Analytics , Artificial Intelligence & Machine Learning , Big Data Security Analytics

How Integration, Orchestration Help in Battling Cyberthreats

Cisco's John Maynard on Fixing Fragmented Security Architectures
How Integration, Orchestration Help in Battling Cyberthreats
John Maynard, vice president-security specialist, Cisco Systems

Improved integration, automation and orchestration are needed to better detect and respond to evolving cyberthreats, says John Maynard, vice president and global security specialist at Cisco Systems.

Fragmented architectures have widened the gaps in visibility across the environment, making it more difficult to assess risk postures, he says in an interview with Information Security Media Group.

"The sins of the past and how we've built security controls in the past have led to ... fragmented architectures ... and gaps in visibility. ... It's very hard to really assess your risk posture because you've got so many fragmented controls that don't really talk to each other," Maynard says.

In this interview (see audio link below photo), Maynard discusses how to integrate and orchestrate a security strategy from a policy, assurance, governance and risk standpoint to achieve threat intelligence efficacy. He offers insights on:

  • The latest technological innovations;
  • A holistic approach to drive security transformations;
  • Emerging security trends.

Maynard, vice president and global security specialist at Cisco Systems, leads the worldwide security sales team at Cisco. He has more than 18 years of technology and security experience in Europe, the Middle-East, Africa, the Americas, Asia-Pacific and Japan. Previously, he led security sales at Cisco for EMEAR. Before that, he was COO and vice president of cybersecurity for product management at DCX Technology, formed by the merger of Hewlett Packard Enterprise Services and Computer Sciences Corp. He also held leadership positions at Hewlett Packard.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.