Avatar

Tom Gilheany

Product Manager

Learning@Cisco

Tom Gilheany is Cisco’s Product Manager for Security Training and Certifications. He has a diverse background in startups through multinational Fortune 100 companies.

Combining over 20 years of product management and technical marketing positions, and over a dozen years in IT sand Operations, he has conducted nearly 50 product launches in emerging technologies, cybersecurity, and telecommunications.

Tom holds a CISSP, an MBA, and is an active board member of the Silicon Valley Product Management Association and Product Camp Silicon Valley.

Articles

January 29, 2018

SECURITY

Securing the IIoT: Your Opportunity to be a Cyber Hero

3 min read

There’s tremendous potential for operational technology (OT) and information technology (IT) professionals right now, to be cyber heroes in any organization tackling security for the Industrial Internet of Things (IIoT).

February 9, 2017

SECURITY

The Transformation of the Cybersecurity Workforce

3 min read

When the commercial internet was young, IT structure was relatively simple. Today, though, growing complexity is one of IT’s biggest security challenges. The more complex the system, the greater the attack surface. It is much easier now to hide multi-pronged attacks in different layers and parts of the IT infrastructure. Virtual machines, BYOD, “-aaS” environments, […]

September 14, 2016

SECURITY

Why Cisco Is an Essential Partner in Cyber Ops: PART 2

2 min read

Once an organization has deployed technology infrastructure that enables visibility into the network (discussed in the first part of this blog), that organization now requires the properly trained security personnel to bring that time to detection (TTD) down to acceptable levels and to respond appropriately to a security breach. Once detected, a breach must be […]

September 12, 2016

SECURITY

Why Cisco Is an Essential Partner in Cyber Ops: PART 1

3 min read

A soccer ball without a player is useless. A violin without its musician is just a bit of wood and wire. And a beautiful new security deployment, no matter how advanced, needs skilled people to configure and operate it properly. That deployment must be operating at maximum effectiveness. It also must be tuned to the […]