Menu

Menu

Webinars

Menu

Webinars

A secure network is
a Cisco network

Explore Cisco security webinars below.

A secure network is
a Cisco network

Explore Cisco security webinars below.

A secure network is
a Cisco network

Explore Cisco security webinars below.

Security Demo Fridays


Every Friday at 1 p.m. ET/10 a.m. PT.
Drop in each week for a 60-minute live technical
demo and Q&A with Cisco security experts.

Menu

Menu

Webinars

Menu

Webinars

Cisco Security Webinars.

Explore the Cisco security webinars. Register for upcoming events or watch pre-recorded webinars.


Featured Webinar

Talos Fall Threat Briefing

October 19, 2017 at 1PM ET/10AM PT
October 19, 2017 at 6AM PT/2PM BST

From malware to ransomware to phishing schemes, understand what the Threat Researchers at Talos considered the most dangerous and prevalent security issues. You’ll learn all about new vulnerabilities and how to stop them.
Register

Finding a Career in Cybersecurity: Panel on Job Success

October 25, 2017 at 1PM ET/10AM PT

For those looking to break into the cybersecurity industry, the options can be overwhelming. Should you go back to school? Do online courses? How can you find the right role that matches your passions and skills? In this free webinar, led by Learning@Cisco Manager Tom Gilheany, we’ll be diving into how to answer these questions and more. After a brief introduction to set the scene, our panel of experts will discuss how they got their role, lessons learned, and advice for jobseekers like you.
Register

IoT and Real-World Cyber Risks

October 17, 2017 at 1PM ET/10AM PT
October 16, 2017 at 6AM PT/2PM BST

The Internet of Things promises many benefits: improved efficiency, higher productivity, better decision-making.This session explores the real-world challenges associated with IoT and recommends a proven approach toward effective security. Realize the benefits of the Internet of Things. Just do it with your eyes open! Register now and join us for this engaging and insightful webinar. You'll be glad you did.
Register

Cisco Active Threat Analytics

October 18, 2017 at 10AM ET/7AM PT
October 18, 2017 at 7AM PT/3PM BST

Cyber security teams must protect their organizations' data and privacy and support new business initiatives while defending against dynamic cyberattacks. Some of these attacks will evade even the best tools. With today’s talent shortage, how do you effectively manage security operations in the face of these challenges? Discover how Cisco Active Threat Analytics, a leading managed detection and response service, can help.
Register

Reinventing Network Intrusion Detection with Machine Learning

November 9, 2017 at 1PM ET/10AM PT

Join this webinar with experts Raj Sivasan and Josh Rosenthol of BluVector, and Jessica Bair of Cisco Threat Grid; as they discuss how to utilize machine learning, sandboxing, threat intelligence and automation to enable analysts to find, confirm and contain even the newest and most sophisticated threats.
Register



Pre-Recorded Webinars

GDPR: Here's what you absolutely need to know

The General Data Protection Regulation (GDPR) deadline is May 2018, and you already know about the potential non-compliance penalties. Join us and we'll simplify the regulation and show you a practical approach to compliance. It's not too late.

Watch On-Demand




Cisco 2017 Midyear Cybersecurity Report Insights

Watch this on-demand webinar where we addressed our findings from the recent Cisco 2017 Midyear Cybersecurity Report. We shared new insights, explored the newest generation of worm threats going viral on a global scale, and addressed how adversaries use the pace and scale of technology to shift to IoT exploits, and how defenders are responding by shrinking time to detection.

Watch On-Demand
Intelligent Incident Response

A data breach occurs. Your incident responders move into action to reduce damage and exposure. The ability to coordinate and analyze threat intelligence is a critical tool for incident response teams. In every Cisco incident response investigation, anywhere in the world, a dedicated Talos resource is made available to the incident response team.

Watch On-Demand
The Ultimate Guide to Business Email Compromise

Move over ransomware—According to the Cisco Midyear Security Report, Business Email Compromise (BEC) is one of the most important and prevalent email-based threats that organization face. In this on-demand webinar, our cybersecurity experts explore two real-life examples of how a BEC attack happened, how it impacted the companies—and most importantly, what you can do to stop similar attacks.

Watch On-Demand
Exploring Email: The #1 Threat Vector

In the latest Talos cybersecurity webinar, expert Jaeson Shultz revealed the latest trends in email security, including recent high-profile threats. Watch the recording to learn more.

Watch On-Demand
Combating Targeted Malware with ThreatQ

Watch this on-demand webinar in which the experts Jeremy Linden of Cisco Umbrella, Jessica Bair of Cisco Threat Grid and Mike Clark of ThreatQuotient discuss how to utilize a Threat Intelligence Platform to enhance malware analysis capabilities and prevent access to malicious domains

Watch On-Demand
Cisco and IBM: Integrated Defense for Effective Security

Cisco and IBM Security have joined forces to fight this criminal collaboration, delivering an integrated approach across networks, users and cloud. Watch this webinar with experts Jessica Bair of Cisco and Chris Meenan of IBM Security as they discussed how to leverage this partnership to provide rapid detection and response across the diversity of sophisticated threats.

Watch On-Demand
Talos Security Threat Briefing Webinar

Watch this on-demand webinar and hear the cybersecurity experts at Talos as they reveal their insights into recent attacks that exemplify the latest trends in the security industry. By discussing these new and emerging threats, Threat Researcher & Team Manager Martin Lee will help you understand new protection strategies and build better defenses.

Watch On-Demand
Accelerate Malware Analysis with Orchestration

Watch this on-demand webinar with Cisco and ThreatConnect, where we discuss how to utilize orchestration to enhance malware analysis capabilities and protect your organization from todays advanced malware.

Watch On-Demand
Nyetya. Global Ransomware Attack. What you want to know.

Hear from Martin Lee, techinal lead on Cisco’s Talos threat research team, to understand the latest in the new malware variant, that we named Nyetya.

Nyetya is nasty because it encrypts the master boot record (like a table of contents for a hard drive) of a computer -- and uses three ways to spread automatically in a network, one of which is the known Eternal Blue vulnerability, which WannaCry used as well.

Watch On-Demand
OAuth Phishing and WannaCry Ransomware Attacks: Are You Protected?

A new type of phishing attack has gone viral globally, leaving many organizations unsure of what happened and their exposure to future attacks. Watch this on-demand webinar to learn how this OAuth attack happened and how to protect yourself from future threats.

Watch On-Demand

+ View Additional Webinars 

- Hide Additional Webinars 

The Rise of Enterprise Class Cybersecurity Vendors
Watch On-Demand

More is more. But when it comes to cybersecurity, is the old adage really true? In this free webinar, John Oltsik, Sr. Principal Analyst from ESG, shared the latest findings into the pros and cons of a multivendor approach to cybersecurity. With this blueprint, you’ll learn how you can achieve a security approach that’s simple, effective and automated.

The New Cybersecurity Executive Order: What You Need to Know
Watch On-Demand

Is your agency efficiently and effectively managing its cybersecurity risks? Do you already understand the NIST Cybersecurity Framework and know how to adopt it? If not, please watch this on-demand webinar where we cover the key points that you and everyone in the federal government needs to know.

Forcing the Bad Guys to Innovate
Watch On-Demand

In the latest Talos cybersecurity webinar, Threat Research Manager Martin Lee revealed how threat intelligence has forced adversaries to evolve their attack strategies.

Ransomware, Banking Trojans and Floki Bot: A Threat Trifecta
Watch On-Demand

In the latest Talos cybersecurity webinar, expert Edmund Brumaghin revealed the latest trends in malware, including recent developments in ransomware, Trojans, and Floki Bot.

Top 3 Security Challenges for Manufacturing
Watch On-Demand

Watch this on-demand interactive webcast where a panel of experienced security experts focus on critical security challenges manufacturers face while IT and OT environments converge.

Get your head out of the box; More effective security through integration
Watch On-Demand

More IT vendors, more problems. Watch this free cybersecurity webinar to learn a better way of achieving security that’s simple, open, automated, and effective.

Talos Winter Security Threat Briefing Webinar
Watch On-Demand

Adversaries never stop innovating. Learn what macro trends the threat researchers have discovered in the security industry from the past season. By discussing these new and emerging threats, the Talos team will help you understand new protection strategies and build better defenses.

Not Just Another Firewall
Watch On-Demand

Organizations realize that when they are breached, their network is imperiled and business can suffer. To be effective security has to be simple while delivering business resiliency in the face of advanced threats. In this session, experts from IDC and Cisco explain how the NGFW market continues to evolve to meet this challenge.

Design a Secure Branch in less than 1 hour
Watch On-Demand

In this webinar, you will learn how to defend the people, devices and business outcomes in a branch environment from cyberattack. The presenter will create a Secure Branch network diagram from start to finish. The network will include security and networking technology mapped to the most critical business outcomes in the branch.

IPS Myths Debunked
Watch On-Demand

The focus on zero-day attacks and next-generation firewalls has led many to miss the value that a dedicated intrusion prevention system provides to an organization. In this session, experts from IDC and Cisco dispel the myths about IPS and explain why these devices remain a critical part of an effective network defense.

Exploit Kits – is this the end or just the beginning?
Watch On-Demand

Watch this on-demand webinar to learn: What exploit kits are and why they are a major threat; What changes occurred in 2016; What’s the future of exploit kits in 2017 and beyond.

Stop Phishing Attacks with Automated Incident Response
Watch On-Demand

Reduce response and triage time with automated incident response and security orchestration. Cisco has collaborated with Swimlane to deliver an integrated approach to automating the investigation and response activities needed to take action on threats. 

The Case for Next-Generation Intrusion Prevention
Watch On-Demand

Many think with the adoption of a next-generation firewall (NGFW), that a stand-alone intrusion prevention system (IPS) is no longer required. That’s simply not true. This session explores use cases where next-generation IPS (NGIPS) can provide visibility, threat detection and response, and malware discovery in areas of your network that remain off limits to firewall inspection and controls.

Cisco Talos on DNS Exfiltration
Watch On-Demand

Threat researcher Martin Lee discusses Domain Name System (DNS) exfiltration techniques and why security professionals should pay closer attention to DNS traffic.

Combat Cybercrime with an Incident Response Plan
Watch On-Demand

What’s the missing piece of many security approaches? A strong threat management strategy. Learn from expert Sean Mason how your organization can design an incident response plan—and why it matters now more than ever.

The Ransomware Threat: New Tactics and How to Fight Back
Watch On-Demand

The rise of ransomware has become one of the most widespread and financially damaging threats facing businesses today. But, there are steps you can take to reduce the risk of ransomware and protect your business. Watch this on-demand webinar.

Plugging the Email Security Gap
Watch On-Demand

Cyber criminals are hard at work trying to steal your corporate, personal and financial data, and breach your network. Watch this webinar to learn about their top methods of attack and how to prevent them.

The Rising Tide of Spam
Watch On-Demand

What sinister forces are behind this global increase in spam? Watch this on-demand webinar from Talos threat researcher Jaeson Schultz to find out. You’ll learn about the latest trends in spam attacks strategies and how to stop them.

Ransom Where…Everywhere: Breaking Down the Ransomware Attack
Watch On-Demand

Are you prepared if you lose all your critical data? It could be any digital asset, from personal family pictures to sensitive customer records that you couldn’t get back unless you paid a ransom. This kind of attack is called Ransomware and it’s becoming increasingly common. Watch this special webcast focused on Ransomware. Leading the talk will be Nick Biasini from Cisco’s threat research team Talos and Joseph Muniz from the security architecture team.

Talos: Cisco's Secret Security Weapon
Watch On-Demand

Billions of cyberthreats try to compromise systems on a daily basis. Unfortunately, that number is growing. TALOS is on the forefront of stopping cyberattacks and educating organizations about current security threats.

Spotlight on Ransomware: How to Stay Protected.
Watch On-Demand

Ransomware has exploded in popularity. Learn how it started, how it’s spread, and how to stop it in this complementary webinar. Threat researcher William Largent from Talos shares the latest ransomware threat intelligence, and Bart McGlothin gives a demo of our new Ransomware Defense solution.

Cisco Talos on Exploit Kits: Hunting the Hunters
Watch On-Demand

Hear the incredible story of how Talos traced Angler back to the service providers and what happened next. Join our live Q&A for answers to your questions.

Cisco Talos on Ransomware: Data Held Hostage
Watch On-Demand

Nobody knows ransomware like the threat researchers at Talos. They track a threat back to the source, uncovering how it works and what it targets. Join us for a free webinar led by Talos’s William Largent. He’ll give you an insider’s look at ransomware attacks and show you how to protect your organization. Register today!

Stop Threats Faster with Rapid Threat Containment
Watch On-Demand

Cisco Product Marketing Manage Andrew Peters will explain this solution, how it uses the Cisco network as a threat enforcer, and how it is leveraging vulnerability and threat rating structures such as STIX and CVSS to determine user access privileges.

No Time for Cyber Excuses: How SLGs are Building Secure Solutions through Innovation
Watch On-Demand

State and local governments (SLGs), holders of critical data, infrastructure, and services, are under enormous pressure to address today’s cyber threat landscape. In fact, security and risk management are the No. 1 strategic IT priority in 2016 for state and local agencies, according to the National Association of State Chief Information Officers.

Cyber Attack Preparedness - Can We Ever Be Ready?
Watch On-Demand

This webinar covers the importance of retrospective security for protection before, during and after an attack using tools such as Cisco Stealthwatch and Cisco Advanced Malware Protection (AMP) 

Protection with Web and Email Security - from a User's Perspective
Watch On-Demand

Learn what a blended attack looks like from the inside and out as well as what to look for when scoping and containing threats.

 

Webinaires de sécurité Cisco.

Le nouveau modèle de sécurité: Avant, pendant et après une attaque

Merci pour votre patience. Nous travaillons actuellement sur certaines mises à jour du site. S'il vous plaît vérifier à nouveau plus tard.

Webinarios de Seguridad de Cisco.

El nuevo modelo de seguridad: Antes, durante y después de un ataque

No Featured Upcoming Webinar



Pre-Recorded Webinars

¿Cómo prevenir un alto impacto al negocio ante un ataque como WannaCry?
Read More >
¿Cómo prevenir que un ataque como WannaCry impacte altamente a su negocio? Mantenga protegida su organización de manera proactiva y prevéngase ante ataques de esta magnitud
¿Cómo prevenir que un ataque como WannaCry impacte altamente a su negocio? Mantenga protegida su organización de manera proactiva y prevéngase ante ataques de esta magnitud
Ir al webinar
¿Cuál es mi estrategia de seguridad, detectar o remediar?
Read More >
La adopción de una nube segura en un ambiente tan cambiante puede ayudarle a manejar la seguridad de su empresa, negocios y usuarios. Acompañenos de este webinar durante el cual usted podrá: • Bloquear las amenazas antes de que sucedan. • Proteger a los usuarios, datos y aplicaciones en cualquier lugar a donde vayan. Comoncer como contar con una nube segura que evite impacto en la productividad.
La adopción de una nube segura en un ambiente tan cambiante puede ayudarle a manejar la seguridad de su empresa, negocios y usuarios. Acompañenos de este webinar durante el cual usted podrá: • Bloquear las amenazas antes de que sucedan. • Proteger a los usuarios, datos y aplicaciones en cualquier lugar a donde vayan. Comoncer como contar con una nube segura que evite impacto en la productividad.
Ir al webinar
¿Combatiendo las Amenazas Internas –Protegiendo su Agencia de Adentro hacia Afuera
Read More >
Cuando Edward Snowden filtró información clasificada a los medios principales, trajo consigo los peligros representados por las amenazas internas a la consciencia pública y no sin un propósito. Las agencias de hoy en día se están ahogando en el temor que rodea a los ataques cibernéticos sofisticados, pero tal vez, el tipo de ataque más preocupante es la amenaza interna. De acuerdo a Forrester, el abuso por los maliciosos internos llega hasta el 25% de las brechas de información.
Cuando Edward Snowden filtró información clasificada a los medios principales, trajo consigo los peligros representados por las amenazas internas a la consciencia pública y no sin un propósito. Las agencias de hoy en día se están ahogando en el temor que rodea a los ataques cibernéticos sofisticados, pero tal vez, el tipo de ataque más preocupante es la amenaza interna. De acuerdo a Forrester, el abuso por los maliciosos internos llega hasta el 25% de las brechas de información.
Ir al webinar
¿Seguridad en la Nube? Enfrente las amenazas con CloudLock CASB de Cisco.
Read More >
Conozca como las soluciones de Cloud Access Security pueden proteger las aplicaciones y la infraestructura en la Nube.
Conozca como las soluciones de Cloud Access Security pueden proteger las aplicaciones y la infraestructura en la Nube.
Ir al webinar
Enfoque en ransomware: Cómo mantenerse protegido.
Read More >
El ransomware ha explotado en popularidad. Obtenga información acerca de esta amenaza dinámica y vea una demostración de nuestra nueva solución de defensa de ransomware presentada por Omar Alcala.
El ransomware ha explotado en popularidad. Obtenga información acerca de esta amenaza dinámica y vea una demostración de nuestra nueva solución de defensa de ransomware presentada por Omar Alcala.
Ir al webinar

Webinars de segurança da Cisco.

O Novo Modelo de Segurança: Antes, durante e após um ataque.

Featured Upcoming Webinar

No Upcoming webinars

Pre-Recorded Webinars

Internet: Amigo ou Inimigo? As ameaças que chegam pela Rede e por E-mail
Read More >
Com a quantidade crescente de informações disponíveis por e-mail e na Internet, o potencial de vazamento e comprometimento de dados nunca foi tão grande. O ultimo relatório anual de segurança da Cisco aponta que o E-mail é o maior vetor de ameças para ataques digitais. Esses ataques têm o objetivo de distribuir malware que se infiltra nos data centers onde dados comerciais confidenciais de alto valor são armazenados. As defesas tradicionais, incluindo firewalls e soluções de antivírus de endpoint, não conseguem bloquear esses tipos de ataques. 
Com a quantidade crescente de informações disponíveis por e-mail e na Internet, o potencial de vazamento e comprometimento de dados nunca foi tão grande. O ultimo relatório anual de segurança da Cisco aponta que o E-mail é o maior vetor de ameças para ataques digitais. Esses ataques têm o objetivo de distribuir malware que se infiltra nos data centers onde dados comerciais confidenciais de alto valor são armazenados. As defesas tradicionais, incluindo firewalls e soluções de antivírus de endpoint, não conseguem bloquear esses tipos de ataques. 
Visualizar o webinar
Combatendo as ameaças internas – Proteja a sua empresa de dentro para fora.
Read More >
Quando Edward Snowden vazou informações sigilosas para as mídias de massa, os perigos produzidos pelas ameaças internas vieram à tona do conhecimento público, e com razão. Atualmente, as agências estão preocupadas com os sofisticados cyber-ataques, porém também com o pior tipo de ameaça que existe – a ameaça interna. De acordo com a Forrester, abuso por parte de membros internos da empresa representam 25% das violações de dados.
Quando Edward Snowden vazou informações sigilosas para as mídias de massa, os perigos produzidos pelas ameaças internas vieram à tona do conhecimento público, e com razão. Atualmente, as agências estão preocupadas com os sofisticados cyber-ataques, porém também com o pior tipo de ameaça que existe – a ameaça interna. De acordo com a Forrester, abuso por parte de membros internos da empresa representam 25% das violações de dados.
Visualizar o webinar
Combata as Ameaças de Segurança na Nuvem com CloudLock CASB (Cloud Access Security Broker)
Read More >
Webinar Seja você um novato ou conhecedor do CloudLock, participe desta sessão para saber como a nossa solução CASB ajuda os clientes a proteger os dados e os usuários na nuvem.
Webinar Seja você um novato ou conhecedor do CloudLock, participe desta sessão para saber como a nossa solução CASB ajuda os clientes a proteger os dados e os usuários na nuvem.
Visualizar o webinar
Focando no Ransomware: Como manter-se protegido.
Read More >
O Ransomware cresceu a sua popularidade. Obtenha informações sobre esta ameaça dinâmica e veja uma demostração de nossa nova solução de defesa de Ransomware apresentada por Ricardo Marques.
O Ransomware cresceu a sua popularidade. Obtenha informações sobre esta ameaça dinâmica e veja uma demostração de nossa nova solução de defesa de Ransomware apresentada por Ricardo Marques.
Visualizar o webinar