Cisco Blogs / Jeff Schutt
Principal Security Architect | Engineer | Strategist
Security and Trust Organization
As a technical leader, influencer, and strategist in Cisco's Trust Office, Jeff Schutt is focused on ensuring Cisco and its customers embed security, trust, and privacy into future strategies, technologies, and solutions. Jeff engages key internal and external stakeholders, provides guidance on cybersecurity standards and specifications, strategizes on security policy, manages technical risks, and delivers outcomes that improve software resiliency across Cisco's infrastructure, products, and services.
With expertise in IoT and software supply chain security and a passion for innovating, Jeff is currently committed to improving software transparency. During his tenure at Cisco, Jeff has had multiple customer-facing and internal leadership roles which have enabled him to remediate the most technically challenging security outages in Cisco customers' infrastructure; to consult on, design and deliver complex technology solutions around the world; and to identify and prepare Cisco to respond to future cybersecurity challenges and opportunities. He encourages threat modeling, security-by-design, and other secure software development practices that improve cyber resiliency, enabling the deployment of trusted technology solutions around the world.
Executive Order 14028: Cisco’s Commitment to Software Transparency
Improving cybersecurity of our nation’s critical infrastructure and SBOM is so important it is now an Executive Order (EO 14028). Learn how your organization can respond.
The Greatest Gap in Securing Critical Infrastructure
By practicing incident response plans you’ll decrease the time it takes to respond appropriately and recover from a real incident.
Laying the Foundation to Secure Critical Infrastructure
With the rising wave of global Digitization, Industry 4.0 and the Industrial Internet of Things (IIoT) are demanding more network connectivity and creating greater opportunity for scalable internet-based attacks. It’s more critical now than ever that the foundational building blocks of Industrial and Automation Control Systems (IACS) incorporate capabilities that can withstand today’s internet threats.