Menu

Menu

Webinars

Menu

Webinars

A secure network is
a Cisco network

Explore Cisco security webinars below.

A secure network is
a Cisco network

Explore Cisco security webinars below.

A secure network is
a Cisco network

Explore Cisco security webinars below.

Security Demo Fridays


Every Friday at 1 p.m. ET/10 a.m. PT.
Drop in each week for a 60-minute live technical
demo and Q&A with Cisco security experts.

Menu

Menu

Webinars

Menu

Webinars

Cisco Security Webinars.

Explore the Cisco security webinars. Register for upcoming events or watch pre-recorded webinars.


Featured Webinar

Steps to CDM Success

June 27, 2018 at 1PM ET/10AM PT

Did you know that your existing Cisco Security investment is already on the CDM Approved Products list? Join us to discuss how your existing investment in Cisco can meet CDM and FISMA requirements. We will also take you through a review of CDM and NIST requirements. Learn where to go for information on reporting and interoperability, and know who can help.
Register

Pre-Recorded Webinars

Cryptomining: Defending Against the Digital Gold Rush

Cryptomining has exploded in popularity, but users trying to cash in on this digital gold rush may not be aware of the company they keep. In this free webinar, our experts will analyze the latest trends and provide practical security measures you can take to defend your organization.

Watch On-Demand
VPNFilter. Global malware threat discovered. What you want to know.

Learn how this malware system has the ability to steal website credentials and monitor certain protocols. As well as its destructive capability that can turn infected devices completely unusable.

Watch On-Demand
Cybersecurity Report Talks: Visibility past, present and future

The old adage is true: You can’t defend what you can’t see. But how has visibility evolved in the threat landscape? In this free webinar, experts from Cisco along with our technology partners Anomali and Lumeta will bring the results of the 2018 Annual Cybersecurity Report to life. They’ll explore the latest findings on shadow IT networks, encrypted traffic patterns, and legitimate uses of C2.

Watch On-Demand
Cybersecurity Report Talks: Managing Vulnerabilities

Amid the headlines of major breaches and threats, vulnerabilities may seem like a secondary concern for defenders. However, adversaries continue to exploit these weaknesses to launch attacks. In this free webinar, experts from SAINT, Qualys and Cisco PSIRT will explore the findings from the 2018 Annual Cybersecurity Report on patch management, remediation, and more. You’ll have the chance to ask the experts your questions during our live Q&A, and get the deeper story behind the data.

Watch On-Demand
Zero Trust on a Beer Budget

Join Dr. Chase Cunningham, Principal Analyst, with Forrester Research outline how to adopt a Zero Trust Model and Jeff Fawcett, Consulting Principal Director, with Cisco outline the five principles for measuring it.

Watch On-Demand
Better Manage Cyber Risk with Cybersecurity and Insurance

Cyber risk is a concern for organizations, with malware top of mind. We also know that decisive action is needed in the face of this risk. Join Cisco and insurance leader Allianz to learn more about bringing together the key pieces needed to manage cyber risk: security technology, secure devices, cybersecurity domain expertise and enhanced cyber insurance.

Watch On-Demand
Cybersecurity Report Talks: Taking Down the Network Inside and Out

In the 2018 Cisco Cybersecurity Report, threat researchers explored the unprecedented level of destructive, network-based attacks that rocked the security community. In this free webinar, experts from Talos and Radware will explore their findings on DDoS attacks, wiper malware, and more. You’ll have the chance to ask the experts your questions during our live Q&A, and get the deeper story behind the data.

Watch On-Demand
Build a Better Incident Response Program

In this on-demand webinar, we’ll explain how the market has shifted away from a reactive approach for incident response and why proactive incident response services need to be a critical part of every security strategy. Sean will explore the Who, What, Where, Why, and How when it comes to Cisco’s Incident Response Services. Danielle will dive into case studies that demonstrate how real-world programs have been used to improve organizations’ overall security.

Watch On-Demand
Agency Responsibilities When Adopting Cloud Services in the Current Threat Environment

We will explain the key risks inherent in the ongoing use of productivity, file storage and collaboration cloud services, the agency and service provider responsibilities, and how Cisco Cloudlock (with FedRAMP ATO) can enable secure cloud service adoption by protecting user accounts and data.

Watch On-Demand
Ransomware Defense: The Threat is Real

Ransomware continues to be one of the most important security concerns today. The "WannaCry" attack alone reached into billions of dollars, making it one of the most damaging examples. The threat is real. Do you know how ransomware gets in and how to protect against it? Get prepared to defend against today’s ransomware threat.

Watch On-Demand
Your network is your best security tool. Are you using it?

One of your greatest security assets is your network. Are you using it? Learn how Cisco Network Visibility and Enforcement can help you use your network to address your biggest security challenges.

Watch On-Demand
Securing the Cloud and Your Digital Future in AWS

As more organizations move services and applications to Amazon Web Services (AWS), they still need to ensure their workloads are secure and compliant. Cisco Stealthwatch Cloud provides automatic threat detection and visualization related to AWS and other cloud infrastructures using advanced modeling and machine learning techniques. It enables turn-key activation for customers using AWS and delivers actionable security alerts without generating security-related noise.

Watch On-Demand
Encrypted Traffic Analytics: Detecting Malware without Decryption

Organizations have long relied on encryption for privacy and security. However, attackers are now using encrypted traffic to hide malware and evade detection. According to Gartner, by 2019, 70-percent of all network attacks will use encryption.

Watch On-Demand
2018 Annual Cybersecurity Report Readout

Supply chain attacks. Malware that evades detection. Malicious web traffic. Our threat researchers and experts have studied the latest developments in the threat landscape and compiled them into our 2018 Annual Cybersecurity report. Join our free webinar for a live review of the most important findings, including industry best practices, and have the opportunity to ask your questions.

Watch On-Demand
Smarter, faster security through LogRhythm and Cisco integrations

LogRhythm and Cisco are committed to helping you enhance your security operations through the seamless integration and powerful capabilities of the LogRhythm Threat Lifecycle Management platform and Cisco’s Threat Grid, Umbrella, Firepower and ISE. LogRhythm integrates with over three dozen Cisco products, providing centralized visibility and advanced security analytics across the Cisco-enabled environment and makes security events actionable in the network. Stay in front of cyber adversaries and proactively detect, respond to and remediate cyberthreats with this powerful integration.

Watch On-Demand
Moving to the cloud, staying compliant, and staying secure

As agencies continue to transition to the cloud it’s more important than ever to stay secure and stay in compliance with your regulatory requirements. The NIST Cybersecurity Framework can guide your security implementation and make sure you use the risk based approach called out in the Cybersecurity Executive Order.

Watch On-Demand
A New Way to Look at Cloud Security with Cisco Stealthwatch Cloud

Join us for a discussion which reviews Cisco's recent acquisition of Observable Networks, now called Stealthwatch Cloud. Learn how this strategic addition to Cisco's security portfolio is yielding compelling results by providing security-relevant visibility into network behavior across all topographies with incredible accuracy and very low noise. Join us as we discuss how this cloud-native solution is being used to protect traditional networks and cloud environments including AWS VPCs, Azure and others. We’ll show a demo and answer your specific questions.

Watch On-Demand
IoT Threat Defense: Design, Validation, Proof

Join us for an engaging conversation where we’ll discuss, with the author Bart McGlothin, the Cisco IoT Threat Defense solution. You’ll learn: • Why Cisco IoT Threat Defense provides essential and effective security for the Internet of Things • How our validated design offers credible proof of its advanced capabilities, highlighting IoT in Manufacturing • How your organization can benefit from Cisco IoT Threat Defense today.

Watch On-Demand
Closing the Skills Gap Chasm with Automation & Actionable Analytics

Threat detection is an inherently difficult practice due to cunning adversaries and evolving attack methods. Instead of taking a reactive approach, companies can use global security telemetry to identify threats in the wild before they arrive howling at the gates. Join this webinar with experts Daniel Bardenstien, Christopher Meile and Chris Stewart of Exabeam, with Jessica Bair of Cisco Threat Grid, as they discuss closing the skills gap with automation and actionable analytics.

Watch On-Demand
Boosting efficacy and efficiency with SaaS security

Software-as-a-Service (SaaS) security can help you address budget challenges while providing more actionable intelligence. In this session, you will learn how SaaS and Cisco Stealthwatch Cloud can simplify technology deployment and maintenance, provide flexible pricing options, make your security team more efficient, and lower security “noise” and false alerts.

Watch On-Demand
The deepest enterprise visibility and control for iOS devices

The Cisco Security Connector app makes it easy to ensure compliance of your enterprise-owned iOS devices, whether they’re on the corporate network, public Wi-Fi or cellular networks. You can simplify incident investigations by rapidly identifying what happened, who it affected, and the risk exposure, without impacting your employees’ mobile experience. Register now to attend a technical deep dive session on the Cisco Security Connector.

Watch On-Demand
Dismantling Supply Chain Attacks
Now that the dust has settled, learn what really happened behind the scenes of some of the most high-profile supply chain attacks in recent memory. Get the story of the origin of these two threats, as well as professional recommendations for how to protect your organization from similar attacks.
Watch On-Demand
Dissecting a Breach: An Incident Responder's Perspective

The ability to rapidly analyze information about your data breach is critical. Join us for this webinar to learn from experienced Cisco incident responders who will dissect actual breach response scenarios. You’ll gain technical and practical insight into actions you can incorporate into your own incident response plans to manage and reduce overall impact an incident.

Watch On-Demand

+ View Additional Webinars 

- Hide Additional Webinars 

GDPR: Here's what you absolutely need to know

The General Data Protection Regulation (GDPR) deadline is May 2018, and you already know about the potential non-compliance penalties. Join us and we'll simplify the regulation and show you a practical approach to compliance. It's not too late.

Watch On-Demand
IoT and Real-World Cyber Risks
The Internet of Things promises many benefits: improved efficiency, higher productivity, better decision-making.This session explores the real-world challenges associated with IoT and recommends a proven approach toward effective security. Realize the benefits of the Internet of Things.
Watch On-Demand
Cisco Active Threat Analytics

Cyber security teams must protect their organizations' data and privacy and support new business initiatives while defending against dynamic cyberattacks. Some of these attacks will evade even the best tools. With today’s talent shortage, how do you effectively manage security operations in the face of these challenges? Discover how Cisco Active Threat Analytics can help.

Watch On-Demand
Intelligent Incident Response

A data breach occurs. Your incident responders move into action to reduce damage and exposure. The ability to coordinate and analyze threat intelligence is a critical tool for incident response teams. In every Cisco incident response investigation, anywhere in the world, a dedicated Talos resource is made available to the incident response team.

Watch On-Demand
Accelerate Malware Analysis with Orchestration

Watch this on-demand webinar with Cisco and ThreatConnect, where we discuss how to utilize orchestration to enhance malware analysis capabilities and protect your organization from todays advanced malware.

Watch On-Demand
Nyetya. Global Ransomware Attack. What you want to know.

Hear from Martin Lee, techinal lead on Cisco’s Talos threat research team, to understand the latest in the new malware variant, that we named Nyetya.

Nyetya is nasty because it encrypts the master boot record (like a table of contents for a hard drive) of a computer -- and uses three ways to spread automatically in a network, one of which is the known Eternal Blue vulnerability, which WannaCry used as well.

Watch On-Demand
The Ultimate Guide to Business Email Compromise

Move over ransomware—According to the Cisco Midyear Security Report, Business Email Compromise (BEC) is one of the most important and prevalent email-based threats that organization face. In this on-demand webinar, our cybersecurity experts explore two real-life examples of how a BEC attack happened, how it impacted the companies—and most importantly, what you can do to stop similar attacks.

Watch On-Demand
Finding a Career in Cybersecurity: Panel on Job Success

For those looking to break into the cybersecurity industry, the options can be overwhelming. Should you go back to school? Do online courses? How can you find the right role that matches your passions and skills? In this free webinar, led by Learning@Cisco Manager Tom Gilheany, we’ll be diving into how to answer these questions and more. After a brief introduction to set the scene, our panel of experts will discuss how they got their role, lessons learned, and advice for jobseekers like you.

Watch On-Demand
Reinventing Network Intrusion Detection with Machine Learning

Watch this webinar with experts Raj Sivasankar and Josh Rosenthol of BluVector, and Jessica Bair of Cisco Threat Grid; as they discuss how to utilize machine learning, sandboxing, threat intelligence and automation to enable analysts to find, confirm and contain even the newest and most sophisticated threats.

Watch On-Demand
Exploring Email: The #1 Threat Vector

In the latest Talos cybersecurity webinar, expert Jaeson Shultz revealed the latest trends in email security, including recent high-profile threats. Watch the recording to learn more.

Watch On-Demand
Combating Targeted Malware with ThreatQ

Watch this on-demand webinar in which the experts Jeremy Linden of Cisco Umbrella, Jessica Bair of Cisco Threat Grid and Mike Clark of ThreatQuotient discuss how to utilize a Threat Intelligence Platform to enhance malware analysis capabilities and prevent access to malicious domains

Watch On-Demand
Cisco and IBM: Integrated Defense for Effective Security

Cisco and IBM Security have joined forces to fight this criminal collaboration, delivering an integrated approach across networks, users and cloud. Watch this webinar with experts Jessica Bair of Cisco and Chris Meenan of IBM Security as they discussed how to leverage this partnership to provide rapid detection and response across the diversity of sophisticated threats.

Watch On-Demand
Not Just Another Firewall

Organizations realize that when they are breached, their network is imperiled and business can suffer. To be effective security has to be simple while delivering business resiliency in the face of advanced threats. In this session, experts from IDC and Cisco explain how the NGFW market continues to evolve to meet this challenge.

Watch On-Demand
IPS Myths Debunked

The focus on zero-day attacks and next-generation firewalls has led many to miss the value that a dedicated intrusion prevention system provides to an organization. In this session, experts from IDC and Cisco dispel the myths about IPS and explain why these devices remain a critical part of an effective network defense.

Watch On-Demand
The Case for Next-Generation Intrusion Prevention

Many think with the adoption of a next-generation firewall (NGFW), that a stand-alone intrusion prevention system (IPS) is no longer required. That’s simply not true. This session explores use cases where next-generation IPS (NGIPS) can provide visibility, threat detection and response, and malware discovery in areas of your network that remain off limits to firewall inspection and controls.

Watch On-Demand
The Ransomware Threat: New Tactics and How to Fight Back

The rise of ransomware has become one of the most widespread and financially damaging threats facing businesses today. But, there are steps you can take to reduce the risk of ransomware and protect your business. Watch this on-demand webinar.

Watch On-Demand
Combat Cybercrime with an Incident Response Plan

What’s the missing piece of many security approaches? A strong threat management strategy. Learn from expert Sean Mason how your organization can design an incident response plan—and why it matters now more than ever.

Watch On-Demand
Cyber Attack Preparedness - Can We Ever Be Ready?

This webinar covers the importance of retrospective security for protection before, during and after an attack using tools such as Cisco Stealthwatch and Cisco Advanced Malware Protection (AMP)

Watch On-Demand

Webinaires de sécurité Cisco.

Le nouveau modèle de sécurité: Avant, pendant et après une attaque

Merci pour votre patience. Nous travaillons actuellement sur certaines mises à jour du site. S'il vous plaît vérifier à nouveau plus tard.

Webinarios de Seguridad de Cisco.

El nuevo modelo de seguridad: Antes, durante y después de un ataque

No Featured Upcoming Webinar



Pre-Recorded Webinars

¿Cómo prevenir un alto impacto al negocio ante un ataque como WannaCry?
Read More >
¿Cómo prevenir que un ataque como WannaCry impacte altamente a su negocio? Mantenga protegida su organización de manera proactiva y prevéngase ante ataques de esta magnitud
¿Cómo prevenir que un ataque como WannaCry impacte altamente a su negocio? Mantenga protegida su organización de manera proactiva y prevéngase ante ataques de esta magnitud
Ir al webinar
¿Cuál es mi estrategia de seguridad, detectar o remediar?
Read More >
La adopción de una nube segura en un ambiente tan cambiante puede ayudarle a manejar la seguridad de su empresa, negocios y usuarios. Acompañenos de este webinar durante el cual usted podrá: • Bloquear las amenazas antes de que sucedan. • Proteger a los usuarios, datos y aplicaciones en cualquier lugar a donde vayan. Comoncer como contar con una nube segura que evite impacto en la productividad.
La adopción de una nube segura en un ambiente tan cambiante puede ayudarle a manejar la seguridad de su empresa, negocios y usuarios. Acompañenos de este webinar durante el cual usted podrá: • Bloquear las amenazas antes de que sucedan. • Proteger a los usuarios, datos y aplicaciones en cualquier lugar a donde vayan. Comoncer como contar con una nube segura que evite impacto en la productividad.
Ir al webinar
¿Combatiendo las Amenazas Internas –Protegiendo su Agencia de Adentro hacia Afuera
Read More >
Cuando Edward Snowden filtró información clasificada a los medios principales, trajo consigo los peligros representados por las amenazas internas a la consciencia pública y no sin un propósito. Las agencias de hoy en día se están ahogando en el temor que rodea a los ataques cibernéticos sofisticados, pero tal vez, el tipo de ataque más preocupante es la amenaza interna. De acuerdo a Forrester, el abuso por los maliciosos internos llega hasta el 25% de las brechas de información.
Cuando Edward Snowden filtró información clasificada a los medios principales, trajo consigo los peligros representados por las amenazas internas a la consciencia pública y no sin un propósito. Las agencias de hoy en día se están ahogando en el temor que rodea a los ataques cibernéticos sofisticados, pero tal vez, el tipo de ataque más preocupante es la amenaza interna. De acuerdo a Forrester, el abuso por los maliciosos internos llega hasta el 25% de las brechas de información.
Ir al webinar
¿Seguridad en la Nube? Enfrente las amenazas con CloudLock CASB de Cisco.
Read More >
Conozca como las soluciones de Cloud Access Security pueden proteger las aplicaciones y la infraestructura en la Nube.
Conozca como las soluciones de Cloud Access Security pueden proteger las aplicaciones y la infraestructura en la Nube.
Ir al webinar
Enfoque en ransomware: Cómo mantenerse protegido.
Read More >
El ransomware ha explotado en popularidad. Obtenga información acerca de esta amenaza dinámica y vea una demostración de nuestra nueva solución de defensa de ransomware presentada por Omar Alcala.
El ransomware ha explotado en popularidad. Obtenga información acerca de esta amenaza dinámica y vea una demostración de nuestra nueva solución de defensa de ransomware presentada por Omar Alcala.
Ir al webinar

Webinars de segurança da Cisco.

O Novo Modelo de Segurança: Antes, durante e após um ataque.

Featured Upcoming Webinar

Saiba como tornar a sua empresa e seus negócios salvos das ameaças cibernéticas

14 de junho de 2018 às 11h ET / 8h PT

O aumento da mobilidade e flexibilidade no local de trabalho reduziu custos e aumentou a produtividade, a inovação e a independência, mas isso tem um preço. As empresas não estão mais protegidas por trás do firewall ou gateway de segurança da Web. Como a nuvem está se tornando comum rapidamente, as soluções de segurança de rede precisam se adaptar.
Registo

Pre-Recorded Webinars

Internet: Amigo ou Inimigo? As ameaças que chegam pela Rede e por E-mail
Com a quantidade crescente de informações disponíveis por e-mail e na Internet, o potencial de vazamento e comprometimento de dados nunca foi tão grande. O ultimo relatório anual de segurança da Cisco aponta que o E-mail é o maior vetor de ameças para ataques digitais. Esses ataques têm o objetivo de distribuir malware que se infiltra nos data centers onde dados comerciais confidenciais de alto valor são armazenados. As defesas tradicionais, incluindo firewalls e soluções de antivírus de endpoint, não conseguem bloquear esses tipos de ataques. 
Visualizar o webinar
Combatendo as ameaças internas – Proteja a sua empresa de dentro para fora.
Quando Edward Snowden vazou informações sigilosas para as mídias de massa, os perigos produzidos pelas ameaças internas vieram à tona do conhecimento público, e com razão. Atualmente, as agências estão preocupadas com os sofisticados cyber-ataques, porém também com o pior tipo de ameaça que existe – a ameaça interna. De acordo com a Forrester, abuso por parte de membros internos da empresa representam 25% das violações de dados.
Visualizar o webinar
Combata as Ameaças de Segurança na Nuvem com CloudLock CASB (Cloud Access Security Broker)
Webinar Seja você um novato ou conhecedor do CloudLock, participe desta sessão para saber como a nossa solução CASB ajuda os clientes a proteger os dados e os usuários na nuvem.
Visualizar o webinar
Focando no Ransomware: Como manter-se protegido.
O Ransomware cresceu a sua popularidade. Obtenha informações sobre esta ameaça dinâmica e veja uma demostração de nossa nova solução de defesa de Ransomware apresentada por Ricardo Marques.
Visualizar o webinar