Menu

Menu

Webinars

Menu

Webinars

A secure network is
a Cisco network

Explore Cisco security webinars below.

A secure network is
a Cisco network

Explore Cisco security webinars below.

A secure network is
a Cisco network

Explore Cisco security webinars below.

Security Demo Fridays


Every Friday at 1 p.m. ET/10 a.m. PT.
Drop in each week for a 60-minute live technical
demo and Q&A with Cisco security experts.

Menu

Menu

Webinars

Menu

Webinars

Cisco Security Webinars.

Explore the Cisco security webinars. Register for upcoming events or watch pre-recorded webinars.


Featured Webinar

Another Day, Another Data Breach

September 6, 2018 at 1PM ET/10AM PT

By now you have probably heard the importance of investing in security. Join Cisco to hear some key recommendations that can dramatically improve your security posture.
Register

Forrester security survey results: 3 things you need to know

September 12, 2018 at 1PM ET/10AM PT

In this webinar, you'll learn how IT professionals are addressing security effectiveness and what you should do to improve the effectiveness of your own security environment.

Register

Can your firewall do that?

September 13, 2018 at 1PM ET/10AM PT

Join us for an overview of the Cisco Next-Generation Firewall (NGFW). We’ll showcase the firewall’s best-of-breed capabilities and how it is integrated with the rest of the Cisco security ecosystem.

Register

A Modern Look at Security Analytics

September 20, 2018 at 1PM ET/10AM PT

Are you looking to establish a strategic framework as you develop a security analytics architecture for your business? If so, this session is for you.

Register

Unlocking the Security Potential of Your Network

September 25, 2018 at 1PM ET/10AM PT

One of your greatest security assets is your network. Are you using it? Join us to learn how you can activate the security capabilities of your network to address your biggest security challenges.

Register

A Modern Look at Security Analytics

September 20, 2018 at 1PM ET/10AM PT

Are you looking to establish a strategic framework as you develop a security analytics architecture for your business? If so, this session is for you.

Register

Pre-Recorded Webinars

Securing Multicloud and Hybrid Networks with Stealthwatch Cloud
The accelerating pace of innovation is driving cloud adoption, and many organizations are operating with multiple cloud infrastructures in addition to their on-premises network. Unfortunately, gaining visibility and properly protecting these diverse environments is difficult, often requiring excessive time spent hunting through logs and manually correlating events.
Watch On-Demand
Cisco Secure Data Center Summer Webinar Series: An Overview
Sam Rastogi, Cisco Product Marketing Manager, takes you through the following:
  • Overview of key trends and security challenges facing today’s modern data center
  • Learn about Cisco’s vision, strategy, and new security architecture for the modern data center to enable workload protection across physical data centers to multi-cloud environments
  • Find out how Cisco’s Data Center Security enables you to gain greater visibility, segmentation, and threat protection"
Watch On-Demand
Cisco Secure Data Center Solution Architecture and Use Cases
Jamey Heary, Distinguished Systems Architect, covers the following:
  • Secure Data Center Architecture & Technology Deep Dive and unique product integrations
  • See how these solutions work in action
  • Understanding the solution through real world use cases by reviewing actual customer scenarios that show how to introduce automation, reduce complexity and increase agility
Watch On-Demand
Multiply the Impact of Your Security Team with Managed Security Services
If you are responsible for network security, your job is getting harder. The security environment is more complex than ever and the cybersecurity talent shortage doesn’t make it any easier. There is a lot for IT teams to manage. But you don’t have to do it by yourself. Cisco Managed Security Services makes your operations more efficient and gives you time to focus on strategic projects. Attend this webinar to learn what Cisco Managed Security Services can do for you.
Watch On-Demand
Cryptomining: Defending Against the Digital Gold Rush

Cryptomining has exploded in popularity, but users trying to cash in on this digital gold rush may not be aware of the company they keep. In this free webinar, our experts will analyze the latest trends and provide practical security measures you can take to defend your organization.

Watch On-Demand
VPNFilter. Global malware threat discovered. What you want to know.

Learn how this malware system has the ability to steal website credentials and monitor certain protocols. As well as its destructive capability that can turn infected devices completely unusable.

Watch On-Demand
Steps to CDM Success

Did you know that your existing Cisco Security investment is already on the CDM Approved Products list? Join us to discuss how your existing investment in Cisco can meet CDM and FISMA requirements. We will also take you through a review of CDM and NIST requirements. Learn where to go for information on reporting and interoperability, and know who can help.

Watch On-Demand
Cybersecurity Report Talks: Visibility past, present and future

The old adage is true: You can’t defend what you can’t see. But how has visibility evolved in the threat landscape? In this free webinar, experts from Cisco along with our technology partners Anomali and Lumeta will bring the results of the 2018 Annual Cybersecurity Report to life. They’ll explore the latest findings on shadow IT networks, encrypted traffic patterns, and legitimate uses of C2.

Watch On-Demand
Cybersecurity Report Talks: Managing Vulnerabilities

Amid the headlines of major breaches and threats, vulnerabilities may seem like a secondary concern for defenders. However, adversaries continue to exploit these weaknesses to launch attacks. In this free webinar, experts from SAINT, Qualys and Cisco PSIRT will explore the findings from the 2018 Annual Cybersecurity Report on patch management, remediation, and more. You’ll have the chance to ask the experts your questions during our live Q&A, and get the deeper story behind the data.

Watch On-Demand
Zero Trust on a Beer Budget

Join Dr. Chase Cunningham, Principal Analyst, with Forrester Research outline how to adopt a Zero Trust Model and Jeff Fawcett, Consulting Principal Director, with Cisco outline the five principles for measuring it.

Watch On-Demand
Better Manage Cyber Risk with Cybersecurity and Insurance

Cyber risk is a concern for organizations, with malware top of mind. We also know that decisive action is needed in the face of this risk. Join Cisco and insurance leader Allianz to learn more about bringing together the key pieces needed to manage cyber risk: security technology, secure devices, cybersecurity domain expertise and enhanced cyber insurance.

Watch On-Demand
Cybersecurity Report Talks: Taking Down the Network Inside and Out

In the 2018 Cisco Cybersecurity Report, threat researchers explored the unprecedented level of destructive, network-based attacks that rocked the security community. In this free webinar, experts from Talos and Radware will explore their findings on DDoS attacks, wiper malware, and more. You’ll have the chance to ask the experts your questions during our live Q&A, and get the deeper story behind the data.

Watch On-Demand
Build a Better Incident Response Program

In this on-demand webinar, we’ll explain how the market has shifted away from a reactive approach for incident response and why proactive incident response services need to be a critical part of every security strategy. Sean will explore the Who, What, Where, Why, and How when it comes to Cisco’s Incident Response Services. Danielle will dive into case studies that demonstrate how real-world programs have been used to improve organizations’ overall security.

Watch On-Demand
Agency Responsibilities When Adopting Cloud Services in the Current Threat Environment

We will explain the key risks inherent in the ongoing use of productivity, file storage and collaboration cloud services, the agency and service provider responsibilities, and how Cisco Cloudlock (with FedRAMP ATO) can enable secure cloud service adoption by protecting user accounts and data.

Watch On-Demand
Ransomware Defense: The Threat is Real

Ransomware continues to be one of the most important security concerns today. The "WannaCry" attack alone reached into billions of dollars, making it one of the most damaging examples. The threat is real. Do you know how ransomware gets in and how to protect against it? Get prepared to defend against today’s ransomware threat.

Watch On-Demand
Your network is your best security tool. Are you using it?

One of your greatest security assets is your network. Are you using it? Learn how Cisco Network Visibility and Enforcement can help you use your network to address your biggest security challenges.

Watch On-Demand
Securing the Cloud and Your Digital Future in AWS

As more organizations move services and applications to Amazon Web Services (AWS), they still need to ensure their workloads are secure and compliant. Cisco Stealthwatch Cloud provides automatic threat detection and visualization related to AWS and other cloud infrastructures using advanced modeling and machine learning techniques. It enables turn-key activation for customers using AWS and delivers actionable security alerts without generating security-related noise.

Watch On-Demand
Encrypted Traffic Analytics: Detecting Malware without Decryption

Organizations have long relied on encryption for privacy and security. However, attackers are now using encrypted traffic to hide malware and evade detection. According to Gartner, by 2019, 70-percent of all network attacks will use encryption.

Watch On-Demand
2018 Annual Cybersecurity Report Readout

Supply chain attacks. Malware that evades detection. Malicious web traffic. Our threat researchers and experts have studied the latest developments in the threat landscape and compiled them into our 2018 Annual Cybersecurity report. Join our free webinar for a live review of the most important findings, including industry best practices, and have the opportunity to ask your questions.

Watch On-Demand
Smarter, faster security through LogRhythm and Cisco integrations

LogRhythm and Cisco are committed to helping you enhance your security operations through the seamless integration and powerful capabilities of the LogRhythm Threat Lifecycle Management platform and Cisco’s Threat Grid, Umbrella, Firepower and ISE. LogRhythm integrates with over three dozen Cisco products, providing centralized visibility and advanced security analytics across the Cisco-enabled environment and makes security events actionable in the network. Stay in front of cyber adversaries and proactively detect, respond to and remediate cyberthreats with this powerful integration.

Watch On-Demand
Moving to the cloud, staying compliant, and staying secure

As agencies continue to transition to the cloud it’s more important than ever to stay secure and stay in compliance with your regulatory requirements. The NIST Cybersecurity Framework can guide your security implementation and make sure you use the risk based approach called out in the Cybersecurity Executive Order.

Watch On-Demand
A New Way to Look at Cloud Security with Cisco Stealthwatch Cloud

Join us for a discussion which reviews Cisco's recent acquisition of Observable Networks, now called Stealthwatch Cloud. Learn how this strategic addition to Cisco's security portfolio is yielding compelling results by providing security-relevant visibility into network behavior across all topographies with incredible accuracy and very low noise. Join us as we discuss how this cloud-native solution is being used to protect traditional networks and cloud environments including AWS VPCs, Azure and others. We’ll show a demo and answer your specific questions.

Watch On-Demand
IoT Threat Defense: Design, Validation, Proof

Join us for an engaging conversation where we’ll discuss, with the author Bart McGlothin, the Cisco IoT Threat Defense solution. You’ll learn: • Why Cisco IoT Threat Defense provides essential and effective security for the Internet of Things • How our validated design offers credible proof of its advanced capabilities, highlighting IoT in Manufacturing • How your organization can benefit from Cisco IoT Threat Defense today.

Watch On-Demand
Closing the Skills Gap Chasm with Automation & Actionable Analytics

Threat detection is an inherently difficult practice due to cunning adversaries and evolving attack methods. Instead of taking a reactive approach, companies can use global security telemetry to identify threats in the wild before they arrive howling at the gates. Join this webinar with experts Daniel Bardenstien, Christopher Meile and Chris Stewart of Exabeam, with Jessica Bair of Cisco Threat Grid, as they discuss closing the skills gap with automation and actionable analytics.

Watch On-Demand
Boosting efficacy and efficiency with SaaS security

Software-as-a-Service (SaaS) security can help you address budget challenges while providing more actionable intelligence. In this session, you will learn how SaaS and Cisco Stealthwatch Cloud can simplify technology deployment and maintenance, provide flexible pricing options, make your security team more efficient, and lower security “noise” and false alerts.

Watch On-Demand
The deepest enterprise visibility and control for iOS devices

The Cisco Security Connector app makes it easy to ensure compliance of your enterprise-owned iOS devices, whether they’re on the corporate network, public Wi-Fi or cellular networks. You can simplify incident investigations by rapidly identifying what happened, who it affected, and the risk exposure, without impacting your employees’ mobile experience. Register now to attend a technical deep dive session on the Cisco Security Connector.

Watch On-Demand
Dismantling Supply Chain Attacks
Now that the dust has settled, learn what really happened behind the scenes of some of the most high-profile supply chain attacks in recent memory. Get the story of the origin of these two threats, as well as professional recommendations for how to protect your organization from similar attacks.
Watch On-Demand
Dissecting a Breach: An Incident Responder's Perspective

The ability to rapidly analyze information about your data breach is critical. Join us for this webinar to learn from experienced Cisco incident responders who will dissect actual breach response scenarios. You’ll gain technical and practical insight into actions you can incorporate into your own incident response plans to manage and reduce overall impact an incident.

Watch On-Demand

+ View Additional Webinars 

- Hide Additional Webinars 

GDPR: Here's what you absolutely need to know

The General Data Protection Regulation (GDPR) deadline is May 2018, and you already know about the potential non-compliance penalties. Join us and we'll simplify the regulation and show you a practical approach to compliance. It's not too late.

Watch On-Demand
IoT and Real-World Cyber Risks
The Internet of Things promises many benefits: improved efficiency, higher productivity, better decision-making.This session explores the real-world challenges associated with IoT and recommends a proven approach toward effective security. Realize the benefits of the Internet of Things.
Watch On-Demand
Cisco Active Threat Analytics

Cyber security teams must protect their organizations' data and privacy and support new business initiatives while defending against dynamic cyberattacks. Some of these attacks will evade even the best tools. With today’s talent shortage, how do you effectively manage security operations in the face of these challenges? Discover how Cisco Active Threat Analytics can help.

Watch On-Demand
Intelligent Incident Response

A data breach occurs. Your incident responders move into action to reduce damage and exposure. The ability to coordinate and analyze threat intelligence is a critical tool for incident response teams. In every Cisco incident response investigation, anywhere in the world, a dedicated Talos resource is made available to the incident response team.

Watch On-Demand
Accelerate Malware Analysis with Orchestration

Watch this on-demand webinar with Cisco and ThreatConnect, where we discuss how to utilize orchestration to enhance malware analysis capabilities and protect your organization from todays advanced malware.

Watch On-Demand
Nyetya. Global Ransomware Attack. What you want to know.

Hear from Martin Lee, techinal lead on Cisco’s Talos threat research team, to understand the latest in the new malware variant, that we named Nyetya.

Nyetya is nasty because it encrypts the master boot record (like a table of contents for a hard drive) of a computer -- and uses three ways to spread automatically in a network, one of which is the known Eternal Blue vulnerability, which WannaCry used as well.

Watch On-Demand
The Ultimate Guide to Business Email Compromise

Move over ransomware—According to the Cisco Midyear Security Report, Business Email Compromise (BEC) is one of the most important and prevalent email-based threats that organization face. In this on-demand webinar, our cybersecurity experts explore two real-life examples of how a BEC attack happened, how it impacted the companies—and most importantly, what you can do to stop similar attacks.

Watch On-Demand
Finding a Career in Cybersecurity: Panel on Job Success

For those looking to break into the cybersecurity industry, the options can be overwhelming. Should you go back to school? Do online courses? How can you find the right role that matches your passions and skills? In this free webinar, led by Learning@Cisco Manager Tom Gilheany, we’ll be diving into how to answer these questions and more. After a brief introduction to set the scene, our panel of experts will discuss how they got their role, lessons learned, and advice for jobseekers like you.

Watch On-Demand
Reinventing Network Intrusion Detection with Machine Learning

Watch this webinar with experts Raj Sivasankar and Josh Rosenthol of BluVector, and Jessica Bair of Cisco Threat Grid; as they discuss how to utilize machine learning, sandboxing, threat intelligence and automation to enable analysts to find, confirm and contain even the newest and most sophisticated threats.

Watch On-Demand
Exploring Email: The #1 Threat Vector

In the latest Talos cybersecurity webinar, expert Jaeson Shultz revealed the latest trends in email security, including recent high-profile threats. Watch the recording to learn more.

Watch On-Demand
Combating Targeted Malware with ThreatQ

Watch this on-demand webinar in which the experts Jeremy Linden of Cisco Umbrella, Jessica Bair of Cisco Threat Grid and Mike Clark of ThreatQuotient discuss how to utilize a Threat Intelligence Platform to enhance malware analysis capabilities and prevent access to malicious domains

Watch On-Demand
Cisco and IBM: Integrated Defense for Effective Security

Cisco and IBM Security have joined forces to fight this criminal collaboration, delivering an integrated approach across networks, users and cloud. Watch this webinar with experts Jessica Bair of Cisco and Chris Meenan of IBM Security as they discussed how to leverage this partnership to provide rapid detection and response across the diversity of sophisticated threats.

Watch On-Demand
Not Just Another Firewall

Organizations realize that when they are breached, their network is imperiled and business can suffer. To be effective security has to be simple while delivering business resiliency in the face of advanced threats. In this session, experts from IDC and Cisco explain how the NGFW market continues to evolve to meet this challenge.

Watch On-Demand
IPS Myths Debunked

The focus on zero-day attacks and next-generation firewalls has led many to miss the value that a dedicated intrusion prevention system provides to an organization. In this session, experts from IDC and Cisco dispel the myths about IPS and explain why these devices remain a critical part of an effective network defense.

Watch On-Demand
The Case for Next-Generation Intrusion Prevention

Many think with the adoption of a next-generation firewall (NGFW), that a stand-alone intrusion prevention system (IPS) is no longer required. That’s simply not true. This session explores use cases where next-generation IPS (NGIPS) can provide visibility, threat detection and response, and malware discovery in areas of your network that remain off limits to firewall inspection and controls.

Watch On-Demand
The Ransomware Threat: New Tactics and How to Fight Back

The rise of ransomware has become one of the most widespread and financially damaging threats facing businesses today. But, there are steps you can take to reduce the risk of ransomware and protect your business. Watch this on-demand webinar.

Watch On-Demand
Combat Cybercrime with an Incident Response Plan

What’s the missing piece of many security approaches? A strong threat management strategy. Learn from expert Sean Mason how your organization can design an incident response plan—and why it matters now more than ever.

Watch On-Demand
Cyber Attack Preparedness - Can We Ever Be Ready?

This webinar covers the importance of retrospective security for protection before, during and after an attack using tools such as Cisco Stealthwatch and Cisco Advanced Malware Protection (AMP)

Watch On-Demand

Webinaires de sécurité Cisco.

Le nouveau modèle de sécurité: Avant, pendant et après une attaque

Merci pour votre patience. Nous travaillons actuellement sur certaines mises à jour du site. S'il vous plaît vérifier à nouveau plus tard.

Webinarios de Seguridad de Cisco.

El nuevo modelo de seguridad: Antes, durante y después de un ataque

Featured Webinar

Las Mejores Prácticas Para Asegurar O365: Correo Electrónico, Usuarios, Datos y Aplicaciones

19 de septiembre de 2018 11h ET / 8h PT

Cisco ofrece seguridad y control incomparables de correo electrónico y aplicaciones en la nube para mejorar la postura de seguridad de los clientes de Office 365.

Registo

Pre-Recorded Webinars

Defendemos su red de la criptominería
Los autores de amenazas están utilizando la criptominería ilícita de modo creciente como una fuente de ingresos sencilla. La criptominería es la producción de moneda virtual —también conocida como criptomoneda—, como Bitcoin y Monero. Se obtiene a expensas del rendimiento del sistema y del consumo de energía. Además, los autores de amenazas se están infiltrando en las redes y utilizando los recursos de los computadores de sus víctimas para realizar este trabajo. En este webinar le explicamos cómo defender su organización de la criptominería ilícita con el portafolio de seguridad de Cisco.
Ir al webinar
Cyberseguridad, ante todo
Las estadísticas de ataques cibernéticos se incrementa a diario, ransomware infecta equipos silenciosamente y los responsables de seguridad no pueden detectarlos con sus múltiples proveedores y soluciones, haciendo cada vez más complejo la protección de sus organizaciones. En este webinar presentaremos la estrategia de Seguridad que tenemos para usted.
Ir al webinar
¿Cómo prevenir un alto impacto al negocio ante un ataque como WannaCry?
¿Cómo prevenir que un ataque como WannaCry impacte altamente a su negocio? Mantenga protegida su organización de manera proactiva y prevéngase ante ataques de esta magnitud
Ir al webinar
Cyberseguridad, ante todo
Las estadísticas de ataques cibernéticos se incrementa a diario, ransomware infecta equipos silenciosamente y los responsables de seguridad no pueden detectarlos con sus múltiples proveedores y soluciones, haciendo cada vez más complejo la protección de sus organizaciones. En este webinar presentaremos la estrategia de Seguridad que tenemos para usted.
Ir al webinar
¿Combatiendo las Amenazas Internas –Protegiendo su Agencia de Adentro hacia Afuera
Cuando Edward Snowden filtró información clasificada a los medios principales, trajo consigo los peligros representados por las amenazas internas a la consciencia pública y no sin un propósito. Las agencias de hoy en día se están ahogando en el temor que rodea a los ataques cibernéticos sofisticados, pero tal vez, el tipo de ataque más preocupante es la amenaza interna. De acuerdo a Forrester, el abuso por los maliciosos internos llega hasta el 25% de las brechas de información.
Ir al webinar
¿Cuál es mi estrategia de seguridad, detectar o remediar?
La adopción de una nube segura en un ambiente tan cambiante puede ayudarle a manejar la seguridad de su empresa, negocios y usuarios. Acompañenos de este webinar durante el cual usted podrá: • Bloquear las amenazas antes de que sucedan. • Proteger a los usuarios, datos y aplicaciones en cualquier lugar a donde vayan. Comoncer como contar con una nube segura que evite impacto en la productividad.
Ir al webinar
Enfoque en ransomware: Cómo mantenerse protegido.
El ransomware ha explotado en popularidad. Obtenga información acerca de esta amenaza dinámica y vea una demostración de nuestra nueva solución de defensa de ransomware presentada por Omar Alcala.
Ir al webinar
¿Seguridad en la Nube? Enfrente las amenazas con CloudLock CASB de Cisco.
Conozca como las soluciones de Cloud Access Security pueden proteger las aplicaciones y la infraestructura en la Nube.
Ir al webinar

Webinars de segurança da Cisco.

O Novo Modelo de Segurança: Antes, durante e após um ataque.

Featured Webinar

Saiba como tornar a sua empresa e seus negócios salvos das ameaças cibernéticas

14 de junho de 2018 às 11h ET / 8h PT

O aumento da mobilidade e flexibilidade no local de trabalho reduziu custos e aumentou a produtividade, a inovação e a independência, mas isso tem um preço. As empresas não estão mais protegidas por trás do firewall ou gateway de segurança da Web. Como a nuvem está se tornando comum rapidamente, as soluções de segurança de rede precisam se adaptar.

Registo

Pre-Recorded Webinars

Internet: Amigo ou Inimigo? As ameaças que chegam pela Rede e por E-mail
Com a quantidade crescente de informações disponíveis por e-mail e na Internet, o potencial de vazamento e comprometimento de dados nunca foi tão grande. O ultimo relatório anual de segurança da Cisco aponta que o E-mail é o maior vetor de ameças para ataques digitais. Esses ataques têm o objetivo de distribuir malware que se infiltra nos data centers onde dados comerciais confidenciais de alto valor são armazenados. As defesas tradicionais, incluindo firewalls e soluções de antivírus de endpoint, não conseguem bloquear esses tipos de ataques. 
Visualizar o webinar
Saiba como tornar a sua empresa e seus negócios salvos das ameaças cibernéticas
O aumento da mobilidade e flexibilidade no local de trabalho reduziu custos e aumentou a produtividade, a inovação e a independência, mas isso tem um preço. As empresas não estão mais protegidas por trás do firewall ou gateway de segurança da Web. Como a nuvem está se tornando comum rapidamente, as soluções de segurança de rede precisam se adaptar.
Visualizar o webinar
Combatendo as ameaças internas – Proteja a sua empresa de dentro para fora.
Quando Edward Snowden vazou informações sigilosas para as mídias de massa, os perigos produzidos pelas ameaças internas vieram à tona do conhecimento público, e com razão. Atualmente, as agências estão preocupadas com os sofisticados cyber-ataques, porém também com o pior tipo de ameaça que existe – a ameaça interna. De acordo com a Forrester, abuso por parte de membros internos da empresa representam 25% das violações de dados.
Visualizar o webinar
Combata as Ameaças de Segurança na Nuvem com CloudLock CASB (Cloud Access Security Broker)
Webinar Seja você um novato ou conhecedor do CloudLock, participe desta sessão para saber como a nossa solução CASB ajuda os clientes a proteger os dados e os usuários na nuvem.
Visualizar o webinar
Focando no Ransomware: Como manter-se protegido.
O Ransomware cresceu a sua popularidade. Obtenha informações sobre esta ameaça dinâmica e veja uma demostração de nossa nova solução de defesa de Ransomware apresentada por Ricardo Marques.
Visualizar o webinar