Making Global Threat Intelligence Locally Actionable
In this video blog post John Stewart, Cisco's Chief Security Officer (CSO) and Senior Vice President, highlights the fact that there is a wealth of threat intelligence available on a global basis and how to best make use of that intelligence data to protect our network infrastructure.
Vectoring to a New Mission
John Stewart, Cisco Chief Security Officer (CSO) and Senior Vice President, announces the new name and mission of the group he leads at Cisco, i.e. the former Global Government Solutions Group (GGSG) has now become the Cisco Threat Response, Intelligence, and Development (TRIAD) organization.
Security Geeks and Wonks Unite!
Are we heading to a day of reckoning, where the forces of cyber crime overwhelm and erase the good things that information technology delivers? If we head down our current path of incremental, individualized approaches to cyber security, the answer is “Yes.” But I’m enough of an optimist to think that if the IT and security geeks and wonks of the world can unite, share information, work hard, and not worry about who gets the credit, we stand a fighting chance.
Three Transitions Driving Net-Centric Security
Cisco Senior Vice President and Chief Security Officer, John Stewart, kicks off a series of video blogs focused on the topic of Net-Centric Security.
RSA 2013: That’s a Wrap
RSA 2013 ends and I both miss it and breathe a sigh of relief that it’s over. Let me explain. As a security guy, it’s nice to be around other...
Transparency, Transparency, Transparency, and Trustworthy Systems
Cisco's Senior Vice President and Chief Security Officer, John Stewart discusses - in both words and video - the importance of Trustworthy Systems for Cisco's customers and the efforts being put forth by Cisco to insure that we listen to our customers and provide products that possess robustness and integrity.
Live from RSA: John N. Stewart
The RSA Conference is expected to be bigger and better than ever this year—more booths, more vendors, more technical sessions and keynotes. But I have to ask the question: “Are we as IT practitioners better off now than we were 4 or 5 years ago?” There are a lot of people at the show who […]
Collecting IT Security Intelligence Globally, Using it Locally
“Think globally, act locally” is a phrase, now cliché, because it expresses an incontrovertible and immediately graspable truth. The global-local concept applies when it comes to mobilizing globally-collected cyber threat data, which in turn informs local IT operations against hackers and criminals. Of note, data collections spanning the globe don’t appear magically out of the […]
RSA Conference: T-Minus 30 Days and Counting
A month from now, thousands of cyber security friends, colleagues, professionals, hackers, defenders, sellers, buyers, old timers, and newbies will descend on San Francisco for the 2013 RSA Conference. We will challenge one another about what has changed, create new topics and new words to describe the previously indefinable, scare the heck out of each […]