Home > Talking Tech with Cisco > 2016 > October

Talking Tech with Cisco

October 2016 Previous month Next month

Submission By: Tom Gilheany Over the years, IT security and its associated job roles have evolved. In 1995, the arrangement was fairly simple. It consisted of just three layers: server, network, and client. Each had its own security component. A decade later, the U.S. Department of Defense (DoD) introduced Directive 8570 as a workforce model for security teams. It was adopted and adapted by ... Read more

Submission By: Tom Gilheany If you are thinking about a career in cybersecurity, congratulations. You have chosen a field in which demand and job growth are soaring. This means salaries are above average and going up, too. Cybersecurity jobs are growing three times faster right now than IT jobs in general, and 12 times faster than the overall job market. In a 10-year period, IT security jobs ... Read more

Submission By: Tom Gilheany In the first part of this blog series, we talked about how the evolution of cybersecurity threats means that security teams need to evolve too. We also talked about the National Cybersecurity Workforce Framework (NCWF) from the U.S. Department of Homeland Security that gives big organizations a place to start for designing their own security teams. Yet, smaller ... Read more

Submission By: Tom Gilheany IT security managers should be asking three questions over and over. Is my security team complete? Can it handle today’s threats, risks, and requirements? And more profoundly, can it handle the threats of tomorrow? What worked for security yesterday isn’t right for today and certainly not for tomorrow. Today’s threats are different because they ... Read more

Submission By: Tom Gilheany Yesterday, in Part 1 of this blog post, we talked about how the need for security jobs has changed, and shared how those changes have resulted in more opportunities for security professionals than ever before. However, so many choices (and their combinations) can be confusing and overwhelming, both to hiring managers, and to career planners. In this post, we break ... Read more

Submission By: Tom Gilheany This is not your father’s IT security. The move to digitalization opens up a vast new world of career possibilities for IT professionals. Cybersecurity people need to be able to think like the bad actors who are out to exploit systems for their own nefarious purposes. Tsung Tzu: “If you do not know your enemies nor yourself, you will be imperiled in ... Read more

Submission By: Tejas Vashi   Today's information security challenges are more complex than ever. The proliferation of digital strategies has given cybercriminals the means and opportunity to appropriate personal and corporate information, steal money, or both. The Internet of Things (IoT), for example, allows sensors and endpoint devices to gather, and make available, huge amounts of data ... Read more

Submission By: Tom Gilheany Is your organization digital yet? If not, it will be soon. Most expect huge gains from converging mobility, big data, cloud, collaboration, and the Internet of Things (IoT). Businesses envision new markets. Governments like greater control. There are advantages for criminals, too. Cybercrime is one of the top two challenges in this vast digital transformation. ... Read more

Ten days ago, we gave you a heads-up on a special Twitter chat being conducted as part of National Cyber Security Awareness Month. It happened on October 6th amid lively dialogue between our two expert hosts and quite a number of you in the LearningatCisco community on Twitter. The main theme was the cybersecurity talent shortage. Our two hosts were Tom Gilheany, Cisco's Product Manager for ... Read more

Filter Blog

By date:
By tag: