Cisco Security Webinars.

Explore the Cisco security webinars. Register for upcoming events or watch pre-recorded webinars.


Featured Upcoming Webinar

Nyetya. Global Ransomware Attack. What you want to know.

June 30, 2017 at 7AM PDT/3PM BST/4PM CEST

Hear from Martin Lee, techinal lead on Cisco’s Talos threat research team, to understand the latest in the new malware variant, that we named Nyetya.

Nyetya is nasty because it encrypts the master boot record (like a table of contents for a hard drive) of a computer -- and uses three ways to spread automatically in a network, one of which is the known Eternal Blue vulnerability, which WannaCry used as well.

Register Now

Pre-Recorded Webinars

Talos Security Threat Briefing Webinar

Watch this on-demand webinar and hear the cybersecurity experts at Talos as they reveal their insights into recent attacks that exemplify the latest trends in the security industry. By discussing these new and emerging threats, Threat Researcher & Team Manager Martin Lee will help you understand new protection strategies and build better defenses.

Watch On-Demand
Accelerate Malware Analysis with Orchestration

Watch this on-demand webinar with Cisco and ThreatConnect, where we discuss how to utilize orchestration to enhance malware analysis capabilities and protect your organization from todays advanced malware.

Watch On-Demand
The New Cybersecurity Executive Order: What You Need to Know

Is your agency efficiently and effectively managing its cybersecurity risks? Do you already understand the NIST Cybersecurity Framework and know how to adopt it? If not, please watch this on-demand webinar where we cover the key points that you and everyone in the federal government needs to know.

Watch On-Demand

Forcing the Bad Guys to Innovate


In the latest Talos cybersecurity webinar, Threat Research Manager Martin Lee revealed how threat intelligence has forced adversaries to evolve their attack strategies.

Watch On-Demand
OAuth Phishing and WannaCry Ransomware Attacks: Are You Protected?

A new type of phishing attack has gone viral globally, leaving many organizations unsure of what happened and their exposure to future attacks. Watch this on-demand webinar to learn how this OAuth attack happened and how to protect yourself from future threats.

Watch On-Demand

Top 3 Security Challenges for Manufacturing

Read More >
Watch this on-demand interactive webcast where a panel of experienced security experts focus on critical security challenges manufacturers face while IT and OT environments converge.
Watch this on-demand interactive webcast where a panel of experienced security experts focus on critical security challenges manufacturers face while IT and OT environments converge.
Watch On-Demand

Get your head out of the box; More effective security through integration

Read More >
More IT vendors, more problems. Watch this free cybersecurity webinar to learn a better way of achieving security that’s simple, open, automated, and effective.
More IT vendors, more problems. Watch this free cybersecurity webinar to learn a better way of achieving security that’s simple, open, automated, and effective.
Watch On-Demand

The Rise of Enterprise Class Cybersecurity Vendors

Read More >
More is more. But when it comes to cybersecurity, is the old adage really true? In this free webinar, John Oltsik, Sr. Principal Analyst from ESG, shared the latest findings into the pros and cons of a multivendor approach to cybersecurity. With this blueprint, you’ll learn how you can achieve a security approach that’s simple, effective and automated.
More is more. But when it comes to cybersecurity, is the old adage really true? In this free webinar, John Oltsik, Sr. Principal Analyst from ESG, shared the latest findings into the pros and cons of a multivendor approach to cybersecurity. With this blueprint, you’ll learn how you can achieve a security approach that’s simple, effective and automated.
Watch On-Demand
Talos Winter Security Threat Briefing Webinar
Read More >
Adversaries never stop innovating. Learn what macro trends the threat researchers have discovered in the security industry from the past season. By discussing these new and emerging threats, the Talos team will help you understand new protection strategies and build better defenses.
Adversaries never stop innovating. Learn what macro trends the threat researchers have discovered in the security industry from the past season. By discussing these new and emerging threats, the Talos team will help you understand new protection strategies and build better defenses.
Watch On-Demand
Design a Secure Branch in less than 1 hour
Read More >
In this webinar, you will learn how to defend the people, devices and business outcomes in a branch environment from cyberattack. The presenter will create a Secure Branch network diagram from start to finish. The network will include security and networking technology mapped to the most critical business outcomes in the branch.
In this webinar, you will learn how to defend the people, devices and business outcomes in a branch environment from cyberattack. The presenter will create a Secure Branch network diagram from start to finish. The network will include security and networking technology mapped to the most critical business outcomes in the branch.
Watch On-Demand
Ransomware, Banking Trojans and Floki Bot: A Threat Trifecta
Read More >
In the latest Talos cybersecurity webinar, expert Edmund Brumaghin will reveal the latest trends in malware, including recent developments in ransomware, Trojans, and Floki Bot.
In the latest Talos cybersecurity webinar, expert Edmund Brumaghin revealed the latest trends in malware, including recent developments in ransomware, Trojans, and Floki Bot.
Watch On-Demand

+ View Additional Webinars 

- Hide Additional Webinars 

Not Just Another Firewall
Watch On-Demand

Organizations realize that when they are breached, their network is imperiled and business can suffer. To be effective security has to be simple while delivering business resiliency in the face of advanced threats. In this session, experts from IDC and Cisco explain how the NGFW market continues to evolve to meet this challenge.

IPS Myths Debunked
Watch On-Demand

The focus on zero-day attacks and next-generation firewalls has led many to miss the value that a dedicated intrusion prevention system provides to an organization. In this session, experts from IDC and Cisco dispel the myths about IPS and explain why these devices remain a critical part of an effective network defense.

Exploit Kits – is this the end or just the beginning?
Watch On-Demand

Watch this on-demand webinar to learn: What exploit kits are and why they are a major threat; What changes occurred in 2016; What’s the future of exploit kits in 2017 and beyond.

Stop Phishing Attacks with Automated Incident Response
Watch On-Demand

Reduce response and triage time with automated incident response and security orchestration. Cisco has collaborated with Swimlane to deliver an integrated approach to automating the investigation and response activities needed to take action on threats. 

The Case for Next-Generation Intrusion Prevention
Watch On-Demand

Many think with the adoption of a next-generation firewall (NGFW), that a stand-alone intrusion prevention system (IPS) is no longer required. That’s simply not true. This session explores use cases where next-generation IPS (NGIPS) can provide visibility, threat detection and response, and malware discovery in areas of your network that remain off limits to firewall inspection and controls.

Cisco Talos on DNS Exfiltration
Watch On-Demand

Threat researcher Martin Lee discusses Domain Name System (DNS) exfiltration techniques and why security professionals should pay closer attention to DNS traffic.

Combat Cybercrime with an Incident Response Plan
Watch On-Demand

What’s the missing piece of many security approaches? A strong threat management strategy. Learn from expert Sean Mason how your organization can design an incident response plan—and why it matters now more than ever.

The Ransomware Threat: New Tactics and How to Fight Back
Watch On-Demand

The rise of ransomware has become one of the most widespread and financially damaging threats facing businesses today. But, there are steps you can take to reduce the risk of ransomware and protect your business. Watch this on-demand webinar.

Plugging the Email Security Gap
Watch On-Demand

Cyber criminals are hard at work trying to steal your corporate, personal and financial data, and breach your network. Watch this webinar to learn about their top methods of attack and how to prevent them.

The Rising Tide of Spam
Watch On-Demand

What sinister forces are behind this global increase in spam? Watch this on-demand webinar from Talos threat researcher Jaeson Schultz to find out. You’ll learn about the latest trends in spam attacks strategies and how to stop them.

Ransom Where…Everywhere: Breaking Down the Ransomware Attack
Watch On-Demand

Are you prepared if you lose all your critical data? It could be any digital asset, from personal family pictures to sensitive customer records that you couldn’t get back unless you paid a ransom. This kind of attack is called Ransomware and it’s becoming increasingly common. Watch this special webcast focused on Ransomware. Leading the talk will be Nick Biasini from Cisco’s threat research team Talos and Joseph Muniz from the security architecture team.

Talos: Cisco's Secret Security Weapon
Watch On-Demand

Billions of cyberthreats try to compromise systems on a daily basis. Unfortunately, that number is growing. TALOS is on the forefront of stopping cyberattacks and educating organizations about current security threats.

Spotlight on Ransomware: How to Stay Protected.
Watch On-Demand

Ransomware has exploded in popularity. Learn how it started, how it’s spread, and how to stop it in this complementary webinar. Threat researcher William Largent from Talos shares the latest ransomware threat intelligence, and Bart McGlothin gives a demo of our new Ransomware Defense solution.

Cisco Talos on Exploit Kits: Hunting the Hunters
Watch On-Demand

Hear the incredible story of how Talos traced Angler back to the service providers and what happened next. Join our live Q&A for answers to your questions.

Cisco Talos on Ransomware: Data Held Hostage
Watch On-Demand

Nobody knows ransomware like the threat researchers at Talos. They track a threat back to the source, uncovering how it works and what it targets. Join us for a free webinar led by Talos’s William Largent. He’ll give you an insider’s look at ransomware attacks and show you how to protect your organization. Register today!

Stop Threats Faster with Rapid Threat Containment
Watch On-Demand

Cisco Product Marketing Manage Andrew Peters will explain this solution, how it uses the Cisco network as a threat enforcer, and how it is leveraging vulnerability and threat rating structures such as STIX and CVSS to determine user access privileges.

No Time for Cyber Excuses: How SLGs are Building Secure Solutions through Innovation
Watch On-Demand

State and local governments (SLGs), holders of critical data, infrastructure, and services, are under enormous pressure to address today’s cyber threat landscape. In fact, security and risk management are the No. 1 strategic IT priority in 2016 for state and local agencies, according to the National Association of State Chief Information Officers.

Cyber Attack Preparedness - Can We Ever Be Ready?
Watch On-Demand

This webinar covers the importance of retrospective security for protection before, during and after an attack using tools such as Cisco Stealthwatch and Cisco Advanced Malware Protection (AMP) 

Protection with Web and Email Security - from a User's Perspective
Watch On-Demand

Learn what a blended attack looks like from the inside and out as well as what to look for when scoping and containing threats.

 

Webinaires de sécurité Cisco.

Le nouveau modèle de sécurité: Avant, pendant et après une attaque

Merci pour votre patience. Nous travaillons actuellement sur certaines mises à jour du site. S'il vous plaît vérifier à nouveau plus tard.

Webinarios de Seguridad de Cisco.

El nuevo modelo de seguridad: Antes, durante y después de un ataque

No Featured Upcoming Webinar



Pre-Recorded Webinars

¿Cómo prevenir un alto impacto al negocio ante un ataque como WannaCry?
Read More >
¿Cómo prevenir que un ataque como WannaCry impacte altamente a su negocio? Mantenga protegida su organización de manera proactiva y prevéngase ante ataques de esta magnitud
¿Cómo prevenir que un ataque como WannaCry impacte altamente a su negocio? Mantenga protegida su organización de manera proactiva y prevéngase ante ataques de esta magnitud
Ir al webinar
¿Cuál es mi estrategia de seguridad, detectar o remediar?
Read More >
La adopción de una nube segura en un ambiente tan cambiante puede ayudarle a manejar la seguridad de su empresa, negocios y usuarios. Acompañenos de este webinar durante el cual usted podrá: • Bloquear las amenazas antes de que sucedan. • Proteger a los usuarios, datos y aplicaciones en cualquier lugar a donde vayan. Comoncer como contar con una nube segura que evite impacto en la productividad.
La adopción de una nube segura en un ambiente tan cambiante puede ayudarle a manejar la seguridad de su empresa, negocios y usuarios. Acompañenos de este webinar durante el cual usted podrá: • Bloquear las amenazas antes de que sucedan. • Proteger a los usuarios, datos y aplicaciones en cualquier lugar a donde vayan. Comoncer como contar con una nube segura que evite impacto en la productividad.
Ir al webinar
¿Combatiendo las Amenazas Internas –Protegiendo su Agencia de Adentro hacia Afuera
Read More >
Cuando Edward Snowden filtró información clasificada a los medios principales, trajo consigo los peligros representados por las amenazas internas a la consciencia pública y no sin un propósito. Las agencias de hoy en día se están ahogando en el temor que rodea a los ataques cibernéticos sofisticados, pero tal vez, el tipo de ataque más preocupante es la amenaza interna. De acuerdo a Forrester, el abuso por los maliciosos internos llega hasta el 25% de las brechas de información.
Cuando Edward Snowden filtró información clasificada a los medios principales, trajo consigo los peligros representados por las amenazas internas a la consciencia pública y no sin un propósito. Las agencias de hoy en día se están ahogando en el temor que rodea a los ataques cibernéticos sofisticados, pero tal vez, el tipo de ataque más preocupante es la amenaza interna. De acuerdo a Forrester, el abuso por los maliciosos internos llega hasta el 25% de las brechas de información.
Ir al webinar
¿Seguridad en la Nube? Enfrente las amenazas con CloudLock CASB de Cisco.
Read More >
Conozca como las soluciones de Cloud Access Security pueden proteger las aplicaciones y la infraestructura en la Nube.
Conozca como las soluciones de Cloud Access Security pueden proteger las aplicaciones y la infraestructura en la Nube.
Ir al webinar
Enfoque en ransomware: Cómo mantenerse protegido.
Read More >
El ransomware ha explotado en popularidad. Obtenga información acerca de esta amenaza dinámica y vea una demostración de nuestra nueva solución de defensa de ransomware presentada por Omar Alcala.
El ransomware ha explotado en popularidad. Obtenga información acerca de esta amenaza dinámica y vea una demostración de nuestra nueva solución de defensa de ransomware presentada por Omar Alcala.
Ir al webinar

Webinars de segurança da Cisco.

O Novo Modelo de Segurança: Antes, durante e após um ataque.

Featured Upcoming Webinar

No Upcoming webinars

Pre-Recorded Webinars

Internet: Amigo ou Inimigo? As ameaças que chegam pela Rede e por E-mail
Read More >
Com a quantidade crescente de informações disponíveis por e-mail e na Internet, o potencial de vazamento e comprometimento de dados nunca foi tão grande. O ultimo relatório anual de segurança da Cisco aponta que o E-mail é o maior vetor de ameças para ataques digitais. Esses ataques têm o objetivo de distribuir malware que se infiltra nos data centers onde dados comerciais confidenciais de alto valor são armazenados. As defesas tradicionais, incluindo firewalls e soluções de antivírus de endpoint, não conseguem bloquear esses tipos de ataques. 
Com a quantidade crescente de informações disponíveis por e-mail e na Internet, o potencial de vazamento e comprometimento de dados nunca foi tão grande. O ultimo relatório anual de segurança da Cisco aponta que o E-mail é o maior vetor de ameças para ataques digitais. Esses ataques têm o objetivo de distribuir malware que se infiltra nos data centers onde dados comerciais confidenciais de alto valor são armazenados. As defesas tradicionais, incluindo firewalls e soluções de antivírus de endpoint, não conseguem bloquear esses tipos de ataques. 
Visualizar o webinar
Combatendo as ameaças internas – Proteja a sua empresa de dentro para fora.
Read More >
Quando Edward Snowden vazou informações sigilosas para as mídias de massa, os perigos produzidos pelas ameaças internas vieram à tona do conhecimento público, e com razão. Atualmente, as agências estão preocupadas com os sofisticados cyber-ataques, porém também com o pior tipo de ameaça que existe – a ameaça interna. De acordo com a Forrester, abuso por parte de membros internos da empresa representam 25% das violações de dados.
Quando Edward Snowden vazou informações sigilosas para as mídias de massa, os perigos produzidos pelas ameaças internas vieram à tona do conhecimento público, e com razão. Atualmente, as agências estão preocupadas com os sofisticados cyber-ataques, porém também com o pior tipo de ameaça que existe – a ameaça interna. De acordo com a Forrester, abuso por parte de membros internos da empresa representam 25% das violações de dados.
Visualizar o webinar
Combata as Ameaças de Segurança na Nuvem com CloudLock CASB (Cloud Access Security Broker)
Read More >
Webinar Seja você um novato ou conhecedor do CloudLock, participe desta sessão para saber como a nossa solução CASB ajuda os clientes a proteger os dados e os usuários na nuvem.
Webinar Seja você um novato ou conhecedor do CloudLock, participe desta sessão para saber como a nossa solução CASB ajuda os clientes a proteger os dados e os usuários na nuvem.
Visualizar o webinar
Focando no Ransomware: Como manter-se protegido.
Read More >
O Ransomware cresceu a sua popularidade. Obtenha informações sobre esta ameaça dinâmica e veja uma demostração de nossa nova solução de defesa de Ransomware apresentada por Ricardo Marques.
O Ransomware cresceu a sua popularidade. Obtenha informações sobre esta ameaça dinâmica e veja uma demostração de nossa nova solução de defesa de Ransomware apresentada por Ricardo Marques.
Visualizar o webinar