{"id":3917,"date":"2021-08-27T23:40:20","date_gmt":"2021-08-28T04:40:20","guid":{"rendered":"https:\/\/texascyber.com\/?post_type=sponsor_post&p=3917"},"modified":"2023-09-16T19:03:30","modified_gmt":"2023-09-17T00:03:30","slug":"cisco","status":"publish","type":"sponsor_post","link":"https:\/\/texascyber.org\/sponsor\/cisco\/","title":{"rendered":"Cisco Secure"},"content":{"rendered":"

“Cisco Secure delivers a streamlined, customer-centric approach to security that ensures it\u2019s easy to deploy, manage, and use. We help 100 percent of the Fortune 100 companies secure work \u2013 wherever it happens \u2013 with the broadest, most integrated platform. Learn more at cisco.com\/go\/secure.”<\/p>\n","protected":false},"featured_media":8694,"template":"","sponsor_level":[13],"sponsored_year":[],"acf":[],"yoast_head":"\nCisco Secure - Texas Cyber<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/texascyber.org\/sponsor\/cisco\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cisco Secure - Texas Cyber\" \/>\n<meta property=\"og:description\" content=\"“Cisco Secure delivers a streamlined, customer-centric approach to security that ensures it\u2019s easy to deploy, manage, and use. We help 100 percent of the Fortune 100 companies secure work \u2013 wherever it happens \u2013 with the broadest, most integrated platform. Learn more at cisco.com\/go\/secure.”\" \/>\n<meta property=\"og:url\" content=\"https:\/\/texascyber.org\/sponsor\/cisco\/\" \/>\n<meta property=\"og:site_name\" content=\"Texas Cyber\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/texascyber\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-17T00:03:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/texascyber.org\/wp-content\/uploads\/2022\/09\/ciscosecurestacked2c.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"270\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@texascyber\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/texascyber.org\/sponsor\/cisco\/\",\"url\":\"https:\/\/texascyber.org\/sponsor\/cisco\/\",\"name\":\"Cisco Secure - Texas Cyber\",\"isPartOf\":{\"@id\":\"https:\/\/texascyber.org\/#website\"},\"datePublished\":\"2021-08-28T04:40:20+00:00\",\"dateModified\":\"2023-09-17T00:03:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/texascyber.org\/sponsor\/cisco\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/texascyber.org\/sponsor\/cisco\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/texascyber.org\/sponsor\/cisco\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/texascyber.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cisco Secure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/texascyber.org\/#website\",\"url\":\"https:\/\/texascyber.org\/\",\"name\":\"Texas Cyber\",\"description\":\"Texas Cyber Summit\",\"publisher\":{\"@id\":\"https:\/\/texascyber.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/texascyber.org\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/texascyber.org\/#organization\",\"name\":\"Texascyber\",\"url\":\"https:\/\/texascyber.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/texascyber.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/texascyber.org\/wp-content\/uploads\/2021\/03\/Cyber-Summit-Logo1-e1620316415785.png\",\"contentUrl\":\"https:\/\/texascyber.org\/wp-content\/uploads\/2021\/03\/Cyber-Summit-Logo1-e1620316415785.png\",\"width\":150,\"height\":150,\"caption\":\"Texascyber\"},\"image\":{\"@id\":\"https:\/\/texascyber.org\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/texascyber\",\"https:\/\/twitter.com\/texascyber\",\"https:\/\/www.instagram.com\/texascybersummit\/\",\"https:\/\/www.linkedin.com\/company\/texas-cyber\",\"https:\/\/www.youtube.com\/texascybersummit\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cisco Secure - Texas Cyber","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/texascyber.org\/sponsor\/cisco\/","og_locale":"en_US","og_type":"article","og_title":"Cisco Secure - Texas Cyber","og_description":"“Cisco Secure delivers a streamlined, customer-centric approach to security that ensures it\u2019s easy to deploy, manage, and use. We help 100 percent of the Fortune 100 companies secure work \u2013 wherever it happens \u2013 with the broadest, most integrated platform. Learn more at cisco.com\/go\/secure.”","og_url":"https:\/\/texascyber.org\/sponsor\/cisco\/","og_site_name":"Texas Cyber","article_publisher":"https:\/\/facebook.com\/texascyber","article_modified_time":"2023-09-17T00:03:30+00:00","og_image":[{"width":500,"height":270,"url":"https:\/\/texascyber.org\/wp-content\/uploads\/2022\/09\/ciscosecurestacked2c.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_site":"@texascyber","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/texascyber.org\/sponsor\/cisco\/","url":"https:\/\/texascyber.org\/sponsor\/cisco\/","name":"Cisco Secure - Texas Cyber","isPartOf":{"@id":"https:\/\/texascyber.org\/#website"},"datePublished":"2021-08-28T04:40:20+00:00","dateModified":"2023-09-17T00:03:30+00:00","breadcrumb":{"@id":"https:\/\/texascyber.org\/sponsor\/cisco\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/texascyber.org\/sponsor\/cisco\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/texascyber.org\/sponsor\/cisco\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/texascyber.org\/"},{"@type":"ListItem","position":2,"name":"Cisco Secure"}]},{"@type":"WebSite","@id":"https:\/\/texascyber.org\/#website","url":"https:\/\/texascyber.org\/","name":"Texas Cyber","description":"Texas Cyber Summit","publisher":{"@id":"https:\/\/texascyber.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/texascyber.org\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/texascyber.org\/#organization","name":"Texascyber","url":"https:\/\/texascyber.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/texascyber.org\/#\/schema\/logo\/image\/","url":"https:\/\/texascyber.org\/wp-content\/uploads\/2021\/03\/Cyber-Summit-Logo1-e1620316415785.png","contentUrl":"https:\/\/texascyber.org\/wp-content\/uploads\/2021\/03\/Cyber-Summit-Logo1-e1620316415785.png","width":150,"height":150,"caption":"Texascyber"},"image":{"@id":"https:\/\/texascyber.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/texascyber","https:\/\/twitter.com\/texascyber","https:\/\/www.instagram.com\/texascybersummit\/","https:\/\/www.linkedin.com\/company\/texas-cyber","https:\/\/www.youtube.com\/texascybersummit"]}]}},"_links":{"self":[{"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/sponsor_post\/3917"}],"collection":[{"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/sponsor_post"}],"about":[{"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/types\/sponsor_post"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/media\/8694"}],"wp:attachment":[{"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/media?parent=3917"}],"wp:term":[{"taxonomy":"sponsor_level","embeddable":true,"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/sponsor_level?post=3917"},{"taxonomy":"sponsored_year","embeddable":true,"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/sponsored_year?post=3917"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}