Patti Titus, Markel
37:32
Bruce Brody chats with Patti Titus about her journey to the Chief Privacy Officer and Information Security Officer.
Related Videos
In Success Stories
-
Play video Wingmen: A Fountain of Impact
Wingmen: A Fountain of Impact
Wingmen takes Enterprise Agreements with Cisco to the next level, reaching a fountain of impact. Wingmen's strategy aims to deliver customer value, create recurring value for Wingmen, and foster a lasting partnership with Cisco.
1:28
-
Play video AXIS Capital powers agile collaboration with Webex
AXIS Capital powers agile collaboration with Webex
Discover how AXIS leverages the breadth of the Webex Suite, Cisco AI Assistant, and Cisco devices to power agile collaboration across its organization.
1:40
-
Play video Cisco and Workday | Building next generation data center for fast growing SAAS platform
Cisco and Workday | Building next generation data center for fast growing SAAS platform
Discover how SaaS leader Workday leveraged Cisco's Nexus portfolio to build their new high-capacity, globally-connected data center network.
2:32
-
Play video The biggest Cisco SD-WAN deployment in South-East Asia with NCS
The biggest Cisco SD-WAN deployment in South-East Asia with NCS
Cisco and its Partner, NCS have jointly enabled a large Organisation to modernise its infrastructure. Over 800 Cisco SD-WAN routers were successfully deployed, and firewalls were seamlessly migrated across more than 500 sites.
2:32
-
Play video Harnessing Sustainability at Telecom Egypt
Harnessing Sustainability at Telecom Egypt
Telecom Egypt aims to become a leader in corporate sustainability, and they're partnering with Cisco to achieve those goals.
1:59
-
Play video Liebherr relies on Cisco for the modernization of its production and manufacturing processes
Liebherr relies on Cisco for the modernization of its production and manufacturing processes
The IIoT Box, developed by Liebherr in collaboration with RWTH Aachen Campus and Cisco, digitally networks older and new machines and enables standardized data analysis while complying with the highest OT security standards.
2:37