DoD cyber strategy
Cisco’s Journey to DoD 8140 Accreditation
2 min read
Cisco is actively working with the U.S. Department of Defense (DoD) to ensure certifications align with the recently issued DoD Manual 8140.03, which introduces a role-based approach to qualifying individuals in alignment with the DoD Cyber Workforce Framework (DCWF).
Comply to Connect: The Bridge to Zero Trust
5 min read
The Comply to Connect (C2C) program is a bridge to Zero Trust access, and with the growth of Iot and IIoT devices it's now critical for DoD security. Learn all about C2C and selecting the right tools to get it done.
Delving Deeper into the DoD Zero Trust Strategy – Part 2
4 min read
Join us as we continue our deep dive into Zero Trust strategy and the Department of Defense in part 2 of our series. Read now.
CMMC: A Strategic Imperative to Greater Value
4 min read
Recently, Cisco commissioned Forrester Consulting to study the projected return on investment that may be realized by engaging Cisco on their preparation efforts toward future accreditation by a third-party assessor to the CMMC requirements.
Artificial Intelligence: Does the AI silver bullet really exist?
4 min read
How do you strategize AI? Those who can create an open technology framework will hold the key. Take a deeper dive into AI/ML.
Cybersecurity for Defense: Cisco Supports the NIST Risk Management Framework
2 min read
In our Cybersecurity for Defense Blog Series Kickoff, Peter Romness mentioned that we at Cisco are hard at work delivering advanced cybersecurity capabilities that support the Department of Defense Cyber Strategy. That’s certainly true, and each blog in our series will further that point. But it’s about more than just products and services. It’s also […]
Cybersecurity for Defense: Blog Series Kickoff
2 min read
The United States increasingly relies on the Internet to support our economic, health, and social services. However, the more we utilize network connections, the more cognizant we must be of potential cyberattacks from enemies seeking to access information and to destabilize our country. We’ve seen the results – everything from people’s personal emails to shopping […]