CISO

October 22, 2019

SECURITY

How much security do you really need?

According to our new report, "The Security Bottom Line," no matter how large your budget is, you're not likely to feel that you have everything needed to secure your environment.

October 3, 2019

SECURITY

Threat Hunting: How to Gain the Most Value

As security practitioners who continuously look for adversarial malice, one of the questions we are asked frequently is: What’s around the corner?

September 25, 2019

SECURITY

DevSecOps: Blending Critical Operations and Cultures to Increase Data Security

CISOs are innovating to build security in and shift to a shared responsibility between the development and IT teams. Learn tips and lessons learned to building your DevSecOps journey.

June 7, 2019

SECURITY

The Endless Scourge of Malicious Email

Email: Click with Caution – How to protect against phishing, fraud, and other scams... We invite you to download our full report.

April 24, 2019

SECURITY

Five Hot Button Cybersecurity Conversations that Dominated Cisco Live Melbourne

Here are five key topics that dominated the conversations I had at Cisco Live Melbourne, which are shaping security professionals’ agendas.

February 28, 2019

SECURITY

Anticipating the Unknowns: 2019 Cisco CISO Benchmark Study

Today, we released our CISO Benchmark Study, an annual global survey of information security leaders working at organizations of all sizes and in all industries all over the world.

September 11, 2018

SECURITY

Cracking the Code – How to Measure the Real Value of Information Security Management

To help measure the success and value of information security organizations, Cisco has developed a process to capture and quantify losses from security incidents, comparing them against established industry benchmarks.

April 7, 2017

SECURITY

The CISO Evolution – From IT Operations to Earning a Seat at the Table

With the escalation of cybercrime, the role of Chief Information Security Officer (CISO) is fast evolving beyond its traditional operational functions of monitoring, repelling and responding to cyber threats.  Continuous changes in our connected business landscape make customer data, intellectual property and brand properties new targets for information theft, which can directly impact business performance […]