easy-accordion-free
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114zoho-flow
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114wordpress-seo
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114This year marks the 30th anniversary of National Cyber Security Awareness Month<\/a> (NCSAM). You remember that phrase\u2026the more things change, the more they stay the same?<\/p>\n While much has changed over the l\u2026 Read more on Cisco Blogs<\/a><\/p>\n \u200b<\/p>\n This year marks the 30th anniversary of National Cyber Security Awareness Month<\/a> (NCSAM). You remember that phrase\u2026the more things change, the more they stay the same?<\/p>\n While much has changed over the last 30 years, some things remain true.<\/p>\n Cybercriminals, known for being highly opportunistic, are a mainstay in the threat space. This year, I had the opportunity to meet with Cisco customers, government officials, and providers of critical infrastructure across the United States, Europe, and Asia. Naturally, there are cultural and regulatory expectations that make each unique. More interesting, is how much the cybersecurity world is struggling with the same pressure and too many voices.<\/p>\n Much of this noise is coming from technology vendors pushing the newest innovations without a clear strategy to solve our toughest challenges. This strategy of adding bespoke tools \u2013 new bright, shiny objects \u2013 to address point problems can quickly break down without an integrated architecture and larger strategy at play.<\/p>\n It may not be provocative, but regardless of what is being written in the press about the latest \u2018bright shiny\u2019 things (AI anyone?), as an industry, we still have fundamental, foundational gaps we absolutely must solve.<\/p>\n A huge part of addressing risk and building resilience starts by developing a strong security culture<\/a> amongst your employees. Cybersecurity truly is everyone\u2019s job. You simply cannot grow a strong security culture without transparency, from internal stakeholders to third-party suppliers. I\u2019m excited to see many small startup technology companies embed security at their core from the beginning. However, unless you are starting fresh, this is an unsolved challenge.\u00a0 At Cisco, we are pushing ourselves to be \u201cbumper sticker\u201d clear with our stakeholders. Invest the time to discuss and clearly communicate the impact of threats or vulnerabilities that can permeate risk across your company and ecosystem. Create a space where it is accepted to have difficult conversations about risk and security gaps transparently, this can open a door to collaborative problem solving. Finally, make sure the owners of the systems, assets, applications, and\/or data understand their role \u2013 they own the risk!<\/p>\n While everything cloud may grab headlines and may make a strong argument for security, very few organizations are cloud only. A hybrid cloud strategy, zero-trust approach, and a modern network helps lay the foundation for effective security. In nearly every risk-based assessment I\u2019ve seen, the ability to have visibility and control from the network remains the critical risk control point. The network connects the data, applications, and services within any organization so that it can deliver goods and services to end customers. Overlooked and poorly maintained network gear can be the most appealing targets for an adversary. We have been sounding the alarm on the importance of updating and maintaining network\u00a0infrastructure<\/a> for\u00a0years. This situation can no longer be ignored<\/a>.<\/p>\n No one should be doing this alone. Resilience is born and built in communities<\/a>. When I\u2019ve run into hard times, I reach out to one of my peers. In return, I encourage them to do the same. It\u2019s no secret that security resources (time, talent, technology) are all scarce and in competition with other business imperatives, like developing products. As a cybersecurity community, we must anchor ourselves in in real-world evidence about what really works to improve security, and that starts with cooperative, candid, collaborative dialogue. We can and must explore with passion and energy on important topics like Software Bill of Materials<\/a> and AI<\/a>, but we need to be honest about what problems they are solving today, what they might solve in the future and clearly distinguish between the two. By having real conversations about risk, we can help each other bolster and mature our security cultures. And that makes us all more resilient.<\/p>\n Cisco has been building systems that remain critical for communications for over 30 years. We continue to push the boundaries on what \u2018good security\u2019 looks like. We\u2019ve come a long way and have learned a few things along the journey. It is our duty and honor to share what we\u2019ve learned.<\/p>\n If you need us, please reach out.<\/p>\n For more information on Cisco\u2019s 30-year journey and commitment to security and trust, visit our Trust Center<\/a>.<\/p>\n We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social!<\/em><\/p>\n Cisco Secure Social Channels<\/strong><\/p>\n Instagram<\/a><\/strong>Facebook<\/a><\/strong>Twitter<\/a><\/strong>LinkedIn<\/a><\/strong><\/p>\n \u00a0\u00a0This year marks the 30th anniversary of National Cyber Security Awareness Month. While much has changed over the last 30 years, some things remain true.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>","protected":false},"excerpt":{"rendered":" <\/p>\n This year marks the 30th anniversary of National Cyber Security Awareness Month<\/a> (NCSAM). You remember that phrase\u2026the more things change, the more they stay the same?<\/p>\n While much has changed over the l\u2026 Read more on Cisco Blogs<\/a><\/p>\n \u200b<\/p>\n This year marks the 30th anniversary of National Cyber Security Awareness Month<\/a> (NCSAM). You remember that phrase\u2026the more things change, the more they stay the same?<\/p>\n While much has changed over the last 30 years, some things remain true.<\/p>\n Cybercriminals, known for being highly opportunistic, are a mainstay in the threat space. This year, I had the opportunity to meet with Cisco customers, government officials, and providers of critical infrastructure across the United States, Europe, and Asia. Naturally, there are cultural and regulatory expectations that make each unique. More interesting, is how much the cybersecurity world is struggling with the same pressure and too many voices.<\/p>\n Much of this noise is coming from technology vendors pushing the newest innovations without a clear strategy to solve our toughest challenges. This strategy of adding bespoke tools \u2013 new bright, shiny objects \u2013 to address point problems can quickly break down without an integrated architecture and larger strategy at play.<\/p>\n It may not be provocative, but regardless of what is being written in the press about the latest \u2018bright shiny\u2019 things (AI anyone?), as an industry, we still have fundamental, foundational gaps we absolutely must solve.<\/p>\n A huge part of addressing risk and building resilience starts by developing a strong security culture<\/a> amongst your employees. Cybersecurity truly is everyone\u2019s job. You simply cannot grow a strong security culture without transparency, from internal stakeholders to third-party suppliers. I\u2019m excited to see many small startup technology companies embed security at their core from the beginning. However, unless you are starting fresh, this is an unsolved challenge.\u00a0 At Cisco, we are pushing ourselves to be \u201cbumper sticker\u201d clear with our stakeholders. Invest the time to discuss and clearly communicate the impact of threats or vulnerabilities that can permeate risk across your company and ecosystem. Create a space where it is accepted to have difficult conversations about risk and security gaps transparently, this can open a door to collaborative problem solving. Finally, make sure the owners of the systems, assets, applications, and\/or data understand their role \u2013 they own the risk!<\/p>\n While everything cloud may grab headlines and may make a strong argument for security, very few organizations are cloud only. A hybrid cloud strategy, zero-trust approach, and a modern network helps lay the foundation for effective security. In nearly every risk-based assessment I\u2019ve seen, the ability to have visibility and control from the network remains the critical risk control point. The network connects the data, applications, and services within any organization so that it can deliver goods and services to end customers. Overlooked and poorly maintained network gear can be the most appealing targets for an adversary. We have been sounding the alarm on the importance of updating and maintaining network\u00a0infrastructure<\/a> for\u00a0years. This situation can no longer be ignored<\/a>.<\/p>\n No one should be doing this alone. Resilience is born and built in communities<\/a>. When I\u2019ve run into hard times, I reach out to one of my peers. In return, I encourage them to do the same. It\u2019s no secret that security resources (time, talent, technology) are all scarce and in competition with other business imperatives, like developing products. As a cybersecurity community, we must anchor ourselves in in real-world evidence about what really works to improve security, and that starts with cooperative, candid, collaborative dialogue. We can and must explore with passion and energy on important topics like Software Bill of Materials<\/a> and AI<\/a>, but we need to be honest about what problems they are solving today, what they might solve in the future and clearly distinguish between the two. By having real conversations about risk, we can help each other bolster and mature our security cultures. And that makes us all more resilient.<\/p>\n Cisco has been building systems that remain critical for communications for over 30 years. We continue to push the boundaries on what \u2018good security\u2019 looks like. We\u2019ve come a long way and have learned a few things along the journey. It is our duty and honor to share what we\u2019ve learned.<\/p>\n If you need us, please reach out.<\/p>\n For more information on Cisco\u2019s 30-year journey and commitment to security and trust, visit our Trust Center<\/a>.<\/p>\n We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social!<\/em><\/p>\n Cisco Secure Social Channels<\/strong><\/p>\n Instagram<\/a><\/strong>Facebook<\/a><\/strong>Twitter<\/a><\/strong>LinkedIn<\/a><\/strong><\/p>\n \u00a0\u00a0This year marks the 30th anniversary of National Cyber Security Awareness Month. While much has changed over the last 30 years, some things remain true.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>\n <\/p>\n","protected":false},"author":0,"featured_media":1373,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-1372","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cisco-learning"],"yoast_head":"\n
\nThrowing the newest bright shiny objects at a problem is not a cybersecurity strategy.<\/p>\nDeveloping a cybersecurity culture\u00a0 <\/strong><\/h2>\n
Investing in the foundations<\/strong><\/h2>\n
Treating cybersecurity as a team sport<\/strong><\/h2>\n
\nThrowing the newest bright shiny objects at a problem is not a cybersecurity strategy.<\/p>\nDeveloping a cybersecurity culture\u00a0 <\/strong><\/h2>\n
Investing in the foundations<\/strong><\/h2>\n
Treating cybersecurity as a team sport<\/strong><\/h2>\n