Avatar

Amy Henderson

Amy Henderson is the Security Services portfolio manager for Advanced Services at Cisco where she works cross-functionally to grow the security services business with innovative solutions for our clients’ greatest security needs.

She has over 5 years of experience as a product manager developing IT-based services to help clients simplify their lives, and meet their business objectives. Her philosophy is greatly influenced by her extensive travel in Southeast Asia, Europe, and Central America.

She holds a Bachelors in business management from the State University of New York at Buffalo and a Masters in International Communication from American University in Washington, DC.

Amy currently resides in Washington, DC with her husband and 75lb Rottweiler, Olive.

Articles

April 12, 2018

SECURITY

Secure Data Centers: When the Best Advice is to Get the Best Advice

We ask Brian Trevey and Saad Hasan, our resident Secure Data Center gurus, three simple questions on the design and implementation of security, data center and networking infrastructure solutions.

March 8, 2018

SECURITY

Balancing Cybersecurity Program Priorities: It’s Time to Get Help

The Project Management Triangle. The Iron Triangle.  The Triple Constraint. There are many names for the three-word phrases in the title of this blog, but it all comes down to...

February 9, 2018

SECURITY

How to Overcome Privacy Program Stumbling Blocks

The need to have a strong data privacy and protection plan continues to heat up. The more we share, the more market researchers gather information on their consumers, the more...

January 9, 2018

SECURITY

Security or Innovation?

I recently bought a house, and as many homeowners know, you should never buy a house without inspecting its foundation. A bad foundation can lead to cracks, instability, and an unsafe living environment. No matter how good the rest of the house looks, without a good foundation it’s unlivable. In order to foster innovation at […]

October 19, 2017

SECURITY

Business Critical Security

Endpoint. Cloud. IoT Devices. Email. Network. All of it needs to be secure, but where do you start? Once you have visibility out to your endpoints, the perimeter shifts:  when you think you know all the devices connecting to your network, you discover new SaaS-based applications in use. You train your team on information security […]