Cisco Security Webinars.

The New Security Model: Before, During, and After an Attack.

Combat Cybercrime with an Incident Response Plan
January 24, 2017

REGISTER

The Ransomware Threat: New Tactics and How to Fight Back

On-Demand

  • ‹ prev
  • next ›
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7

Upcoming Webinars

Combat Cybercrime with an Incident Response Plan
Register

January 24, 2017 at 1PM ET/10AM PT
 
What’s the missing piece of many security approaches? A strong threat management strategy. Learn from expert Sean Mason how your organization can design an incident response plan—and why it matters now more than ever.

Stop Phishing Attacks with Automated Incident Response
Register

February 9, 2017 at 1PM ET/10AM PT
 
Reduce response and triage time with automated incident response and security orchestration. Cisco has collaborated with Swimlane to deliver an integrated approach to automating the investigation and response activities needed to take action on threats. Join us for this 60-minute webinar.

Talos Winter Security Threat Briefing Webinar
Register

February 28, 2017 at 1PM ET/10AM PT

Adversaries never stop innovating. Learn what macro trends the threat researchers have discovered in the security industry from the past season. By discussing these new and emerging threats, the Talos team will help you understand new protection strategies and build better defenses.

Archived Webinars

The Case for Next-Generation Intrusion Prevention
Watch On-Demand

Many think with the adoption of a next-generation firewall (NGFW), that a stand-alone intrusion prevention system (IPS) is no longer required. That’s simply not true. This session explores use cases where next-generation IPS (NGIPS) can provide visibility, threat detection and response, and malware discovery in areas of your network that remain off limits to firewall inspection and controls. 

Exploit Kits – is this the end or just the beginning?
Watch On-Demand

Watch this on-demand webinar to learn: What exploit kits are and why they are a major threat; What changes occurred in 2016;  What’s the future of exploit kits in 2017 and beyond.

A Cybersecurity Buyer's Guide for Industrial Control Networks
Watch On-Demand

Watch this on-demand webinar, where a panel discussion to help industrial operators select the technologies and vendors that can protect OT on OT’s terms.  

Fall Security Threat Briefing 
Watch On-Demand

In the latest Talos security threat briefing, expert Warren Mercer will reveal the latest trends in threat intelligence, including recent developments in attack strategies, ransomware, and other threats. 

FBI CJIS Security Policy: The Road to Compliance and Beyond Watch On-Demand

Watch this engaging session on the Security Policy. We'll break it down, make it easy to understand and show you how industry best practices and other resources can guide you down the road to compliance – and beyond.

The Rising Tide of Spam
Watch On-Demand

What sinister forces are behind this global increase in spam? Watch this on-demand webinar from Talos threat researcher Jaeson Schultz to find out. You’ll learn about the latest trends in spam attacks strategies and how to stop them.

The Ransomware Threat: New Tactics and How to Fight Back Watch On-Demand

The rise of ransomware has become one of the most widespread and financially damaging threats facing businesses today. But, there are steps you can take to reduce the risk of ransomware and protect your business. Watch this on-demand webinar.

Plugging the Email Security Gap Watch On-Demand

Cyber criminals are hard at work trying to steal your corporate, personal and financial data, and breach your network. Watch this webinar to learn about their top methods of attack and how to prevent them.

Cisco Talos on DNS Exfiltration Watch On-Demand

Threat researcher Martin Lee discusses Domain Name System (DNS) exfiltration techniques and why security professionals should pay closer attention to DNS traffic.

Know Your Network: Pre- and Post-Access Control
Watch On-Demand

Watch the on-demand webinar to hear from Cisco experts on how to secure your network from connection to termination of any device using the network. Many tools on the market focus on parts of the attack while this webinar will cover pre- and post-access control security best practices. The best part about this topic is you can use your existing infrastructure by turning a general router, switch, access point, virtual switch, or other network asset into a security tool. 

Spotlight on Ransomware: How to Stay Protected.
Watch On-Demand

Ransomware has exploded in popularity. Learn how it started, how it’s spread, and how to stop it in this complementary webinar. Threat researcher William Largent from Talos shares the latest ransomware threat intelligence, and Bart McGlothin gives a demo of our new Ransomware Defense solution.

Talos Security Threat Briefing
Watch On-Demand

Unlocking the secrets of ransomware is just one small portion of what the threat researchers at Talos can achieve. They block more than 19 billion threats on a daily basis. In this complimentary webinar, William Largent shares Talos’s top threats from the past summer. From malware to ransomware to phishing schemes, you’ll see what they considered the most dangerous and prevalent security issues. You’ll learn all about new vulnerabilities and how to secure them. 

Cisco Talos on Exploit Kits: Hunting the Hunters
Watch On-Demand

Hear the incredible story of how Talos traced Angler back to the service providers and what happened next. Join our live Q&A for answers to your questions.

Cisco Talos on Ransomware: Data Held Hostage
Watch On-Demand

Nobody knows ransomware like the threat researchers at Talos. They track a threat back to the source, uncovering how it works and what it targets. Join us for a free webinar led by Talos’s William Largent. He’ll give you an insider’s look at ransomware attacks and show you how to protect your organization. Register today!

Stop Threats Faster with Rapid Threat Containment
Watch On-Demand

Cisco Product Marketing Manage Andrew Peters will explain this solution, how it uses the Cisco network as a threat enforcer, and how it is leveraging vulnerability and threat rating structures such as STIX and CVSS to determine user access privileges.

Cyber Attack Preparedness - Can We Ever Be Ready?
Watch On-Demand

This webinar covers the importance of retrospective security for protection before, during and after an attack using tools such as Cisco Stealthwatch and Cisco Advanced Malware Protection (AMP) 

What’s New with Cisco Policy & Access
Watch On-Demand

Watch this on-demand webcast to learn how the Cisco Policy & Access portfolio – Identity Services Engine (ISE), TrustSec, and AnyConnect – enables to you to effectively manage and defend your network by providing best-in-class network visibility, policy management and enforcement, and highly secure remote access anywhere, at any time.

Protection with Web and Email Security - from a User's Perspective
Watch On-Demand

Learn what a blended attack looks like from the inside and out as well as what to look for when scoping and containing threats.

 

Talos Quarterly Threat Briefing
Watch On-Demand

Cyberthreats will never disappear. Adversaries are only getting smarter and more adept at evading security measures. The security experts at Talos invite you to their quarterly threat briefing, where they will share their insights into recent attacks that exemplify the latest trends within the security industry. By discussing these new and emerging threats, the Talos team will help you understand new protection strategies and build better defenses.

LogRhythm and Cisco AMP Threat Grid for Integrated Enterprise Security
Watch On-Demand

LogRhythm and Cisco AMP Threat Grid have partnered to deliver enterprise-wide threat detection and response by integrating Cisco’s threat intelligence into LogRhythm’s Security Intelligence platform and automating the discovery of indicators of compromise relative to malware that has penetrated the network.

No Time for Cyber Excuses: How SLGs are Building Secure Solutions through Innovation
Watch On-Demand

State and local governments (SLGs), holders of critical data, infrastructure, and services, are under enormous pressure to address today’s cyber threat landscape. In fact, security and risk management are the No. 1 strategic IT priority in 2016 for state and local agencies, according to the National Association of State Chief Information Officers.

Beyond NGFW: A Threat-centric approach to security
Watch On-Demand

The Cisco Firepower™ Next-Generation Firewall (NGFW) is the industry’s first fully integrated, threat-focused next-gen firewall with unified management. It includes Application Visibility and Control (AVC), optional Firepower next-gen IPS (NGIPS), Cisco® Advanced Malware Protection (AMP), and URL Filtering.

Cisco Email Security: Deliver secure email to anyone, anywhere, on any device
Watch On-Demand

With the potential for revenue and intellectual property losses, a damaged reputation, compliance violations, and the liability associated with breaches, email must be carefully protected more than ever. Encryption is the answer and although encryption is a complex technology, the user experience must be easy for it to be effectively used.

Solving the Attack Puzzle: Using Automated Malware Analysis and Threat Intelligence to Drive Incident Response
Watch On-Demand

No company is immune from cyber attacks. It’s no longer a question of if your company will be attacked, but rather a question of when this will occur and how long it will take you to respond and remediate.

Ransom Where…Everywhere: Breaking Down the Ransomware Attack
Watch On-Demand

Are you prepared if you lose all your critical data? It could be any digital asset, from personal family pictures to sensitive customer records that you couldn’t get back unless you paid a ransom. This kind of attack is called Ransomware and it’s becoming increasingly common. Watch this special webcast focused on Ransomware. Leading the talk will be Nick Biasini from Cisco’s threat research team Talos and Joseph Muniz from the security architecture team.

Federal Cybersecurity Best Practices: Learn and Apply the NIST Cybersecurity Framework
Watch On-Demand

We have assembled an expert panel to discuss how state and local governments can apply the NIST Cybersecurity Framework, utilize public-private sector partnerships, and share threat information to better prepare critical infrastructure for today’s cyber threats.

Move Beyond the Sandbox: Integrate and Automate Your Malware Analysis
Watch On-Demand

Companies today find themselves under a multitude of advanced malware attacks. It is difficult to effectively identify attacks, let alone prioritize the most dangerous ones that should be addressed first.

Talos: Cisco's Secret Security Weapon
Watch On-Demand

Billions of cyberthreats try to compromise systems on a daily basis. Unfortunately, that number is growing. TALOS is on the forefront of stopping cyberattacks and educating organizations about current security threats.

Fortifying Your Gateway: How to Defend Against Email and Web-Based Attacks
Watch On-Demand

Traditional web and email security measures are not enough to stop today’s advanced threats. As modern networks have expanded beyond the traditional perimeter, new threat vectors have emerged, leaving gaps in protection. Join us for a webinar to discuss the top two emerging attack vectors—email and web.

Cisco Web and Email Security Webinar: Protect Your Data and Reputation
Watch On-Demand

The top two attack vectors for malware are email and web browsers. Watering-hole attacks conceal malware on member-based sites and phishing scams can target individuals with personal details. Experience a different security approach to protect against these threats while achieving business growth, efficiency and lowered expenses.

Stop Advanced Threats With Cisco Network Security
Watch On-Demand

Traditional network security solutions, built from disparate point technologies have created gaps in traditional defenses that sophisticated attackers exploit. Organizations need an integrated approach to network security to enhance visibility, enable dynamic controls, and provide advanced threat protection before, during and after an attack.

Five Ways to Protect Your Data Center
Watch On-Demand

Secure your data center without sacrificing speed, performance, or functionality. Sound too good to be true? Join us for a free webinar that will show you how to identify where you might have gaps in your security and how to address data center security priorities, while maintaining the agility to meet ever-increasing business demands.

Close Your Endpoint Security Gaps
Watch On-Demand

Move beyond point-in-time technologies towards a continuous and retrospective approach to security. Join our live webinar to find out how.

Stop Threats in their Tracks: An Introduction to Cisco Advanced Malware Protection (AMP)
Watch On-Demand

Join us to learn how Cisco Advanced Malware Protection (AMP) provides the continuous visibility and control needed to defeat malware across the extended network and the full attack continuum: before, during, and after an attack.

Securing Critical Intrastructure from Cyber Threats: How State and Local Governments Can Utilize a Threat-Centric Approach
Watch On-Demand

We have assembled an expert panel to discuss how state and local governments can apply the NIST Cybersecurity Framework, utilize public-private sector partnerships, and share threat information to better prepare critical infrastructure for today’s cyber threats.

Reduce Your Time to Detection with Retrospective Security
Watch On-Demand

Learn how to turn back the clock on attacks to effectively find and remediate advanced malware faster with Cisco threat intelligence and retrospective security.

Webinaires de sécurité Cisco.

Le nouveau modèle de sécurité: Avant, pendant et après une attaque

  • ‹ prev
  • next ›
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7

Webinaires à venir

Merci pour votre patience. Nous travaillons actuellement sur certaines mises à jour du site. S'il vous plaît vérifier à nouveau plus tard.

Webinaires archivés

Webinarios de Seguridad de Cisco.

El nuevo modelo de seguridad: Antes, durante y después de un ataque

  • ‹ prev
  • next ›
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7

Próximos webinarios

¿Combatiendo las Amenazas Internas –Protegiendo su Agencia de Adentro hacia Afuera
Enero 18, 2017 a la 1pm EST / 12pm CST

Cuando Edward Snowden filtró información clasificada a los medios principales, trajo consigo los peligros representados por las amenazas internas a la consciencia pública y no sin un propósito. Las agencias de hoy en día se están ahogando en el temor que rodea a los ataques cibernéticos sofisticados, pero tal vez, el tipo de ataque más preocupante es la amenaza interna. De acuerdo a Forrester, el abuso por los maliciosos internos llega hasta el 25% de las brechas de información.  

Webinarios archivados

¿Seguridad en la Nube? Enfrente las amenazas con CloudLock CASB de Cisco.
Ir al webinar

Conozca como las soluciones de Cloud Access Security pueden proteger las aplicaciones y la infraestructura en la Nube.  

Enfoque en ransomware: Cómo mantenerse protegido.
Ir al webinar

El ransomware ha explotado en popularidad. Obtenga información acerca de esta amenaza dinámica y vea una demostración de nuestra nueva solución de defensa de ransomware presentada por Omar Alcala.

¿Por qué el Malware es exitoso? Empiece a pensar como el atacante para protegerse
Ir al webinar

Ninguna compañía se encuentra inmune a ataques cibernéticos. Ya no se trata más de una cuestión de si su compañía será atacada, sino de una cuestión de cuándo una brecha ocurrirá y cuánto le tomará responder y remediar. Debido a esto, las organizaciones necesitan de herramientas de seguridad para ayudarles a rápidamente detectar, responder y remediar después de un ataque.

Webinars de segurança da Cisco.

O Novo Modelo de Segurança: Antes, durante e após um ataque

  • ‹ prev
  • next ›
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7

Próximos webinars

Combatendo as ameaças internas – Proteja a sua empresa de dentro para fora.  

18 de Janeiro, 11am EST / 2pm BRL
Quando Edward Snowden vazou informações sigilosas para as mídias de massa, os perigos produzidos pelas ameaças internas vieram à tona do conhecimento público, e com razão. Atualmente, as agências estão preocupadas com os sofisticados cyber-ataques, porém também com o pior tipo de ameaça que existe – a ameaça interna. De acordo com a Forrester, abuso por parte de membros internos da empresa representam 25% das violações de dados.

Webinars arquivados

Combata as Ameaças de Segurança na Nuvem com CloudLock CASB (Cloud Access Security Broker)   

Webinar Seja você um novato ou conhecedor do CloudLock, participe desta sessão para saber como a nossa solução CASB ajuda os clientes a proteger os dados e os usuários na nuvem. 

Focando no Ransomware: Como manter-se protegido.

O Ransomware cresceu a sua popularidade. Obtenha informações sobre esta ameaça dinâmica e veja uma demostração de nossa nova solução de defesa de Ransomware apresentada por Ricardo Marques.

Solucionando o quebra-cabeça do ataque - Usando inteligência de ameaça e análise de malware automatizada para promover reação ao incidente  

Nenhuma empresa está imune contra ataques virtuais. Não é mais uma questão de sua empresa ser atacada, mas sim uma questão de quando uma violação acontecerá e quanto tempo levará para você reagir e remediar. Por causa disso, as organizações precisam de ferramentas de segurança para ajudá-los a detectar, reagir e remediar rapidamente após um ataque.