DoD cyber strategy

November 13, 2023

LEARNING

Cisco’s Journey to DoD 8140 Accreditation 

Cisco is actively working with the U.S. Department of Defense (DoD) to ensure certifications align with the recently issued DoD Manual 8140.03, which introduces a role-based approach to qualifying individuals in alignment with the DoD Cyber Workforce Framework (DCWF).

August 14, 2023

GOVERNMENT

Comply to Connect: The Bridge to Zero Trust

The Comply to Connect (C2C) program is a bridge to Zero Trust access, and with the growth of Iot and IIoT devices it's now critical for DoD security. Learn all about C2C and selecting the right tools to get it done.

January 30, 2023

GOVERNMENT

Delving Deeper into the DoD Zero Trust Strategy – Part 2

Join us as we continue our deep dive into Zero Trust strategy and the Department of Defense in part 2 of our series. Read now.

March 4, 2021

GOVERNMENT

CMMC: A Strategic Imperative to Greater Value

Recently, Cisco commissioned Forrester Consulting to study the projected return on investment that may be realized by engaging Cisco on their preparation efforts toward future accreditation by a third-party assessor to the CMMC requirements.

March 7, 2019

GOVERNMENT

Artificial Intelligence: Does the AI silver bullet really exist?

How do you strategize AI? Those who can create an open technology framework will hold the key. Take a deeper dive into AI/ML.

April 14, 2016

GOVERNMENT

Cybersecurity for Defense: Cisco Supports the NIST Risk Management Framework

In our Cybersecurity for Defense Blog Series Kickoff, Peter Romness mentioned that we at Cisco are hard at work delivering advanced cybersecurity capabilities that support the Department of Defense Cyber Strategy. That’s certainly true, and each blog in our series will further that point. But it’s about more than just products and services. It’s also […]

March 15, 2016

GOVERNMENT

Cybersecurity for Defense: Blog Series Kickoff

The United States increasingly relies on the Internet to support our economic, health, and social services. However, the more we utilize network connections, the more cognizant we must be of potential cyberattacks from enemies seeking to access information and to destabilize our country. We’ve seen the results – everything from people’s personal emails to shopping […]