GDPR: Start Your Privacy Protection Planning Now
One of the most talked about topics at the June Infosecurity Europe 2017 conference in London was the General Data Protection Regulation (GDPR). This is a new law concerning data privacy which will render the implications of a data breach much more severe and comes into force in all EU countries from 25th May 2018. […]
The Significance of Log Sources to Building Effective Intelligence-Driven Incident Response
Many organizations today fail in adequately acquiring the necessary visibility across their network to perform efficient and effective Incident Response tasks, one of which is Intelligence-Driven Incident Response; defined as...
Is it time to hire cybersecurity guardians for the network?
Another day, another hack. It seems like every time we turn on the news, we are hearing about another company that has been breached. How to remove the burden of detection, investigation and remediation from the in-house security teams? What about recovering a network and rebuilding trust after a breach – when is the time to turn to an expert? Join #CiscoChat on Wed, June 7th at 11AM PST to talk about alleviating the stress of dealing with the advanced threat landscape.
Can Your Organisation Be Breached? Find Out with a Red Team
Have you ever wondered about how the everyday information available on your network could compromise your entire organisation? I lead the Cisco Security Advisory Services team in EMEAR. We recently performed a “Red Team” exercise in which our client set us the objective of attempting to gain access to their client database. For the uninitiated: […]
Cisco and Ericsson Enable Service Providers and Enterprises to Embrace Network Function Virtualization (NFV) and Deliver …
The Cloud is changing how service providers and enterprises deliver services to users and provides new opportunities to drive their business forward. With cloud infrastructure, apps, and services they can proactively respond to market and business needs with greater agility, while reducing costs and complexity.
A Comparison of SOC Models for Today’s Need of Monitoring & Detecting the Latest Cyber Threats
At Cisco, we are often asked to take a vendor agnostic approach when developing a Security Operations Center (SOC) strategy, and as such, we must consider the importance of distinguishing between the various types of SOC models in today’s demanding security needs. However, before explaining the various models that exist for today’s need of monitoring […]
Securing Air Traffic Control Systems
I fly quite a bit for my job as a Security Services consultant for Cisco. I’m one of billions of passengers traveling annually: according to the International Air Transport Association (IATA), passenger numbers are expected to reach 3.8 billion in 2016. The number of unique city pairs connected by airline networks will reach 18,243. With […]
Security Services Play a Key Role in Digital Transformation for Higher Education
For institutions to be successful, they must commit to investing in security solutions and strategies that enable long-term flexibility and agility without compromising on performance.
MITM Training at Black Hat USA 2016
To prevent a security breach and loss of critical business data, security teams must be diligent in defining, identifying, and classifying security gaps in their organization’s network. Many security teams conduct pentesting as a way to assess and mitigate any potential gaps. As a consulting engineer for Cisco Security Services, I’ve observed a deeper understanding […]