Active Defense & Deception , Next-Generation Technologies & Secure Development , Video

Rising Above the Cybersecurity Poverty Line

Cisco's Mike Storm on Helping Have-Nots Improve Detection and Response
Mike Storm, distinguished engineer, Cisco

It's called the cybersecurity poverty line, and it distinguishes organizations as haves or have-nots - not just financially, but in terms of cybersecurity defenses. Cisco's Mike Storm discusses how to develop and leverage embedded security to rise above the line.

In a video interview with Information Security Media Group, Storm discusses:

  • Why the cybersecurity poverty line is not just a financial issue;
  • How to embrace embedded security;
  • How to leverage existing and new tools to improve detection and response.

Storm, cybersecurity distinguished engineer at Cisco, CCIE Security, focuses on cybersecurity solution architectures and security platform strategy for the global Cisco Security business. He has 30 years of experience in the networking and cybersecurity industry and frequently speaks, blogs and podcasts on cybersecurity topics. Storm is the host of the online reality TV series "Cisco IT Security Makeover," currently in season six, where he leads a team to help transform the security posture for companies of all sizes to maximize their protection from cyberattacks. Storm also hosts the "Unhackable" podcast series, where he shares his experience and insights on cybersecurity best practices, threats and security industry topics for both businesses and consumers.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.