Avatar

Anthony Grieco

SVP, Chief Information Security Officer

Security and Trust Organization

As Chief Information Security Officer at Cisco, Anthony Grieco leads an organization that defends the company, its partners, and customers from information security threats 7x24. It innovates and adopts the most effective security technologies and policies, reflects them in Cisco’s people, solutions, and services, and shares with customers. Anthony’s organization also includes the Trust Office, the team responsible for ensuring Cisco and its customers embed security, trust, and privacy into future strategies, solutions, and business models. The team instigates and incubates future challenges and opportunities in cybersecurity and privacy. Risk governance, next generation architectures, as well as supply chain security, are all efforts focused on ensuring security, trust, and privacy remains core to the future of digital business. Under Anthony’s leadership, Cisco has built strong partnerships with customers, governments, and partners globally to enable business growth and transformation by accelerating the use of trusted technology, development and implementation of secure processes, policies, and culture. Over his 20+ years at Cisco, he has held a variety of leadership roles in development engineering, product management, marketing, and strategic planning. Anthony is a trusted security advisor to industry, customers, and startups worldwide. Anthony has made multiple contributions to industry standards through his time spent with working groups at the World Economic Forum, National Institute of Standards and Technology, and the Communications, Security, Reliability, and Interoperability Council. As a trusted advisor he is regularly asked to share insights at industry events and is sought out by global governments and industry leaders for his perspective on cybersecurity trends and best practices. Anthony earned a Bachelor of Science in Electrical Engineering at the University of Alabama Birmingham and a Master of Science in Electrical Engineering from North Carolina State University. He lives in Raleigh, North Carolina with his wife and daughter.

Articles

February 24, 2016

PARTNER

Security and Trust That Is Foundational to Reducing Cyber Risks

Did you know that Cisco created the Cisco Secure Development Lifecycle (Cisco SDL) to ensure that security is central through the entire product development process? Cisco SDL is a repeatable and measurable process we’ve designed to fortify the resiliency and trustworthiness of our offerings. Are your customers aware of this foundational security? Did you know […]

February 10, 2016

SECURITY

Built-In Security: Sharing the ‘How’

I work with a lot of customers discussing how they can reduce their cyber risk and increase resiliency with an effective security strategy. It’s easy to talk about leading practices for security, but figuring out how to put them into practice can be a whole other story. As I mentioned in a recent post, the […]

February 9, 2016

SECURITY

Protect Your Entire Digital Self

Cisco is proud to join the National Cybersecurity Alliance in its support of White House efforts to improve online security.

February 1, 2016

SECURITY

Are you protecting your organization with comprehensive security and trust?

With cyber threats escalating, security has emerged as a critical business driver and competitive differentiator. Organizations that successfully embed security throughout their network infrastructure, policies, processes, and culture are able to reduce risk while creating sustainable business advantage. At CiscoLive Berlin this year, we will examine how Cisco is building foundational security into the underlying […]

January 21, 2016

SECURITY

Why Aging Infrastructure Is a Growing Problem

Defending a network against threats of growing complexity requires a mix of technology and policies that are as sophisticated as the campaigns created by attackers. A necessary component to an efffective defense includes tackling the low-hanging fruit—that is, basic tasks such as patching vulnerabilities and updating old software. However, as we relate in the Cisco […]

December 21, 2015

SECURITY

Update for Customers

Following a recent Juniper security bulletin discussing unauthorized code, we have fielded a number of related questions from our customers. Being trustworthy, transparent, and accountable is core to our team, so we are responding to these questions publicly. First, we have a “no backdoor” policy and our principles are published at trust.cisco.com Our development practices […]

November 18, 2015

SECURITY

Introducing the Cisco Technology Verification Service

Building Trust and Transparency One Step at a Time Like all successful companies, we listen to our customers and strive to exceed their expectations. Our customers expect us to be trustworthy, transparent and accountable. As a company, there are many ways we are doing just that. We started this journey more than 10 years ago […]

October 15, 2015

SECURITY

What’s in Your Network? Verifying Trust with Integrity Verification Service

As we continue to observe National Cyber Security Awareness Month, it’s time this week to think about integrity verification and what it means for your network and your organization. As today’s network threats increase in sophistication, the resulting risks to a business’s or government agency’s network may go undetected for days, months or even years. […]

October 8, 2015

SECURITY

Cybersecurity: The Holistic Trust Approach

In the past few years, the security industry has invested heavily in the detection and containment of attacks and breaches as a primary focus of innovation. To help protect Cisco,...

September 18, 2015

SECURITY

IT Security: When Maturity is Overrated

In so many parts of life, the passing of time is a benefit. Wine and whisky mature, intelligence is gained, and friendships grow stronger. For those of us working in IT security, however, the passing of time brings new challenges. Prolonging the use of older technology exponentially increases risk and the resulting problems can cost […]

July 27, 2015

SECURITY

The Best Defense is a Good Offense? Why Cisco Security Researchers Attack Cisco Technologies

This week, Cisco provided comments on the Department of Commerce’s Bureau of Industry and Security (BIS) proposed cybersecurity regulations. These comments reflect the realities of how Cisco looks to protect both our customers and our products. They also emphasize the critical role that security researches, access to tools, and qualified talent have in cybersecurity. Cisco has […]

June 3, 2015

SECURITY

Trust and Transparency

“In our increasingly interconnected world, the Internet of Everything is making trust a critical element of how people use network-connected devices to work, play, live, and learn. The relentless rise in information security breaches underscores the deep need for enterprises to trust that their systems, data, business partners, customers, and citizens are safe.” – John […]

April 23, 2015

SECURITY

Industry Recognition for Security Excellence

Cybersecurity is a company-wide initiative. It touches every line of business, the technology, the fabric of the organization, its culture, brand and reputation. Customers are telling us that their most important issues are security and assuring the integrity of the products and data in their networks. In light of the heightened potential for cyber threats, trust […]

April 21, 2015

SECURITY

Cisco’s First Transparency Report on Law Enforcement Requests for Customer Data

As Cisco’s products and services evolve to new models, we find ourselves coming in contact with our customer’s data more regularly. We approach this role as stewards of this data with our customers interest foremost in our mind. One area of widespread interest as it relates to this data is how we interact with Global […]

April 25, 2014

SECURITY

Cisco, Linux Foundation, and OpenSSL

The recent OpenSSL Heartbleed vulnerability has shown that technology leaders must work together to secure the Internet’s critical infrastructure. That’s why Cisco is proud to be a founding supporter of the Linux Foundation initiative announced yesterday (April 24th). The initiative will fund open source projects that are critical to core computing and Internet functions, and […]

October 17, 2013

SECURITY

A Crypto Conversation: How We Choose Algorithms

Cryptography is critical to secure, trustworthy communications. Recent questions within the tech industry have created entirely new discussions about the cryptography underpinning our communications infrastructure. While some in the media have focused on the algorithm chosen for Deterministic Random Bit Generation (DRBG), we’ve seen many more look to have a broader crypto conversation. With this […]