Registration

Inscription

Inscripción

Registro

Finding a Career in Cybersecurity: Panel on Job Success
October 25, 2017 at 1PM ET | 10AM PT

For those looking to break into the cybersecurity industry, the options can be overwhelming. Should you go back to school? Do online courses? How can you find the right role that matches your passions and skills? In this free webinar, hosted by Learning@Cisco Manager Tom Gilheany, we’ll be diving into how to answer these questions and more. After a brief introduction to set the scene, our panel of experts will discuss how they got their role, lessons learned, and advice for jobseekers like you. Our panel comes from a diverse background and represents distinct paths to professional success:

  • Jessica Bair built upon her success as a US Army CID Special Agent and transitioned into a fulfilling career in the private sector. 
  • Matt Watchinski started with a BS in Computer Information Systems. After 18 years in the industry, Matt now leads Talos, one of the largest and most active threat intelligence and research teams in the industry.
  • Steve Caimi began his career as an electrical engineer before finding his niche in cybersecurity, achieving success as a consultant to public sector organizations and speaker at conferences across the country. 
  • Michele Guel spent 11 years at NASA Ames Research Center prior to joining Cisco, where she has recently co-founded the Cisco Women in Cybersecurity Community, which focuses on developing the next generation of women cybersecurity leaders.

They will welcome your questions during a live Q&A session. Register now to secure your spot.

Cisco Active Threat Analytics
October 18, 2017 at 10AM ET | 7AM PT | 3PM BST

Cyber security teams must protect their organizations' data and privacy and support new business initiatives while defending against dynamic cyber attacks. 

Some of  these attacks will evade even the best tools, such as next-generation firewalls, unified threat management (UTM) solutions, and intrusion prevention systems (IPS). 

That means that organizations must vigilantly monitor security events. Compounding these challenges are the shortage of cyber talent, a vast amount of telemetry and platforms to watch, and difficult-to-use Security Event Management Systems. 

How do you effectively manage security operations in the face of these challenges? Cisco ActiveThreat Analytics, a leading managed detection and response service, can help.   

In this webinar, you will:

  • Hear from experts on Cisco’s Active Threat Analytics team  
  • Learn about best practices for more effectively managing threat detection and response 
  • Find out how our 24-hour continuous-monitoring, advanced-analytics capabilities, industry-leading threat intelligence, and expert investigators work together to rapidly detect advanced threats
  • Discover how we are helping leading organizations better meet their security event management needs and free up resources

Plus get answers to your questions from our experts during our live Q&A.

 

Presenters:

Kevin Guidinger, Americas Leader, Active Threat Analytics (ATA) Solution Development

Dmitry Kuchynski, Client Services Director, Cisco Security Solutions

IoT and Real-World Cyber Risks
October 17, 2017 at 1PM ET | 10AM PT

Please register here for the 6AM PT | 2PM BST Session on October 16th, 2017

The Internet of Things promises many benefits: improved efficiency, higher productivity, better decision-making. But change brings new risks: Did you know that IoT devices can introduce new vulnerabilities that can be exploited to launch a cyberattack? How comfortable are you in your ability to mitigate the risk?

This session explores the real-world challenges associated with IoT and recommends a proven approach toward effective security. Realize the benefits of the Internet of Things. Just do it with your eyes open!

Register now and join us for this engaging and insightful webinar. You'll be glad you did.

Presenter:

 

  Steve Caimi is a cybersecurity professional at Cisco who helps organizations efficiently and effectively manage their cybersecurity programs and achieve compliance goals. He advocates a risk-based approach based on industry standards and best practices that guides organizations to the improvements that matter the most. Prior to joining Cisco, Steve held various product management, engineering, and solution architecture positions at HP Enterprise Security, CA Technologies, UUNET Technologies, and Citigroup. He earned a Master of Business Administration from Virginia Tech and a Bachelor of Science in Electrical Engineering from Penn State University. He is also a Certified Information Systems Security Professional (CISSP).

GDPR: Here's what you absolutely need to know
October 12, 2017 at 1PM ET | 10AM PT

Please register here for the 6AM PT | 2PM BST Session

 

The General Data Protection Regulation (GDPR) deadline is May 2018, and you already know about the potential non-compliance penalties. Join us and we'll simplfy the regulation and show you a practical approach to compliance. It's not too late.

 

Presenters:

 

Lorena Marciano
EMEAR Data Protection & Privacy Officer at Cisco

 

 

Steve Caimi
US Public Sector Cybersecurity

 

Talos Fall Threat Briefing
October 19, 2017 at 1PM ET | 10AM PT

Please register here for the 6AM PT | 2PM BST Session

After analyzing 1.5 million malware samples daily, the Talos team knows a thing or two about threat intelligence. Join us for the latest security threat briefing to learn about what these threat researchers consider to be the most notable threats of the past season. 

Don’t miss this opportunity to hear directly from Talos Technical Leader Vanja Svajcer. You’ll get a deep dive into how emerging threats work, what adversaries are after, and how you can stop them.

In this free webinar, you will:

  • Get a deep dive into the hottest topics in threat intelligence, including what experts have identified as the most prevalent and powerful threats
  • Learn how adversaries have changed their attack strategies
  • Identify best practices your organization can use to protect itself from attacks

Join our live Q&A for answers to your specific questions and organizational needs.

 

 

Presenters:

 

Vanja Svajcer
Talos Technical Leader

 

Intelligent Incident Response
On-Demand

A data breach occurs. Your incident responders move into action to reduce damage and exposure. The ability to coordinate and analyze threat intelligence is a critical tool for incident response teams. In every Cisco incident response investigation, anywhere in the world, a dedicated Talos resource is made available to the incident response team. 

In this on-demand webinar, you will:

  • Hear experts from Cisco’s Talos threat intelligence and Cisco’s Incident Response teams walk you through real-world incidents such as the recent Nyetya attack. 
  • They will show how the integration of response and intelligence worked together to more effectively contain the impact of a cybersecurity event. 
  • You'll learn best practices for integrating threat intelligence with your incident response program.

Presenters:

 

Sean Mason
Director, Threat Management

Craig Williams.jpgCraig Williams 
Sr. Technical Leader and Global Outreach Manager
Talos

 

The Ultimate Guide to Business Email Compromise
On-Demand

Move over ransomware—According to the Cisco Midyear Security Report, Business Email Compromise (BEC) is one of the most important and prevalent email-based threats that organization face. And potentially the costliest, with the fraud raking in nearly $5.3 billion between October 2013 and December 2015. Even high-profile targets, with robust cybersecurity approaches, can be vulnerable to these types of attacks. 

In this on-demand webinar, two of our top email cybersecurity experts team up to tell you everything you need to know about BEC. They start by drawing on their boots-on-the-ground experience with BEC to tell you how two different organizations succumbed to BEC. Then they walk through how your organization can protect itself, covering everything from user education to the IT tools you need to know about.

During this session, you will:

  • Learn about two real-life cases of BEC, starting from how the attack originated to how it impacted their cybersecurity approach
  • Understand how adversaries use phishing, web forms, spam bots and more to create convincing BEC fraud campaigns
  • Identify best practices your organization can use to protect itself from BEC attacks

 

 

Exploring Email: The #1 Threat Vector
On-Demand

Adversaries rely on email to execute their malicious campaigns, and no one understands their tactics better than the threat researchers at Talos. Analyzing more than 500 billion emails per day,Talos has unparalleled insight into the latest email security attack strategies. 
 
In this free webinar, Talos Technical Leader Jaeson Shultz revealed the latest tactics in email fraud, including several high-profile examples that demonstrate their latest findings. 

In this on-demand webinar, you will:

  • Get a deep dive into the hottest topics in email security, including what experts have identified as the most prevalent and powerful threats
  • Learn how adversaries have changed their attack strategies
  • Identify best practices your organization can use to protect itself from email-based attacks

 

Cisco and IBM: Integrated Defense for Effective Security
On-Demand

Cybercriminals are growing increasingly collaborative. In fact, it is estimated that 80 percent of cyberattacks are driven by highly organized “crime rings” that share data and tools to launch sophisticated attacks. At the same time, competition in the cybersecurity market is so fierce that deep collaboration among vendors is practically non-existent. Many enterprise organizations use as many as 50 different security products from nearly as many vendors. The result is an inability to identify potentially malicious activity and to respond in a proactive, coordinated manner to halt the attack. 

Cisco and IBM Security have joined forces to fight this criminal collaboration, delivering an integrated approach across networks, users and cloud. Join this webinar with experts Jessica Bair of Cisco and Chris Meenan of IBM Security as they discuss how to leverage this partnership to provide rapid detection and response across the diversity of sophisticated threats. 

In the webinar, you will learn about:

  • Product integrations between Cisco infrastructure and IBM Security Operations to deliver rapid threat detection and orchestrated incident response
  • Threat intelligence sharing between Cisco Talos and IBM X-Force Exchange
  • Managed and consulting-led services to secure hybrid cloud and enterprise-infrastructure
  • Demo between Cisco and IBM QRadar based on App-Exchange ecosystem

Speakers:

  • Jessica Bair – Senior Manager, Advanced Threat Solutions at Cisco Threat Grid
  • Chris Meenan – Director, Security Intelligence Product Management and Strategy, IBM Security
  • George Mina – Program Director, Strategic Alliances, IBM Security

Disclaimer: Your registration information will be shared with the Cisco ecosystem partner IBM, who may contact you in follow-up to your registration and/or attendance of this webinar.

Cisco 2017 Midyear Cybersecurity Report Insights
On-Demand

Cisco security experts are becoming increasingly concerned about the accelerating pace of change in the cyber threat landscape.

Watch this on-demand webinar where we addressed our findings from the recent Cisco 2017 Midyear Cybersecurity Report. We shared new insights, explored the newest generation of worm threats going viral on a global scale, and addressed how adversaries use the pace and scale of technology to shift to IoT exploits, and how defenders are responding by shrinking time to detection.

In this webinar, you will:

  • Discover select methods threat actors are using to compromise and infiltrate systems
  • Examine vulnerabilities and other exposures that may leave you susceptible to attacks
  • Explore opportunities for defenders by industry to improve your security posture

The New Cybersecurity Executive Order: What You Need to Know
On-Demand

The President recently issued a new Executive Order (EO) titled “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.” It aims to enhance the security of federal networks, our critical infrastructure, and the entire nation. The EO emphasizes the importance of a cyber risk management approach within each federal agency to accomplish these goals.

The EO outlines important points that everyone in the federal government needs to know:

  • Agency heads are held accountable for cyber risk management programs in their departments and agencies
  • All executive branch agencies are now required to use the NIST Cybersecurity Framework to manage their cyber risks
  • Agency heads must develop and submit a risk management report for scrutiny by DHS and OMB within 90 days of the order.

Is your agency efficiently and effectively managing its cybersecurity risks? Do you already understand the NIST Cybersecurity Framework and know how to adopt it? If not, please watch this on-demand webinar where we cover the key points that you and everyone in the federal government needs to know.

In this webinar, you will learn:

  • The key policies and actions required by the new Cybersecurity Executive Order
  • The NIST Cybersecurity Framework and how it’s used to manage and improve your cybersecurity program
  • How Cisco can help you adopt the NIST Cybersecurity Framework with essential solutions to efficiently and effectively manage cybersecurity risks in your agency

Presenters:




Steve Caimi

US Public Sector Cybersecurity



Accelerate Malware Analysis with Orchestration
On-Demand

Cyber attackers are developing new, more advanced and more dangerous malware. Organizations must continuously advance their cybersecurity programs in order to battle this new malware - viruses, Trojans, bots and more.

As malware becomes more complicated and harder to detect, cyber analysts are increasingly inundated with more work. The more menial tasks a security team performs, the less likely they are to have the time to properly analyze or defend against malware.

There are steps you can take to defend yourself against malware and protect your organization. Join this webinar with experts Jeremy Linden of Cisco Umbrella, Michael Auger of Cisco Threat Grid and Joe Reese of ThreatConnect as they discuss how to utilize orchestration to enhance malware analysis capabilities.

In the webinar, you will learn to:

  • Standardize processes around malware analysis
  • Combine automated actions with human decision-making
  • Aggregate malware analysis results with validated threat intelligence
  • Quickly take action based on malware analysis results

Speakers:

  • Jeremy Linden – Investigate Product Manager at Cisco Umbrella
  • Michael Auger – Security Solution Architect at Cisco Threat Grid
  • Joe Reese – Senior Product Manager at ThreatConnect

OAuth Phishing and WannaCry Ransomware Attacks: Are You Protected?
On-Demand

Recent headlines show a new generation of worm threats going viral on a global scale. OAuth phishing and the WannaCry ransomware attacks are leaving many organizations unsure of what happened and how they may be impacted by future attacks.

Watch this on-demand webinar to learn what these threats are, what actually happened during these attacks, and how Cisco can help your organization better protect against these new types of attacks. In this webinar, you will:

  • Learn the history and recent surge of these attacks
  • Identify what your organization can do to protect itself from future attacks

Think you're safe? Think again!


Presenters:



Ron Zalkind
CTO
Cisco Cloudlock

Russell Miller
Head of Product Marketing
Cisco Cloudlock
Nick Biasini
Researcher
Talos Outreach

Talos Security Threat Briefing Webinar
On-Demand

After analyzing 1.5 million malware samples daily, the Talos team knows a thing about threat intelligence. Join us for the latest security threat briefing to learn about what these threat researchers consider to be the most notable threats of the past season.

Don’t miss this opportunity to hear directly from Talos Threat Researcher & Manager Martin Lee. You’ll get a deep dive into how emerging threats work, what adversaries are after, and how you can stop them.

In this webinar, you will:

  • Get a deep dive into the hottest topics in threat intelligence, including what experts have identified as the most prevalent and powerful threats
  • Learn how adversaries have changed their attack strategies
  • Identify best practices your organization can use to protect itself from attacks

Presenter:

 

BioPicture.png

Martin Lee
Talos Threat Researcher

 

 

Forcing the Bad Guys to Innovate
On-Demand

Threat intelligence is the backbone of any successful cybersecurity approach—but how does it affect adversaries in the real world? Nearly 300 threat researchers at Talos have already shaped history with their innovative tactics for stopping attacks.

In this on-demand webinar, you will:
  • Understand how attackers have increased the sophistication of their malware
  • See how threat intelligence has caused notable crime rings to change their attack strategies
  • Identify best practices your organization can use to protect itself from attacks

Presenter:


BioPicture.png

Martin Lee
Talos Threat Researcher

 


The Rise of Enterprise Class Cybersecurity Vendors
On-Demand

More is more. But when it comes to cybersecurity, is the old adage really true? New research from Enterprise Strategy Group (ESG) shows that customers are actively consolidating the number of security vendors in their environment.

In this on-demand webinar, you’ll learn why security professionals everywhere are rethinking their cybersecurity approach. Expert John Oltsik, Sr. Principal Analyst from ESG, will discuss the latest customer sentiments around vendor consolidation, key attributes for Enterprise Security Vendors, and how Cisco’s architectural approach stacks up to the new customer reality.

In this on-demand webinar, you will:

  • Get a deep dive into how your organization can achieve simpler, more effective and automated cybersecurity
  • Learn how security professionals have changed their approach to better protect their networks
  • Identify best practices your organization can use to protect itself from attacks

Presenter:


BioPicture.png

Jon Oltsik
Sr. Principal Analyst


Top 3 Security Challenges for Manufacturing
On-Demand

Cybersecurity has never been more important to the world’s leading manufacturers. Legacy industrial control systems — many of which were never built with security in mind — remain especially prone to cyber threats. And as these systems are converged and integrated with enterprise IT technologies, new vectors of attack open up.

In this webcast, a panel of experienced security experts focused on the manufacturing industry will identify critical security challenges manufacturers face while IT and OT environments converge.  We’ll discuss approaches for implementing a forward-thinking, proactive security strategy that allows you to take advantage of IoT opportunities while decreasing the attack surface and the chances for business disruption.

You'll learn:

  • What IT/OT convergence in manufacturing looks like from a security lens
  • Critical areas of security focus for manufacturers
  • How a strategic infrastructure segmentation approach will allow you to reduce risk, simplify your audit profile, protect data, and achieve a defensible position for board-level requirements
  • How to enable simplified management, lowered complexity, and increased consistency, resulting in optimized operational costs

Panel:

  • Jon Stanford, Principal, Cisco Services IoT and Industrial Solutions. Jon leads services and business development strategy for the critical infrastructure and industrial automation sectors.
  • Hank Hensel, Sr. Security Consultant, Cisco Services ICS Practice Lead. Hank is a senior-level information technology (IT) and ICS operations technology (OT) security professional with over 28+ years of experience in multiple aspects of security risk and program governance across many industries.
  • John Ode, Field Product Manager.  John is a Field Product Manager and former Cyber Security Incident Response Leader with over ten years experience deploying and utilizing security products in a critical infrastructure environment. 
  • Eric Ehlers, Marketing Manager, Manufacturing Subject Matter Expert. He was previously Director of Marketing at Belden, where he worked with the Industrial Networking, Connectivity and Cybersecurity business units to lead strategic programs.

Get your head out of the box; More effective security through integration 
On-Demand

More IT vendors, more problems. Security administrators today suffer from a barrage of products that work in isolation, and tax an already limited security manpower budget to give hackers the advantage. But a more intelligent security solution can provide increased productivity, savings, and sanity.

Watch this on-demand webinar to learn how Cisco Security provides an integrated solution that eliminates many of the multivendor headaches. Through a use case, the presenters will walk through the solution, highlighting how shared intelligence, simple design and open-source integration can provide more effective security protection.

In this webinar, you will:

  • Understand the benefit of having multiple products that can exchange information regarding events, policy, threats, and context to correlate events
  • Join the discussion on the challenges of multi-vendor support
  • Identify best practices your organization can use to simplify its security approach
Presenter:


BioPicture.png

Chris Hoff
Field Product Manager


Ransomware, Banking Trojans and Floki Bot: A Threat Trifecta
On-Demand

Malware seems to be the Swiss Army knife in an attacker’s toolkit; some threats like ransomware target the users data. Others, such as banking trojans seek to exfiltrate sensitive data. Join our live webinar lead by Talos Threat Researcher Edmund Brumaghin as he covers the recent evolutions in malware and offers a detailed analysis of one of the newest banking Trojans, Floki Bot.

In this free webinar, you will:

  • Understand how attackers have increased the sophistication of their malware
  • Join the discussion on Floki bot and other financially-motivated malware schemes
  • Identify best practices your organization can use to protect itself from attacks
Presenter:
 
Edmund Brumaghin, Talos Threat Researcher
 

Design a Secure Branch in Less Than 1 hour
On-Demand

Branches are typically less complex and smaller in footprint than campus or data centers. Within the branch environment, people with various access levels use different devices to accomplish various business outcomes. For example, an internal employee needs to securely process a credit card transaction through a secure application on an iPAD. Other critical business functions include web access and communications over voice and email. Service providers, partners and other third parties need secure access and accountability. Customers access guest Internet and expect their private information to remain private.

In this webinar, you will learn how to defend the people, devices and business outcomes in a branch environment from cyberattack.  The presenter will create a Secure Branch network, on paper, from start to finish. The network will include security and networking technology mapped to the most critical business outcomes in the branch. 


Presenter:


BioPicture.png

Christian Janoff
Security Solutions Architect


Talos Winter Security Threat Briefing Webinar
On-Demand

Adversaries never stop innovating—and one team is tasked with tracking and stopping new attack strategies. The Talos threat intelligence team has more than 270 full time threat researchers who discover new vulnerabilities, threats and attack strategies. Join our complimentary webinar led by Talos Senior Threat Researcher Earl Carter to learn what the team considered the most important security developments of the past season. 

Once per quarter, Talos threat researchers showcases their most important findings. Don’t miss this opportunity to hear directly from the experts on everything from exploit kits to complex malware. You’ll get a deep dive into how these threats work, what adversaries are after, and how you can stop them.

In this free webinar, you will:

  • Get a deep dive into the hottest topics in threat intelligence, including what experts have identified as the most prevalent and powerful threats
  • Learn how adversaries have changed their attack strategies
  • Identify best practices your organization can use to protect itself from attacks
Presenter:


BioPicture.png

Earl Carter
Talos Sr. Threat Researcher


Not Just Another Firewall
On-Demand

Organizations realize that when they are breached, their network is imperiled and business can suffer. While next generation security, including edge protection, is critical to business resiliency, numerous challenges remain to implementing effective and scalable security without the traditional performance sacrifices and management complexities.

In this on-demand webinar, Rob Ayoub, Research Director at IDC, and Cisco’s Jason Wright explain how the NGFW market continues to evolve to meet this challenge. Learn about:

  • NGFW market dynamics and the impact of the cloud
  • The role of NGFW in Specialized Threat Analysis and Protection (STAP)
  • An architectural approach to security that delivers resiliency and simplicity

Presenters:


Rob Ayoub, CISSP
Research Director Security Products and Solutions, Networking Security and Security and Vulnerability Management IDC

Jason WrightJason Wright
Sr. Manager, Vertical and Solutions Marketing
Cisco


IPS Myths Debunked
On-Demand

IPS is stale, legacy technology. NGFWs do everything IPSs do. These are just a couple of the myths that lead many to miss the value dedicated intrusion prevention systems provide to an organization. In fact, IPS devices remain an important part of an effective network security program and critical to mitigate risk and protect against today’s network cyberattacks.

In this on-demand webinar, Rob Ayoub, Research Director at IDC, and Cisco’s Jason Wright dispel these myths, sharing research and insights on:

  • IPS market growth and the drivers behind it
  • The numerous use cases a dedicated IPS can effectively address
  • Key considerations as you integrate IPS within your security architecture

Presenters:


Rob Ayoub, CISSP
Research Director Security Products and Solutions, Networking Security and Security and Vulnerability Management IDC

Jason WrightJason Wright
Sr. Manager, Vertical and Solutions Marketing
Cisco


Stop Phishing Attacks with Automated Incident Response
On-Demand

Detecting and responding to cyber-attacks is critical to business operations. What happens when something does get in? Will you respond by having a team of incident response professionals investigate the problem?

Reduce response and triage time with automated incident response and security orchestration. Cisco has collaborated with Swimlane to deliver an integrated approach to automating the investigation and response activities needed to take action on threats. Watch this on-demand webinar to learn how to automate:

  • Investigation of potential phishing emails, including embedded URLs and attachments
  • Searching and correlation data across multiple security tools 
  • Incident triage and blocking at the endpoint

Exploit Kits – is this the end or just the beginning?
On-Demand

Exploit kits are used by hackers to compromise users through software vulnerabilities and deliver malicious payloads like Ransomware and Banking Trojans. They are responsible for tens of millions of dollars in losses, and a countless number of victims – and are very profitable for the hackers who use them. These EKs are ready to go off the shelf and often require little-to-no knowledge of the underlying code or the vulnerabilities they exploit. We've seen several exploit kits disappear in 2016, including Angler and Nuclear, but that doesn’t mean we’ve seen the last of these malicious tools. 

Watch this on-demand webinar to learn:

  • What exploit kits are and why they are a major threat
  • What changes occurred in 2016
  • What’s the future of exploit kits in 2017 and beyond?
Presenter:


BioPicture.png

Nick Biasini
Talos Outreach


Combat Cybercrime with an Incident Response Plan
On-Demand

When it comes to a robust security approach, three key pillars of your organization must be in alignment: people, processes and technology. Security expert Sean Mason has seen organizations stumble when it comes to streamlining people and processes. In this free webinar, he’ll explain why incident response planning is so critical to defending your organization and how you can begin shaping your plan today.

Craig Williams, Sr. Technical Leader at Talos, will also briefly share how crucial threat intelligence is to incident response planning, and how to apply it to your environment.

In this on-demand webinar, you will:

  • Get a deep dive into what it means to have a strong emergency incident response
  • Learn how proactive threat hunting can better protect your organization from future attacks.
  • Understand how your organization can take concrete steps towards creating its own incident response plan

Presenters:


Sean Mason
Director, Threat Management

Craig Williams.jpgCraig Williams 
Sr. Technical Leader and Global Outreach Manager
Talos


A Cybersecurity Buyer's Guide for Industrial Control Networks
On-Demand

Cybersecurity for industrial control networks is NOT the same as IT cybersecurity. And now that some high-profile industrial cyber attacks have been in the news, many traditional IT vendors are pursuing industrial customers without understanding the nature of ICS and it can be hard for industrial organizations to separate fact from marketing fiction.

Presenter:


BioPicture.png

Marc Blackmer



The Case for Next-Generation Intrusion Prevention
On-Demand

Many think with the adoption of a next-generation firewall (NGFW), that a stand-alone intrusion prevention system (IPS) is no longer required. That's simply not true.  IPS has evolved — next-generation IPS (NGIPS) can help protect digital business in new and unique ways.  This session explores use cases where NGIPS can provide visibility, threat detection and response, and malware discovery in areas of your network that remain off limits to firewall inspection and controls. Performance factors and organizational influences are discussed. You will learn how to use NGIPS to virtually patch vulnerabilities before more permanent fixes can be deployed and how to speed time to detection and quickly remediate advanced threats.

During this on-demand webinar:

  • Learn how IPS has evolved and what NGIPS can do differently
  • Understand deployment cases where NGIPS is less disruptive and can provide deeper visibility and better protections than NGFW or other solutions
  • See what's on the horizon for this important defense technology

Presenters:

Dave Staurt

Joe O’Laughlin

 

The Rising Tide of Spam
On-Demand


Spam is more than an inconvenience. It’s a powerful threat vector for criminal enterprises. Learn what new tactics these adversaries are using to compromise your system, and why spam bots are increasing on a global scale.  

Talos Technical Leader Jaeson Schultz, will explain the evolution of spam attacks and why security professionals everywhere need to take notice of these persistent attack strategies. 

In this free webinar, you will:
•    Understand how spam campaigns have increased in popularity and complexity
•    See notable examples of spam and how it compromises a system
•    Identify best practices your organization can use to protect itself from these attacks

Presenter:

Talos Technical Leader Jaeson Schultz

The Ransomware Threat: New Tactics and How to Fight Back
On-Demand

The ransomware struggle is real. As businesses struggle to secure and protect their data, cybercriminals continue to evolve and refine their tactics to avoid detection.

The rise of ransomware has become one of the most widespread and financially damaging threats facing businesses today. But, there are steps you can take to reduce the risk of ransomware and protect your business.

Watch this on-demand webinar with experts Eric Hulse and Josh Reynolds of Cisco Research and Efficacy Team (RET) as they discuss the ransomware threat and how to fight back. Specifically, this webinar will cover:

  • How ransomware has evolved and the attacker tactics that are used today
  • Current ransomware families, who they target and how they work
  • Predictions on what ransomware might do next
  • How to proactively prevent ransomware with threat intelligence and a multi-layer defense

 

To successfully prevent ransomware attacks you need to understand how attacks happen and what you can do to protect your business. 

Presenters:

Eric Hulse, Sr. Reverse Engineer, Research & Efficacy Team 
Josh Reynolds, Software Engineer, Research & Efficacy Team

Cisco Talos on DNS Exfiltration
On-Demand

Exfiltrating data from locked down networks is hard for cyber criminals. But every network has its weak points. Recently attackers have started exploiting Domain Name System (DNS) queries as a means to steal information. The time has come for organizations to consider their DNS traffic as a potentially malicious channel.  

Join us for a free webinar from the threat researchers at Talos on DNS exfiltration and why security professionals everywhere should be taking a closer look at DNS traffic.

In this webinar, you will:

  • Learn techniques for exfiltrating data and its weaknesses
  • Get an deeper understanding of multigrain point-of-sale (POS) malware DNS requests
  • Understand how to find anomalies in DNS logs—and what they might mean

Presenter:


BioPicture.png

Martin Lee
Talos Threat Researcher



Plugging the Email Security Gap
Learn the latest attacker techniques and campaigns

On-Demand

With more than 100 billion corporate emails exchanged each day, email has become a prime target for cyber attacks. Cyber criminals are hard at work trying to steal your corporate, personal and financial data, and breach your network. Join this webinar to learn about their top methods of attack and how to prevent them.

Presenter:

BioPicture.png

Scott Bower
Technical Marketing Engineering and Business Development Manager

Cisco

With over a decade of hands-on experience with Email and Web Security, Scott Bower has consulted with global customers, product management, engineering, marketing and sales to implement and develop industry-leading offerings. He is a seasoned professional and experienced speaker who is comfortable using non-techno speak to show customers how technology can make their companies more secure.




Spotlight on Ransomware: How to Stay Protected.
On-Demand

Ransomware is an ever growing financial prospect for criminals. It's spreading like wildfire. Watch this on-demand webinar in which we’ll explore what ransomware is, how it infiltrates a system, and most important—what steps you should take to protect your organization.

 

Warren Mercer will share his perspective on ransomware as a Talos threat researcher. He speaks to how ransomware has evolved, gives examples of notable attacks, and talks about new security trends.

 

You'll then get a chance to see our new Ransomware Defense solution in action. Bart McGlothin will walk you through how it works and what protection it can offer your organization.

 

In this on-demand webinar, you will:

  • Learn how adversaries have evolved and strengthened their ransomware attack strategies
  • See how Cisco Ransomware Defense gives your organization visibility and responsiveness 
  • Identify best practices your organization can use to protect itself from attacks

 

Cisco Talos on Ransomware: Data Held Hostage
On-Demand

Ransomware is spreading like wildfire. Adversaries know that a successful attack seizes our most important data, from financial records to family photos. Those hit by an attack often feel backed into a corner. What can they do but pay up?

Watch this free webinar from the threat researchers at Talos on how to stop ransomware attacks.

Nobody knows ransomware like Talos. They've cracked CryptoWall 4, uncovering everything from how it communicates across the network to what regions it targets. You’ll get an inside look at how it works and why ransomware is becoming the fastest-growing threat in cybersecurity.

In this on-demand webinar, you will:

  • Get an insider's perspective on notable ransomware attacks, including how they target users
  • Learn how ransomware has evolved
  • Identify best practices your organization can use to protect itself from these types of attacks
 

Cisco Talos on Exploit Kits: Hunting the Hunters
On-Demand

Flash. Silverlight. Internet Explorer. Exploit kits capitalize on vulnerabilities everywhere. And the problem is only growing. Join us for a free webinar from the threat researchers at Talos on these malicious kits and how to stop them. 


Talos has done more than just monitor exploit kits as they happen. They disrupted a $34 million enterprise by unraveling the process behind the Angler exploit kit. Hear the incredible story of how Talos traced Angler back to the service providers and what happened next. 


Watch the on-demand webcast and:

  • Learn more about the Angler and Rig exploit kits and how Talos succeeded in disarming them
  • Learn how exploit kits adapt, change and evolve 
  • Identify best practices your organization can use to protect itself from these types of attacks
Presenter:


BioPicture.png

Nick Biasini
Talos Outreach


Cyber Attack Preparedness - Can We Ever Be Ready?
On-Demand

Today’s threat landscape has become far more complicated and dynamic. Trends such as mobility, the cloud, and the Internet of Things (IoT) have expanded the attack surface while cybercriminals continue to become increasingly sophisticated, employing tools that are more difficult to detect and defend against than ever before.

With so much to defend against, how can we ever truly feel prepared? 

Join our Cisco security experts Steve Caimi and Chris Smithee for this live 60-minute webcast to discuss the state of cybersecurity and best practices as organization move from prevention to detection and realize the need for security everywhere. We will also cover the importance of retrospective security for protection before, during and after an attack using tools such as Cisco Stealthwatch and Cisco Advanced Malware Protection (AMP) 

Tune in to learn how your organization can become more prepared for the next breach with the right frameworks and security tools. Steve and Chris will also answer your questions in real time during the webcast.

Agenda:

  • The state of cybersecurity 
  • A review of best practices
  • Implementing a retrospective security solution using:

               -  Cisco Advanced Malware Protection
               -  Cisco StealthWatch

  • Q&A

Presenters:



Steve Caimi
Industry Solutions Specialist
US Public Sector

Chris Smithee
Program Manager
Engineering

Stop Threats Faster with Rapid Threat Containment
On-Demand

The Cisco Rapid Threat Containment solution allows customers to understand threats faster and take immediate action to stop them in their tracks. This open solution allows customers to share threat intelligence from over 40 Cisco technology partners, including Cisco Firepower and Stealthwatch, create a single source-of-truth and expose threats without lengthy investigations.  
Threats can be quickly contained from the same source-of-truth product either automatically or at the command of an administrator.   

Cisco Product Marketing Manager Andrew Peters will explain this solution, how it uses the Cisco network as a threat enforcer, and how it is leveraging vulnerability and threat rating structures such as STIX and CVSS to determine user access privileges.

Presenter:

BioPicture.png

Andrew Peters
Sr. Product Marketing Manager

Cisco




No Time for Cyber Excuses: How SLGs are Building Secure Solutions through Innovation
On-Demand

State and local governments (SLGs), holders of critical data, infrastructure, and services, are under enormous pressure to address today’s cyber threat landscape. In fact, security and risk management are the No. 1 strategic IT priority in 2016 for state and local agencies, according to the National Association of State Chief Information Officers.

As discussed in a previous webinar, “Diminishing the Cyber Threat: How State and Local Governments Can Get Ahead,” many SLGs have not used available programs or public-private partnerships to make changes to their cybersecurity programs. In the next installment of our webinar series, a panel of government leaders will offer insight into the strategies and innovations that drive real progress in managing cyber risks.

Watch this on-demand webinar to hear a panel of innovators and government leaders discuss:
  • Current challenges and trends in SLG cybersecurity environment
  • Lessons learned and success stories: best practices for implementing a strong cybersecurity strategy despite constrained resources
  • How SLG C-suite leaders can leverage people, process, and technology to improve their cybersecurity strategy
  • Developing a city-wide strategy for cyber:How the growth of smart cities will play a role in the evolution of SLG technology and cybersecurity practices


Protection with Web and Email Security - from a User's Perspective
On-Demand

Cisco Web and Email Security protect against the top two attack vectors. A typical pattern for attackers is to compromise a victim through the email vector and then use the web vector for further exfiltration and compromise through command and control, as well as data exfiltration.
  • See what this type of attack looks like from both a user as well as an administrator’s perspective within the Web and Email Security product interfaces.
  • Learn what a blended attack looks like from the inside and out as well as what to look for when scoping and containing threats.

Cisco Web and Email Security provide more than just your regular proxy or email solution. They combine Advanced Malware Protection, Cognitive Threat Analytics, and the global threat intelligence of Talos to actively identify breaches, malicious files, and otherwise lower your total time to remediation.

Presenter:

BioPicture.png

Scott Bower
Technical Marketing Engineering and Business Development Manager

Cisco

With over a decade of hands-on experience with Email and Web Security, Scott Bower has consulted with global customers, product management, engineering, marketing and sales to implement and develop industry-leading offerings. He is a seasoned professional and experienced speaker who is comfortable using non-techno speak to show customers how technology can make their companies more secure.




Breaking Down The Ransomware Attack
On-Demand

Are you prepared if you lose all your critical data? It could be any digital asset, from personal family pictures to sensitive customer records that you couldn’t get back unless you paid a ransom. This kind of attack is called Ransomware and it’s becoming increasingly common.

Ransomware keeps growing in sophistication and adversaries target a wide variety of organizations in many different industries. Your organization could be exposed to Ransomware when employees access compromised websites, open malicious documents or click the wrong link in an email. In most cases, once the data is encrypted, your only method of getting it back is paying the criminals. This can quickly become expensive based on your organization’s level of compromise.

Watch this special webcast focused on Ransomware. Leading the talk will be Nick Biasini from Cisco’s threat research team Talos and Joseph Muniz from the security architecture team.

Why Cisco? Cisco’s threat research team sees thousands of ransomware attacks each day, and offers resources to help organizations protect themselves. Talos recently created a tool to decrypt a specific Ransomware compromise for public use, free of charge.

We will focus on research and best practices to reduce the risk of exposur verses specific products.
Topics include:  
  • An overview of Ransomware
  • Trends for common Ransomware and how attacks have evolved
  • Security considerations to reduce risk of compromise

Presenters:

BioPicture.png

Joey Muniz
Cisco Security Architect - Americas


BioPicture.png

Nick Biasini
Talos Outreach




Apologies for the delay...


Sorry for the inconvenience, we are in the process of archiving this webinar. Please check back again soon and visit our home page


¿Cómo prevenir un alto impacto al negocio ante un ataque como WannaCry?
Mantenga protegida su organización de manera proactiva y prevéngase ante ataques de esta magnitud.

En los últimos días escuchamos a través de redes sociales, medios de comunicación y conversaciones del que pudiera ser uno de los peores y más extendidos ataques de malware jamás vistos en el mundo: El ataque de Ransomware "WannaCry".

¿Le queda claro exactamente cómo fue lanzado este ataque y por qué se propagó tan rápido?

¿Comprende bien las vulnerabilidades que se detonaron?

¿Está usted 100% seguro de que puede usted estar protegido si es lanzado nuevamente y vuelve a atacar?

Defina proactivamente una estrategia de seguridad para su negocio y evite que un ataque como el de WannaCry impacte a su negocio generando grandes pérdidas.

Mediante este webinar usted podrá:

  • Definir qué puede hacer su organización para protegerse de ataques futuros.
  • Identificar mejores prácticas para mantener protegida a su organización.
  • Participar en la sesión de preguntas y respuestas en vivo con los expertos. 

Presentador:

BioPicture.png

Ricardo Marques




Focando no Ransomware: Como manter-se protegido.

Ransomware traz uma perspectiva financeira cada vez mais interessante para os criminosos digitais. Esta ameaça está se espalhando como um incêndio. Junte-se a nós para um webinar gratuito onde iremos explorar o que é Ransomware, como ele se infiltra em um sistema e quais os passos que você deve tomar para proteger a sua organização.

Na abertura ao vivo do evento, Ricardo Marques irá compartilhar a sua perspectiva em relação ao Ransomware. O executivo falará como esta ameaça evoluiu, dar exemplos de ataques notáveis e falar sobre as novas tendências de segurança.

Você terá a oportunidade de conhecer a nova solução de defesa da Cisco para combater o Ransomware em ação. Ricardo Marques orientará sobre o seu funcionamento e a proteção adequada para a sua organização.

Neste webinar gratuito, você irá:

  • Aprender como os adversários estão evoluindo e as suas estratégias de ataque de Ransomware
  • Ver como a Defesa da Cisco de Ransomware oferece visibilidade a sua organização e capacidade de resposta
  • Identificar as melhores práticas para proteger a sua empresa deste tipo de ataque

Participe da nossa sessão de Perguntas & Respostas ao vivo para sanar suas dúvidas específicas e necessidades de sua organização.

Palestrante:


BioPicture.png

Ricardo Marques
AMP Specialist for LATAM
Cisco




Enfoque en ransomware: Cómo mantenerse protegido.

Ransomware es una perspectiva financiera cada vez mayor para los criminales. Se está extendiendo como el fuego. Únase a nosotros para un seminario web gratuito en el que vamos a explorar lo que es el ransomware, cómo se infiltra en un sistema, y más importantemente —¿qué medidas tiene que tomar para proteger su organización.

La apertura del evento en vivo, Omar Alcala compartirá su perspectiva sobre ransomware. Él va a hablar de cómo ha evolucionado el ransomware, dará ejemplos de ataques notables, y hablará de nuevas tendencias de seguridad.

Continuación obtendrá la oportunidad de ver nuestra nueva solución de defensa de ransomware en acción. Omar Alcala le guiará a través de cómo funciona y qué protección puede ofrecerle a su organización.

En este seminario web gratuito, usted:

  • Aprenderá cómo los adversarios han evolucionado y han reforzado sus estrategias de ataques de ransomware
  • Vea cómo la defensa ransomware de Cisco le da a su organización visibilidad y capacidad de respuesta
  • Identifique las mejores prácticas que su empresa puede utilizar para protegerse de los ataques

Únase a nuestra sesión de preguntas y respuestas en vivo para obtener respuestas a sus preguntas específicas y las necesidades de la organización.

Presentadores:

Omar Alcala

IoT: Internet of Terror. Cuando la tecnología es usada en contra de nosotros.

El Internet de las cosas (IoT) es una de las transformaciones más importantes en la tecnología. En la dinámica actual de mercado crea excelentes oportunidades de negocio; sin embargo, al mismo tiempo amplia la plataforma de ataque para los delincuentes cibernéticos.

Conozca cómo puede integrar una arquitectura de seguridad que lo acompañe en esta transformación y evite dejar la puerta abierta a los atacantes.

Participe de este webinar durante el cual usted podrá:

  • Definir una estrategia de protección para el IoT.
  • Integrar una arquitectura de seguridad simple, abierta y efectiva.
  • Minimizar el riesgo de manera ágil

Presentadores:

 

Omar Alcala Ruiz
Cisco

 

 

Combata as Ameaças de Segurança na Nuvem com CloudLock CASB (Cloud Access Security Broker)

Gartner elegeu o CASB como a tecnologia número 1 em segurança da informação em 2016. Por que colocar a segurança da nuvem em primeiro lugar? Porque hoje as ameaças cibernéticas mais avançadas tem como alvo os indivíduos, os aplicativos que eles utilizam e os dados que eles acessam. Manter a sua empresa sob controle significa entender, abraçar e proteger a nuvem.

Nesta sessão você ira:

  • Aprender sobre os principais riscos de segurança cibernética que estão a sua volta
  • Identificar as principais ameaças cibernéticas do seu ambiente de nuvem
Manter-se confiante para responder a pergunta do CISO: Como a minha empresa fica segura na nuvem?

Presentadores:

BioPicture.png

Ricardo Marques
Gerente de Soluciones Avanzadas
Cisco




¿Cuál es mi estrategia de seguridad, detectar o remediar?

La adopción de una nube segura en un ambiente tan cambiante puede ayudarle a manejar la seguridad de su empresa, negocios y usuarios.

Acompañenos de este webinar durante el cual usted podrá:

  • Bloquear las amenazas antes de que sucedan.
  • Proteger a los usuarios, datos y aplicaciones en cualquier lugar a donde vayan.
  • Conocer como contar con una nube segura que evite impacto en la productividad.

Presentadores:

BioPicture.png

Antonio Ramirez Macedo
Gerente de Soluciones Avanzadas
Cisco




¿Seguridad en la Nube? Enfrente las amenazas con CloudLock CASB de Cisco.

Gartner nombró a CASB la tecnología de seguridad de la información # 1 en 2016.  ¿Por qué es la número uno?. Actualmente las amenazas cibernéticas más avanzadas se dirigen a los datos que las personas proporcionan para acceder a los diferentes tipos aplicaciones. Mantener a su organización bajo control significa entender, abrazar y asegurar la nube.

Si usted es nuevo o está familiarizado con CloudLock, únase a esta sesión para aprender cómo Cloud Access Security Broker (CASB) puede ayudar a  proteger los datos y usuarios en la nube.

Durante estas sesiones usted podrá:

  • Conocer los principales riesgos de seguridad cibernética que pueden afectar su organización.
  • Identifique las principales amenazas cibernéticas en el entorno dentro de la nube.
  • Prepárese para contestar con confianza a su CISO: "¿Cómo puede mi compañía permanecer segura en la nube?"

Presentadores:

BioPicture.png

Jaime Villegas Nunez
Cisco




Combatiendo las Amenazas Internas –Protegiendo su Agencia de Adentro hacia Afuera

Cuando Edward Snowden filtró información clasificada a los medios principales, trajo consigo los peligros representados por las amenazas internas a la consciencia pública y no sin un propósito. Las agencias de hoy en día se están ahogando en el temor que rodea a los ataques cibernéticos sofisticados, pero tal vez, el tipo de ataque más preocupante es la amenaza interna. De acuerdo a Forrester, el abuso por los maliciosos internos llega hasta el 25% de las brechas de información.  

Aprenda acerca de las mejores prácticas y tecnologías que debería estar implementando ahora para evitar convertirse en la próxima víctima de un ataque de alto perfil.  

  • Manténgase al tanto de los diferentes tipos de ataques de amenazas internas, incluyendo sus motivos y métodos de ataque.
  • Entienda porque las herramientas de seguridad convencionales como firewalls, antivirus y IDS/IPS no cuentan con el poder para enfrentar la amenaza interna
  • Entérese de las diferentes tecnologías, las políticas y las mejores prácticas que deben colocarse en sitio para ayudarle a detectar y frustrar las amenazas internas
  • Descubra como los network logs, particularmente NetFlow, pueden utilizarse para monitorear rentablemente las conductas sospechosas internas que pudieran indicar un ataque
  • Conozca acerca de los métodos de ataque emergente tales como muleware que podría agravar los ataques internos en los próximos años

Presentadores:

Gerardo Carrion


 

Combatendo as ameaças internas – Proteja a sua empresa de dentro para fora.

Quando Edward Snowden vazou informações sigilosas para as mídias de massa, os perigos produzidos pelas ameaças internas vieram à tona do conhecimento público, e com razão. Atualmente, as agências estão preocupadas com os sofisticados cyber-ataques, porém também com o pior tipo de ameaça que existe – a ameaça interna. De acordo com a Forrester, abuso por parte de membros internos da empresa representam 25% das violações de dados. Saiba mais sobre as melhores práticas e tecnologias que devem ser implementadas para evitar que você seja a próxima vítima de um ataque. 

  • Conheça os diferentes tipos de ameaças internas, incluindo seus motivos e métodos de ataque
  • Entenda por que as ferramentas convencionais de segurança, como o firewalls, antivirus e IDS/IPS são poderosas no combate às ameaças internas
  • Obtenha conhecimento nas várias tecnologias, políticas e melhores práticas que devem ser coladas em prática para ajudar na detecção e impedir ameaças internas
  • Descubra como os logs de rede, particularmente o NetFlow, podem ser usados para monitorar de forma econômica os comportamentos internos suspeitos que poderiam indicar um ataque
  • Conheça os métodos de ataque emergentes, como o malware, que podem aumentar ainda mais as ameaças internas nos próximos anos

Apresentador:

BioPicture.png

Ricardo Marques
Gerente de Soluções de Segurança Avançadas
Cisco




Internet: Amigo ou Inimigo? As ameaças que chegam pela Rede e por E-mail

Com a quantidade crescente de informações disponíveis por e-mail e na Internet, o potencial de vazamento e comprometimento de dados nunca foi tão grande.
O ultimo relatório anual de segurança da Cisco aponta que o E-mail é o maior vetor de ameças para ataques digitais. Esses ataques têm o objetivo de distribuir malware que se infiltra nos data centers onde dados comerciais confidenciais de alto valor são armazenados. As defesas tradicionais, incluindo firewalls e soluções de antivírus de endpoint, não conseguem bloquear esses tipos de ataques.

Para enfrentar esses desafios, as organizações de hoje precisam de uma solução que forneça segurança em camadas para e-mail e web. Veja durante esse webinar, como as soluções de segurança de conteúdo da Cisco podem ajudá-lo a:

  • Manter o Foco na ameaça – Com proteção de e-mail e web de alta disponibilidade contra o ataques cada vez mais sofisticados e dinâmicos.
  • Garantir Alto desempenho – Por apresentar uma defesa em camadas, em um único dispositivo. Ele rapidamente bloqueia novas ameaças enviadas por e-mail e web.
  • Obter Inovação contínua – A segurança de e-mail e web da Cisco oferece as opções de implementação mais completas do setor. Com redução de custos e gerenciamento mais simples, integração mais rápida e sem complexidade. 

Apresentador:

BioPicture.png

Ricardo Marques
Gerente de Soluções de Segurança Avançadas
Cisco




Please complete the form below


S'il vous plaît remplir le formulaire

 

Por favor complete el siguiente formulario

Por favor, preencha o formulário abaixo