Cybersecurity Report Talks: Managing Vulnerabilities
May 24, 2018 at 1PM ET | 10AM PT

With the onslaught of new technologies, attack strategies, and breaking developments, defenders may be tempted to overlook vulnerabilities and patching. However, attackers continue to use them as an easy way to penetrate otherwise strong defenses.

In this free webinar, experts from Cisco PSIRT along with our technology partners SAINT and Qualys will explore the findings from the 2018 Annual Cybersecurity Report. They’ll explore the latest findings on patch management, remediation, and more. You’ll have the chance to ask the experts your questions during our live Q&A, and get the deeper story behind the data.

In this free webinar, you will:

  • Learn the top 3 vulnerabilities our experts detected
  • Get a blueprint for the ideal patch management plan, including why vulnerability management shouldn’t be your primary instigator
  • Understand the new best practices for defenders, including why old recommendations simply aren’t sufficient for today’s attack strategies

Join our live Q&A for answers to your questions.


Sam Kline
Chief Technical Officer
SAINT Corporation
  Jimmy Graham
Director of Product Management
Jeff Shipley, CISSP
Manager, PSIRT Security Intelligence Analysts

Cybersecurity Report Talks: Visibility past, present and future
May 15, 2018 at 1PM ET | 10AM PT

The old adage is true: You can’t defend what you can’t see.

But how has visibility evolved in the threat landscape? What’s the baseline defenders need to understand in order to defend their organizations? What new tactics are adversaries using to cover their tracks? Our experts are standing by to dive into the data and provide detailed answers to the most pressing visibility questions.

In this free webinar, experts from Cisco along with our technology partners Anomali and Lumeta will bring the results of the 2018 Annual Cybersecurity Report to life. They’ll explore the latest findings on shadow IT networks, encrypted traffic patterns, and more. You’ll have the chance to ask the experts your questions during our live Q&A, and get the deeper story behind the data.

In this free webinar, you will:

  • Learn the top strategies for real-time change monitoring
  • Get the expert’s take on the rise adversaries harnessing encrypted web traffic
  • Understand which strategic security improvements you should make to provide more visibility into the threat landscape


Reggie Best
Chief Product Officer
  Dr. Joakim Kennedy
Principal Security Researcher, Threat Intelligence
Anomali Labs
Megha Mehta
Product Marketing Manager
Cisco Security Business Group

Build a Better Incident Response Program
May 10, 2018 at 1PM ET | 10AM PT

Cisco Incident Response Services experts Sean Mason and Danielle Sermer have seen organizations stumble when it comes to responding to nearly every type of incident.

In this free webinar, they will explain how the market has shifted away from a reactive-only stance towards incidents and why incident response services and their proactive component need to be a critical part of every security strategy.

Sean will explore the Who, What, Where, Why, and How when it comes to Cisco’s Incident Response Services.

Danielle will dive into case studies that demonstrate how customers’ programs have been used to improve organizations’ overall security.

In this webinar, you will:
• Gain insight into the ever-changing Incident Response landscape
• Get an understanding of how Cisco Incident Response services helps organizations
• Understand proactive services you should be leveraging to be better prepared and more resilient in the event of a data breach or other incident.



Sean Mason
Director Incident Response Services at Cisco



Danielle Sermer
Services Account Manager at Cisco


Cybersecurity Report Talks: Taking Down the Network Inside and Out
May 3, 2018 at 1PM ET | 10AM PT

In the 2018 Cisco Cybersecurity Report, threat researchers explored the unprecedented level of destructive, network-based attacks that rocked the security community. In this free webinar, experts from Talos and Radware will explore their findings on DDoS attacks, wiper malware, and more. You’ll have the chance to ask the experts your questions during our live Q&A, and get the deeper story behind the data.


Edmund Brumaghin
Threat Researcher at Cisco Talos

Ron Winward
Security Evangelist, North America at Radware

Better Manage Cyber Risk with Cybersecurity and Insurance

Cyber risk is a concern for organizations, with malware top of mind. We also know that decisive action is needed in the face of this risk. Cisco and insurance leader Allianz  bring together the key pieces needed to manage cyber risk: security technology, secure devices, cybersecurity domain expertise and enhanced cyber insurance. Working together, these elements can improve security and reduce cyber risk. In this on-demand webinar we discussed how better security postures can yield enhanced cyber insurance coverage, unique to Cisco customers.


  • Jenny SoubraU.S. Cyber and Tech E&O Practice Leader; Allianz
  • Stephanie Snyder, Cyber Insurance Lead, Aon Professional Risk Solutions
  • Dan Gould, Portfolio Manager, Cisco Security

Your network is your best security tool. Are you using it?

The attack surface is growing. By 2020, it’s estimated that 1 million devices will go online every hour - creating numerous attack vectors. Meanwhile, 85 percent of victims don’t realize they have been attacked for weeks or longer.

One of your greatest security assets is your network. Are you using it? Learn how Cisco Network Visibility and Enforcement can help you use your greatest investment – the enterprise network – to address these security challenges.

Download this on-demand session to learn how security woven into the network provides:

  • Visibility to know what is happening and detect threats
  • Control to defend your assets
  • Automation to streamline incident response



Andrew Akers
Product Marketing Manager


Ransomware Defense: The Threat is Real

Ransomware continues to be one of the most important security concerns today. CBS News reported that global losses from the "WannaCry" attack alone reached into billions of dollars, making it one of the most damaging examples. The threat is real.

Do you know how ransomware gets in? Hackers typically trick employees through email and web browsing into unintentionally downloading and spreading it, but there’s a lot more to the story. Get prepared to defend against today’s ransomware threat. In this webinar, we’ll discuss the latest ransomware developments and offer expert advice on where you should focus to protection your organization. In this on-demand weinar you’ll learn how to:

  • Identify the main attack vectors that enable ransomware attacks to succeed
  • Extend your key security controls beyond patching and backup/restore capabilities
  • Protect your network from the DNS layer to email to the endpoint with Cisco Ransomware Defense

Don’t let ransomware disrupt your organization.  Learn how you can strengthen your defenses with detection, visibility, and intelligence. Download now.



Steve Caimi
Cybersecurity Professional



Scott Dunkerley
Global Director of Email and Web Security Sales


Securing the Cloud and Your Digital Future in AWS

As more organizations move services and applications to Amazon Web Services (AWS), they still need to ensure their workloads are secure and compliant. More importantly, they need a way to satisfy security requirements without jeopardizing the business benefits of using cloud infrastructure.

Cisco Stealthwatch Cloud provides automatic threat detection and visualization related to AWS and other cloud infrastructures using advanced modeling and machine learning techniques. It enables turn-key activation for customers using AWS and delivers actionable security alerts without generating security-related noise.

Download this webinar to learn about:

  • The need to secure cloud workloads
  • How AWS enables good security but requires customers to do their part
  • How Stealthwatch Cloud complements AWS security, without jeopardizing the benefits of the cloud
  • How to secure your AWS workloads today



Bryan Doerr
Product Manager


Agency Responsibilities When Adopting Cloud Services in the Current Threat Environment

In this on-deand webinar Ron will explain the key risks inherent in the ongoing use of productivity, file storage and collaboration cloud services, the agency and service provider responsibilities, and how Cisco Cloudlock (with FedRAMP ATO) can enable secure cloud service adoption by protecting user accounts and data.



Ron Zalkind
Head of Innovation, Cloud Security, Cisco

Ron Zalkind is the Head of Innovation for Cisco Cloud Security, and the former CTO of CloudLock. Prior to founding Cloudlock, Zalkind was Director of Product Management at Interwise (acquired by AT&T), and held varied Engineering Management positions in private and military sectors such as the Israeli Air Force Software Development unit, where he worked on the development of mission critical intelligence systems. Zalkind has over 20 years of experience building complex software systems and product platforms.  


Encrypted Traffic Analytics: Detecting Malware without Decryption

Learn how Cisco is changing the equation with Encrypted Traffic Analytics. This new solution combines advanced machine-learning from Stealthwatch Enterprise with Cisco innovations in network telemetry to help you gain rich insights into the nature of encrypted traffic and stop threats without the need for decryption.

With Encrypted Traffic Analytics you can:

  • Determine how much of your digital business is encrypted
  • Discover which network devices use out-of-date and non-compliant encryption software that make it easier for malware to hide
  • Identify and isolate malicious traffic without decryption



TK Keanini
Distinguished Engineer & Product Line CTO for Analytics


2018 Annual Cybersecurity Report Readout

Supply chain attacks. Malware that evades detection. Malicious web traffic. Our threat researchers and experts have studied the latest developments in the threat landscape and compiled them into our 2018 Annual Cybersecurity report. Join our free webinar for a live review of the most important findings, including industry best practices, and have the opportunity to ask your questions.  


In this on-demand webinar, you will:

  • Discover how adversaries are using encryption to evade detection
  • Explore the potential of artificial intelligence and machine learning for improving your cybersecurity posture
  • Hear how organization like yours respond to threats through the findings of our double-blind Security Benchmarks Study



Franc Artes
Architect, Cisco Security Business Group, Office of the CTO

Francisco Artes is a recognized information security executive who has helped form many of the best practices for securing intellectual property within the computer gaming, motion picture, and television industries. Mr. Artes is also known for his work on cybercrime, hacking, and forensic security with various federal, state and local government organizations as well as law enforcement agencies such as Europol, US Dept. of Homeland Security, FBI, Texas Rangers, and US Marshals.


Boosting Efficacy and Efficiency with SaaS Security
Watch On-Demand

Security teams face significant challenges including budget constraints and a lack of trained personnel. Meanwhile numerous point products and noisy security solutions cause security teams to waste time managing their technology and chasing false alarms.

To address these challenges, you need to find a way to make your security team more efficient, your strategy more cost-effective, and your technology more actionable.

Software-as-a-Service (SaaS) security can help you achieve these goals. In this session, you will learn how SaaS and Cisco Stealthwatch Cloud can:

  • Simplify technology deployment and maintenance
  • Provide flexible pricing options
  • Make your security team more efficient
  • Lower security “noise” and false alerts

Bryan Doerr, a Cisco Product Manager has years of experience in cloud-based security, and will discuss how SaaS security can improve your efficiency and overall security posture.


Moving to the cloud, staying compliant, and staying secure
Watch On-Demand

As agencies continue to transition to the cloud it’s more important than ever to stay secure and stay in compliance with your regulatory requirements. The NIST Cybersecurity Framework can guide your security implementation and make sure you use the risk based approach called out in the Cybersecurity Executive Order.

FedRAMP authorized clouds help you be sure that FISMA, NIST and other requirements are met as you enable your agency to use cloud services securely and efficiently. Compliance is important and the NIST Guidelines are great tools but it’s even more important to stay protected!

In this on-deamnd webinar you will learn:

  • How an effective security program can ensure your agency’s cloud migration strategy ensures security at each stage
  • How the NIST Cybersecurity Framework can help you protect your agency and how Cisco security solutions align with the framework
  • Why choosing FedRAMP cloud can help protect your agency and help you meet requirements as you move to cloud applications



Brian J. Tillett
Security Advisory



Peter Romness
Cybersecurity Solutions Lead – US Public Sector CTO Office


Smarter, faster security through LogRhythm and Cisco integrations

LogRhythm and Cisco are committed to helping you enhance your security operations through the seamless integration and powerful capabilities of the LogRhythm Threat Lifecycle Management platform and Cisco’s Threat Grid, Umbrella, Firepower and ISE. LogRhythm integrates with over three dozen Cisco products, providing centralized visibility and advanced security analytics across the Cisco-enabled environment and makes security events actionable in the network. Stay in front of cyber adversaries and proactively detect, respond to and remediate cyberthreats with this powerful integration.

LogRhythm and Cisco Security discussed how your organization can quit wasting valuable time and increase your security posture through a powerful suite of products. 

In this technical webinar, you’ll learn how to:

  • Gain immediate insight with Cisco and LogRhythm’s comprehensive visibility
  • Streamline investigations with Umbrella and Threat Grid
  • Accelerate and enable endpoint and perimeter remediation with ISE and ASA



Jake Reynolds
Technology Alliances Engineer at LogRhythm



Michael Euperio
Director of Technology Alliances at LogRhythm



Douglas Hurd
Cisco Security Technical Alliances (CSTA)



Jessica Bair
Senior Manager, Business Development, Advanced Threat Solutions


A New Way to Look at Cloud Security with Cisco Stealthwatch Cloud

Cisco's recent acquisition of Observable Networks, now called Stealthwatch Cloud. Learn how this strategic addition to Cisco's security portfolio is yielding compelling results by providing security-relevant visibility into network behavior across all topographies with incredible accuracy and very low noise. We discussed how this cloud-native solution is being used to protect traditional networks and cloud environments including AWS VPCs, Azure and others.

This on-demand webinar will address:

  • Intro & Overview
  • Using Modeling for Security
  • Use Cases
  • How to Get Started
  • Demo
  • Review & Questions



John Heintz
John joined Cisco Systems from the recently acquired start-up, Observable Networks. At Observable Networks, he was Director of Solutions Engineering where he was passionate about spreading the gospel of endpoint modeling as a way to improve network security.



Lawrence Hatcher
Cybersecurity Sales Specialist in Cisco's Advanced Threat Solutions Organization. Lawrence joined Cisco via the acquisition of Observable Networks in August 2017, where he led the mid-market sales efforts.


IoT Threat Defense: Design, Validation, Proof
Watch On-Demand

It’s one thing to make bold claims about a product’s capabilities. It’s quite another to prove it. At Cisco, our cybersecurity solutions have been tested, deployed, and validated using our SAFE security reference architecture. They’re backed by SAFE Design Guides that provide clear guidance, best practices, and the simple configuration steps to make everything work as designed. What better proof is that?

The Cisco Internet of Things (IoT) Threat Defense solution is no different. It’s a tested, layered, effective security architecture solution validated by the all-new SAFE Design Guide.

In this webinar, you will learn:

  • Why Cisco IoT Threat Defense provides essential and effective security for the Internet of Things
  • How our validated design offers credible proof of its advanced capabilities, highlighting IoT in Manufacturing
  • How your organization can benefit from Cisco IoT Threat Defense today 


Bart McGlothin
Solution Architect in the Security Business Group at Cisco Systems, Inc.

Steve Caimi
Industry Solutions Specialist, US Public Sector Cybersecurity, Cisco Systems

Closing the Skills Gap Chasm with Automation & Actionable Analytics
Watch On-Demand

Data scientists are in high demand, but there aren’t enough of them. The struggle for skilled security professionals to pull insights and analyze dense data to correctly detect and then effectively respond to threats, cannot wait until there is more talent in the pool, especially when threats are increasing and attackers are so highly motivated.

Threat detection is an inherently difficult practice due to cunning adversaries and evolving attack methods. Instead of taking a reactive approach, companies can use global security telemetry to identify threats in the wild before they arrive howling at the gates.

Exabeam leverages Cisco’s open nature to integrate with Threat Grid, ISE, Umbrella and upcoming AMP for Endpoints. Through integrated processing of malware and enumeration of new Indicators of Compromise (IOCs), organizations can proactively collect IOCs and feed these into detection systems. Furthermore, automated collection and aggregation of malware data can provide context that streamlines security event analysis.

This brief, technical webinar will cover the following topics: 

  • Unifying Cisco Security Elements
  • Automating Malware Response
  • Security Investigation & Containment

*Please note: Your registration information will be shared with the Cisco ecosystem partner Exabeam, who may contact you in follow-up to your registration and/or attendance of this webinar.



Christopher Meile
WW Director of Technical Alliances for Exabeam



Jessica Bair
Senior Manager, Business Development, Advanced Threat Solutions


Federal Cybersecurity in a Whole New Era

Cybersecurity is too hard. It is also hard for agencies to find skilled Cyber Defenders for what can be a tedious job. Government systems can be complex and hard to manage and security threats make the job even tougher. Cisco’s architecture-based approach offers effective security that is simple, open and automated. As the company that built the Internet, Cisco can deploy security from the network to the endpoint and cloud that shares information and works together. Fighting the evolving universe of threats with a haphazard collection of solutions from different vendors never works for long. Cisco offers a smarter strategy.

In this free webinar, you will learn how Cisco enables your agency to implement simple, open and automated solutions for ever-improving cyber defense.



Daniel P. Kent, Public Sector Engineering and CTO, Cisco Systems

Doug Cowan, Regional Manager Cisco Security – Federal Civilian, Cisco Systems




Dismantling Supply Chain Attacks
Watch On-Demand

Now that the dust has settled, learn what really happened behind the scenes of some of the most high-profile supply chain attacks in recent memory. After diligently analyzing the CCleaner and Nyetya attacks, Talos Threat Researcher Vitor Ventura will share his findings on their execution and proliferation, as well as his predictions for what moves adversaries will make next. Get the origin story on these two threats, as well as professional recommendations for how to protect your organization from similar attacks.

In this webinar, you will:

  • Understand the CCleaner attack from start to finish, including how adversaries created the backdoor and what bounty they were really after
  • Get in the mind of an attacker: learn about Nyetya and its destructive intent



Vitor Ventura
Vitor Ventura has worked in Cyber Security for over 17 years, including secure architecture design, computer forensics, incident response and management. While performing security assessments, Vitor lead flagship projects like Connected Car assessments and Oil and Gas ICS security assessments, along with other IoT security projects. As incident responder Vitor was the lead responder on several high profile organizations affected by the WannaCry and Nyetya breaches, helping to determine the extent of the damage and to define the recovery path. Vitor is currently a security researcher member of the Cisco Talos Outreach team in EMEAR. "


Dissecting a Breach: An Incident Responder's Perspective
Watch On-Demand

You know that every second counts when it comes to identifying and managing a data breach. And there is good news: time to detection has declined by almost 12 hours over the last year. Similarly, your IT team needs to act quickly to reduce damage and exposure.

The ability to rapidly analyze information about your data breach is critical. Join us for this webinar to learn from experienced Cisco incident responders who will dissect actual breach response scenarios. 

You'll gain technical and practical insight into actions you can incorporate into your own incident response plans to manage and reduce overall impact an incident.



Matt Aubert
Cisco Security Services, Senior Incident Response Consultant



Juan Romero Jr.
Cisco Security Services, Senior Incident Response Consultant


Reinventing Network Intrusion Detection with Machine Learning
Watch On-Demand

We live in a bullish market for cyber attacks. As ransomware and destructive malware based attacks continue to succeed, organizations today are turning to advancements in AI and machine learning to continuously advance their cybersecurity posture. 

The experts Raj Sivasankar and Josh Rosenthol of BluVector, and Jessica Bair of Cisco Threat Grid; discuss how to utilize machine learning, sandboxing, threat intelligence and automation to enable analysts to find, confirm and contain even the newest and most sophisticated threats.  

In this webinar, you will learn to:

  • Understand how network intrusion detection with machine learning is finally delivering on its promise: defend the network against even the newest and most sophisticated cyberattack
  • Build a standard process for advanced threat detection, threat intelligence enrichment and response
  • Combine automated actions with human decision-making continuing to enhance detection via machine learning
  • Aggregate malware analysis results with validated threat intelligence


  • Raj Sivasankar – Director of Product Management at BluVector
  • Josh Rosenthol – Alliances and Integrations Manager at BluVector
  • Jessica Bair – Senior Manager at Cisco Threat Grid

Finding a Career in Cybersecurity: Panel on Job Success
Watch On-Demand

For those looking to break into the cybersecurity industry, the options can be overwhelming. Should you go back to school? Do online courses? How can you find the right role that matches your passions and skills? In this free webinar, hosted by Learning@Cisco Manager Tom Gilheany, we’ll be diving into how to answer these questions and more. After a brief introduction to set the scene, our panel of experts will discuss how they got their role, lessons learned, and advice for jobseekers like you. Our panel comes from a diverse background and represents distinct paths to professional success:

  • Jessica Bair built upon her success as a US Army CID Special Agent and transitioned into a fulfilling career in the private sector. 
  • Matt Watchinski started with a BS in Computer Information Systems. After 18 years in the industry, Matt now leads Talos, one of the largest and most active threat intelligence and research teams in the industry.
  • Steve Caimi began his career as an electrical engineer before finding his niche in cybersecurity, achieving success as a consultant to public sector organizations and speaker at conferences across the country. 
  • Michele Guel spent 11 years at NASA Ames Research Center prior to joining Cisco, where she has recently co-founded the Cisco Women in Cybersecurity Community, which focuses on developing the next generation of women cybersecurity leaders.

Cisco Active Threat Analytics
Watch On-Demand

Cyber security teams must protect their organizations' data and privacy and support new business initiatives while defending against dynamic cyber attacks. 

Some of  these attacks will evade even the best tools, such as next-generation firewalls, unified threat management (UTM) solutions, and intrusion prevention systems (IPS). 

That means that organizations must vigilantly monitor security events. Compounding these challenges are the shortage of cyber talent, a vast amount of telemetry and platforms to watch, and difficult-to-use Security Event Management Systems. 

How do you effectively manage security operations in the face of these challenges? Cisco ActiveThreat Analytics, a leading managed detection and response service, can help.   

In this webinar, you will:

  • Hear from experts on Cisco’s Active Threat Analytics team  
  • Learn about best practices for more effectively managing threat detection and response 
  • Find out how our 24-hour continuous-monitoring, advanced-analytics capabilities, industry-leading threat intelligence, and expert investigators work together to rapidly detect advanced threats
  • Discover how we are helping leading organizations better meet their security event management needs and free up resources


Kevin Guidinger, Americas Leader, Active Threat Analytics (ATA) Solution Development

Dmitry Kuchynski, Client Services Director, Cisco Security Solutions

IoT and Real-World Cyber Risks
Watch On-Demand

The Internet of Things promises many benefits: improved efficiency, higher productivity, better decision-making. But change brings new risks: Did you know that IoT devices can introduce new vulnerabilities that can be exploited to launch a cyberattack? How comfortable are you in your ability to mitigate the risk?

This session explores the real-world challenges associated with IoT and recommends a proven approach toward effective security. Realize the benefits of the Internet of Things. Just do it with your eyes open!


  Steve Caimi is a cybersecurity professional at Cisco who helps organizations efficiently and effectively manage their cybersecurity programs and achieve compliance goals. He advocates a risk-based approach based on industry standards and best practices that guides organizations to the improvements that matter the most. Prior to joining Cisco, Steve held various product management, engineering, and solution architecture positions at HP Enterprise Security, CA Technologies, UUNET Technologies, and Citigroup. He earned a Master of Business Administration from Virginia Tech and a Bachelor of Science in Electrical Engineering from Penn State University. He is also a Certified Information Systems Security Professional (CISSP).

GDPR: Here's what you absolutely need to know

The General Data Protection Regulation (GDPR) deadline is May 2018, and you already know about the potential non-compliance penalties. Watch this on-demand webinar where we simplfy the regulation and show you a practical approach to compliance. It's not too late.




Lorena Marciano
EMEAR Data Protection & Privacy Officer at Cisco



Steve Caimi
US Public Sector Cybersecurity


Talos Fall Threat Briefing
Watch On-Demand

After analyzing 1.5 million malware samples daily, the Talos team knows a thing or two about threat intelligence. Join us for the latest security threat briefing to learn about what these threat researchers consider to be the most notable threats of the past season. 

Don’t miss this opportunity to hear directly from Talos Technical Leader Vanja Svajcer. You’ll get a deep dive into how emerging threats work, what adversaries are after, and how you can stop them.

In this webinar, you will:

  • Get a deep dive into the hottest topics in threat intelligence, including what experts have identified as the most prevalent and powerful threats
  • Learn how adversaries have changed their attack strategies
  • Identify best practices your organization can use to protect itself from attacks



Vanja Svajcer
Talos Technical Leader


Intelligent Incident Response

A data breach occurs. Your incident responders move into action to reduce damage and exposure. The ability to coordinate and analyze threat intelligence is a critical tool for incident response teams. In every Cisco incident response investigation, anywhere in the world, a dedicated Talos resource is made available to the incident response team. 

In this on-demand webinar, you will:

  • Hear experts from Cisco’s Talos threat intelligence and Cisco’s Incident Response teams walk you through real-world incidents such as the recent Nyetya attack. 
  • They will show how the integration of response and intelligence worked together to more effectively contain the impact of a cybersecurity event. 
  • You'll learn best practices for integrating threat intelligence with your incident response program.



Sean Mason
Director, Threat Management

Craig Williams.jpgCraig Williams 
Sr. Technical Leader and Global Outreach Manager


The Ultimate Guide to Business Email Compromise

Move over ransomware—According to the Cisco Midyear Security Report, Business Email Compromise (BEC) is one of the most important and prevalent email-based threats that organization face. And potentially the costliest, with the fraud raking in nearly $5.3 billion between October 2013 and December 2015. Even high-profile targets, with robust cybersecurity approaches, can be vulnerable to these types of attacks. 

In this on-demand webinar, two of our top email cybersecurity experts team up to tell you everything you need to know about BEC. They start by drawing on their boots-on-the-ground experience with BEC to tell you how two different organizations succumbed to BEC. Then they walk through how your organization can protect itself, covering everything from user education to the IT tools you need to know about.

During this session, you will:

  • Learn about two real-life cases of BEC, starting from how the attack originated to how it impacted their cybersecurity approach
  • Understand how adversaries use phishing, web forms, spam bots and more to create convincing BEC fraud campaigns
  • Identify best practices your organization can use to protect itself from BEC attacks



Exploring Email: The #1 Threat Vector

Adversaries rely on email to execute their malicious campaigns, and no one understands their tactics better than the threat researchers at Talos. Analyzing more than 500 billion emails per day,Talos has unparalleled insight into the latest email security attack strategies. 
In this free webinar, Talos Technical Leader Jaeson Shultz revealed the latest tactics in email fraud, including several high-profile examples that demonstrate their latest findings. 

In this on-demand webinar, you will:

  • Get a deep dive into the hottest topics in email security, including what experts have identified as the most prevalent and powerful threats
  • Learn how adversaries have changed their attack strategies
  • Identify best practices your organization can use to protect itself from email-based attacks


Cisco and IBM: Integrated Defense for Effective Security

Cybercriminals are growing increasingly collaborative. In fact, it is estimated that 80 percent of cyberattacks are driven by highly organized “crime rings” that share data and tools to launch sophisticated attacks. At the same time, competition in the cybersecurity market is so fierce that deep collaboration among vendors is practically non-existent. Many enterprise organizations use as many as 50 different security products from nearly as many vendors. The result is an inability to identify potentially malicious activity and to respond in a proactive, coordinated manner to halt the attack. 

Cisco and IBM Security have joined forces to fight this criminal collaboration, delivering an integrated approach across networks, users and cloud. Join this webinar with experts Jessica Bair of Cisco and Chris Meenan of IBM Security as they discuss how to leverage this partnership to provide rapid detection and response across the diversity of sophisticated threats. 

In the webinar, you will learn about:

  • Product integrations between Cisco infrastructure and IBM Security Operations to deliver rapid threat detection and orchestrated incident response
  • Threat intelligence sharing between Cisco Talos and IBM X-Force Exchange
  • Managed and consulting-led services to secure hybrid cloud and enterprise-infrastructure
  • Demo between Cisco and IBM QRadar based on App-Exchange ecosystem


  • Jessica Bair – Senior Manager, Advanced Threat Solutions at Cisco Threat Grid
  • Chris Meenan – Director, Security Intelligence Product Management and Strategy, IBM Security
  • George Mina – Program Director, Strategic Alliances, IBM Security

Disclaimer: Your registration information will be shared with the Cisco ecosystem partner IBM, who may contact you in follow-up to your registration and/or attendance of this webinar.

Accelerate Malware Analysis with Orchestration

Cyber attackers are developing new, more advanced and more dangerous malware. Organizations must continuously advance their cybersecurity programs in order to battle this new malware - viruses, Trojans, bots and more.

As malware becomes more complicated and harder to detect, cyber analysts are increasingly inundated with more work. The more menial tasks a security team performs, the less likely they are to have the time to properly analyze or defend against malware.

There are steps you can take to defend yourself against malware and protect your organization. Join this webinar with experts Jeremy Linden of Cisco Umbrella, Michael Auger of Cisco Threat Grid and Joe Reese of ThreatConnect as they discuss how to utilize orchestration to enhance malware analysis capabilities.

In the webinar, you will learn to:

  • Standardize processes around malware analysis
  • Combine automated actions with human decision-making
  • Aggregate malware analysis results with validated threat intelligence
  • Quickly take action based on malware analysis results


  • Jeremy Linden – Investigate Product Manager at Cisco Umbrella
  • Michael Auger – Security Solution Architect at Cisco Threat Grid
  • Joe Reese – Senior Product Manager at ThreatConnect

Not Just Another Firewall

Organizations realize that when they are breached, their network is imperiled and business can suffer. While next generation security, including edge protection, is critical to business resiliency, numerous challenges remain to implementing effective and scalable security without the traditional performance sacrifices and management complexities.

In this on-demand webinar, Rob Ayoub, Research Director at IDC, and Cisco’s Jason Wright explain how the NGFW market continues to evolve to meet this challenge. Learn about:

  • NGFW market dynamics and the impact of the cloud
  • The role of NGFW in Specialized Threat Analysis and Protection (STAP)
  • An architectural approach to security that delivers resiliency and simplicity


Rob Ayoub, CISSP
Research Director Security Products and Solutions, Networking Security and Security and Vulnerability Management IDC

Jason WrightJason Wright
Sr. Manager, Vertical and Solutions Marketing

IPS Myths Debunked

IPS is stale, legacy technology. NGFWs do everything IPSs do. These are just a couple of the myths that lead many to miss the value dedicated intrusion prevention systems provide to an organization. In fact, IPS devices remain an important part of an effective network security program and critical to mitigate risk and protect against today’s network cyberattacks.

In this on-demand webinar, Rob Ayoub, Research Director at IDC, and Cisco’s Jason Wright dispel these myths, sharing research and insights on:

  • IPS market growth and the drivers behind it
  • The numerous use cases a dedicated IPS can effectively address
  • Key considerations as you integrate IPS within your security architecture


Rob Ayoub, CISSP
Research Director Security Products and Solutions, Networking Security and Security and Vulnerability Management IDC

Jason WrightJason Wright
Sr. Manager, Vertical and Solutions Marketing

Combat Cybercrime with an Incident Response Plan

When it comes to a robust security approach, three key pillars of your organization must be in alignment: people, processes and technology. Security expert Sean Mason has seen organizations stumble when it comes to streamlining people and processes. In this free webinar, he’ll explain why incident response planning is so critical to defending your organization and how you can begin shaping your plan today.

Craig Williams, Sr. Technical Leader at Talos, will also briefly share how crucial threat intelligence is to incident response planning, and how to apply it to your environment.

In this on-demand webinar, you will:

  • Get a deep dive into what it means to have a strong emergency incident response
  • Learn how proactive threat hunting can better protect your organization from future attacks.
  • Understand how your organization can take concrete steps towards creating its own incident response plan


Sean Mason
Director, Threat Management

Craig Williams.jpgCraig Williams 
Sr. Technical Leader and Global Outreach Manager

A Cybersecurity Buyer's Guide for Industrial Control Networks

Cybersecurity for industrial control networks is NOT the same as IT cybersecurity. And now that some high-profile industrial cyber attacks have been in the news, many traditional IT vendors are pursuing industrial customers without understanding the nature of ICS and it can be hard for industrial organizations to separate fact from marketing fiction.



Marc Blackmer

The Case for Next-Generation Intrusion Prevention

Many think with the adoption of a next-generation firewall (NGFW), that a stand-alone intrusion prevention system (IPS) is no longer required. That's simply not true.  IPS has evolved — next-generation IPS (NGIPS) can help protect digital business in new and unique ways.  This session explores use cases where NGIPS can provide visibility, threat detection and response, and malware discovery in areas of your network that remain off limits to firewall inspection and controls. Performance factors and organizational influences are discussed. You will learn how to use NGIPS to virtually patch vulnerabilities before more permanent fixes can be deployed and how to speed time to detection and quickly remediate advanced threats.

During this on-demand webinar:

  • Learn how IPS has evolved and what NGIPS can do differently
  • Understand deployment cases where NGIPS is less disruptive and can provide deeper visibility and better protections than NGFW or other solutions
  • See what's on the horizon for this important defense technology


Dave Staurt

Joe O’Laughlin


The Ransomware Threat: New Tactics and How to Fight Back

The ransomware struggle is real. As businesses struggle to secure and protect their data, cybercriminals continue to evolve and refine their tactics to avoid detection.

The rise of ransomware has become one of the most widespread and financially damaging threats facing businesses today. But, there are steps you can take to reduce the risk of ransomware and protect your business.

Watch this on-demand webinar with experts Eric Hulse and Josh Reynolds of Cisco Research and Efficacy Team (RET) as they discuss the ransomware threat and how to fight back. Specifically, this webinar will cover:

  • How ransomware has evolved and the attacker tactics that are used today
  • Current ransomware families, who they target and how they work
  • Predictions on what ransomware might do next
  • How to proactively prevent ransomware with threat intelligence and a multi-layer defense


To successfully prevent ransomware attacks you need to understand how attacks happen and what you can do to protect your business. 


Eric Hulse, Sr. Reverse Engineer, Research & Efficacy Team 
Josh Reynolds, Software Engineer, Research & Efficacy Team

Cyber Attack Preparedness - Can We Ever Be Ready?

Today’s threat landscape has become far more complicated and dynamic. Trends such as mobility, the cloud, and the Internet of Things (IoT) have expanded the attack surface while cybercriminals continue to become increasingly sophisticated, employing tools that are more difficult to detect and defend against than ever before.

With so much to defend against, how can we ever truly feel prepared? 

Join our Cisco security experts Steve Caimi and Chris Smithee for this live 60-minute webcast to discuss the state of cybersecurity and best practices as organization move from prevention to detection and realize the need for security everywhere. We will also cover the importance of retrospective security for protection before, during and after an attack using tools such as Cisco Stealthwatch and Cisco Advanced Malware Protection (AMP) 

Tune in to learn how your organization can become more prepared for the next breach with the right frameworks and security tools. Steve and Chris will also answer your questions in real time during the webcast.


  • The state of cybersecurity 
  • A review of best practices
  • Implementing a retrospective security solution using:

               -  Cisco Advanced Malware Protection
               -  Cisco StealthWatch

  • Q&A


Steve Caimi
Industry Solutions Specialist
US Public Sector

Chris Smithee
Program Manager

Breaking Down The Ransomware Attack

Are you prepared if you lose all your critical data? It could be any digital asset, from personal family pictures to sensitive customer records that you couldn’t get back unless you paid a ransom. This kind of attack is called Ransomware and it’s becoming increasingly common.

Ransomware keeps growing in sophistication and adversaries target a wide variety of organizations in many different industries. Your organization could be exposed to Ransomware when employees access compromised websites, open malicious documents or click the wrong link in an email. In most cases, once the data is encrypted, your only method of getting it back is paying the criminals. This can quickly become expensive based on your organization’s level of compromise.

Watch this special webcast focused on Ransomware. Leading the talk will be Nick Biasini from Cisco’s threat research team Talos and Joseph Muniz from the security architecture team.

Why Cisco? Cisco’s threat research team sees thousands of ransomware attacks each day, and offers resources to help organizations protect themselves. Talos recently created a tool to decrypt a specific Ransomware compromise for public use, free of charge.

We will focus on research and best practices to reduce the risk of exposur verses specific products.
Topics include:  
  • An overview of Ransomware
  • Trends for common Ransomware and how attacks have evolved
  • Security considerations to reduce risk of compromise



Joey Muniz
Cisco Security Architect - Americas


Nick Biasini
Talos Outreach

Apologies for the delay...

Sorry for the inconvenience, we are in the process of archiving this webinar. Please check back again soon and visit our home page

¿Cómo prevenir un alto impacto al negocio ante un ataque como WannaCry?
Mantenga protegida su organización de manera proactiva y prevéngase ante ataques de esta magnitud.

En los últimos días escuchamos a través de redes sociales, medios de comunicación y conversaciones del que pudiera ser uno de los peores y más extendidos ataques de malware jamás vistos en el mundo: El ataque de Ransomware "WannaCry".

¿Le queda claro exactamente cómo fue lanzado este ataque y por qué se propagó tan rápido?

¿Comprende bien las vulnerabilidades que se detonaron?

¿Está usted 100% seguro de que puede usted estar protegido si es lanzado nuevamente y vuelve a atacar?

Defina proactivamente una estrategia de seguridad para su negocio y evite que un ataque como el de WannaCry impacte a su negocio generando grandes pérdidas.

Mediante este webinar usted podrá:

  • Definir qué puede hacer su organización para protegerse de ataques futuros.
  • Identificar mejores prácticas para mantener protegida a su organización.
  • Participar en la sesión de preguntas y respuestas en vivo con los expertos. 



Ricardo Marques

Focando no Ransomware: Como manter-se protegido.

Ransomware traz uma perspectiva financeira cada vez mais interessante para os criminosos digitais. Esta ameaça está se espalhando como um incêndio. Junte-se a nós para um webinar gratuito onde iremos explorar o que é Ransomware, como ele se infiltra em um sistema e quais os passos que você deve tomar para proteger a sua organização.

Na abertura ao vivo do evento, Ricardo Marques irá compartilhar a sua perspectiva em relação ao Ransomware. O executivo falará como esta ameaça evoluiu, dar exemplos de ataques notáveis e falar sobre as novas tendências de segurança.

Você terá a oportunidade de conhecer a nova solução de defesa da Cisco para combater o Ransomware em ação. Ricardo Marques orientará sobre o seu funcionamento e a proteção adequada para a sua organização.

Neste webinar gratuito, você irá:

  • Aprender como os adversários estão evoluindo e as suas estratégias de ataque de Ransomware
  • Ver como a Defesa da Cisco de Ransomware oferece visibilidade a sua organização e capacidade de resposta
  • Identificar as melhores práticas para proteger a sua empresa deste tipo de ataque

Participe da nossa sessão de Perguntas & Respostas ao vivo para sanar suas dúvidas específicas e necessidades de sua organização.



Ricardo Marques
AMP Specialist for LATAM

Enfoque en ransomware: Cómo mantenerse protegido.

Ransomware es una perspectiva financiera cada vez mayor para los criminales. Se está extendiendo como el fuego. Únase a nosotros para un seminario web gratuito en el que vamos a explorar lo que es el ransomware, cómo se infiltra en un sistema, y más importantemente —¿qué medidas tiene que tomar para proteger su organización.

La apertura del evento en vivo, Omar Alcala compartirá su perspectiva sobre ransomware. Él va a hablar de cómo ha evolucionado el ransomware, dará ejemplos de ataques notables, y hablará de nuevas tendencias de seguridad.

Continuación obtendrá la oportunidad de ver nuestra nueva solución de defensa de ransomware en acción. Omar Alcala le guiará a través de cómo funciona y qué protección puede ofrecerle a su organización.

En este seminario web gratuito, usted:

  • Aprenderá cómo los adversarios han evolucionado y han reforzado sus estrategias de ataques de ransomware
  • Vea cómo la defensa ransomware de Cisco le da a su organización visibilidad y capacidad de respuesta
  • Identifique las mejores prácticas que su empresa puede utilizar para protegerse de los ataques

Únase a nuestra sesión de preguntas y respuestas en vivo para obtener respuestas a sus preguntas específicas y las necesidades de la organización.


Omar Alcala

IoT: Internet of Terror. Cuando la tecnología es usada en contra de nosotros.

El Internet de las cosas (IoT) es una de las transformaciones más importantes en la tecnología. En la dinámica actual de mercado crea excelentes oportunidades de negocio; sin embargo, al mismo tiempo amplia la plataforma de ataque para los delincuentes cibernéticos.

Conozca cómo puede integrar una arquitectura de seguridad que lo acompañe en esta transformación y evite dejar la puerta abierta a los atacantes.

Participe de este webinar durante el cual usted podrá:

  • Definir una estrategia de protección para el IoT.
  • Integrar una arquitectura de seguridad simple, abierta y efectiva.
  • Minimizar el riesgo de manera ágil



Omar Alcala Ruiz



Combata as Ameaças de Segurança na Nuvem com CloudLock CASB (Cloud Access Security Broker)

Gartner elegeu o CASB como a tecnologia número 1 em segurança da informação em 2016. Por que colocar a segurança da nuvem em primeiro lugar? Porque hoje as ameaças cibernéticas mais avançadas tem como alvo os indivíduos, os aplicativos que eles utilizam e os dados que eles acessam. Manter a sua empresa sob controle significa entender, abraçar e proteger a nuvem.

Nesta sessão você ira:

  • Aprender sobre os principais riscos de segurança cibernética que estão a sua volta
  • Identificar as principais ameaças cibernéticas do seu ambiente de nuvem
Manter-se confiante para responder a pergunta do CISO: Como a minha empresa fica segura na nuvem?



Ricardo Marques
Gerente de Soluciones Avanzadas

¿Cuál es mi estrategia de seguridad, detectar o remediar?

La adopción de una nube segura en un ambiente tan cambiante puede ayudarle a manejar la seguridad de su empresa, negocios y usuarios.

Acompañenos de este webinar durante el cual usted podrá:

  • Bloquear las amenazas antes de que sucedan.
  • Proteger a los usuarios, datos y aplicaciones en cualquier lugar a donde vayan.
  • Conocer como contar con una nube segura que evite impacto en la productividad.



Antonio Ramirez Macedo
Gerente de Soluciones Avanzadas

¿Seguridad en la Nube? Enfrente las amenazas con CloudLock CASB de Cisco.

Gartner nombró a CASB la tecnología de seguridad de la información # 1 en 2016.  ¿Por qué es la número uno?. Actualmente las amenazas cibernéticas más avanzadas se dirigen a los datos que las personas proporcionan para acceder a los diferentes tipos aplicaciones. Mantener a su organización bajo control significa entender, abrazar y asegurar la nube.

Si usted es nuevo o está familiarizado con CloudLock, únase a esta sesión para aprender cómo Cloud Access Security Broker (CASB) puede ayudar a  proteger los datos y usuarios en la nube.

Durante estas sesiones usted podrá:

  • Conocer los principales riesgos de seguridad cibernética que pueden afectar su organización.
  • Identifique las principales amenazas cibernéticas en el entorno dentro de la nube.
  • Prepárese para contestar con confianza a su CISO: "¿Cómo puede mi compañía permanecer segura en la nube?"



Jaime Villegas Nunez

Combatiendo las Amenazas Internas –Protegiendo su Agencia de Adentro hacia Afuera

Cuando Edward Snowden filtró información clasificada a los medios principales, trajo consigo los peligros representados por las amenazas internas a la consciencia pública y no sin un propósito. Las agencias de hoy en día se están ahogando en el temor que rodea a los ataques cibernéticos sofisticados, pero tal vez, el tipo de ataque más preocupante es la amenaza interna. De acuerdo a Forrester, el abuso por los maliciosos internos llega hasta el 25% de las brechas de información.  

Aprenda acerca de las mejores prácticas y tecnologías que debería estar implementando ahora para evitar convertirse en la próxima víctima de un ataque de alto perfil.  

  • Manténgase al tanto de los diferentes tipos de ataques de amenazas internas, incluyendo sus motivos y métodos de ataque.
  • Entienda porque las herramientas de seguridad convencionales como firewalls, antivirus y IDS/IPS no cuentan con el poder para enfrentar la amenaza interna
  • Entérese de las diferentes tecnologías, las políticas y las mejores prácticas que deben colocarse en sitio para ayudarle a detectar y frustrar las amenazas internas
  • Descubra como los network logs, particularmente NetFlow, pueden utilizarse para monitorear rentablemente las conductas sospechosas internas que pudieran indicar un ataque
  • Conozca acerca de los métodos de ataque emergente tales como muleware que podría agravar los ataques internos en los próximos años


Gerardo Carrion


Combatendo as ameaças internas – Proteja a sua empresa de dentro para fora.

Quando Edward Snowden vazou informações sigilosas para as mídias de massa, os perigos produzidos pelas ameaças internas vieram à tona do conhecimento público, e com razão. Atualmente, as agências estão preocupadas com os sofisticados cyber-ataques, porém também com o pior tipo de ameaça que existe – a ameaça interna. De acordo com a Forrester, abuso por parte de membros internos da empresa representam 25% das violações de dados. Saiba mais sobre as melhores práticas e tecnologias que devem ser implementadas para evitar que você seja a próxima vítima de um ataque. 

  • Conheça os diferentes tipos de ameaças internas, incluindo seus motivos e métodos de ataque
  • Entenda por que as ferramentas convencionais de segurança, como o firewalls, antivirus e IDS/IPS são poderosas no combate às ameaças internas
  • Obtenha conhecimento nas várias tecnologias, políticas e melhores práticas que devem ser coladas em prática para ajudar na detecção e impedir ameaças internas
  • Descubra como os logs de rede, particularmente o NetFlow, podem ser usados para monitorar de forma econômica os comportamentos internos suspeitos que poderiam indicar um ataque
  • Conheça os métodos de ataque emergentes, como o malware, que podem aumentar ainda mais as ameaças internas nos próximos anos



Ricardo Marques
Gerente de Soluções de Segurança Avançadas

Internet: Amigo ou Inimigo? As ameaças que chegam pela Rede e por E-mail

Com a quantidade crescente de informações disponíveis por e-mail e na Internet, o potencial de vazamento e comprometimento de dados nunca foi tão grande.
O ultimo relatório anual de segurança da Cisco aponta que o E-mail é o maior vetor de ameças para ataques digitais. Esses ataques têm o objetivo de distribuir malware que se infiltra nos data centers onde dados comerciais confidenciais de alto valor são armazenados. As defesas tradicionais, incluindo firewalls e soluções de antivírus de endpoint, não conseguem bloquear esses tipos de ataques.

Para enfrentar esses desafios, as organizações de hoje precisam de uma solução que forneça segurança em camadas para e-mail e web. Veja durante esse webinar, como as soluções de segurança de conteúdo da Cisco podem ajudá-lo a:

  • Manter o Foco na ameaça – Com proteção de e-mail e web de alta disponibilidade contra o ataques cada vez mais sofisticados e dinâmicos.
  • Garantir Alto desempenho – Por apresentar uma defesa em camadas, em um único dispositivo. Ele rapidamente bloqueia novas ameaças enviadas por e-mail e web.
  • Obter Inovação contínua – A segurança de e-mail e web da Cisco oferece as opções de implementação mais completas do setor. Com redução de custos e gerenciamento mais simples, integração mais rápida e sem complexidade. 



Ricardo Marques
Gerente de Soluções de Segurança Avançadas

Please complete the form below

S'il vous plaît remplir le formulaire


Por favor complete el siguiente formulario

Por favor, preencha o formulário abaixo