Registration

Inscription

Inscripción

Registro

Exploit Kits – is this the end or just the beginning?
January 12, 2017 at 1pm ET/10am PT

Exploit kits are used by hackers to compromise users through software vulnerabilities and deliver malicious payloads like Ransomware and Banking Trojans. They are responsible for tens of millions of dollars in losses, and a countless number of victims – and are very profitable for the hackers who use them.  These EKs are ready to go off the shelf and often require little-to-no knowledge of the underlying code or the vulnerabilities they exploit. We've seen several exploit kits disappear in 2016, including Angler and Nuclear, but that doesn’t mean we’ve seen the last of these malicious tools. 

Join us for our live webinar to learn:

  • What exploit kits are and why they are a major threat
  • What changes occurred in 2016
  • What’s the future of exploit kits in 2017 and beyond?

Join our live Q&A for answers to your specific questions and organizational needs.

Presenter:

 

BioPicture.png

Nick Biasini
Talos Outreach

 

Combat Cybercrime with an Incident Response Plan
January 24, 2017 at 1pm ET/10am PT

When it comes to a robust security approach, three key pillars of your organization must be in alignment: people, processes and technology. Security expert Sean Mason has seen organizations stumble when it comes to streamlining people and processes. In this free webinar, he’ll explain why incident response planning is so critical to defending your organization and how you can begin shaping your plan today.

Craig Williams, Sr. Technical Leader at Talos, will also briefly share how crucial threat intelligence is to incident response planning, and how to apply it to your environment.

In this free webinar, you will:

  • Get a deep dive into what it means to have a strong emergency incident response
  • Learn how proactive threat hunting can better protect your organization from future attacks.
  • Understand how your organization can take concrete steps towards creating its own incidence response plan

Join our live Q&A for answers to your specific questions and organizational needs.

Presenters:

 

Sean Mason
Director, Threat Management

Craig Williams.jpgCraig Williams 
Sr. Technical Leader and Global Outreach Manager
Talos

 

A Cybersecurity Buyer's Guide for Industrial Control Networks
January 19, 2017 at 1pm ET/10am PT

Cybersecurity for industrial control networks is NOT the same as IT cybersecurity. And now that some high-profile industrial cyber attacks have been in the news, many traditional IT vendors are pursuing industrial customers without understanding the nature of ICS and it can be hard for industrial organizations to separate fact from marketing fiction.

Join Cisco for a panel discussion on what types of questions industrial customer should ask their vendors, what answers they should expect, and why they’re important.

Register today to secure your spot.

Presenter:

 

BioPicture.png

Marc Blackmer
 

 

 

The Case for Next-Generation Intrusion Prevention
On-Demand

Many think with the adoption of a next-generation firewall (NGFW), that a stand-alone intrusion prevention system (IPS) is no longer required. That's simply not true.  IPS has evolved — next-generation IPS (NGIPS) can help protect digital business in new and unique ways.  This session explores use cases where NGIPS can provide visibility, threat detection and response, and malware discovery in areas of your network that remain off limits to firewall inspection and controls. Performance factors and organizational influences are discussed. You will learn how to use NGIPS to virtually patch vulnerabilities before more permanent fixes can be deployed and how to speed time to detection and quickly remediate advanced threats.

During this on-demand webinar:

  • Learn how IPS has evolved and what NGIPS can do differently
  • Understand deployment cases where NGIPS is less disruptive and can provide deeper visibility and better protections than NGFW or other solutions
  • See what's on the horizon for this important defense technology

Presenters:

Dave Staurt

Joe O’Laughlin

 

Fall Security Threat Briefing
On-Demand

New threats emerge on a daily basis—and one team is tasked with tracking and stopping them. The Talos threat intelligence team has more than 270 full time threat researchers who discover new vulnerabilities, threats and attack strategies. Watch this complimentary webinar to learn what they considered the most important security developments of the past season. 

In this on-demand webinar, you will:

  • Get a deep dive into the hottest topics in threat intelligence, including what experts have identified as the most prevalent and powerful threats
  • Learn how adversaries have changed their attack strategies
  • Identify best practices your organization can use to protect itself from attacks

Presenter:

Warren Mercer, Talos Technical Leader

 

FBI CJIS Security Policy: The Road to Compliance and Beyond
On-Demand

Every law enforcement agency in the nation uses criminal justice information to reduce and stop crime. This data is extremely sensitive, so the FBI Criminal Justice Information Services (CJIS) Security Policy is a compliance mandate that applies to everyone who handles it. Audits occur every three years, and non-compliance has serious ramifications – including potential loss of access to FBI CJIS systems.

If you’re new to FBI CJIS Security Policy, you might be wondering:

  • What is the Security Policy's approach and the key policy areas?
  • What roles and responsibilities are involved?
  • What tools and resources are available to help agencies become compliant?

Presenters:

Steve Caimi, Public Sector Security Expert, Cisco

Ryan Reynolds, Senior Public Safety Advisor, Cisco  

The Rising Tide of Spam
On-Demand


Spam is more than an inconvenience. It’s a powerful threat vector for criminal enterprises. Learn what new tactics these adversaries are using to compromise your system, and why spam bots are increasing on a global scale.  

Talos Technical Leader Jaeson Schultz, will explain the evolution of spam attacks and why security professionals everywhere need to take notice of these persistent attack strategies. 

In this free webinar, you will:
•    Understand how spam campaigns have increased in popularity and complexity
•    See notable examples of spam and how it compromises a system
•    Identify best practices your organization can use to protect itself from these attacks

Presenter:

Talos Technical Leader Jaeson Schultz

The Ransomware Threat: New Tactics and How to Fight Back
On-Demand

The ransomware struggle is real. As businesses struggle to secure and protect their data, cybercriminals continue to evolve and refine their tactics to avoid detection.

The rise of ransomware has become one of the most widespread and financially damaging threats facing businesses today. But, there are steps you can take to reduce the risk of ransomware and protect your business.

Join this webinar with experts Eric Hulse and Josh Reynolds of Cisco Research and Efficacy Team (RET) as they discuss the ransomware threat and how to fight back. Specifically, this webinar will cover:

  • How ransomware has evolved and the attacker tactics that are used today
  • Current ransomware families, who they target and how they work
  • Predictions on what ransomware might do next
  • How to proactively prevent ransomware with threat intelligence and a multi-layer defense

 

To successfully prevent ransomware attacks you need to understand how attacks happen and what you can do to protect your business. 

Presenters:

Eric Hulse, Sr. Reverse Engineer, Research & Efficacy Team 
Josh Reynolds, Software Engineer, Research & Efficacy Team

Cisco Talos on DNS Exfiltration
On-Demand

Exfiltrating data from locked down networks is hard for cyber criminals. But every network has its weak points. Recently attackers have started exploiting Domain Name System (DNS) queries as a means to steal information. The time has come for organizations to consider their DNS traffic as a potentially malicious channel.  

Join us for a free webinar from the threat researchers at Talos on DNS exfiltration and why security professionals everywhere should be taking a closer look at DNS traffic.

In this webinar, you will:

  • Learn techniques for exfiltrating data and its weaknesses
  • Get an deeper understanding of multigrain point-of-sale (POS) malware DNS requests
  • Understand how to find anomalies in DNS logs—and what they might mean

Presenter:

 

BioPicture.png

Martin Lee
Talos Threat Researcher

 

 

Plugging the Email Security Gap
Learn the latest attacker techniques and campaigns

On-Demand

With more than 100 billion corporate emails exchanged each day, email has become a prime target for cyber attacks. Cyber criminals are hard at work trying to steal your corporate, personal and financial data, and breach your network. Join this webinar to learn about their top methods of attack and how to prevent them.

Presenter:

BioPicture.png

Scott Bower
Technical Marketing Engineering and Business Development Manager

Cisco

With over a decade of hands-on experience with Email and Web Security, Scott Bower has consulted with global customers, product management, engineering, marketing and sales to implement and develop industry-leading offerings. He is a seasoned professional and experienced speaker who is comfortable using non-techno speak to show customers how technology can make their companies more secure.

 

 

 

Know Your Network: Pre- and Post-Access Control
On-Demand

Cyber-attacks can come from anywhere and typically target where you are most vulnerable. The best method to defend against attackers exploiting your weaknesses is knowing your network. This means controlling who and what can access your network as well as continuously monitoring anything approved for malicious behavior. There are many methods to accomplish this. However, best practice is automating the process to ensure all devices are treated with the same corporate policy, regardless if they are using VPN, wireless, or LAN access methods.

Topics include:

  • Access control and identity management
  • Continuous monitoring of all network traffic
  • Non-signature-based anomaly, malware, and insider threat detection
  • Enabling existing infrastructure with security capabilities
  • Knowing the top threats and alerts to address
  • Automated remediation of threats and vulnerable systems
  • Self-learning and tuning for breach detection

Presenter:

BioPicture.png

Joey Muniz
Cisco Security Architect - Americas

Talos Security Threat Briefing
On-Demand

Ransomware has taken the security world by storm. But is it the top threat? Watch the latest security threat briefing from the experts at Talos and learn about what they consider to be the most notable threats of the past summer.

Talos is committed to giving quarterly updates about its most important discoveries. Don’t miss this opportunity to hear directly from the experts on everything from exploit kits to complex malware. You’ll get a deep dive into how these threats work, what adversaries are after, and how you can secure them.

In this on-demand webinar, you will:

  • Get a deep dive into the hottest topics in threat intelligence, including what experts have identified as the most prevalent and powerful threats
  • Learn how adversaries have changed their attack strategies
  • Identify best practices your organization can use to protect itself from attacks

Spotlight on Ransomware: How to Stay Protected.
On-Demand

Ransomware is an ever growing financial prospect for criminals. It's spreading like wildfire. Join us for a complimentary webinar in which we’ll explore what ransomware is, how it infiltrates a system, and most important—what steps you should take to protect your organization.

 

Opening the live event, Warren Mercer will share his perspective on ransomware as a Talos threat researcher. He’ll speak to how ransomware has evolved, give examples of notable attacks, and talk about new security trends.

You'll then get a chance to see our new Ransomware Defense solution in action. Bart McGlothin will walk you through how it works and what protection it can offer your organization.

 

In this on-demand webinar, you will:

  • Learn how adversaries have evolved and strengthened their ransomware attack strategies
  • See how Cisco Ransomware Defense gives your organization visibility and responsiveness 
  • Identify best practices your organization can use to protect itself from attacks

 

Cisco Talos on Ransomware: Data Held Hostage
On-Demand

Ransomware is spreading like wildfire. Adversaries know that a successful attack seizes our most important data, from financial records to family photos. Those hit by an attack often feel backed into a corner. What can they do but pay up?

Watch this free webinar from the threat researchers at Talos on how to stop ransomware attacks.

Nobody knows ransomware like Talos. They've cracked CryptoWall 4, uncovering everything from how it communicates across the network to what regions it targets. You’ll get an inside look at how it works and why ransomware is becoming the fastest-growing threat in cybersecurity.

In this on-demand webinar, you will:

  • Get an insider's perspective on notable ransomware attacks, including how they target users
  • Learn how ransomware has evolved
  • Identify best practices your organization can use to protect itself from these types of attacks
 

Cisco Talos on Exploit Kits: Hunting the Hunters
On-Demand

Flash. Silverlight. Internet Explorer. Exploit kits capitalize on vulnerabilities everywhere. And the problem is only growing. Join us for a free webinar from the threat researchers at Talos on these malicious kits and how to stop them. 

 

Talos has done more than just monitor exploit kits as they happen. They disrupted a $34 million enterprise by unraveling the process behind the Angler exploit kit. Hear the incredible story of how Talos traced Angler back to the service providers and what happened next. 

 

Watch the on-demand webcast and:

  • Learn more about the Angler and Rig exploit kits and how Talos succeeded in disarming them
  • Learn how exploit kits adapt, change and evolve 
  • Identify best practices your organization can use to protect itself from these types of attacks
Presenter:

 

BioPicture.png

Nick Biasini
Talos Outreach

 

Cyber Attack Preparedness - Can We Ever Be Ready?
On-Demand

Today’s threat landscape has become far more complicated and dynamic. Trends such as mobility, the cloud, and the Internet of Things (IoT) have expanded the attack surface while cybercriminals continue to become increasingly sophisticated, employing tools that are more difficult to detect and defend against than ever before.

With so much to defend against, how can we ever truly feel prepared? 

Join our Cisco security experts Steve Caimi and Chris Smithee for this live 60-minute webcast to discuss the state of cybersecurity and best practices as organization move from prevention to detection and realize the need for security everywhere. We will also cover the importance of retrospective security for protection before, during and after an attack using tools such as Cisco Stealthwatch and Cisco Advanced Malware Protection (AMP) 

Tune in to learn how your organization can become more prepared for the next breach with the right frameworks and security tools. Steve and Chris will also answer your questions in real time during the webcast.

Agenda:

  • The state of cybersecurity 
  • A review of best practices
  • Implementing a retrospective security solution using:

               -  Cisco Advanced Malware Protection
               -  Cisco StealthWatch

  • Q&A
 

Presenters:

 

 
Steve Caimi
Industry Solutions Specialist
US Public Sector
  Chris Smithee
Program Manager
Engineering

Stop Threats Faster with Rapid Threat Containment
On-Demand

The Cisco Rapid Threat Containment solution allows customers to understand threats faster and take immediate action to stop them in their tracks. This open solution allows customers to share threat intelligence from over 40 Cisco technology partners, including Cisco Firepower and Stealthwatch, create a single source-of-truth and expose threats without lengthy investigations.  
Threats can be quickly contained from the same source-of-truth product either automatically or at the command of an administrator.   
 
Cisco Product Marketing Manager Andrew Peters will explain this solution, how it uses the Cisco network as a threat enforcer, and how it is leveraging vulnerability and threat rating structures such as STIX and CVSS to determine user access privileges.

Presenter:

BioPicture.png

Andrew Peters
Sr. Product Marketing Manager

Cisco

 

 

 

What’s New with Cisco Policy & Access
On-Demand

Enterprise mobility. Workplace digitization. The Internet of Things. All of these are fundamentally changing the way we live and work, and the enterprise network no longer sits within four secure walls. With the increasing complexity of the expanded network, the potential impact of identifying, containing, and re-mediating network security threats grows exponentially. Experience a different security approach to protect against these threats while achieving business growth, efficiency, and lowered expenses.
 
Join us to learn how the Cisco Policy & Access portfolio – Identity Services Engine (ISE), TrustSec, and AnyConnect – enables to you to effectively manage and defend your network by providing best-in-class network visibility, policy management and enforcement, and highly secure remote access anywhere, at any time.
 
 

 

Presenters:

 

 
Dan Stotts
Product Marketing Manager
Cisco
  Casey Ulaky
Product Marketing Manager
Cisco

No Time for Cyber Excuses: How SLGs are Building Secure Solutions through Innovation
On-Demand

State and local governments (SLGs), holders of critical data, infrastructure, and services, are under enormous pressure to address today’s cyber threat landscape. In fact, security and risk management are the No. 1 strategic IT priority in 2016 for state and local agencies, according to the National Association of State Chief Information Officers.

As discussed in a previous webinar, “Diminishing the Cyber Threat: How State and Local Governments Can Get Ahead,” many SLGs have not used available programs or public-private partnerships to make changes to their cybersecurity programs. In the next installment of our webinar series, a panel of government leaders will offer insight into the strategies and innovations that drive real progress in managing cyber risks.

Watch this on-demand webinar to hear a panel of innovators and government leaders discuss:
  • Current challenges and trends in SLG cybersecurity environment
  • Lessons learned and success stories: best practices for implementing a strong cybersecurity strategy despite constrained resources
  • How SLG C-suite leaders can leverage people, process, and technology to improve their cybersecurity strategy
  • Developing a city-wide strategy for cyber:How the growth of smart cities will play a role in the evolution of SLG technology and cybersecurity practices


Protection with Web and Email Security - from a User's Perspective
On-Demand

Cisco Web and Email Security protect against the top two attack vectors. A typical pattern for attackers is to compromise a victim through the email vector and then use the web vector for further exfiltration and compromise through command and control, as well as data exfiltration.
  • See what this type of attack looks like from both a user as well as an administrator’s perspective within the Web and Email Security product interfaces.
  • Learn what a blended attack looks like from the inside and out as well as what to look for when scoping and containing threats.

Cisco Web and Email Security provide more than just your regular proxy or email solution. They combine Advanced Malware Protection, Cognitive Threat Analytics, and the global threat intelligence of Talos to actively identify breaches, malicious files, and otherwise lower your total time to remediation.

Presenter:

BioPicture.png

Scott Bower
Technical Marketing Engineering and Business Development Manager

Cisco

With over a decade of hands-on experience with Email and Web Security, Scott Bower has consulted with global customers, product management, engineering, marketing and sales to implement and develop industry-leading offerings. He is a seasoned professional and experienced speaker who is comfortable using non-techno speak to show customers how technology can make their companies more secure.

 

 

 

Talos Quarterly Threat Briefing
On-Demand

Cyberthreats will never disappear. Adversaries are only getting smarter and more adept at evading security measures. The security experts at Talos invite you to their quarterly threat briefing, where they will share their insights into recent attacks that exemplify the latest trends within the security industry.
 
By discussing these new and emerging threats, the Talos team will help you understand new protection strategies and build better defenses.
 
In this free webinar, you will:
  • Discover how attackers target specific organizations and users
  • Learn about changes in attack behavior, including innovation in the shadow economy
  • Identify best practices your organization can use to protect itself from attacks
  • Learn about the most recent and notable threat innovations for this quarter

Presenter:

BioPicture.png

Craig Williams
Sr. Technical Leader

Craig Williams has always had a passion for learning how things operate – and circumvent security measures. His deep interest in security technology led to a career at Cisco, which began with research into vulnerabilities, threats, and network detection techniques. His research over the past decade has included running the Cisco malware lab and trying to outwit the very security products he has helped Cisco to design. New areas of network protection, including the utilization of new evasion techniques and threats, have emerged directly from Mr. Williams’ work. Today, as a Sr. Technical Leader and Manager of the Talos Outreach team, Mr. Williams is focused on building next-generation security products covering web and email security, threat defense systems, and security management systems. Through his work and involvement with Talos, he looks to give back to the Internet and security community by helping to bring attention to the breadth and depth of Cisco’s threat research.

 

 

 

Breaking Down The Ransomware Attack
On-Demand

Are you prepared if you lose all your critical data? It could be any digital asset, from personal family pictures to sensitive customer records that you couldn’t get back unless you paid a ransom. This kind of attack is called Ransomware and it’s becoming increasingly common.
 
Ransomware keeps growing in sophistication and adversaries target a wide variety of organizations in many different industries. Your organization could be exposed to Ransomware when employees access compromised websites, open malicious documents or click the wrong link in an email. In most cases, once the data is encrypted, your only method of getting it back is paying the criminals. This can quickly become expensive based on your organization’s level of compromise.
 
Watch this special webcast focused on Ransomware. Leading the talk will be Nick Biasini from Cisco’s threat research team Talos and Joseph Muniz from the security architecture team.
 
Why Cisco? Cisco’s threat research team sees thousands of ransomware attacks each day, and offers resources to help organizations protect themselves. Talos recently created a tool to decrypt a specific Ransomware compromise for public use, free of charge.
 
We will focus on research and best practices to reduce the risk of exposur verses specific products.
Topics include:  
  • An overview of Ransomware
  • Trends for common Ransomware and how attacks have evolved
  • Security considerations to reduce risk of compromise

Presenters:

BioPicture.png

Joey Muniz
Cisco Security Architect - Americas

 

BioPicture.png

Nick Biasini
Talos Outreach

 

 

 

LogRhythm and Cisco AMP Threat Grid for Integrated Enterprise Security
On-Demand

 
LogRhythm and Cisco AMP Threat Grid have partnered to deliver enterprise-wide threat detection and response by integrating Cisco’s threat intelligence into LogRhythm’s Security Intelligence platform and automating the discovery of indicators of compromise relative to malware that has penetrated the network.
LogRhythm’s platform continually consumes and analyzes dynamic malware and threat intelligence data provided by Cisco AMP Threat Grid and combines this with other machine data collected from across the environment to accurately identify and prioritize high risk events. LogRhythm has developed a SmartResponse™ plugin that allows analysts to automatically submit potential indicators of compromise detected within the Security Intelligence Platform to Cisco AMP Threat Grid for analysis and threat scoring. Results from the Cisco AMP Threat Grid are quickly and seamlessly returned to the LogRhythm console to facilitate immediate protective action.
 
The integration allows customers to:
  • Streamline processes that were once significantly manual and turn them into an automated workflow to reduce detection and response times
  • Corroborate known threats with changes to the behavior of endpoints, users and networks to quickly alert on and take immediate action on high risk events
  • Move from simply logging and alerting to taking dynamic active defense actions
This presentation will include experts from both Cisco and LogRhythm, who will discuss the integration and it’s benefits for our customers. We hope you’ll join us!

 

Presenters:

BioPicture.png

Paul Davis
Director of Advanced Threats Security Solution Architects
Cisco

Paul Davis, Cisco’s director of advanced threats security solution architects, is an IT security executive responsible for advanced threat defense thought leadership, AMP threat grid service delivery and customer support.

BioPicture.png

Bruce Deakyne
Technical Product Manager
LogRhythm

As a technical product manager at LogRhythm, Bruce focuses on innovating LogRhythm’s Threat Intelligence platform. He works closely with LogRhythm’s threat data provider partners—including Cisco AMP Threat Grid—to ensure that customers can realize joint value through deep integration of SIEM and threat intelligence.

 

Cisco Email Security:
Deliver secure email to anyone, anywhere, on any device.

On-Demand

 
You and your employees click the Send button hundreds of times a day. With the potential for revenue and intellectual property losses, a damaged reputation, compliance violations, and the liability associated with breaches, email must be carefully protected more than ever. Encryption is the answer and although encryption is a complex technology, the user experience must be easy for it to be effectively used.
 
Join us to learn how ZixGateway with Cisco Technology enables you to:
  • Send highly secure email to anyone, anywhere, and often transparently
  • Make delivery transparent for senders and receiver
  • Deploy easily and quickly with no training required for end users
  • Provide on-premises, transparent integration with Cisco Email Security Appliance (ESA) for content inspection
  • Utilize Best Method of Delivery for sending encrypted messages, including PostX Envelope
This presentation will feature ZixGateway with Cisco Technology. The presenters will cover features, benefits, integration with Cisco ESA, promotions and pricing models.

 

Presenters:

BioPicture.png

Khelan Bhatt
Product Manager
Cisco

Khelan Bhatt, Product Manager, builds and launches Cisco’s next generation of Security products. Khelan is focused on bringing the capabilities of Cisco’s security solutions to customers across public clouds such as AWS and Azure and enhancing Cisco Intercloud’s security offerings. Khelan has also worked to accelerate product development and go-to-market by leveraging Cisco’s vibrant security partner ecosystem and has spearheaded a technical championship program with channel partners.

 

Solving the Attack Puzzle:
Using Automated Malware Analysis and Threat Intelligence to Drive Incident Response

On-Demand

 
No company is immune from cyber attacks. It’s no longer a question of if your company will be attacked, but rather a question of when this will occur and how long it will take you to respond and remediate.
 
During this webinar you will:
  • Understand the challenges incident response teams face when dealing with a breach
  • Learn how to optimize your team’s ability to defend against today’s sophisticated malware attacks
  • See how to detect and investigate threats faster with Cisco AMP Threat Grid
  • Hear how a Cisco customer quickly remediated after an attack
We hope you can join us!

 

Presenters:

BioPicture.png

Sean Mason
Director, Threat Management
Cisco

 

BioPicture.png

Jason Keller
Consultant, Incident Response Services
Cisco

 

 

Customer Briefing:
What’s New in Cisco Advanced Malware Protection

On-Demand

 
Join us to learn about enhancements, innovations, and integrations for the Cisco Advanced Malware Protection (AMP) portfolio in our upcoming quarterly briefing.
 
During this webinar you will:
  • Hear from our Product Management team about recently delivered features from the AMP roadmap
  • Learn how to use the whitelist and blacklist features in AMP during malware outbreaks and investigations
  • Learn about the following new features in Cisco AMP: API & Local Malware Analysis
  • Provide feedback to the AMP leadership team on current and new roadmap features
  • See the value of AMP for Endpoints and Threat Grid integration
Join us.

 

Presenters:

BioPicture.png

Eric Howard
Manager Advanced Threat Solutions
Cisco

 

BioPicture.png

Brian McMahon
Technical Marketing Engineer
Cisco

 

BioPicture.png

Farzad Bakhtiar
Product Manager, Advanced Malware Protection
Cisco

 

 

Apologies for the delay...


Sorry for the inconvenience, we are in the process of archiving this webinar. Please check back again soon and visit our home page


Federal Cybersecurity Best Practices:
Learn and Apply the NIST Cybersecurity Framework

On-Demand

 
Today’s dynamic cyber threat landscape raises the stakes for defenders to ensure the confidentiality, availability, and integrity of sensitive information and mission-critical data. Sophisticated attacks and massive data breaches happen almost daily, and organizations are struggling to keep up.
How can Federal agencies approach security more successfully? As traditional defenses that rely exclusively on detecting and blocking for protection become more and more inadequate, it is time to take a threat-centric approach to security. The National Institute of Standards and Technology (NIST) Cybersecurity Framework is a set of best practices that illustrate how to address all stages of the attack continuum – before, during, and after an attack. It presents a new security model that appropriately leverages people, processes, and technology for effective and adaptable defense.
 
Join Steve Caimi and Michael Reed as they discuss how the Cisco security portfolio, including the newly acquired StealthWatch® System from Lancope, addresses the NIST Cybersecurity Framework.
 
This session will cover:
  • An overview of the NIST Cybersecurity Framework
  • Using the framework to evaluate your current security architecture
  • How Cisco’s security solutions can help you achieve the NIST cybersecurity best practices in your agency
Join us.

 

Presenters:

BioPicture.png

Steve Caimi
Product Marketing Manager
Cisco

Steve Caimi is Cisco’s Industry Solutions Specialist, focused on the needs of the US Public Sector. His career spans nearly twenty years of diverse experience in information security, computer networking, and telecommunications. Today he drives broader market awareness and accelerates demand for Cisco’s industry-leading security solutions through thought leadership and clear market messaging.

BioPicture.png

Michael Reed
Federal Technical Director
Lancope, Now a Cisco Company

Michael Reed is the Federal Technical Director for Lancope, now a part of Cisco’s security portfolio. With over 30 years of information security and network experience, Reed leads the Federal Lancope engineering team to accelerate agency network visibility and works with customers to shape product development for the Federal marketplace.

 

Beyond NGFW:
A Threat-centric approach to security

On-Demand

 
The Cisco Firepower™ Next-Generation Firewall (NGFW) is the industry’s first fully integrated, threat-focused next-gen firewall with unified management. It includes Application Visibility and Control (AVC), optional Firepower next-gen IPS (NGIPS), Cisco® Advanced Malware Protection (AMP), and URL Filtering.
NGFW provides application-layer visibility, but really doesn't address all threats. Looking beyond NGFW, organizations need to implement a threat-centric approach to security that combines the risk-reduction benefits of tighter access controls with effective threat detection.
 
Through an integrated, threat-centric approach, which helps quickly identify advanced threats and remediate infections, the promise of the self-defending network can be realized, comprising a systemic response to ever-changing threats and dynamic IT infrastructure vulnerability.

 

Presenters:

BioPicture.png

David C. Stuart
Director, Network Security Product Marketing
Cisco

David Stuart has a 20+ year career in product management and marketing within high technology companies. At Cisco, as Director Network Security Product Marketing, he leads the company next-generation network security marketing and positioning efforts, including go to market enablement for new products. Stuart held a similar position with industry innovator Sourcefire, Inc., which was acquired by Cisco in 2013.

 

Move Beyond the Sandbox:
Integrate and Automate Your Malware Analysis

On-Demand

 
Companies today find themselves under a multitude of advanced malware attacks. It is difficult to effectively identify attacks, let alone prioritize the most dangerous ones that should be addressed first.
To effectively combat breaches, you need to be able to understand what malware is doing or attempting to do, how large a threat it poses, and how to defend against it.
 
Join this webinar to:
  • Understand the current threat landscape and the shortfalls of traditional sandboxing solutions.
  • Learn how to identify and respond to suspicious and malicious activity rapidly and with confidence.
  • Improve the effectiveness of security teams and existing technologies.
  • See how AMP Threat Grid fights malware with unified malware analysis and threat intelligence.
Join us.

 

Presenters:

BioPicture.png

Joe Malenfant
Product Marketing Manager, Advanced Threat Solutions
Cisco

Joe Malenfant is a Product Marketing Manager in Cisco’s advanced threat solutions group leading the Advanced Malware Protection (AMP) portfolio as well as Cognitive Threat Analytics. He is focused on the emerging threat intelligence market, malware analysis, and always interested in how technology can improve and safeguard our everyday lives.

Prior to his current role Joe led product marketing for Lockheed Martin’s Industrial Defender portfolio. Following a brief stint as a professional mountain biker, Joe transitioned to a career in the sports industry, having held numerous positions at Shimano. Joe holds an MBA from Johnson & Wales in Providence, and an undergraduate degree from Concordia University in Montreal, Canada.

BioPicture.png

Michael Auger
IT Security Specialist
Cisco

Michael Auger is an experienced IT security specialist with extensive experience in integrating and leveraging IT security tools. He has leveraged a wide range of IT security solutions, integrating them, to deliver leading edge incident response and security operations capabilities. His 15+ year career includes: Supporting security incidents during the event and the subsequent remediation phases Implementing and managing IT security infrastructures for public and private organizations. Design and implement global SIEM infrastructure for F100 organizations Delivering training on advanced SIEM solutions and network discovery tools Presenting and publishing security articles on security vulnerabilities and best practices.

 

Cisco Web and Email Security Webinar:
Protect Your Data and Reputation

On-Demand

 
The top two attack vectors for malware are email and web browsers. Watering-hole attacks conceal malware on member-based sites and phishing scams can target individuals with personal details. Experience a different security approach to protect against these threats while achieving business growth, efficiency and lowered expenses.
 
Join us to learn how Cisco Web and Email Security:
  • Protects your organization from your own users’ web and email activity.
  • Offers unparalleled flexible deployment options.
  • Saves money on bandwidth usage.
  • Brings advanced threat protection from zero day attacks.
  • Reports and manages from a single interface.
  • Controls shadow IT infrastructure outside the governance of corporate IT.
Agenda
This presentation will feature Cisco Email, Web and Cloud Web Security. The presenters will cover basic features, offers, benefits, promotions and pricing models. Information will highlight the newest features and product integration.

 

Presenter:

BioPicture.png

Story Tweedie-Yates
Product Marketing Manager, Web Security
Cisco

Story is a Product Marketing Manager for Cisco Web Security in the Security Business Group. In her role, she is responsible for training Sales on new products and features, positioning products across a large portfolio and launching new offerings into the marketplace. She also serves as an evangelist and thought leader creating content and presenting on Web and Email Security or Cloud Security. Recently she has helped bring new Cloud Security capabilities to market for Cisco customers and has also pioneered a popular webinar series. Story is a Stanford graduate with a BS in Psychology. She also has an MBA from Thunderbird School of Global Management, speaks fluent Spanish and has done business in over 30 countries. In her time off, you will find her on a bike riding around San Francisco or traveling to far away countries with her fiancee.

 

 

Rethink Cisco AnyConnect: Enable a Comprehensive Security Strategy with One Client
On-Demand


Cisco AnyConnect is way more than VPN. With this single client on the endpoint you can enable a comprehensive security strategy. Learn how you can ensure access from anywhere, gain greater visibility, and secure users and devices all through one easy to use solution.


Fortifying Your Gateway -
How to Defend Against Email and Web-Based Attacks

On-Demand

 
Traditional web and email security measures are not enough to stop today’s advanced threats. As modern networks have expanded beyond the traditional perimeter, new threat vectors have emerged, leaving gaps in protection. Join us for a webinar to discuss the top two emerging attack vectors—email and web.
 
In this webinar you will:
  • Learn how to protect your organization against the next generation of evolving email and web attacks.
  • See how Cisco Advanced Malware Protection (AMP) works with Cisco Web and Email Security Appliances to remediate faster against the most sophisticated attacks.
  • Learn how Cisco IT relies on Cisco ESA + AMP for its threat centric email security strategy.
Join us.

 

Presenter:

BioPicture.png

Scott Bower
Technical Marketing Engineering and Business Development Manager
Cisco

With over a decade of hands-on experience with Email and Web Security, Scott Bower has consulted with global customers, product management, engineering, marketing and sales to implement and develop industry-leading offerings. He is a seasoned professional and experienced speaker who is comfortable using non-techno speak to show customers how technology can make their companies more secure.

 

 

Close Your Endpoint Security Gaps
On-Demand

 
Cybercrime is prevalent, attackers are organized, and malware is sophisticated, stealthy, and fast.
 
Traditional point-in-time endpoint security solutions are failing and malware is getting in. These traditional tools rely on signatures and file reputation— all functions that advanced malware can easily evade. They also provide limited visibility into the activity of malicious threats once they get inside. This approach no longer works for today’s advanced threats.
 
Move beyond point-in-time technologies towards a continuous and retrospective approach to security. Join our live webinar to find out how.
  • Learn why protecting endpoints is a challenge.
  • Discover the importance of protecting across multiple attack vectors – from mobile to PC.
  • Learn how network and endpoint integration provide unmatched visibility and control.
  • See how Cisco’s security solutions can proactively protect against advanced malware.
Join us.

 

Presenter:

 

BioPicture.png

Jason Wright
CISSP, SFCP Sr. Manager, Global Field Product Management
Cisco

Stop Advanced Threats With Cisco Network Security
On-Demand

 

Today’s malware problem is pervasive and security breaches happen every day. Traditional network security solutions, built from disparate point technologies have created gaps in traditional defenses that sophisticated attackers exploit. Organizations need an integrated approach to network security to enhance visibility, enable dynamic controls, and provide advanced threat protection before, during and after an attack.

 

Join this webinar to:

  • Learn what it takes to close security gaps and protect your organization from cyber attacks
  • Understand how to detect threats that point in time products miss
  • See how to enhance protection and gain full contextual awareness into everything on your network
  • Discover the power of integrating your endpoint and network defenses together

 

Presenter:

Joseph O'Laughlin
Senior Product Marketing Manager
Cisco

Stop Threats in their Tracks, An Introduction to Cisco Advanced Malware Protection (AMP)
On-Demand

 

It’s no longer a question of if you’ll be breached, but a matter of when. It’s no secret that the IT security world today is a scary place where organizations are under unrelenting attack and security breaches are constantly making headlines. Recent data shows 95% of large companies are targeted by malicious traffic, and on average, it takes up to 45 days to resolve a cyber attack.

 

In this webinar you will:

  • Learn how today’s threat landscape impacts your IT security defenses
  • Understand how Cisco AMP and Threat Grid deliver the visibility and control needed to defeat advanced malware
  • Learn how Cisco’s AMP Everywhere strategy provides protection across the extended network
  • View a demo of the Cisco AMP and Threat Grid solutions

 

Presenters:

John Dominguez
Product Marketing Manager, Advanced Malware Protection
Cisco

Joe Malenfant
Product Marketing Manager, Advanced Threat Solutions, Threat Grid
Cisco

Eric Howard
Manager, Advanced Malware Protection
Cisco

Reduce Your Time to Detection with Retrospective Security
On-Demand

 

Attackers do not stand still. They constantly evaluate the security controls in place and change tactics to stay a step ahead of defenses.
 
Learn how to turn back the clock on attacks to effectively find and remediate advanced malware faster with Cisco threat intelligence and retrospective security.
 


In this webinar, you will:

  • See how Cisco uses global threat intelligence to strengthen your network defenses
  • Understand why you must move beyond point-in-time protection to also include retrospective security
  • Learn how to reduce your time to detection and time to remediation with retrospective security
  • View a demo of Cisco’s Advanced Malware Protection (AMP) solution to see how AMP’s retrospective security capabilities can enable security teams to quickly detect attacks, scope a compromise and remediate malware before it causes damage.

 

Presenters:

Jason Brvenik

Eric Howard
Manager, Advanced Malware Protection
Cisco

Solucionando o quebra-cabeça do ataque - Usando inteligência de ameaça e análise de malware automatizada para promover reação ao incidente
Assista a Gravação

 

Nenhuma empresa está imune contra ataques virtuais. Não é mais uma questão de sua empresa ser atacada, mas sim uma questão de quando uma violação acontecerá e quanto tempo levará para você reagir e remediar.
 
Por causa disso, as organizações precisam de ferramentas de segurança para ajudá-los a detectar, reagir e remediar rapidamente após um ataque.
 
Neste seminário on-line, você vai:
  • Compreender os desafios que as equipes de reação a incidentes enfrentam ao lidar com uma violação 
  • Aprender como otimizar a habilidade da sua equipe de se defender contra os atuais ataques sofisticados de malware
  • Saber como detectar e investigar ameaças mais rapidamente com Cisco AMP Threat Grid
  • Descobrir como um cliente Cisco remediou com agilidade após um ataque
 
 

Palestrante:

BioPicture.png

Ricardo Marques
AMP Specialist for LATAM
Cisco

 

 

Focando no Ransomware: Como manter-se protegido.

Ransomware traz uma perspectiva financeira cada vez mais interessante para os criminosos digitais. Esta ameaça está se espalhando como um incêndio. Junte-se a nós para um webinar gratuito onde iremos explorar o que é Ransomware, como ele se infiltra em um sistema e quais os passos que você deve tomar para proteger a sua organização.

Na abertura ao vivo do evento, Ricardo Marques irá compartilhar a sua perspectiva em relação ao Ransomware. O executivo falará como esta ameaça evoluiu, dar exemplos de ataques notáveis e falar sobre as novas tendências de segurança.

Você terá a oportunidade de conhecer a nova solução de defesa da Cisco para combater o Ransomware em ação. Ricardo Marques orientará sobre o seu funcionamento e a proteção adequada para a sua organização.

Neste webinar gratuito, você irá:

  • Aprender como os adversários estão evoluindo e as suas estratégias de ataque de Ransomware
  • Ver como a Defesa da Cisco de Ransomware oferece visibilidade a sua organização e capacidade de resposta
  • Identificar as melhores práticas para proteger a sua empresa deste tipo de ataque

Participe da nossa sessão de Perguntas & Respostas ao vivo para sanar suas dúvidas específicas e necessidades de sua organização.

Palestrante:

 

BioPicture.png

Ricardo Marques
AMP Specialist for LATAM
Cisco

 

 

Securing Critical Infrastructure from Cyber Threats: How State and Local Governments Can Utilize a Threat-Centric Approach
On-Demand

 

Critical infrastructure systems, such as transportation, oil and natural gas, and the electric grid, create unique challenges for protecting against cyber threats as physical, operational technology (OT) and IT security become increasingly intertwined.  For state and local governments that are often constrained by limited resources, escalating cybersecurity challenges and daunting regulatory concerns, their ability to plan for, prevent, respond and recover from cyber intrusions and attacks is increasingly complicated. Coupled with the increased need to strengthen coordination and communication between physical OT and IT security functions, state and local governments can benefit by applying the NIST Framework for Improving Critical Infrastructure Cybersecurity which uses a threat-centric approach.
 
We have assembled an expert panel to discuss how state and local governments can apply the NIST Cybersecurity Framework, utilize public-private sector partnerships, and share threat information to better prepare critical infrastructure for today’s cyber threats.
 


View this webcast to:

  • Gain insight and guidance on the growing cyber threats state and local governments face when addressing critical infrastructure vulnerabilities
  • Explore the unique challenges of protecting critical infrastructure from cyber attacks in today’s threat landscape
  • Identify tools and resources available to state and local governments to help them implement the NIST Cybersecurity Framework
  • Learn how state and local government officials can build a more effective and threat-centric approach to protecting against cyber threats  

 

Presenters:

Marc Blackmer
Industrial Control Systems/Internet of Things Expert
Cisco Systems

Dr. Jeffrey Runge
Senior Advisor
The Chertoff Group and Former Administrator, National Highway Traffic Safety Administration

Adam Sedgewick
Senior Information Technology Policy Advisor
National Institute of Standards and Technology (NIST)

Mark Weatherford (moderator)
Principal
The Chertoff Group

Enfoque en ransomware: Cómo mantenerse protegido.

Ransomware es una perspectiva financiera cada vez mayor para los criminales. Se está extendiendo como el fuego. Únase a nosotros para un seminario web gratuito en el que vamos a explorar lo que es el ransomware, cómo se infiltra en un sistema, y más importantemente —¿qué medidas tiene que tomar para proteger su organización.

La apertura del evento en vivo, Omar Alcala compartirá su perspectiva sobre ransomware. Él va a hablar de cómo ha evolucionado el ransomware, dará ejemplos de ataques notables, y hablará de nuevas tendencias de seguridad.

Continuación obtendrá la oportunidad de ver nuestra nueva solución de defensa de ransomware en acción. Omar Alcala le guiará a través de cómo funciona y qué protección puede ofrecerle a su organización.

En este seminario web gratuito, usted:

  • Aprenderá cómo los adversarios han evolucionado y han reforzado sus estrategias de ataques de ransomware
  • Vea cómo la defensa ransomware de Cisco le da a su organización visibilidad y capacidad de respuesta
  • Identifique las mejores prácticas que su empresa puede utilizar para protegerse de los ataques

Únase a nuestra sesión de preguntas y respuestas en vivo para obtener respuestas a sus preguntas específicas y las necesidades de la organización.

Presentadores:

Omar Alcala

¿Por qué el Malware es exitoso? Empiece a pensar como el atacante para protegerse
Ir al webinar

Ninguna compañía se encuentra inmune a ataques cibernéticos. Ya no se trata más de una cuestión de si su compañía será atacada, sino de una cuestión de cuándo una brecha ocurrirá y cuánto le tomará responder y remediar.
Debido a esto, las organizaciones necesitan de herramientas de seguridad para ayudarles a rápidamente detectar, responder y remediar después de un ataque.

Durante este webinar usted:
  • Entenderá los desafíos que enfrentan los equipos de respuesta a incidentes cuando se afrontan a una brecha
  • Aprenderá cómo optimizar la habilidad de su equipo para defenderse en contra de los sofisticados ataques de malware actuales
  • Verá cómo detectar e investigar amenazas más rápidamente con Cisco AMP Threat Grid
  • Escuchará cómo un cliente de Cisco rápidamente remedia después de un ataque

Presentadores:

BioPicture.png

Antonio Ramirez Macedo
Gerente de Soluciones Avanzadas
Cisco




Combata as Ameaças de Segurança na Nuvem com CloudLock CASB (Cloud Access Security Broker)

Gartner elegeu o CASB como a tecnologia número 1 em segurança da informação em 2016. Por que colocar a segurança da nuvem em primeiro lugar? Porque hoje as ameaças cibernéticas mais avançadas tem como alvo os indivíduos, os aplicativos que eles utilizam e os dados que eles acessam. Manter a sua empresa sob controle significa entender, abraçar e proteger a nuvem.

Nesta sessão você ira:

  • Aprender sobre os principais riscos de segurança cibernética que estão a sua volta
  • Identificar as principais ameaças cibernéticas do seu ambiente de nuvem
Manter-se confiante para responder a pergunta do CISO: Como a minha empresa fica segura na nuvem?

Presentadores:

BioPicture.png

Ricardo Marques
Gerente de Soluciones Avanzadas
Cisco

 

 

¿Seguridad en la Nube? Enfrente las amenazas con CloudLock CASB de Cisco.

Gartner nombró a CASB la tecnología de seguridad de la información # 1 en 2016.  ¿Por qué es la número uno?. Actualmente las amenazas cibernéticas más avanzadas se dirigen a los datos que las personas proporcionan para acceder a los diferentes tipos aplicaciones. Mantener a su organización bajo control significa entender, abrazar y asegurar la nube.

Si usted es nuevo o está familiarizado con CloudLock, únase a esta sesión para aprender cómo Cloud Access Security Broker (CASB) puede ayudar a  proteger los datos y usuarios en la nube.

Durante estas sesiones usted podrá:

  • Conocer los principales riesgos de seguridad cibernética que pueden afectar su organización.
  • Identifique las principales amenazas cibernéticas en el entorno dentro de la nube.
  • Prepárese para contestar con confianza a su CISO: "¿Cómo puede mi compañía permanecer segura en la nube?"

Presentadores:

BioPicture.png

Jaime Villegas Nunez
Cisco

 

 

Combatiendo las Amenazas Internas –Protegiendo su Agencia de Adentro hacia Afuera
Enero 18, 2017 a la 1pm EST / 12pm CST

Cuando Edward Snowden filtró información clasificada a los medios principales, trajo consigo los peligros representados por las amenazas internas a la consciencia pública y no sin un propósito. Las agencias de hoy en día se están ahogando en el temor que rodea a los ataques cibernéticos sofisticados, pero tal vez, el tipo de ataque más preocupante es la amenaza interna. De acuerdo a Forrester, el abuso por los maliciosos internos llega hasta el 25% de las brechas de información.  

Aprenda acerca de las mejores prácticas y tecnologías que debería estar implementando ahora para evitar convertirse en la próxima víctima de un ataque de alto perfil.  

  • Manténgase al tanto de los diferentes tipos de ataques de amenazas internas, incluyendo sus motivos y métodos de ataque.
  • Entienda porque las herramientas de seguridad convencionales como firewalls, antivirus y IDS/IPS no cuentan con el poder para enfrentar la amenaza interna
  • Entérese de las diferentes tecnologías, las políticas y las mejores prácticas que deben colocarse en sitio para ayudarle a detectar y frustrar las amenazas internas
  • Descubra como los network logs, particularmente NetFlow, pueden utilizarse para monitorear rentablemente las conductas sospechosas internas que pudieran indicar un ataque
  • Conozca acerca de los métodos de ataque emergente tales como muleware que podría agravar los ataques internos en los próximos años

Presentadores:

Gerardo Carrion


 

Combatendo as ameaças internas – Proteja a sua empresa de dentro para fora.
18 de Janeiro de 2017, 11am EST / 2pm BRL

Quando Edward Snowden vazou informações sigilosas para as mídias de massa, os perigos produzidos pelas ameaças internas vieram à tona do conhecimento público, e com razão. Atualmente, as agências estão preocupadas com os sofisticados cyber-ataques, porém também com o pior tipo de ameaça que existe – a ameaça interna. De acordo com a Forrester, abuso por parte de membros internos da empresa representam 25% das violações de dados. Saiba mais sobre as melhores práticas e tecnologias que devem ser implementadas para evitar que você seja a próxima vítima de um ataque. 

  • Conheça os diferentes tipos de ameaças internas, incluindo seus motivos e métodos de ataque
  • Entenda por que as ferramentas convencionais de segurança, como o firewalls, antivirus e IDS/IPS são poderosas no combate às ameaças internas
  • Obtenha conhecimento nas várias tecnologias, políticas e melhores práticas que devem ser coladas em prática para ajudar na detecção e impedir ameaças internas
  • Descubra como os logs de rede, particularmente o NetFlow, podem ser usados para monitorar de forma econômica os comportamentos internos suspeitos que poderiam indicar um ataque
  • Conheça os métodos de ataque emergentes, como o malware, que podem aumentar ainda mais as ameaças internas nos próximos anos

Apresentador:

BioPicture.png

Ricardo Marques
Gerente de Soluções de Segurança Avançadas
Cisco




Please complete the form below


S'il vous plaît remplir le formulaire


Por favor complete el siguiente formulario


Por favor, preencha o formulário abaixo