Natalie Timms

Natalie is the former product manager with the CCIE program at Cisco Systems, Inc., where she managed exam content for the CCIE Security track and introduced Version 4.0. 

She has more than 15 years of Cisco networking experience working in various roles: field sales specialist, product manager and software engineer. Natalie has contributed at the IETF standards level and been involved with various certification programs for Cisco VPN based products, specifically ICSA and FIPS. 

She is a three-time CiscoLive Distinguished Speaker award winner, holder of several security related US patents, and a former network training developer and instructor (Wellfleet Communications).

Her educational background includes a BSc in Computing Science and Statistics from Macquarie University in Sydney, Australia. 

author:

Security

Security Monitoring – It’s All About the Data


In this series, we’ve covered some key areas that can help prepare for potential attacks. Preparation is essential. Security policies are essential. Understanding your network and its assets is essential. What happens if a threat is detected? What can we do to monitor for …


author:

Security

Protection Methods – The Art of Data Analytics


The previous blog reviewed some guidelines that laid the foundation for security through understanding your environment and planning how elements within that environment are configured, used, accessed, and tracked. Although implementing these recommended best practices won’t make you impervious to all attacks, the concept …





author:

Security

Windows Workstation Logs – Integration


In the final blog of this series, we’ll look at ways to integrate Windows event logs with other telemetry sources to provide a complete picture of a network environment. The most common way of doing this is by forwarding event logs to a syslog …


author:

Security

Microsoft Workstation Logs – Configuration


Over the last three posts, we’ve looked at Microsoft event logging use cases and identified a set of must-have event IDs. Now we’re ready to put our security policy in place. This blog will walk you through configuring event logging on client workstations, and …