The importance of trust _Blog

The importance of trust in leading a market transition

As I wrote in my book Connecting the Dots, trust is one of a company’s two most important assets (the other is information). For a company looking to lead a market transition, ...
John Chambers Blog

The Piece of Hardware at the Cutting Edge of Cybersecurity

By John Chambers, Founder and CEO of JC2 Ventures and former CEO and Chairman of Cisco As a mentor, investor, and longtime player in the tech industry, I’m frequently asked which market ...
John_Chambers_Connect_Dots

Voice is the Next Interface, But What Does That Mean for Mobile Security?

By John Chambers, Founder and CEO of JC2 Ventures and former CEO and Chairman of Cisco Ten years ago, I would have said that voice was an interface of the past. Yet ...

The First National Cybersecurity Summit

On July 31, 2018 I attended the first National Cybersecurity Summit at the US Customs House in lower Manhattan. The building itself was constructed around 1902 1907 in order to collect tariffs ...
New Privacy Laws Require Security Professionals Up Their Game

New Privacy Laws Require Security Professionals Up Their Game

Two recent privacy laws GDPR and the California Consumer Privacy Act (AB 375) focus more attention on protecting digital privacy of individuals. Both laws will require that security professional up their game ...

Cybersecurity Workforce Development: Real or Imagined Problem?

Yesterday DHS and the Commerce Department released their most recent workforce report Supporting the Growth and Sustainment of the Nation s Cybersecurity Workforce . The report was commissioned by the Trump administration ...
Antidote for Fake Everything

Antidote for Fake Everything

In this digital era, anything can be faked; followers, news, experts, emails and so on. The possibilities are limited only by the imagination of the faker. It turns out that these issues ...
Information Security Risks, Gray Rhinos and Black Swans

Information Security Risks, Gray Rhinos and Black Swans

Information security over the past few years has been obsessed with zero day vulnerabilities, hacking exploits and headline making mega breaches. Every security risk manager is looking for the unknown unknowns that ...

Managing Information Security On a Limited Budget

| | Connecting the Dots
The recent government shutdown got me thinking about budgets and information security. Having just submitted a proposal to a small business myself, I am asking the question: What is best practice for ...

Building a Security Start-Up

| | Connecting the Dots
If only building a security start up was as predictable as transitioning from caterpillar to butterfly! But, it s not. Unfortunately it usually requires many turns and corresponding changes. Consider companies like ...