Avatar

Jeff Schutt

Security Architect

Security and Trust Organization

As a technical leader and security architect in Cisco's Trust Transformation Office, Jeff Schutt is focused on ensuring Cisco and its customers embed security, trust, and privacy into future strategies, technologies, and solutions. Jeff engages key internal and external stakeholders, provides guidance on cybersecurity standards and specifications, strategizes on security policy, manages technical risks, and delivers outcomes that improve software resiliency across Cisco's infrastructure, products, and services. With expertise in IoT and software supply chain security and a passion for innovating, Jeff is currently committed to improving software transparency. During his tenure at Cisco, Jeff has had multiple customer-facing and internal leadership roles which have enabled him to remediate the most technically challenging security outages in Cisco customers' infrastructure; to consult on, design and deliver complex technology solutions around the world; and to identify and prepare Cisco to respond to future cybersecurity challenges and opportunities. He encourages threat modeling, security-by-design, and other secure software development practices that improve cyber resiliency, enabling the deployment of trusted technology solutions around the world.

Articles

October 4, 2021

GOVERNMENT

Executive Order 14028: Cisco’s Commitment to Software Transparency

Improving cybersecurity of our nation’s critical infrastructure and SBOM is so important it is now an Executive Order (EO 14028). Learn how your organization can respond.

December 20, 2018

SECURITY

The Greatest Gap in Securing Critical Infrastructure

By practicing incident response plans you’ll decrease the time it takes to respond appropriately and recover from a real incident.

August 20, 2018

DIGITAL TRANSFORMATION

Laying the Foundation to Secure Critical Infrastructure

With the rising wave of global Digitization, Industry 4.0 and the Industrial Internet of Things (IIoT) are demanding more network connectivity and creating greater opportunity for scalable internet-based attacks. It’s more critical now than ever that the foundational building blocks of Industrial and Automation Control Systems (IACS) incorporate capabilities that can withstand today’s internet threats.