Cisco Live Security Sessions - Vegas June 2022

Cisco Live Security Sessions - Vegas June 2022

I've scraped the Cisco Security related sessions from Cisco Live Vegas 2022 and listed them here with links to the sessions. There's something in there for everyone !!! ;)

Security Management from Anywhere: Cisco Defense Orchestrator & Security Analytics and Logging - BRKSEC-1138

Cisco Defense Orchestrator (CDO) is a SaaS that is delivered from the Cloud but provides management to your Firewall wherever it sits: Physical, Virtual, On Prem, Public Cloud, Private Cloud even in a container. Cisco Security Analytics and...

Container Security and their APIs; Two Sides of the Same Security Coin - BRKSEC-2080

Cloud-native application security involves balancing contradictory requirements: the benefits of cloud services in accelerating development, while at the same time handling security in an adverse environment where there are more attack surfaces...

The Evolution of DNS Security - BRKSEC-2051

The DNS protocol was designed to be decentralized and hierarchical, but not secure. Almost since its inception there have been exploits. We need to protect this vital network service. In this presentation, attendees will first learn the history...

Breach Prevention: An Effective Security Awareness Program - BRKSEC-2120

The world was stunned in 2020, as everyone came together to fight a pandemic that led to harsh restrictions, tight enforcement, and lastly a global lockdown. Meanwhile, the overall rate of compromised records went up by 141% resulting in losses...

Branch Router Segmentation & Security - BRKSEC-2419

This session will cover details about how to deploy security at the branch in autonomous (non SD-WAN) as well as controller mode (SD-WAN). We will look at some use cases and decide where (on-prem or in the cloud) and how to implement...

Threat Centric Network Security - BRKSEC-2480

The Cisco Secure Firewall next-generation firewall provides a number of compelling threat detection and prevention technologies to the security professional's toolbox. We will briefly survey the threat capabilities of the Firepower solution and...

Application Security - The Final Frontier - BRKSEC-1139

Applications are the center of any business and rapidly evolving from workloads to containers and microservices. As environments transition their applications to the cloud, some get re-hosted or re-platformed from on-prem to cloud and others...

Holistic Security in 5G deployments - BRKSPM-2027

As 5G provides service providers with more opportunities in sectors such as healthcare or manufacturing, it also considerably increases the extent of damage that can be caused by adversaries. Service provider networks are thus...

Multi Cloud Workload Security Analytics - BRKCLD-2009

As many other organizations your cloud environment ended up with Multi Cloud? Did it split your services to the multiple environments ? Your security and visibility concerns should be at their edge. This session will focus on how to get...

Security Resilience for the New Hybrid Work World - INTSEC-1650

We are confronting a new world. Business boundaries are blurred, with billions of ever-expanding connections and work patterns constantly shifting. This change is fueling massive investments in resilience - financial, operational, supply chain...

Cyber Defense with a Tactical Security Mission Task - BRKSEC-2087

Whether your organization is big or small, tactical planning and execution is critical to address your unique security challenges, requirements and priorities. This session will describe tactical guidance on best practice procedures and tools...

Deploying Cisco Secure Cloud Native Security using GitOps - BRKSEC-2353

DevOps practices and tools have helped increase organization’s ability to deliver reliable applications and services at rapid speed and scale while providing built in security controls and compliance. This session is for cybersecurity...

Keeping Up on Network Security with Cisco Secure Firewall - BRKSEC-2236

The network security death rumors are highly exaggerated, and Cisco Secure Firewall is the best proof of all. Whether you are an experienced Firepower aficionado, or someone who is open to trying something new, this session will get you the fix...

Full-Stack Observability (FSO) for App Security in the Cloud - BRKSEC-2624

Modern applications are distributed across multi-cloud and cloud native environments and are constantly changing to keep pace with the speed of business. This dramatically expands the application attack surface, leaving development, operations...

Defense in Depth Security for MultiCloud Data Centers - BRKDCN-3331

This session will focus on how to build multi-level defense in depth DC/multicloud security architecture. First, we'll review the pivotal role the network plays enabling macro-segmentation concentrating on how modern SDN based network fabrics...

Leveraging Visibility to drive Zero Trust for Industrial Security - BRKIOT-2353

Visibility and Operational Insights are key to providing security to Industrial Networks. Cisco Cyber Vision is a foundational element of Cisco's industrial security solutions that can bring full visibility into industrial environments and...

Building Network Security Policy Through Data Intelligence - BRKSEC-2267

Modern network architectures such as SASE and Zero Trust revolve around the concept of "common policy" but how is that policy determined, and even more importantly how is it verified? This session explores a practical approach of leveraging...

Cisco Security Air-Gapped deployments best practices - BRKSEC-1014

In this session, we will cover the best practices for deploying Cisco Security solutions in air-gapped environment. From licensing options, to the different deployments and detailed supported feature sets, this session will cover the best...

Understanding Network Security Requirements for Webex Traffic - BRKCOL-2057

The goal of this session is to demystify the enterprise network security requirements when deploying Webex. First, this session will cover the basics on network firewalls and proxies, the typical rules that are configured, and how they affect...

How to Simplify Cloud Native Security in a Hybrid Cloud Environment - BRKCLD-2741

In this session, Cisco IT will share their experience on complexities involved for providing cloud native application security and governance when deploying in hybrid cloud environment. We will discuss the process we followed to secure data,...

How Cisco is Bringing 30 Years of Security Leadership to Cloud Native Application Architectures - BRKETI-2511

Businesses are shifting to microservice-based application architectures, as these support rapid development with flexibility, stability, security, and scale. However, these architectures present new security challenges that traditional...

Securing Webex Meetings - Privacy, Confidentiality and Security options for meetings in a virtual world - BRKCOL-2876

In the past 18 months Cisco has introduced a plethora of new features that allow you configure and deploy Webex for private, secure and confidential meetings. In the same time frame, as hybrid working and virtual meetings have become common...

Cisco Secure SSLi: Making Firewalls and other Security Devices more Effective - BRKSEC-3144

Traffic encrypted with secure socket layer (SSL) or transport level security (TLS) makes deep packet inspection difficult and can degrade performance. In this session, you will learn how to deploy and configure Cisco Secure SSLi to offload...

Leveraging Cisco Security APIs for Threat Hunting Based on Automated Alerting and Intel-Driven Detections - BRKDEV-2015

This session is intended to help organizations in investigating computer security incidents by providing practical guidance on performing threat hunting activities using Application Programmable Interfaces of respective Cisco Security solutions...

Brace Yourself! Take a Proactive Approach to Defend Your Application Workloads - BRKSEC-2126

Attackers are continuously evolving their approach to wreak maximum damage and profit through increasingly sophisticated attacks. With applications deployed across data centre and multiple clouds, the attack surface area continues to expand,...

Do You Know Where Your Data Is? A deep dive on Cisco Umbrella CASB and DLP and how to protect your locations, data and users - BRKSEC-2143

Do you know where your data is? As cloud adoption is on the rise, so are bad actors preying on companies and users. This session will provide a technical overview of Cisco Umbrella's CASB and DLP offering which is a core part of Cisco's overall...

Getting SASE with Umbrella and Meraki - learn how simple and flexible the integrations between Meraki and Umbrella are and how to best deploy in your environment - BRKSEC-2238

Learn about the latest integrations with Umbrella and Meraki! These simple integrations allow for extremely flexible deployments in your environment. Choose the security level which best meets your organization's needs whether that be Meraki...

Deploy & Scale SASE for Secure Remote Worker in the Cloud with Cisco+ Secure Connect - BRKSEC-2129

This breakout session will cover threat protection & private app connectivity offered by Cisco+ Security Connect. Traditionally, customers have deployed VPN appliances to support remote workers to provide threat protection & access to private...

Why Cisco Secure Email if You Have Microsoft 365 - BRKSEC-2913

Today over a million companies use Microsoft 365 and as Email prevails as #1 threat vector, many organisations are challenged and probed with their M365 exchange online security posture. Microsoft offers by default a basic level of security to...

How to Build a Secure Multi-Cloud Environment with Cisco Secure Workload - BRKSEC-1773

This session will cover the challenges customers are facing in a Multi-Cloud environment and how Cisco Secure Workload will support them on a road to zero trust for their applications. The session will touch briefly on Cisco Data Center...

Cisco's Malware Defense Cloud and Secure Malware Analytics Integrations - BRKSEC-2242

You may have known it as AMP Cloud and Threat Grid, but they've been rebranded as the Malware Defense Cloud and Secure Malware Analytics. This session will review and take a dive deep into the Malware Defense Cloud and Malware Analytics...

Save Countless Hours with SecureX's Latest Feature: Device Insights - BRKSEC-2754

SOC investigators know this problem well. A red flag pops up for an "address", but what is that address? How do we know that each of our many security products is referring to the same endpoint? How can I put together a complete view of this...

Solving the Segmentation Puzzle! Secure Workload and Secure Firewall Integration - BRKSEC-2123

In a world of application workloads deployed anywhere, at any time, and with multi-cloud solutions, traditional security segmentation approaches have proven to be inefficient, not scalable, error-prone, and complex.?

With all of these...

From Ship to Shore: Integrations, Collaboration, and (Securely) Taking Control Beyond the Cisco Secure Email Gateway - BRKSEC-2288

Cisco Secure Email integrates outside of being its own mail gateway. Security, logging, API & configuration, and SecureX - we will walk you through how email extends beyond the gateway and feasibly making the most of your environment, large or...

Cisco Secure Firewall Cloud Native on AWS - BRKSEC-3561

Today, industry is focused on building a scalable infrastructure that can provide security at scale. This session covers building a scalable architecture for workload security using Cisco Secure Firewall Cloud Native...

Simplify your Cyber Asset Attack Surface Management with Cisco - BRKSEC-2346

Securing your migration to the cloud starts with understanding your environment. Every entity within your cyber universe has the potential to either boost or diminish your security posture. These include but are not limited to users, roles,...

Cisco’s New Secure Endpoint Pro Offering Can Do the Heavy Lifting of Endpoint Detection and Response For You - BRKSEC-1071

Ransomware, fileless malware, and an array of new attacks continue to target organizations, leading to compromised endpoints and costly damages. To stop these threats, businesses have turned to a myriad of disparate cybersecurity controls that...

Deploy and Manage Securely in AWS - Your 3 Tiered App in 45 Mins - BRKSEC-1831

No way to make you an AWS cloud security guru in 45 mins, not even close. No way to present all the numerous possibilities to deploy your new App securely in the cloud either. With a very pragmatic approach (many demonstrations), you will see...

Evaluating and Improving Defenses With MITRE ATT&CK - BRKSEC-2227

Security architectures can pose complexity and cast doubt. How can we be certain that the solutions we have acquired are adequate? How can we know they are configured properly to cover the many vectors of attack? Cisco and much of the industry...

SASE the SOCs New Best Friend - BRKSEC-2128

As organizations move to the new architecture of Secure Access Service Edge (SASE), both new and old security challenges need to be addressed. This session will show the capabilities and the tools available to help the Security Operations...

Cisco's Unified Agent: Cisco Secure Client. Bringing AMP, AnyConnect, Orbital & Umbrella together - BRKSEC-2834

We have all heard the complaints or did the complaining ourselves: "Cisco has too many agents".?

Come learn from Aaron Woland, CCIE #20113 and Cisco Live Distinguished Speaker Hall of Fame Elite; while he shows you that Cisco listened...

Who Goes There?: Identity as We Know It is About to Change - BRKSEC-2074

The way we identify ourselves online has seen only scant evolution since the early days of computers. It has been almost entirely dominated by the username and the password. That is coming to an end. What’s coming next is a huge boost to...

Zero Trust Identity for the Cloud - BRKSEC-2104

As more corporate applications migrate to the cloud via Software as a Service(SaaS), the need for user authentication is more critical than ever. Achieving Zero Trust in the Cloud also requires granular user authentication leveraging...

Building an End-End Policy Driven Secure Hybrid Cloud DC Architecture - BRKSEC-2191

This session will introduce how users/devices connect to public and private application with hybrid multi cloud design; users and workloads are everywhere. We will discuss security services using multi-tenancy, segmentation to provide security...

Click Here for Trouble - A Day in the Life of a Threat - BRKSEC-3708

Do you know (and appreciate) the "A day in the life of a packet" sessions? Here is a day in the life of a Threat/Malware. We start with a detailed threat analysis by a Talos researcher, look into how the malware looks from the inside out and...

Secure Operations for an IPv6 Network - BRKSEC-2044

Nowadays, IPv6 is in all networks as all hosts have IPv6 enabled by default. While network operators are experienced with secure operations in the IPv4 world, what are the specific challenges and techniques to be used to securely operate an...

Securing Multi-VPC Architectures in AWS - BRKSEC-2144

Companies commonly use multiple virtual private clouds (VPCs) in Amazon Web Services (AWS) in order to separate business functions and provide redundancy. Traditionally, companies would secure this architecture with 1-2 firewalls per VPC;...

A SAFE Branch with Cisco Meraki - BRKSEC-2449

Whether you are in an office (branch of many) or working from home (branch of one), today's hybrid workforce expects a reliable and secure user experience. Combining the Cisco SAFE architectural framework and the Cisco Meraki platform together,...

Cisco Zero Trust: Device-Focused Deep-Dive - BRKCOC-2620

Doing the impossible: Cisco increased security and improved experience, in one movement, by introducing Zero Trust for the Workforce. This session will dive into the details of the secure Zero Trust authentication flow, how we benefited from...

Firepower Syslog or eStreamer - Which one to choose for your SIEM solution? - Part 1 - BRKSEC-2124

The goal of this sessions is to discuss SIEM (Security information and event management ) and Syslog methods that can be used to retrieve security events (Connection, Intrusion and File&Malware events) from Cisco Next Generation Firewalls. We...

Prepare Your Defence with Cisco SecureX Orchestration - BRKSEC-3404

Prepared workflows will allow for a rapid and consistent response to security incidents as well as saving time and resources. In this breakout we will use Cisco SecureX Orchestration to create a response workflow that takes action after a...

Achieving Industry Standards, Frameworks and Architectures Using Duo - BRKSEC-1017

Identity is the new perimeter. You need identity for everything in your life. Drive a car, get on a plane, buy medication.... The same is true with accessing business applications. Without proper identity, how can the business application...

Authentication in a New Era - BRKSEC-2076

Authentication has entered a new, more secure landscape, reacting to improved technologies and more sophisticated attacks. The global pandemic shifted the way many people work, but also shifted the security landscape around authentication and...

Firepower NGFW in the DC and Enterprise - Deployment Tips and New Features - BRKSEC-2828

Based on customer use cases and common questions, this session covers the core design and configuration considerations to successfully deploy Cisco Secure Firewall (formerly Firepower Threat Defense)?as an enterprise firewall. Best practice...

ISE Deployment Staging and Planning - BRKSEC-2347

This session focuses on the preparation of an environment and the design considerations a customer should think about to ensure a successful ISE deployment. Like any technology, the best configurations and products in the world will not be...

Visibility, Detection and Response with Cisco Secure Network Analytics - BRKSEC-3019

Combating the constantly evolving threat actor requires visibility and analytics into host and user behaviour. This session will deep dive into machine learning and the multiple analytic engines in the Cisco Secure Network Analytics...

Enhanced Application Visibility - Your first step towards NGFW adoption - BRKSEC-2082

A Next Gen Firewall without application-based rules is like a Fish without... Well, you know what I mean. A transition from traditional firewalls to NGFW is much more than migrating rules and its associated configurations. This session will...

What's New with ISE 3.2! - BRKSEC-2071

Cisco ISE is the centerpiece of zero-trust security for the workplace. This flagship NAC product is now cloud-delivered and enables customers to build security resilience in their networks at ease. With the ISE 3.2 version, customers can...

Firepower Syslog or eStreamer - Which one to choose for your SIEM solution? - Part 2 - BRKSEC-2125

The goal of this sessions is to discuss SIEM (Security information and event management ) and Syslog methods that can be used to retrieve security events (Connection, Intrusion and File&Malware events) from Cisco Next Generation Firewalls. We...

Gain Complete Visibility into Your Cyber Asset Universe with Cisco Secure Cloud Insights - BRKCLD-1341

Securing an enterprise starts with understanding the digital environment that it operates within, since every asset within an organization's?cyber universe impacts its security posture. These include?cloud applications, containers, devices,...

How to Securely Build a Product - BRKARC-2021

INTERACTIVE SESSION Security threats are very real today. Product security must be designed in from the start, not added as an afterthought. But how does that happen? What needs to be incorporated into a product to make it secure ? and how do...

Automation Concepts in Firewall Policy Provisioning - BRKOPS-2290

Security in today's networks is a mission-critical concern. With the deployment of new data centers, cloud services, and any other endpoint extensions, the deployment footprint of firewalls also grows. Allowing access from one node to the...

Secure Workloads and Data in the Private Cloud with HyperFlex, Intersight and Cisco Secure Virtual Firewalls - BRKDCN-2706

Learn about the latest HyperFlex security innovations, and HyperFlex support with Cisco Secure virtual firewalls to secure workloads in the data center or at the edge. This session will cover various HX security capabilities, including software...

"Connect the dots" of NIST 800-207, TIC 3.0, and More Using Cisco SAFE Reference Architecture - BRKSEC-1013

Do you not know where to start with Zero Trust (NIST 800-207), TIC 3.0, or other frameworks for security in todays cyber landscape? Using the Cisco SAFE reference architecture to simplify the identification and application of controls can paint...

ACI L4-L7 Policy-Based Redirect (PBR) Deep Dive and Tips - BRKDCN-3610

When designing network security in Data Center, have you ever wondered where to enforce security policies and how to steer traffic to get firewalls to inspect the traffic? How would the use of Cisco ACI affect your L4-L7 services such as...

SASE Your Way: Transforming Your Infrastructure to Deliver Secure Connectivity - INTSEC-1775

In today's hyper-distributed world, ensuring a flawless application experience for remote workers and offices is now paramount. Secure Access Service Edge (SASE), the merging of networking and security architectures, is essential for enabling...

Connected Factory Architecture - BRKIOT-2720

Using Cisco Connected Factory, industrial companies can build a single common, converged, and rugged plant-to-business network. Presented by our subject matter expert, this session will explore the Connected Factory Network, Wireless and...

SecureX and Secure Firewall Better Together - BRKSEC-2201

The most recent trends of the cybersecurity hype cycle indicate that XDR (extended detection and response) is where security platforms are headed. SecureX, Cisco's security platform, is the broadest most integrated platform in the world. In...

Decoding Kubernetes Networking and Policy as Code Using Cisco Secure Workload - BRKSEC-2250

The session will cover technical details of Kubernetes networking and aspects of Container Networking Interface (CNI). The participants will be given an overview of IPtables and how they are leveraged to restrict inbound and outbound traffic...

Protect your network from Counterfeit Cisco Products - BRKGEN-2003

Counterfeiting hardware and software is an illegal and lucrative trade which leads to an estimated $100B loss of revenue annually across IT industries. For end-users across Cisco’s ecosystem, counterfeiting presents serious risks to network...

Solving Today's Challenges with the Newest Features in Cisco Umbrella - BRKSEC-2438

While the world has slowed down during the pandemic, Umbrella has been racing at full speed with the release of many new features in our Secure Internet Gateway! This session will drill down on the latest innovation that our customers are...

An Introduction to Risk-Based Vulnerability Management - BRKSEC-1639

Risk-Based Vulnerability Management (RBVM) encompasses more than you probably think. In this entertaining and informative talk, we will deep dive into the foundational concepts and underlining theories of quantifying risk and then share how...

Malware Execution As A Service: a Deep Dive into CSMA Advanced File Analysis - BRKSEC-2101

In this session you will learn about the advanced file and malware analysis features available to Cisco Secure Malware Analysis (Threat Grid) users, and how to leverage them to best gain insight and intelligence into the threats your...

Secure Access Service Edge - From Home to the Office with Cisco SASE! - BRKSEC-2644

Hybrid work is here to stay as our global workforce is starting to return to the office. This session will detail the power of Cisco SASE showcasing both the end user experience and administrative ease of use of Cisco SASE for Secure Remote...

Building a Scalable Open-Source IPS/IDS Platform Powered by Snort3 and Amazon - BRKSEC-2070

Cisco and AWS are partnering to offer a sustainable open-source IPS/IDS solution for Academic Institutions and other similar entities leaning towards open-source products. In this session, you will learn about how to use a variety of AWS...

Building Trustworthy Critical Infrastructure with IOS-XR Platforms - BRKSPG-2868

Attacks on critical infrastructure like a service provider network have been increasing more than ever along with their level of sophistication. Attackers are not just targeting the product but also the infrastructure and tools used to build...

SecureX All The Things (With Hosted and Remote Relays) - BRKSEC-1483

SecureX lets you bring together global intelligence, local visibility, and response capabilities from multiple Cisco and 3rd party products and tools. We use a modular architecture to accomplish this, and 3rd party integrations specifically use...

What is Your First Step in Protecting Endpoints and Reducing the Attack Surface? - BRKENS-2850

"There has been an exponential increase in the number of cyberattacks on critical infrastructure, healthcare and enterprise IOT in 2020 and 2021. IOT devices has become soft targets for bad actors since they are vulnerable and unpatched. Return...

How to Use Orbital Advanced Search in Your Secure Endpoint Workflows - BRKSEC-1016

See how to use Orbital Advanced Search in Cisco Secure Endpoint to accelerate your work before, during, and after an incident. Topics addressed include forensic snapshots, linked queries, and how to adapt prebuilt catalog queries to your own...

Snort 3 with the Cisco Secure Firewall - BRKSEC-2484

Starting with release 7, Cisco Secure Firewall Threat Defense introduced Snort 3 on FMC-managed devices. Snort 3 is the exciting new release of the legendary open source intrusion detection system. Along with the new Snort is a redesigned FMC...

Deploy Cisco Secure Firewall in OpenStack - BRKSEC-1775

Cisco Secure Firewall 7.0 introduced many cloud platforms, one of them is OpenStack. This session will walk participants through the deployment model, its relation to the OpenStack resources, and arrive with a complete FTDv configuration that...

Data Protection with Homomorphic Encryption and Multiparty Computing - BRKETI-2004

We observe today rising pressure on data protection around the world. Privacy regulation to protect end-users is spreading and is starting to give rise to other trends such as data sovereignty where countries try not to become dependent on some...

Peeling an Onion: A Short Travel into the Darknet - BRKSEC-2172

Everyone has heard about "The Darknet", I am sure. Either through good or bad things...

In this session we will explain how the biggest part of the Darknet, consisting of Tor, is being built, how it works under the hood and what you can...

Public Key Cryptography - from RSA and EC to Post-Quantum - BRKSEC-3129

We will explain how public key cryptography works, what are the challenges posed by quantum computers and, ultimately, we will look into quantum-resistant algorithms. This session is industry-level. We will not focus on a specific type of...

Industrial Zero Trust: Opportunities and Realities - BRKIOT-2012

Zero Trust in an industrial space is possible under certain conditions and in specific locations. Failure to recognize where it fits and does not could impact operations and leave your systems even more exposed than before. In this session,...

Zero Trust Segmentation - From Theory to Implementation - BRKXAR-2008

Now that you know that you need to leverage a Zero Trust approach when segmenting your organization, what do you do now?

Empower IT team to handle Hybrid Workforce with Cisco Best Practices, Tools and Tips - BRKOPS-1700

Most enterprises are embracing hybrid working model and their IT team need to re-adjust with the new network landscape to managed and secure the fading perimeter. Moreover, the traditional perimeter-based networking architecture is changing...

Firepower Virtual Routing and Forwarding (VRF) - BRKSEC-3580

Secure Firewall is an advance Next Generation Firewall, that provides protection in multiple layer of the OSI model. Starting on version 6.6 it supports Virtual Routing and Forwarding (VRF). Participants will learn how to configure Virtual...

Making Cisco Secure Firewall Threat Defense Policy Dynamic with Attribute Based Policy - BRKSEC-2127

This session will provide a comprehensive overview of Attribute-Based Policy in Cisco Secure Firewall Threat Defense.

Participants will learn how to make the firewall policy more dynamic, secure, and easier to manage with dynamic...

[NetSec] Understanding Migration of Snort2 IPS Policies to Snort3 - BRKSEC-2083

With the introduction of Snort3 as the default inspection engine from 7.0 and above, our customers would have to understand how their existing IPS policies and rules from Snort2 would be migrated to Snort3. From a detection standpoint, snort3...

Secure Access with ISE in the Cloud - BRKSEC-2039

ISE perfectly fits into ZTN, but with ISE 3.1 being a cloud native solution, it can be also leveraged as a component of SASE architecture. This session will unleash ISE cloud capabilities, talk about ISE deployment in AWS, cover SAML and ROPC...

Simplifying migration to Cisco Secure Firewall - BRKSEC-1777

Over the last few years, we have added several exciting & industry-first features to Cisco Secure Firewall Threat Defense. This session will highlight key capabilities to migrate your ASA or other 3rd party firewalls to Cisco Secure Firewall...

Cat and Mouse - Defender's need better Mousetraps! - BRKSEC-2487

Being a defender is a tough business and at times feels like a cat and mouse game. When it comes to detection and response EDR (Endpoint Detection and Response) technologies come to mind, but they are only as good as the endpoint they are...

Meraki & Secure Network and Cloud Analytics: Threat Detection for the Rest of Us - BRKMER-2003

Networks are constantly evolving and increasing the need for absolute visibility into every aspect of endpoint communications within and outside the network. As organizations develop data policies the need for validation and enforcement should...

Firepower Cluster NAT and PAT Operation and Troubleshooting - BRKSEC-2102

When working with Secure Firewall Threat Defense Cluster is important to understand how Network Address Translation (NAT) and Port Address Translation (PAT) operates and how a pool of IP addresses is distributed and managed across the cluster...

Help, My Firewall has Sent Me a Health Alert. What Now? - BRKSEC-2121

Don't let your firewall get to a critical state. This Session will discuss Cisco Secure Firewall health monitoring. Participants will learn the importance of health policies, how to configure a health policy and the advantages of putting a...

Route Based VPNs with Cisco Secure Firewall - BRKSEC-3058

Complexity of SDWAN and cloud based VPN use cases means customers need more advanced VPN capabilities in their firewall platforms. This 45 minute breakout session will detail advanced use case designs for ASA and Firepower VTI (Virtual Tunnel...

Secure Firewall in ACI - BRKDCN-3712

Join a focused session on how to protect your Cisco ACI workloads with Cisco Secure Firewalls. We will discuss advanced ACI deployment scenarios using Active/Active high availability with Etherchannel and ECMP firewall clustering.?FTD(v) and...

Zero Trust: Securing the Evolving Workplace - BRKSEC-2053

Cisco Zero Trust enables users to securely connect to your network from any device anywhere while restricting access from non-compliant devices. Our automated network-segmentation capabilities let you set micro-perimeters for users, devices,...

Cisco Secure Firewall and SDA Integration Deep Dive - BRKSEC-2845

This session will provide a comprehensive overview of Cisco Secure Firewall and Software-Defined Access (SDA) integration design best practices. Participants will learn about firewall deployment scenarios with Virtual Routers and...

Why 1+1 = 3 when using FTD in ACI - BRKSEC-2709

In modern DataCenter, it is key to be able to insert, deploy and manage NGFW as easily as possible. This session aims to explain and demonstrate how FTD brings more than just any NGFW in ACI. We will first introduce quickly the key concepts to...

DDoS Mitigation: Introducing Radware Deployment on Firepower Appliances - BRKSEC-2678

The distributed denial of service (DDoS) attack is one of the oldest criminal activities on the web. In today's world DDoS attacks continue to evolve and grow larger than ever. By integrating Radware Virtual Defense Pro (vDP) with the Cisco...

Securing Industrial Networks: Where do I start? - BRKSEC-2077

Operations Techonology started as mostly proprietary and airgapped, but it has increasingly moved to standard based networks and protocols (i.e. Ethernet, TCP/IP). This mandates that Cybersecurity is embedded within every OT implementation...

Securing End-to-End from Campus and Branch to Cloud with Catalyst 9000 Using MACsec and IPSec - BRKENS-3094

This session will address how to secure L2/L3 connections from an Enterprise perspective that allow customers to build large secure networks. We will cover the design and deployment aspects of Site-to-Site IPSec VPNs. The session also contains...

Becoming a Wi-Fi Guest Star: Better Practices for Guest Networks on Cisco Catalyst Wireless - BRKEWN-2284

In this session we will deep dive together into recommendations, tips and tricks to improve our wireless guest networks even further. After a brief overview of the most common and efficient techniques for connecting guest users, we will take a...

Identify Suspicious Behavior, Limit Attack Exposure on Endpoints Using Trust Analytics - BRKENS-2851

"Do you know 98% of IOT devices send encrypted traffic and a sizable number of those are vulnerable?" Unmanaged IOT devices are invariably unpatched and vulnerable to attacks especially from bad actors. Ongoing endpoint validation on behavioral...

Zero Trust Wireless Access Control - BRKEWN-2462

What is the best way to get a user or an endpoint to the network? What are the pros/cons of each EAP (Extensible Authentication Protocol) types? What kind of options are there for IoT wireless access? How can I leverage cloud based identity? If...

Pier Paolo Glave

Cybersecurity expert | Customer Success Manager | CISSP, CISM, CCNP Sec, ITIL certified

2 年

This is amazing! A really impressive and useful catalogue of security sessions ??

Legend. Thanks Steve. Brilliant resource for customers all in one place

要查看或添加评论,请登录

Steve McKee的更多文章

  • Cisco Secure Private Access (SPA)

    Cisco Secure Private Access (SPA)

    You can start off gently with Zero Trust Network Access (ZTNA) and a more modern approach to support your remote users.…

    5 条评论
  • Musings of an AI Network

    Musings of an AI Network

    I recently read Nicolas Vibert 's article - Networks Are Under AI Pressure: Can Cilium Provide Relief? and it made me…

    3 条评论
  • Simplified Segmentation with Intent

    Simplified Segmentation with Intent

    Introduction This is going to be a little bit of a ramble but, hopefully, one that generates some interesting dialogue.…

  • Investigating Cisco Networking & Security with Oracle Cloud Infrastructure.

    Investigating Cisco Networking & Security with Oracle Cloud Infrastructure.

    I thought it might be useful to get outside of my technology comfort zone ;) and look at cloud networking & security…

    2 条评论
  • Zero Trust Architecture for the SMB

    Zero Trust Architecture for the SMB

    Jarrod Benson, CISO of Koch Industries, is attributed with providing the following summary for what might be considered…

    6 条评论
  • Google Meet & AnyConnect Split Tunnelling

    Google Meet & AnyConnect Split Tunnelling

    Cisco AnyConnect has some sophisticated Split Tunnelling capability, together with great non-tunnel site protection via…

    7 条评论

社区洞察

其他会员也浏览了