Amy Henderson

Head of Strategic Planning & Communications, Cisco Talos

Amy Henderson is the Head of Strategic Planning and Communications at Cisco Talos. She formerly managed the Security Services portfolio for Advanced Services at Cisco where she works cross-functionally to grow the security services business with innovative solutions for our clients' greatest security needs. She has over a decade of experience as a communications professional and product manager developing IT-based services to help clients simplify their lives, and meet their business objectives. Her philosophy is greatly influenced by her extensive travel in Southeast Asia, Europe, and Central America. She holds a Bachelors in business management from the State University of New York at Buffalo and a Masters in International Communication from American University in Washington, DC. Amy currently resides in Washington, DC with her husband and two daughters, and 75lb Rottweiler, Olive.


April 12, 2018


Secure Data Centers: When the Best Advice is to Get the Best Advice

3 min read

We ask Brian Trevey and Saad Hasan, our resident Secure Data Center gurus, three simple questions on the design and implementation of security, data center and networking infrastructure solutions.

March 8, 2018


Balancing Cybersecurity Program Priorities: It’s Time to Get Help

3 min read

The Project Management Triangle. The Iron Triangle.  The Triple Constraint. There are many names for the three-word phrases in the title of this blog, but it all comes down to...

February 9, 2018


How to Overcome Privacy Program Stumbling Blocks

6 min read

The need to have a strong data privacy and protection plan continues to heat up. The more we share, the more market researchers gather information on their consumers, the more...

January 9, 2018


Security or Innovation?

1 min read

I recently bought a house, and as many homeowners know, you should never buy a house without inspecting its foundation. A bad foundation can lead to cracks, instability, and an unsafe living environment. No matter how good the rest of the house looks, without a good foundation it’s unlivable. In order to foster innovation at […]

October 19, 2017


Business Critical Security

2 min read

Endpoint. Cloud. IoT Devices. Email. Network. All of it needs to be secure, but where do you start? Once you have visibility out to your endpoints, the perimeter shifts:  when you think you know all the devices connecting to your network, you discover new SaaS-based applications in use. You train your team on information security […]