I often get asked the question, “Why did Cisco buy Splunk?
Here’s the answer. I look at it from three perspectives.
Perspective #1:
Cisco has its roots in networking. Today, networking is incomplete without security. So we must be a world-class security provider. Given the sophistication of threat actors and adversaries, you have to handle sophisticated attacks at machine scale since human scale no longer suffices. This requires that in order to be a world-class security company we also have to be a world-class AI company. And in order to be a world-class AI company, we must also be a world-class data company. And Splunk progresses us so much on this dimension of data.
Perspective #2:
Another way to think about it is that in this world of extremely sophisticated adversaries and threats, you have to assume that the attacker has already infiltrated your environment. And the objective is containing lateral movement. Where does lateral movement happen? It happens on the network. And Cisco has such rich telemetry on what packets are traversing the network, what processes originated on the end point and visibility on how they terminate on the server/host. The challenge however with this rich telemetry is that it is far too voluminous for ingesting into any Security Incident and Event Management (SIEM) system. Today the problem with network telemetry trying to provide signal to the SIEM is that it is very high volume telemetry with very low signal. There is a possibility to fundamentally change this to extremely high fidelity, low volume telemetry that can be fed into Splunk to dramatically improve detections and reduce the time to investigation.
Perspective #3:
Cisco and Splunk had very low overlap in the security portfolio. But both of us were very passionate about reimagining the future of the Security Operations Center (SOC). Markets that Splunk had pioneered like SIEM and SOAR build on their data platform coupled with innovations we have made in areas like XDR. When combined together they allow us to solve problems that no one has been successful solving.
To discuss all this in more detail, I was delighted to join my friend Tom Casey at Splunk’s .conf event. Here’s the video of our conversation that you might find interesting.
Really exciting to work closely with the Splunkers to help keep the world safe.
Patient. And joining me now to talk a little bit more about how we're gonna do that as Executive Vice President and General Manager of Cisco's security and collaboration products, my friend G2 Patel G2. There he is. How are you, buddy? I am great. It is so good to see you. Hey, it's a special day today. This is my first time at dot com, but I have to tell you, I'm a little nervous. Little nervous. You're extra nervous for a reason. I'm extra nervous for a reason today because my, my life, this is the first time that my better half, Jyothi is going to be watching me in the audience do a keynote. So, so to echo, echo Chuck, to echo Chuck, yeah, don't screw it up. Don't screw it up. And at 5:00 PM, regardless of how I do, I'm going to be getting a feedback session, so. Well, it is. It is also a special day. I know you don't want a big deal about it, but it is also G2's birthday today. Stop, stop, stop and and. So we, we threw a little party, we decorated the place. I got you a pony and a whole company. So I think we're in pretty good shape here. So look, Chuck and Gary spent some time yesterday talking about the bigger picture. We thought we could spend a little bit of time talking to everybody today in particular about how Splunk and Cisco together can really define the future of the sock or redefine the future, what the sock looks like and remove the security industry. So what are your thoughts? We are so excited. Firstly, as as we talked about yesterday as well, security is a data problem. And the amount of visibility that we can provide between Cisco and Splunk together is actually unparalleled. Now, if you think about Cisco itself, our core business started with networking. And you couldn't really be a great connectivity company if you weren't actually protecting the data that was flowing through your network. So it would be incomplete to be a networking company if you weren't a security company, and it would be an incomplete motion to be a security company if you didn't have the right data associated with it. So there's a very, very logical synergy over here. As you move through it, and the way that I think about this is, imagine for a moment we're living in all encrypted world that the attacker is already in your system. And the name of the game is preventing lateral movement. Now the question is where does lateral movement happen? It happens on the network, Yep. And so we need to make sure that we can contain lateral movement on the network in an effective way and actually have deep hooks into the infrastructure with security and actually tie in very closely with Splunk. So we're really excited about the possibilities, and I think we've got a limitless level of possibilities as we move forward. Yeah. And I think you and I are both really excited for the future about our ability to kind of take action a little bit closer to the edge too. We'll come back to that in a minute, but maybe. Level set for people G2 on Cisco's security product portfolio, I mean, it is amazing now to be inside of Cisco and look at the amount of innovation that's taking place, the amount of software assets in addition to hardware. So in the Cisco security portfolio, there's a ton of value around user cloud and breach. You want to talk a little about? There is. And by the way, one of the things that we've seen like if you look at a macro level, what's happening in the security industry, there's about 3500 vendors in this market. On average, most companies have between 50 to 70 vendors and their cyber security. Back and frankly it's untenable to maintain that level of complexity because that's 50 to 70 different policy engines, that's 50 to 70 different places where contention can occur in policy. So there's a fundamental kind of rethink that needs to be had to reimagine security in this new age, especially where you have to deal with security at machine scale, not at human scale given the sophistication of attackers as well. So what we did about two years ago was we announced this capability, are we actually re platformed? Entire set of capabilities. Cisco used to be like a holding company. We used to have a bunch of small little products that weren't really tied together. And what we wanted to do was make sure that we provided an integrated platform. So we started the building work and Tom Gillis, you here stand up for a second. That's Tom Gillis. He runs our security business. He gets all the questions during Q&A, just so you know. Actually started this journey around saying let's build an integrated platform that we call the Cisco Security Cloud which solved for three key problems. How do you protect a user? How do you protect cloud and cloud infrastructure and how do you protect against the breach and make sure that you can have detections and near real time and not just detections, response and remediation in near real time. And now it's Splunk that gets completely supercharged because you actually have a set of data that we just never had before. And the way I think about security is the one who has the most amount of data, that's the most effectively correlated, is the one that can best detect breaches and threats and help keep the world safe for sure, because you don't know how they're going to evolve and that ability to go analyze and threat. Point is critical. I think there's some cool stuff that ability to go kind of down at the edge, yeah, snapshot immediately to get an image of what's occurring if you think there's a potential threat there. There's tremendous value in breach protection, user and cloud protection, and it's all a great compliment to Splunk. So that data from that from the security cloud can flow into Splunk and give better longitudinal visibility in the sock. But I think we get to make a little announcement here today as well about some of the early integration the teams are doing and something else that's new and coming. So do you want to tee that up and talk a little bit about. How we enrich the content for for threat management, Yeah, So we have a threat intelligence service that many of you might have heard of called Talos. And Talos actually process is about 550 billion security events daily. Right. And what we wanted to do was make sure that we can enrich Splunk. With Talos data. Across the entirety of the Splunk portfolio, so Attack Analyzer, you know, ES as well as SOAR, all should have Splunk enriched, all should have taught us and rich data so that you can make sure that you can more effectively process and analyze the data for you know emerging threats that are occurring in the market. So I am delighted to announce that we have announced this integration today and you will actually see this come out over the course of the next few months. Talos is fully going to be integrated with Splunk. And all of the data from Talos will be in Richmond, Splunk so that you can have a far better ability to go out and do detections and compress the time for investigation. That's fantastic. It. And I think, you know, one of the things, I2 and I, we both have pretty high energy and we wanna move fast on things and we're pretty proud of the teams for moving quickly on a whole set of integrations. This is just the start of something, but you gotta start and build momentum and we feel like we're getting some momentum. So that's great. Hey, you know, at the end of the day, we get all this additional signal from the security cloud we get from integration with Talos. We're going to reach down into like thousand eyes and bring in signal from there as well. So what do we think this signal does broadly for customers from a customer value perspective when you think about the outcomes that they get again? That's a great question because one of the challenges that we have and we've had in the past is if you look at, if you go back to this notion of. Lateral movement and containing lateral movement. It's impractical to take all of the network telemetry. And ingested into a single location. And So what we have to do is make sure that we can actually filter that telemetry in some way and only provide, rather than providing high volume, low fidelity telemetry into a SIM, what we want to do is make sure that we can provide. High fidelity, low volume telemetry and do them so that there's better detections. That's right. So our product XDR, which essentially correlates data across every single control point, e-mail, endpoint, web network, we can actually correlate that data so that if you have low level alerts that otherwise you would have missed, you can now correlate them so that it graduates to a high level alert that you can actually take action on. And then I think additionally about XDR working kind of on real time detections a little bit lower in the back. And it's a fantastic complement then to what's happening within the SIM. It's an enterprise security because we take that signal from those detections, flow that up. You now get a longitudinal view across an extended period of time in the sock. And then one of the other team things that Tom Gillis, Mike Horn, the rest of the security teams are working on is how can we take some of that threat intelligence we gain in the sock and then enrich those detections lower in the stack. So that's just the start of one of the future things I think we're excited about and the compliment, but. We've made another announcement at Cisco in the last couple of months here and that was the announcement of Hyper Shield. Do you wanna kind of tee that up for folks about what that is? And then you and I'll try not to get too excited about the future for that one. Yes, yes, I'll, I'll, I'll, I'll quickly tee it up because I think this actually has a very consequential architectural implication for how the world is evolving as well. If you think about the way that the world is evolving today, it's getting to be a hyper distributed architecture rather than a completely monolithic architecture. So they've gone are the days, of course. Of three tiered and you know, every application tier tying to a piece of hardware, you've got thousands of microservices that are running on hundreds of pieces of, you know, Kubernetes clusters and containers and pieces of hardware. And it's very hard to do two or three things in this architecture compared to the way that we used to do it in the past. Segmentation is extremely hard today. You know, it used to be pretty easy to go out and segment when the piece of application ran on a very, very good runs everywhere. Yeah. But now you have to make sure that you completely reimagine segmentation and imagine if you could have fully autonomous segmentation that could adjust based on the behavior of the application. So that's the one problem that we solve in a very, very unique way with Hyper Shield. The second big problem that we solve is patching is really hard, respectfully for critical infrastructure, the amount of time it takes for an exploit to occur from the time that you've announced a vulnerability. Is about 3 days. And it's getting down to hours and minutes. Right. But the amount of time it takes to patch a vulnerability is anywhere between 22 and 49 days. You've got this window where you're exposed as an organization where you need to make sure that you can figure out a way to shield their vulnerability so that you don't have that exposure. And that's another area that we source all with this capability called distributed exploit protection. And then the third area is if you all think about your iPhones today, do you worry about what operating system is running now because it just updates the operating system at night? But that's not how infrastructure works. Updating infrastructure is really hard. Yeah. And So what we've done is we've made sure that we can actually have gone are the days where you had to have a sandbox environment, you had to test out how your firewalls worked and then updated, updated twice a year, once and 4th of July. Once you're live now you can do it live in line and you can have two parallel data paths and actually do a diff at the end and know that, hey, version one and version two are behaving very normal. So we can now graduate. Version 2 from version one. And all of this can happen autonomously. So these things provide a hyper distributed architecture. You take security, you break it into thousands of peace parts and you bring it in front of the workload rather than moving the workload to security. That's right. And then ideally what also happens then is you can move the analytics to the workload and to the data rather than actually having the analytics centrally moved. And we can go even a step beyond that. And this is one of the things I get really excited about as well, that ability to get all that signal. So so hyper shield acts not as a fence. But as a fabric that's out there, right? And if you have that distributed fabric, it not only becomes a place that we can get better signal and more detection, but we can also start to push more action down with locality, the point of ingress from a user and a device. And so you can do things like quarantine earlier, snapshot earlier, even start over logging certain sessions on a network because Tom or G2 becomes a person or a device of interest in the environment. I mean, the possibilities here around the connectedness of the sock or, you know, your SRE. Into the network fabric to take action. It has tremendous potential it is truly magical and so I'm I'm really excited about all the potential we have because we don't have overlapping technologies between security and what's blank does but they're very complementary and 1 + 1 isn't 3 it's actually 11 and so I think it's going to be a lot of fun to we should have the we go to 11 sure we do have we go to 11 shirts that would have been fun yeah alright G2 we'll fantastic. One last thing for the team. You know great products get built by good companies. But movements get created by communities. And one thing that you folks should know about Cisco is we appreciate the passion with which over the course of the past 20 years, this community has built this data movement. And I just want to commit to you, we are not going to screw up Splunk. We're going to get it way, way better than where we are right now. But more importantly. More importantly, we're going to make sure that we nurture this community because this is the heart and soul of Splunk. It's all of you that actually should be really proud of this amazing movement that you've created in the industry that we're just going to take larger and scale it to 8 billion people on the planet. So thank you again for having us and we are, we are so excited to make sure that we could work with each one of you. Thank you, you too. Appreciate you. All right. So look, as you can tell, we're pretty excited about what the future holds, but we're also being incredibly practical and delivering direct integration that is of value for you and it's G2 said. The technology sets here and the products are highly complementary, not only in security, but as you.
Thanks for sharing Jeetu! It's exciting to see Cisco and Splunk joining forces. I really like the focus on refining network and endpoint telemetry to provide high-fidelity, low-volume data for the SIEM. This should boost performance and also speed up threat detection and response, which is critical with today's advanced threats. Looking forward to seeing how this shapes the future of the SOC!
Your strategic insights into the acquisition of Splunk by Cisco are truly fascinating, Jeetu Patel. The three perspectives you shared demonstrate the depth of vision needed to navigate today's complex cybersecurity landscape. Exciting times ahead for the collaboration between Cisco and Splunk in shaping the future of security operations. Your expertise shines through in each perspective presented.
Happy Birthday Jeetu! Great insights. There is so much room for AI to reduce the volume of logs being ingested as well. Every AppD customer I ever worked with talked about this.
On Item #3, What is missing with most SOC/XDR/SIEM vendor is the SaaS, Cloud infrastructure. Among the top 5 - MSFT may is the only with cloud expertise, but they lack the Network, endpoint dominance. Use CSP - GCP/AZ/AWS to learn cloud nuances of SaaS but leverage Equinix to do cloud refactoring and differentiate for long term SaaS model.
Integration in a complex environment requires a brother - sister, not a top down approach. A collaborative partnership will improve response times to disruptions and lessen the chance they occur.
Founder & CEO, Real Estate Fund Manager🏦 motivational speaker
“2+ Decades of Real Estate Experience as an International Broker-Realtor" ✈️/ Beach Lover 🏖
This insightful explanation sheds light on the strategic reasoning behind Cisco's acquisition of Splunk. The synergy between their expertise in networking, security, AI, and data promises innovative solutions for a safer digital landscape.
Great insights! The acquisition makes perfect sense given the need for robust security and data capabilities. Excited to see how Cisco and Splunk will innovate together.
Deep Dive #9 for “Some of My Learnings”
Learning #9: “Assume your customers are rational actors and your competitors are smart.”
It is surprising to see how infrequently in business people exercise the concept of Game Theory.
For those that aren’t familiar with the concept of Game Theory, here is a definition from Perplexity and ChatGPT:
“Game theory is the study of strategic interactions among rational decision-makers, where the outcome for each participant depends on the actions of all involved. It analyzes situations to predict optimal strategies and potential outcomes in competitive scenarios.”
Why do I bring this up? Because I’ve been surprised at the frequency with which competition is underestimated for their ability to operate rationally and in their best interest.
This is one of the most dangerous traps that people fall into. It is a common human tendency to assume that competition is stupid. The reality is that the most formidable competitors are rational actors. If they weren’t, they wouldn’t have earned the position of your most “formidable competitors”.
That’s why the game of catch up has never been an appealing strategy. Because we must assume that competition won’t remain still. They will advance. They will respond to your moves. They will do so in a logical and rational way. And what is extremely important is that you assume the rational and brilliant moves from them while you are thinking of your own strategic moves.
In a similar vain, it’s also important to assume that customers will make smart decisions and uncover your flaws. Your shortcomings won’t remain hidden from customers. Knowing your flaws well, acknowledging them openly and giving customers rational offsets for those flaws is essential for swaying them your way. But being in denial about your flaws or assuming they won’t be discovered will only surprise you in unpleasant ways.
An approach to use to ensure you remain intellectually honest and earn your customer’s trust is to start by acknowledging your shortfalls and demonstrating what you’ve done to offset them for creating that durable advantage.
The best way to win over a customer is not by relying on your slick charm but by showing a customer how logic steers a decision in your favor. And the best way of beating competition is assuming that they will act rationally and competently. That will force you in having more robust strategies where their response won’t be stupid, but ideally one where the rational response from them will be to not fight you because they lack an incentive to do so.
One of the most under appreciated gifts of life is freedom, until of course you lose it. And at that point, very few things matter more. Thanks to all the bravery of those that worked so hard to give all Americans the freedom we so enjoy and cherish.
Happy Independence Day to a country that I am so proud to belong to. Happy 4th!
When I look back at my journey, never in a million years would I have imagined having the privilege to dream as big as I can today.
So many of us find ourselves in these fortunate positions of representing teams that do such extraordinary work. We find ourselves in positions where we get to represent and be the face of technologies many people worked night and day to deliver. There are times when they end up delivering something to the market that is soooo magical and delightful for the people using it, that it is truly hard to have even imagined when we first started the project.
I am so grateful for the people who work so tirelessly at Cisco to deliver products to our customers that take their breath away. Our goal is to deliver products to people they love so they talk to their friends and family about it. And we do this because of these geniuses who are on a mission.
At CiscoLive in Las Vegas this year, I had a chance to ask the audience to express to our employees who work so hard that didn’t get a chance to be there live what they thought of their work. Watching this video even at full volume won’t do justice to the palpable energy we felt from every person in that arena and their appreciation for the innovation that you all deliver every day.
This was categorically my favorite moment at Cisco Live 24!!!
Thank you to all the employees at Cisco who work so tirelessly to make the world a better place. It’s your work that allows our company to fulfill our mission. It’s a privilege of a lifetime to be working alongside all of you. ❤️ 🙏 👏 ❤️
Deep Dive #8 for “Some of My Learnings”
Learning #8:
Step 1: Prove product/market fit.
Step 2: Create a repeatable opportunity creation motion.
Step 3: Only after successfully completing Step 1 & Step 2, invest in scale. Prematurely investing in scale is the same as lighting money on fire.
This formula applies to both startups and large companies.
When you build a product from scratch, or as they say from Zero to One, there are one of two types of products you build. It’s either a product for an established market with established competitors or a product in a new category.
Let’s start with established products and I can then highlight the extra work that needs to be done for a category creating product.
So goal #1 that must be accomplished when you build a product from the ground-up is to get validation from the market that in fact the product you built solves an important problem, customers are willing to pay for it and what you deliver works as advertised and solves a real problem for a focused set of customers.
The first 25 to 50 customers have to be acquired in very non-scalable ways. You must do things initially that don’t scale, so that you can eventually scale. The product leader in a big company or a CEO in a startup have to be intimately involved in selling and delivering the first few deals.
Now, a V1 product, no matter how good, isn’t going to meet all the requirements of every customer segment or industry vertical. So it is crucial to understand exactly which customers will most benefit from the product and define that ideal customer profile (ICP). Most importantly, understand and communicate why you are different from incumbents. Not by 10% but by 10x. Once this is defined, you have to be maniacally focus on pursuing opportunities for ONLY that ICP. The reason for this is that you want to have repeatability in the sales model and not spend a whole lot of time trying to win deals where your probability of winning those deals is extremely low. The thing you want to avoid at all costs is a “slow no”.
Now, as you keep enhancing the product, you can keep expanding your ICP. But staying focused on the initial ICP is great not just for sales but also adoption.
So…
Goal #1 is to validate an ideal customer for whom your product works as advertised.
Goal #2 is to make sure that you build a repeatable opportunity creation motion with a defined ICP.
Goal #3 once you succeed at #1 & #2, then and only then should you focus on scale.
The mistake that many make is to not focus and try and chase and win all different types of use cases all at once, which have little repeatability amongst themselves. This lack of focus leads to low win rates and loss of confidence in the field.
If you have to launch a new product category, it is even harder because of the investment needed to create a new category. So identify a large market but focus on serving a very small subset of that market to get started with in the early days.
There are 4 big decisions Cisco made in our Collaboration business that turned out to be very strategic.
1. Forward Invest: About 6 years ago, we had made a decision to have NVIDIA GPUs in our video devices. That turned out to be one of the most strategic decisions the team made. What it did was allowed us innovate in AI and pack a rich set of capabilities, right in the hardware layer that we shipped to equip conference rooms around the world with video conferencing enhanced with rich AI capabilities.
2. Interoperability With Competition: A second really strategic decision that we as a team made was to double down on our commitment to an interoperable open platform. Not only did we commit to making the experience of the Cisco devices working seamlessly with Webex, but we also invested in interop with other major video platforms in the market, such as Microsoft Teams, Zoom & Google. This commitment towards interoperability became core to our philosophy on how we built experiences for our customers. We further doubled down with Microsoft Teams and allowed Microsoft Team Rooms (MTR) to run natively on our devices. Today these products actually get enhanced with our AI capabilities and work better because they are running on Cisco devices, even though some would say they are competitors.
In highly competitive markets, it always feels like a very risky and unintuitive decision to interoperate with your competitors. But every time in my professional career that I’ve been part of such decisions, few years later it seems so abundantly obvious that it was the right call because it allowed us to preserve and extend an investment that customers had made not just in us, but also in others.
Contrary to popular belief, these decisions don’t exclude you from markets, but rather include you in markets you would have otherwise been excluded from. These two decisions allowed us to reimagine workspaces not just for Webex customers, but for every customer.
3. Build a Platform Advantage: over the past few years we’ve built out Webex as a true platform. What this means is that several capabilities that we’ve built for let’s say meetings, can also be used and calling, which then can be leverage in the contact center. This allowed us to build once and use many times. It allowed us to spread the investment across multitude of different products and also therefore allowed us to strategically invest in solving hard problems and spread out the cost over a much larger canvas.
4. Leverage Our Core: Integrating with core Cisco strengths like Cisco Spaces and Thousands Eyes to do what others can’t easily replicate.
We talked about this at CiscoLive in Vegas this week. Take a listen.
I’m so proud of the team for the work they’ve done to build a remarkable platform that delights users every single day. The team played the long game. They had grit. They had persistence. They had tenacity. They are Rockstars. They’ve built a gem. Thanks to the entire Collaboration team!
In Cybersecurity, one of the things that the industry has gotten wrong is that we are all looking at this as far too much of a zero-sum game as all the technology providers pursue commercial success. There is a mindset that in order for Company A to win, Company B must lose. I feel like we as an industry have to do better in order to effectively keep our customers safe in the age where AI will get increasingly more weaponized by bad actors. And as this happens, cybersecurity is no longer just a minor inconvenience because someone stole your credit card number, but lives will be lost.
When critical infrastructure like a hospital as part of our healthcare system is breached, there's someone who won't be able to get dialysis. When the financial system is down, we won't be able to move money and get a paycheck, and many won't be able to put food on the table for their families.
The reality is that the true enemy in this industry isn't the competitor. In fact, far from it. It is the adversary, who is getting more and more sophisticated every single day.
As AI is so effectively weaponized by the bad actors, we have to not only just use AI natively in the defenses, but we have to exchange knowledge and insights among each other to always stay one step ahead of the adversary.
This needs a fundamental recommitment towards an open ecosystem. We need a movement where even the fiercest competitors are figuring out a way to cooperate so that our joint customers can stay secure.
I was delighted on behalf of Cisco to share the stage at #CiscoLive in Las Vegas earlier this week with my good friend Vasu Jakkal from Microsoft where we both jointly committed to making sure that we will work together as two of the big security platforms in the industry to keep humanity safe in the AI era.
We also announced further partnerships with integrating our products with Google and AMD. My good friend Jonathan Davidson also announced the deepening of our partnership with NVIDIA. Lastly, we also announced a $1B fund for strategic investments in AI. As part of that investment, we became the largest strategic investor in Scale AI, and announced investments with Mistral AI and Cohere.
The cyber criminals are acting at an unprecedented speed and sophistication and no one company will be able to do it all. We need to come together with a strong commitment towards an open ecosystem. Expect more from Cisco in this area.
Thank you to Microsoft, Google, NVIDIA and AMD for the continued partnership. If you haven't had a chance to watch the full Day 1 keynote from Cisco by Chuck Robbins, Gary Steele, Jonathan Davidson, Carrie Palin, Vasu Jakkal, Arun C Murthy, and me, check out the replay posted in the comments of this post. Lastly, we are so grateful to our customers who took the time out of their busy schedules to join us in Las Vegas for Cisco Live.
I look forward to engaging with more of the industry to partner together to make our world more secure.
The one thing that I don’t think about on a daily basis is my freedom. I take it for granted most moments in my life. But if that were gone, everything else would pale in comparison. It is so core to our self-esteem, our ability to hold our head up high, our ability to find happiness and meaning in life.
This precious gift to allow us to be free is given to us by the sacrifice of those who gave up their lives for the pursuit of freedom of those that they don’t even know.
On this Memorial Day, let’s take a moment and honor the brave heroes for all they have done so that we can be free. Thank you for your courage.
Someone asked me last week who manages my social media posts?
My answer was pretty simple.
I do.
Here’s why!
I feel like over time as companies get large, the employees, especially senior executives are expected to be super-human all the time and always personify the image of perfect, which simply isn’t human or natural. And frankly isn’t at all interesting. It has a sterile property to it.
So I have always strongly felt that in order to use Social Media as an authentic channel of communication, it is so important to not lose your voice and manage your own content. Yes. Frequency and regularity is important in gaining value from social media channels. But not as much as authenticity. The moment we outsource that, we may have made the medium not entirely representative of ourselves. Also, the perfectly perceived persona seems far less interesting to engage with. At least for me.
So for anyone who follows me and responds and engages with my posts, know that I have authored and posted each one of them myself. Some are better than others. Some suck. These posts will always have a raw element to them. They will be unpolished. Imperfect. A bit random. They will always be a representation of my mood at that moment.
Thanks for engaging and I appreciate you 🙏.
Solutions Engineering @ Cisco | Sharing Cybersecurity Content + News | Technical Advisor, Evangelist, Mentor | Helping to Secure Enterprises and US Public Sector 🇺🇸
2wThanks for sharing Jeetu! It's exciting to see Cisco and Splunk joining forces. I really like the focus on refining network and endpoint telemetry to provide high-fidelity, low-volume data for the SIEM. This should boost performance and also speed up threat detection and response, which is critical with today's advanced threats. Looking forward to seeing how this shapes the future of the SOC!