Log in
E-mail
Password
Remember
Forgot password ?
Become a member for free
Sign up
Sign up
Settings
Settings
Dynamic quotes 
OFFON

4-Traders Homepage  >  Equities  >  Nasdaq  >  Cisco Systems    CSCO

CISCO SYSTEMS (CSCO)
Mes dernières consult.
Most popular
  Report  
SummaryQuotesChartsNewsAnalysisCalendarCompanyFinancialsConsensusRevisions 
News SummaryMost relevantAll newsSector newsTweets

Cisco : Exploiting the gaps in technology, processes and user awareness

share with twitter share with LinkedIn share with facebook
share via e-mail
0
02/14/2018 | 05:51pm CET

Blog 2 of the CISO Experience series

This year Cisco hosted their first CISO Experience at CiscoLive Barcelona, on 29 and 30 January. The event attracted over 60 Chief Information Security Officers (CISOs) and other senior security leaders, who discussed the topics that are shaping cybersecurity in 2018. In the second blog of the CISO Experience series, we broke down recent large-scale attacks and how hackers take advantage of weak security processes and bad user behaviour to get in. Read our first post in the series here.

In 2017, large-scale ransomware attacks have brought cybersecurity to the headlines once again. What was a tough year for CISOs was, in fact, an exciting year for threat researchers such as Warren Mercer, Technical Leader at Cisco Talos and one of the presenters at Cisco's CISO Experience event in Barcelona.

Mercer observed that over the years there has been a decline in the 'low hanging fruits', the easy attacks such as guessing network passwords, because in general security hygiene has been improving. On the other hand, hackers are becoming bolder and more innovative, and we are experiencing the rise of new devastating attacks, such as WannaCry and Nyetya.

WannaCry, for example, exploited the fact that companies do not patch their networks regularly. It used a known vulnerability, for which a patch had already been released two months prior to the outbreak. Nyetya took advantage of people's trust in their supply chain; it used a backdoor in a common accounting tool, MeDoc, to infiltrate their targets.

Mercer explained that the majority of complex attacks happen in multiple stages, which is why a layered defence and updated threat intelligence help increase the odds of catching threats earlier.

Are users the weakest link?

How many times have you been to a trade show and got a USB stick as a gift?

Dave Justice, SVP of Global Security and Enterprise Networking Sales at Cisco, believes that the average employee would probably not think twice before plugging an electronic device gifted by a stranger on their corporate computer, which could pose a security risk.

Hackers use people's trusting nature and social engineering to trick users: they disguise malware into emails and websites in a way that would look legitimate to the untrained eye.

When you pair clever techniques with people's natural curiosity and lack of security awareness, it makes it very difficult to avoid attacks. Most people do not look at cybersecurity in the same way they look at personal security. With so many things to consider and so little resources and talent available, user awareness often slips down a company's list of priorities.

Bill O'Connell, Chief Business Security Officer at ADP, believes companies should help increase security awareness not only within their businesses but also in the broader market, by taking a more active role in larger initiatives such as the Cybersecurity Awareness Month.

Justice from Cisco reinforced the importance of stopping threats at the endpoint; he also discussed how Cisco products are able to detect a threat once and enforce changes everywhere across the network, effectively making it stronger after every incident.

Mind the Talent Gap

User awareness is not the only challenge. Companies are overwhelmed with the volume of security alerts they need to manage, not to mention the complexity of having multiple security products from different vendors. In addition to that, there is a shortage of qualified security professionals.

Estimates vary, but some researchers believe that the cybersecurity talent gap may reach 3.5 million unfilled jobs by 2021.

Richard Goodman, Head of Network and Security Services at John Lewis Partnership and one of the presenters at the Cisco event, believes that companies should play a bigger role in forming the next generation of security professionals. He shared that John Lewis runs a talent program that helps educate IT professionals on security. For those employees, it is an opportunity to learn new skills and further their careers, while the business benefits from a regular supply of talented security professionals.

Goodman highlighted that programs like this are only possible if companies stop seeing security as an obstacle and start looking at it from a different perspective, as a growth enabler. For instance, John Lewis is using technology such as the IoT to make customer experience feel seamless, whether they shop online or in store. This type of transformation cannot be truly effective if the technology is not secure. Thanks to this proactive security posture, John Lewis Partnership received a Cisco Circle Security Award for their innovative security operations for Retail.

Freerk Bosscha, Security Officer of NHL University also found a creative way to help fix the talent gap issue and benefit directly from it. Not only does NHL offer cybersecurity courses, but they also encourage their students to help pen test the university's defences and report their findings. He also says he rewards students with more access privileges when they accept to have security software installed on their devices.

Empower your SecOps team

Goodman from John Lewis also highlighted the importance of closing the gaps in communication between CISOs and Security Operations (SecOps) managers. Here are eight steps he recommended to CISO to help empower their SecOps team:

[Attachment]

Next in the CISO Experience series:

In our third and final blog, we covered the insights from security leaders at ADP, Enel and Cisco about how to make security a business priority and how regulations such as GDPR help secure investments.


Tags:

Cisco Systems Inc. published this content on 14 February 2018 and is solely responsible for the information contained herein.
Distributed by Public, unedited and unaltered, on 14 February 2018 16:50:12 UTC.

share with twitter share with LinkedIn share with facebook
share via e-mail
0
Latest news on CISCO SYSTEMS
02/21CISCO : Haunted house, iFullerton videos win awards for three Cal State Fullerto..
AQ
02/21CISCO : Intersight – Automating Standalone Rack Servers
PU
02/21CISCO : Innovate, Educate, and Build the Next Generation of Women in STEM
PU
02/21#CISCOCHAMPION RADIO, S5|EP.5 : Trends in Collaboration
PU
02/21CISCO : The Experience Economy – The Customer Comes First
PU
02/21CISCO : Hopper A story about how Cisco's CHILL made a startup
AQ
02/213 WAYS TO OVERCOME CHALLENGES OF DIG : Q&A with Chris Stiles
PU
02/21THE NEW CISCO CROSSWORK NETWORK AUTO : Helping global service providers automate..
AQ
02/21CISCO : February 21, 2018 Cisco 2018 Annual Cybersecurity Report Reveals Securit..
PU
02/21CISCO : 2018 Annual Cybersecurity Report Reveals Security Leaders Rely on and In..
GL
More news
News from SeekingAlpha
02/21Tracking Tweedy Browne Portfolio - Q4 2017 Update 
02/21CISCO EARNINGS REVIEW : Has 'The Kid' Turned The Corner? 
02/20Cisco Systems Raises Dividend 14% - Now What? 
02/20TECH DIVIDEND SHOWDOWN : Cisco Vs. IBM 
02/2027 DIVIDEND INCREASES : February 12-16, 2018 (Part 1: Industrials And Informatio.. 
Financials ($)
Sales 2018 49 130 M
EBIT 2018 15 299 M
Net income 2018 279 M
Finance 2018 34 597 M
Yield 2018 2,81%
P/E ratio 2018 -
P/E ratio 2019 18,25
EV / Sales 2018 3,65x
EV / Sales 2019 3,67x
Capitalization 214 B
Chart CISCO SYSTEMS
Duration : Period :
Cisco Systems Technical Analysis Chart | CSCO | US17275R1023 | 4-Traders
Technical analysis trends CISCO SYSTEMS
Short TermMid-TermLong Term
TrendsBullishBullishBullish
Income Statement Evolution
Consensus
Sell
Buy
Mean consensus OUTPERFORM
Number of Analysts 30
Average target price 47,5 $
Spread / Average Target 9,7%
EPS Revisions
Managers
NameTitle
Charles H. Robbins Chairman & Chief Executive Officer
Tiang Yew Tan Senior Vice President-Operations & Digital
Kelly A. Kramer Chief Financial Officer & Executive Vice President
Guillermo Diaz Chief Information Officer & Senior Vice President
Roderick C. McGeary Independent Director
Sector and Competitors
1st jan.Capitalization (M$)
CISCO SYSTEMS13.08%214 108
QUALCOMM4.01%96 002
ERICSSON-0.20%22 497
ZTE CORPORATION--.--%19 197
HARRIS CORPORATION9.40%18 674
ARISTA NETWORKS INC30.72%18 238