It is my distinct honor to announce the six finalists of this year’s Innovation Grand Challenge. These six superstar startups rose to the top of aInnovation Grand Challenge_Ski Solution competition launched last May at the Pioneers Festival in Vienna, attracting more than 5,500 participants from 150 countries that spanned every continent except Antarctica.

They are all digital trailblazers with the best potential to shake up private and public market sectors by harnessing the power of Cisco’s digital platform.

The finalists are:

  • CloudMedx, United States: AI platform simplifies, scales and automates delivery of healthcare apps to care providers for better treatment.
  • Dedrone, United States: Automated, 3D aerial security platform identifies unauthorized drones, protecting critical installations.
  • Gestoos, Spain: Artificial intelligence for cameras that can see people’s movement and understand their behavior.
  • L7 Defense, Israel: Self- and machine-learning intelligence platform lessens DDoS attacks with little user interference.
  • ProGlove, Germany: Smart, wearable gloves link workers to digitized systems, improving speed, quality and data.
  • Streamroot, France, Centralized video optimization network improves speed, quality of service, and global reach.

This is an impressive array of inter-connected and networked technologies in both the public and private sectors.

These finalists now move on to the live competition Nov. 9 at the Web Summit in Lisbon, Portugal. There, they will pitch their ventures to a panel of prominent industry experts, who will declare three winners and award a total of $250,000 in cash plus world class, co-innovation support and opportunities. Judges will score each idea on its potential to expand new markets, compatibility with Cisco’s technology and business objectives, creative differentiation, and caliber of their talent to go to market.

Web SummitWith just two weeks to go, the finalists will fine-tune their solutions, sharpen their value propositions, hone their messages, rehearse their pitches and respond to written questions from judges. We will provide them with travel arrangements to the Web Summit, an ideal venue for such a global event where 50,000 attendees from Fortune 500 companies and aspiring startups converge.

Our own John Chambers, Chairman of the Board, is keynoting, “Every country will be digital” on the center stage, Nov. 8, 11:20a.m.

We must recognize that innovation doesn’t happen on its own! We especially appreciate and value our partnership with TTTech to help run this challenge, and to co-host the finals at the Web Summit.

Also, narrowing such a large field of entrepreneurial ingenuity has been no easy job. About 100 Cisco leaders volunteered to pore over the thousands of entries, analyze them against our criteria, whittle them to 15 semifinalists, and now down to six finalists. There are too many to name, but I cannot thank all of you enough for your time, diligence and dedication in this important process.

I also want to tip my hat to all those who have participated in our Innovation Grand Challenges. We consider all of you winners—today’s and tomorrow’s emerging game-changers. You are true pioneers whose brilliant ideas, business acumen, and technology know-how are vastly improving the quality of life in society and business. I hope you keep coming back year after year.

It’s hard to believe that we are in the third year of the Innovation Grand Challenge and nearing the winner’s circle once again. The speed and growth of innovation is breathtaking these days. We have nearly doubled participation each year, and this challenge has already attracted 57.5 million impressions on social media platforms. Clearly, there’s never been a better time to innovate.

The digital revolution, powered by the Internet of Things, is opening vast opportunities in every industry sector. We know that innovation can come from anywhere, and companies—no matter their size or success—can’t innovate alone. That is why we search the world over to discover new talent, co-innovate and collaborate for everyone’s success.

Stay tuned for my update in a couple of weeks when we culminate this year’s Innovation Grand Challenge by declaring the three winners in Lisbon. My heartfelt best wishes to all the finalists!

 

#CGIC16

#NeverBetter

#CiscoInnovates

Authors

Alex Goryachev

Senior Director, Innovation Strategy & Programs

Corporate Strategic Innovation Group

Avatar

#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we’re discussing Cisco Unified Border Element (CUBE).

Cisco Champion 2016Get the Podcast

  • Listen to this episode
  • Download this episode (right-click on the episode’s download button)
  • View this episode in iTunes

Cisco Guest
John Vickroy, Product Manager

Cisco Champion Hosts
Enda Cahill (@endacahill10), Technical Director

Moderator
Kim Austin (@ciscokima)

Continue reading “#CiscoChampion Radio, S3|Ep. 27: Cisco Unified Border Element (CUBE)”

Avatar

Co-Authors: Frank Palumbo, SVP, Global Data Center & Enterprise Networking Sales and Kristine A. Snow, SVP, Cisco Capital

We’ve previously written about how companies can overcome financial limitations and develop organizational agility with Open Pay financing from Cisco Capital. Today, we want to show an example of how Open Pay’s unique features have enabled Insight Enterprises to adapt to the rapidly evolving landscape of technology acquisition and maintenance in the digital age.

Unlike other variable consumption models, Open Pay fuels scalability and organizational flexibility through a metered approach to monitoring usage – a technical feat that only Cisco has been able to employ for converged infrastructure, storage, routing and switching solutions. With the combination of metered usage and scalable financial capacity, organizations can financially pivot with agility and flexibility only rivaled by professional athletes.

No wonder Open Pay has become a solid part of the technological backbone of several organizations since it was first launched in April 2015. One early adopter was Insight Enterprises.

Insight Enterprises is a Cisco and Cisco Capital customer, partner and value added reseller of IT technologies and services. The ability to innovate and showcase how Insight leverages its own technological investments is a top priority for the company, particularly since it allows Insight to show customers how to achieve their business objectives. Think of the cobbler’s children that have the shoes, for a change.

Watch the video to see how Open Pay enabled Insight Enterprises to provide the flexibility and agility they were looking for, while addressing technology refresh and financial goals.

Cisco Capital Video

With Open Pay’s variable consumption model, Insight was able to simultaneously

  • Reduce time to market from over 60 days to hours,
  • Improve budget predictability, and
  • Drive a regular three-year technology refresh.

With Open Pay’s metered approach, organizations can better align infrastructure costs to actual usage – saving time and money while increasing operating efficiency. Companies can prepare for both anticipated and unexpected demand spikes with less risk and increased elasticity, as demonstrated by Insight.

“Open Pay from Cisco Capital has enabled Insight to provide both consumption (capacity on demand) and financial flexibility that is missing in most private/hybrid cloud deployments,” said Carlos Sotero, Insight’s IT Director, “it enables us to have additional capacity already on the data center floor that can be provisioned within minutes and paid for with flexible terms.”

Want to learn more about how Open Pay can help increase flexibility for your company technology infrastructure like it helped Insight? Start by talking to a Cisco Capital representative.

Authors

Frank Palumbo

Senior Vice President

Global Data Center Sales

Avatar

These Vulnerabilities were discovered by Tyler Bohan of Cisco Talos.

Talos is releasing multiple vulnerabilities (TALOS-2016-0187, TALOS-2016-0190 & TALOS-2016-0205) in the LibTIFF library . One vulnerability (TALOS-2016-0187) is an exploitable heap based buffer overflow that impacts the LibTIFF TIFF2PDF conversion tool. Another vulnerability (TALOS-2016-0190) impacts the parsing and handling of TIFF images ultimately leading to remote code execution. The final vulnerability (TALOS-2016-0205) is an exploitable heap based buffer overflow in the handling of compressed TIFF images in LibTIFF’s PixarLogDecode API. An attacker who can trick a user into processing a malformed TIFF document can use one of these vulnerabilities to achieve remote code execution on the targeted system.

The Tagged Image File Format (TIFF)  was developed in the mid-1980’s as a common file format able to store image data in a lossless format for the burgeoning image manipulation industry. Since then TIFF files have been widely adopted within the graphic arts industry, and also by electronic fax systems.

<<Read_More>>

Authors

Talos Group

Talos Security Intelligence & Research Group

Avatar

The University of British Columbia is making buildings smarter with green initiatives. UBC transformed their building network to obtain highly granular, digital insights into traffic patterns. Using these data analytics, they improved operational efficiencies, resulting in 33 percent lower gas emissions and 5 percent energy savings.

UBC’s one million square meter campus supports approximately 70,000 concurrent clients using the network on 130,000 unique devices, supported by 5500 access points. UBC paved the way in digitizing their network to glean data analytics on traffic patterns to improve and adapt their campus buildings. With Cisco CMX, UBC is now able to dynamically adapt to building occupancy rates.

“The lightbulb moment was when I realized that data could be used to make buildings smart,” said Stefan Storey, CEO and Co-Founder of Sensible Building Science.

Watch how Cisco partnered with UBC to sustain user environmental experiences, yet improve operational efficiencies with automation and analytics, and read more about their deployment here.

https://www.youtube.com/watch?v=Oxz0c-R3N2w

Authors

Sangita Patel

Cisco SD-WAN, Routing, Cloud Networking Marketing Lead

Avatar

crisis

Source: Edreformnow.org

Have you ever told your team, “Upgrading our equipment is too expensive and likely to cause downtime. Let’s just keep it running.” Ultimately, you made a risk decision. While cyber security hasn’t been a critical risk factor until recently, it has quickly emerged as one of today’s biggest risks.

Manufacturing risk management often comes down to a cost and safety discussion. These costs include downtime, IP theft, counterfeiting, brand damage, personal injury, and loss of life. Furthermore, significant security attack costs must be reported on your company’s SEC filings.

“Manufacturers are increasingly being targeted not just by traditional malicious actors such as hackers and cyber-criminals, but by competing companies and nations engaged in corporate espionage. Motivations range from money and revenge to competitive advantage and strategic disruption.”  – Deloitte

Limited security and dated systems unnecessarily expose plant operations to uncontrolled failures, including complete process “crashes.” As cyber-induced crashes become more sophisticated, they are more commonly placing the workforce at personal risk. In 2014, a German plant sustained massive damage when its blast furnace was hacked. Fortunately no injuries were reported, but the plant incurred damages in the tens of millions of dollars.

As part of corporate risk management, more and more manufacturers are adding cyber attack coverage to their overall insurance portfolio.  Unfortunately, insurance policies are a reactive approach and represent the cost of doing nothing. Manufacturers need to adopt a balanced approach that includes not only insurance but proactive measures that reduce or eliminate plant floor attack vectors.

You can’t lock down your factory and limit access because you won’t be competitive in a connected world. So what’s the best approach?

Here are a few steps to protect your company while embracing IoT, external connectivity, and machines as a service:

  1. Upgrade your old equipment and control systems to ensure they support the latest virus and malware protection. Until an upgrade is possible, add strict controls on legacy equipment and require purchases of new automation adhere to a much higher cyber attack standard
  2. Eliminate USB Drives – EVERYWHERE, especially on the manufacturing floor
  3. Virtualize PCs and industrial computers on the shop floor to reduce unplanned outages and increase security
  4. Implement edge compute capabilities through centrally managed industrial switching platforms
  5. Install firewall and identity management technologies to allow managing, controlling, and auditing access to your factory floor networks
  6. Partner with leading security companies – at Cisco we employ over 5,000 people focused on cyber security
  7. Deploy platform-based solutions leveraging a secure, pre-integrated modular platform. While it’s tempting to purchase the hottest start-up’s latest security products, the costs (integration cost, vendor stability, and technology obsolescence) create a HUGE risk to your business

To go even further, the National Institute of Standards and Technology (NIST) has created a draft Manufacturing profile for cyber security. The NIST profile details an approach to identify, protect, detect, respond, and recover.

Additionally our whitepaper, Holistic Security for the Factory of Tomorrow, addresses these topics in more depth from both the business and technology perspective.

If you would like to continue the conversation about security for your manufacturing plant, please send me a note at neheller@cisco.com.  I welcome the opportunity to learn more about your goals and objectives and see how we can help. I would like to thank my colleagues Steve Marchewitz, Pat Mitchell, and Greg McCarthy for their insights and guidance in creating this blog.

For more information on factory security:

page-cta-2

 

 

Authors

Neil Heller

Manufacturing Industry Solutions

Manufacturing

Avatar

Technology continues to change, but one thing remains the same; Cisco proudly earns the J.D. Power Certified Technology Service and Support (CTSS) certification. This is the 10th consecutive time Cisco has earned this certification – a milestone accomplishment no other company (in any industry) has ever achieved.

CTSS_16_CiscoTo achieve this high-level certification, Cisco Services underwent a rigorous evaluation process and attained customer satisfaction scores among the top 20 percent of companies globally that offer technology support. We also passed a detailed 6-week audit of our support policies and procedures, involving multiple global and partner locations. Our audit scores were also in the top 20th percentile and well above certification requirements.

Our 10th consecutive J.D. Power certification clearly demonstrates our passion and commitment to delivering an exceptional support experience, and helping our customers succeed in today’s increasingly demanding and challenging world.

 

In addition to our historic 10th J.D. Power certification, the Technology Services Industry Association (TSIA) honored Cisco last week at its annual Technology Services World conference in Las Vegas for service innovation and industry-leading best practices. We were awarded 4 STAR Awards in the following categories, bringing our total STAR Awards count to 30:

picGiven the Cisco culture of delivering customer success, we continuously learn to improve our people, process, and technology to stay ahead of rising customer expectations. Listening to our customers and using smart tools and automation to improve our customers’ support experience are key elements of our services innovation and strategy. We are so pleased to be recognized by TSIA, the leading association for today’s technology and services organizations, and our peers. We are especially proud of our 9500+ services innovators who have contributed to Cisco’s leadership in delivering an outstanding customer service experience. This would not be possible without them. Congratulations!

 

 

Authors

Joe Pinto

Senior Vice President

Cisco Technical Services Group (CTSG)