Cisco Live Security Sessions - Vegas June 2022
I've scraped the Cisco Security related sessions from Cisco Live Vegas 2022 and listed them here with links to the sessions. There's something in there for everyone !!! ;)
Cisco Defense Orchestrator (CDO) is a SaaS that is delivered from the Cloud but provides management to your Firewall wherever it sits: Physical, Virtual, On Prem, Public Cloud, Private Cloud even in a container. Cisco Security Analytics and...
Cloud-native application security involves balancing contradictory requirements: the benefits of cloud services in accelerating development, while at the same time handling security in an adverse environment where there are more attack surfaces...
The DNS protocol was designed to be decentralized and hierarchical, but not secure. Almost since its inception there have been exploits. We need to protect this vital network service. In this presentation, attendees will first learn the history...
The world was stunned in 2020, as everyone came together to fight a pandemic that led to harsh restrictions, tight enforcement, and lastly a global lockdown. Meanwhile, the overall rate of compromised records went up by 141% resulting in losses...
This session will cover details about how to deploy security at the branch in autonomous (non SD-WAN) as well as controller mode (SD-WAN). We will look at some use cases and decide where (on-prem or in the cloud) and how to implement...
The Cisco Secure Firewall next-generation firewall provides a number of compelling threat detection and prevention technologies to the security professional's toolbox. We will briefly survey the threat capabilities of the Firepower solution and...
Applications are the center of any business and rapidly evolving from workloads to containers and microservices. As environments transition their applications to the cloud, some get re-hosted or re-platformed from on-prem to cloud and others...
As 5G provides service providers with more opportunities in sectors such as healthcare or manufacturing, it also considerably increases the extent of damage that can be caused by adversaries. Service provider networks are thus...
As many other organizations your cloud environment ended up with Multi Cloud? Did it split your services to the multiple environments ? Your security and visibility concerns should be at their edge. This session will focus on how to get...
We are confronting a new world. Business boundaries are blurred, with billions of ever-expanding connections and work patterns constantly shifting. This change is fueling massive investments in resilience - financial, operational, supply chain...
Whether your organization is big or small, tactical planning and execution is critical to address your unique security challenges, requirements and priorities. This session will describe tactical guidance on best practice procedures and tools...
DevOps practices and tools have helped increase organization’s ability to deliver reliable applications and services at rapid speed and scale while providing built in security controls and compliance. This session is for cybersecurity...
The network security death rumors are highly exaggerated, and Cisco Secure Firewall is the best proof of all. Whether you are an experienced Firepower aficionado, or someone who is open to trying something new, this session will get you the fix...
Modern applications are distributed across multi-cloud and cloud native environments and are constantly changing to keep pace with the speed of business. This dramatically expands the application attack surface, leaving development, operations...
This session will focus on how to build multi-level defense in depth DC/multicloud security architecture. First, we'll review the pivotal role the network plays enabling macro-segmentation concentrating on how modern SDN based network fabrics...
Visibility and Operational Insights are key to providing security to Industrial Networks. Cisco Cyber Vision is a foundational element of Cisco's industrial security solutions that can bring full visibility into industrial environments and...
Modern network architectures such as SASE and Zero Trust revolve around the concept of "common policy" but how is that policy determined, and even more importantly how is it verified? This session explores a practical approach of leveraging...
In this session, we will cover the best practices for deploying Cisco Security solutions in air-gapped environment. From licensing options, to the different deployments and detailed supported feature sets, this session will cover the best...
The goal of this session is to demystify the enterprise network security requirements when deploying Webex. First, this session will cover the basics on network firewalls and proxies, the typical rules that are configured, and how they affect...
In this session, Cisco IT will share their experience on complexities involved for providing cloud native application security and governance when deploying in hybrid cloud environment. We will discuss the process we followed to secure data,...
Businesses are shifting to microservice-based application architectures, as these support rapid development with flexibility, stability, security, and scale. However, these architectures present new security challenges that traditional...
In the past 18 months Cisco has introduced a plethora of new features that allow you configure and deploy Webex for private, secure and confidential meetings. In the same time frame, as hybrid working and virtual meetings have become common...
Traffic encrypted with secure socket layer (SSL) or transport level security (TLS) makes deep packet inspection difficult and can degrade performance. In this session, you will learn how to deploy and configure Cisco Secure SSLi to offload...
This session is intended to help organizations in investigating computer security incidents by providing practical guidance on performing threat hunting activities using Application Programmable Interfaces of respective Cisco Security solutions...
Attackers are continuously evolving their approach to wreak maximum damage and profit through increasingly sophisticated attacks. With applications deployed across data centre and multiple clouds, the attack surface area continues to expand,...
Do you know where your data is? As cloud adoption is on the rise, so are bad actors preying on companies and users. This session will provide a technical overview of Cisco Umbrella's CASB and DLP offering which is a core part of Cisco's overall...
Learn about the latest integrations with Umbrella and Meraki! These simple integrations allow for extremely flexible deployments in your environment. Choose the security level which best meets your organization's needs whether that be Meraki...
This breakout session will cover threat protection & private app connectivity offered by Cisco+ Security Connect. Traditionally, customers have deployed VPN appliances to support remote workers to provide threat protection & access to private...
Today over a million companies use Microsoft 365 and as Email prevails as #1 threat vector, many organisations are challenged and probed with their M365 exchange online security posture. Microsoft offers by default a basic level of security to...
This session will cover the challenges customers are facing in a Multi-Cloud environment and how Cisco Secure Workload will support them on a road to zero trust for their applications. The session will touch briefly on Cisco Data Center...
You may have known it as AMP Cloud and Threat Grid, but they've been rebranded as the Malware Defense Cloud and Secure Malware Analytics. This session will review and take a dive deep into the Malware Defense Cloud and Malware Analytics...
SOC investigators know this problem well. A red flag pops up for an "address", but what is that address? How do we know that each of our many security products is referring to the same endpoint? How can I put together a complete view of this...
In a world of application workloads deployed anywhere, at any time, and with multi-cloud solutions, traditional security segmentation approaches have proven to be inefficient, not scalable, error-prone, and complex.?
With all of these...
Cisco Secure Email integrates outside of being its own mail gateway. Security, logging, API & configuration, and SecureX - we will walk you through how email extends beyond the gateway and feasibly making the most of your environment, large or...
Today, industry is focused on building a scalable infrastructure that can provide security at scale. This session covers building a scalable architecture for workload security using Cisco Secure Firewall Cloud Native...
Securing your migration to the cloud starts with understanding your environment. Every entity within your cyber universe has the potential to either boost or diminish your security posture. These include but are not limited to users, roles,...
Ransomware, fileless malware, and an array of new attacks continue to target organizations, leading to compromised endpoints and costly damages. To stop these threats, businesses have turned to a myriad of disparate cybersecurity controls that...
No way to make you an AWS cloud security guru in 45 mins, not even close. No way to present all the numerous possibilities to deploy your new App securely in the cloud either. With a very pragmatic approach (many demonstrations), you will see...
Security architectures can pose complexity and cast doubt. How can we be certain that the solutions we have acquired are adequate? How can we know they are configured properly to cover the many vectors of attack? Cisco and much of the industry...
As organizations move to the new architecture of Secure Access Service Edge (SASE), both new and old security challenges need to be addressed. This session will show the capabilities and the tools available to help the Security Operations...
We have all heard the complaints or did the complaining ourselves: "Cisco has too many agents".?
Come learn from Aaron Woland, CCIE #20113 and Cisco Live Distinguished Speaker Hall of Fame Elite; while he shows you that Cisco listened...
The way we identify ourselves online has seen only scant evolution since the early days of computers. It has been almost entirely dominated by the username and the password. That is coming to an end. What’s coming next is a huge boost to...
As more corporate applications migrate to the cloud via Software as a Service(SaaS), the need for user authentication is more critical than ever. Achieving Zero Trust in the Cloud also requires granular user authentication leveraging...
This session will introduce how users/devices connect to public and private application with hybrid multi cloud design; users and workloads are everywhere. We will discuss security services using multi-tenancy, segmentation to provide security...
Do you know (and appreciate) the "A day in the life of a packet" sessions? Here is a day in the life of a Threat/Malware. We start with a detailed threat analysis by a Talos researcher, look into how the malware looks from the inside out and...
Nowadays, IPv6 is in all networks as all hosts have IPv6 enabled by default. While network operators are experienced with secure operations in the IPv4 world, what are the specific challenges and techniques to be used to securely operate an...
Companies commonly use multiple virtual private clouds (VPCs) in Amazon Web Services (AWS) in order to separate business functions and provide redundancy. Traditionally, companies would secure this architecture with 1-2 firewalls per VPC;...
Whether you are in an office (branch of many) or working from home (branch of one), today's hybrid workforce expects a reliable and secure user experience. Combining the Cisco SAFE architectural framework and the Cisco Meraki platform together,...
Doing the impossible: Cisco increased security and improved experience, in one movement, by introducing Zero Trust for the Workforce. This session will dive into the details of the secure Zero Trust authentication flow, how we benefited from...
The goal of this sessions is to discuss SIEM (Security information and event management ) and Syslog methods that can be used to retrieve security events (Connection, Intrusion and File&Malware events) from Cisco Next Generation Firewalls. We...
Prepared workflows will allow for a rapid and consistent response to security incidents as well as saving time and resources. In this breakout we will use Cisco SecureX Orchestration to create a response workflow that takes action after a...
Identity is the new perimeter. You need identity for everything in your life. Drive a car, get on a plane, buy medication.... The same is true with accessing business applications. Without proper identity, how can the business application...
Authentication has entered a new, more secure landscape, reacting to improved technologies and more sophisticated attacks. The global pandemic shifted the way many people work, but also shifted the security landscape around authentication and...
领英推荐
Based on customer use cases and common questions, this session covers the core design and configuration considerations to successfully deploy Cisco Secure Firewall (formerly Firepower Threat Defense)?as an enterprise firewall. Best practice...
This session focuses on the preparation of an environment and the design considerations a customer should think about to ensure a successful ISE deployment. Like any technology, the best configurations and products in the world will not be...
Combating the constantly evolving threat actor requires visibility and analytics into host and user behaviour. This session will deep dive into machine learning and the multiple analytic engines in the Cisco Secure Network Analytics...
A Next Gen Firewall without application-based rules is like a Fish without... Well, you know what I mean. A transition from traditional firewalls to NGFW is much more than migrating rules and its associated configurations. This session will...
Cisco ISE is the centerpiece of zero-trust security for the workplace. This flagship NAC product is now cloud-delivered and enables customers to build security resilience in their networks at ease. With the ISE 3.2 version, customers can...
The goal of this sessions is to discuss SIEM (Security information and event management ) and Syslog methods that can be used to retrieve security events (Connection, Intrusion and File&Malware events) from Cisco Next Generation Firewalls. We...
Securing an enterprise starts with understanding the digital environment that it operates within, since every asset within an organization's?cyber universe impacts its security posture. These include?cloud applications, containers, devices,...
INTERACTIVE SESSION Security threats are very real today. Product security must be designed in from the start, not added as an afterthought. But how does that happen? What needs to be incorporated into a product to make it secure ? and how do...
Security in today's networks is a mission-critical concern. With the deployment of new data centers, cloud services, and any other endpoint extensions, the deployment footprint of firewalls also grows. Allowing access from one node to the...
Learn about the latest HyperFlex security innovations, and HyperFlex support with Cisco Secure virtual firewalls to secure workloads in the data center or at the edge. This session will cover various HX security capabilities, including software...
Do you not know where to start with Zero Trust (NIST 800-207), TIC 3.0, or other frameworks for security in todays cyber landscape? Using the Cisco SAFE reference architecture to simplify the identification and application of controls can paint...
When designing network security in Data Center, have you ever wondered where to enforce security policies and how to steer traffic to get firewalls to inspect the traffic? How would the use of Cisco ACI affect your L4-L7 services such as...
In today's hyper-distributed world, ensuring a flawless application experience for remote workers and offices is now paramount. Secure Access Service Edge (SASE), the merging of networking and security architectures, is essential for enabling...
Using Cisco Connected Factory, industrial companies can build a single common, converged, and rugged plant-to-business network. Presented by our subject matter expert, this session will explore the Connected Factory Network, Wireless and...
The most recent trends of the cybersecurity hype cycle indicate that XDR (extended detection and response) is where security platforms are headed. SecureX, Cisco's security platform, is the broadest most integrated platform in the world. In...
The session will cover technical details of Kubernetes networking and aspects of Container Networking Interface (CNI). The participants will be given an overview of IPtables and how they are leveraged to restrict inbound and outbound traffic...
Counterfeiting hardware and software is an illegal and lucrative trade which leads to an estimated $100B loss of revenue annually across IT industries. For end-users across Cisco’s ecosystem, counterfeiting presents serious risks to network...
While the world has slowed down during the pandemic, Umbrella has been racing at full speed with the release of many new features in our Secure Internet Gateway! This session will drill down on the latest innovation that our customers are...
Risk-Based Vulnerability Management (RBVM) encompasses more than you probably think. In this entertaining and informative talk, we will deep dive into the foundational concepts and underlining theories of quantifying risk and then share how...
In this session you will learn about the advanced file and malware analysis features available to Cisco Secure Malware Analysis (Threat Grid) users, and how to leverage them to best gain insight and intelligence into the threats your...
Hybrid work is here to stay as our global workforce is starting to return to the office. This session will detail the power of Cisco SASE showcasing both the end user experience and administrative ease of use of Cisco SASE for Secure Remote...
Cisco and AWS are partnering to offer a sustainable open-source IPS/IDS solution for Academic Institutions and other similar entities leaning towards open-source products. In this session, you will learn about how to use a variety of AWS...
Attacks on critical infrastructure like a service provider network have been increasing more than ever along with their level of sophistication. Attackers are not just targeting the product but also the infrastructure and tools used to build...
SecureX lets you bring together global intelligence, local visibility, and response capabilities from multiple Cisco and 3rd party products and tools. We use a modular architecture to accomplish this, and 3rd party integrations specifically use...
"There has been an exponential increase in the number of cyberattacks on critical infrastructure, healthcare and enterprise IOT in 2020 and 2021. IOT devices has become soft targets for bad actors since they are vulnerable and unpatched. Return...
See how to use Orbital Advanced Search in Cisco Secure Endpoint to accelerate your work before, during, and after an incident. Topics addressed include forensic snapshots, linked queries, and how to adapt prebuilt catalog queries to your own...
Starting with release 7, Cisco Secure Firewall Threat Defense introduced Snort 3 on FMC-managed devices. Snort 3 is the exciting new release of the legendary open source intrusion detection system. Along with the new Snort is a redesigned FMC...
Cisco Secure Firewall 7.0 introduced many cloud platforms, one of them is OpenStack. This session will walk participants through the deployment model, its relation to the OpenStack resources, and arrive with a complete FTDv configuration that...
We observe today rising pressure on data protection around the world. Privacy regulation to protect end-users is spreading and is starting to give rise to other trends such as data sovereignty where countries try not to become dependent on some...
Everyone has heard about "The Darknet", I am sure. Either through good or bad things...
In this session we will explain how the biggest part of the Darknet, consisting of Tor, is being built, how it works under the hood and what you can...
We will explain how public key cryptography works, what are the challenges posed by quantum computers and, ultimately, we will look into quantum-resistant algorithms. This session is industry-level. We will not focus on a specific type of...
Zero Trust in an industrial space is possible under certain conditions and in specific locations. Failure to recognize where it fits and does not could impact operations and leave your systems even more exposed than before. In this session,...
Now that you know that you need to leverage a Zero Trust approach when segmenting your organization, what do you do now?
Most enterprises are embracing hybrid working model and their IT team need to re-adjust with the new network landscape to managed and secure the fading perimeter. Moreover, the traditional perimeter-based networking architecture is changing...
Secure Firewall is an advance Next Generation Firewall, that provides protection in multiple layer of the OSI model. Starting on version 6.6 it supports Virtual Routing and Forwarding (VRF). Participants will learn how to configure Virtual...
Making Cisco Secure Firewall Threat Defense Policy Dynamic with Attribute Based Policy - BRKSEC-2127
This session will provide a comprehensive overview of Attribute-Based Policy in Cisco Secure Firewall Threat Defense.
Participants will learn how to make the firewall policy more dynamic, secure, and easier to manage with dynamic...
With the introduction of Snort3 as the default inspection engine from 7.0 and above, our customers would have to understand how their existing IPS policies and rules from Snort2 would be migrated to Snort3. From a detection standpoint, snort3...
ISE perfectly fits into ZTN, but with ISE 3.1 being a cloud native solution, it can be also leveraged as a component of SASE architecture. This session will unleash ISE cloud capabilities, talk about ISE deployment in AWS, cover SAML and ROPC...
Over the last few years, we have added several exciting & industry-first features to Cisco Secure Firewall Threat Defense. This session will highlight key capabilities to migrate your ASA or other 3rd party firewalls to Cisco Secure Firewall...
Being a defender is a tough business and at times feels like a cat and mouse game. When it comes to detection and response EDR (Endpoint Detection and Response) technologies come to mind, but they are only as good as the endpoint they are...
Networks are constantly evolving and increasing the need for absolute visibility into every aspect of endpoint communications within and outside the network. As organizations develop data policies the need for validation and enforcement should...
When working with Secure Firewall Threat Defense Cluster is important to understand how Network Address Translation (NAT) and Port Address Translation (PAT) operates and how a pool of IP addresses is distributed and managed across the cluster...
Don't let your firewall get to a critical state. This Session will discuss Cisco Secure Firewall health monitoring. Participants will learn the importance of health policies, how to configure a health policy and the advantages of putting a...
Complexity of SDWAN and cloud based VPN use cases means customers need more advanced VPN capabilities in their firewall platforms. This 45 minute breakout session will detail advanced use case designs for ASA and Firepower VTI (Virtual Tunnel...
Join a focused session on how to protect your Cisco ACI workloads with Cisco Secure Firewalls. We will discuss advanced ACI deployment scenarios using Active/Active high availability with Etherchannel and ECMP firewall clustering.?FTD(v) and...
Cisco Zero Trust enables users to securely connect to your network from any device anywhere while restricting access from non-compliant devices. Our automated network-segmentation capabilities let you set micro-perimeters for users, devices,...
This session will provide a comprehensive overview of Cisco Secure Firewall and Software-Defined Access (SDA) integration design best practices. Participants will learn about firewall deployment scenarios with Virtual Routers and...
In modern DataCenter, it is key to be able to insert, deploy and manage NGFW as easily as possible. This session aims to explain and demonstrate how FTD brings more than just any NGFW in ACI. We will first introduce quickly the key concepts to...
The distributed denial of service (DDoS) attack is one of the oldest criminal activities on the web. In today's world DDoS attacks continue to evolve and grow larger than ever. By integrating Radware Virtual Defense Pro (vDP) with the Cisco...
Operations Techonology started as mostly proprietary and airgapped, but it has increasingly moved to standard based networks and protocols (i.e. Ethernet, TCP/IP). This mandates that Cybersecurity is embedded within every OT implementation...
This session will address how to secure L2/L3 connections from an Enterprise perspective that allow customers to build large secure networks. We will cover the design and deployment aspects of Site-to-Site IPSec VPNs. The session also contains...
In this session we will deep dive together into recommendations, tips and tricks to improve our wireless guest networks even further. After a brief overview of the most common and efficient techniques for connecting guest users, we will take a...
Identify Suspicious Behavior, Limit Attack Exposure on Endpoints Using Trust Analytics - BRKENS-2851
"Do you know 98% of IOT devices send encrypted traffic and a sizable number of those are vulnerable?" Unmanaged IOT devices are invariably unpatched and vulnerable to attacks especially from bad actors. Ongoing endpoint validation on behavioral...
What is the best way to get a user or an endpoint to the network? What are the pros/cons of each EAP (Extensible Authentication Protocol) types? What kind of options are there for IoT wireless access? How can I leverage cloud based identity? If...
Cybersecurity expert | Customer Success Manager | CISSP, CISM, CCNP Sec, ITIL certified
2 年This is amazing! A really impressive and useful catalogue of security sessions ??
Secure Digital Transformation Architect
2 年Tekanyo Spencer Kgotlhane
Legend. Thanks Steve. Brilliant resource for customers all in one place