Cisco’s security portfolio is under a constant state of evolution to protect our customers as new threats also evolve. Join host Jason Wright for straight-to-the-point coverage and live demos of the latest developments in Cisco cybersecurity.
Marisa Chancellor Senior Director, Security & Trust Organization, Cisco, joins us to provide her unique take on some of the findings in the recent CISO Benchmark Study.
How do you build a secure data center quickly and effectively? Senior Solutions Architect Albra Welch joins me to demo how the Cisco Validated Design (CVD) provides a blueprint to get you there.
Vaishali Ghiya joins us to outline how Stealthwatch, AMP, and Umbrella integrate to help SOC analysts and managers improve visibility, reduce alerts, and respond to events faster.
|Cisco on Cisco: The CISO Benchmark Study||Portfolio (new entry)||Threat Response, Cloud Security, Machine Learning|
|How to accelerate your SOC||Cisco threat response, Umbrella, Stealthwatch||Threat Response|
|Secure Data Center CVD||Firepower, Application Centric Infrastructure||Data Center, Workload|
|Cisco Defense Orchestrator (CDO)||Firepower, Defense Orchestrator||Firewall, Data Center|
|Email Security Improvements in 12.0||Cloud Email Security, Email Security||Advanced Phishing Protection, DMARC, Domain Protection|
|Cisco Trusted Access||Duo||Multi-factor Authentication|
|A Quick Look at Multi-Instance Firewalls||Firepower (NGFW)||Firewall|
|Intro to Duo||Duo||Multi-factor Authentication|
|Umbrella Improvements||Umbrella||Web Security, Cloud Security|
|Cisco Threat Response||Threat Response||Incident Response|
|Threat Grid’s New Interface||Firepower (NGFW), Advanced Malware Protection (AMP), Umbrella, Stealthwatch, Threat Response||Cryptomining|
|Trends in Illicit Cryptomining||Threat Grid||Breach, Incident Response|
|Machine Learning in Cisco Security||Advanced Malware Protection (AMP), Threat Response, Umbrella, Stealthwatch||Machine Learning / Artificial Intelligence|
|Cisco and ThreatQuotient||Threat Grid, Umbrella||ThreatQuotient, Threat Intelligence Platform (TIP)|
|Protecting Workloads||Tetration, Firepower (NGFW), Application Centric Infrastructure||Data Center, Workload|
|Protecting Endpoints||Advanced Malware Protection (AMP), Threat Response||Endpoint|
|Securing Branch Offices with Umbrella and Meraki||Umbrella, Meraki, Secure Internet Gateway (SIG)||Branch, SD-WAN|
|Protecting Workloads with Tetration and Stealthwatch||Tetration, Stealthwatch||Data Center, Workload|
|Cisco and LogRhythm||SIEM, LogRhythm||SIEM|
|Cisco Email Domain Protect and Advanced Phishing Protection||Cloud Email Security, Email Security||Domain Protect, Advanced Phishing Protection, Phishing, DMARC|
|Breach Readiness and Response with AMP, SIG, and Services||Advanced Malware Protection (AMP), Umbrella, Secure Internet Gateway (SIG), Services||Breach, Incident Response|
|The Three Lenses of Security||Advanced Malware Protection (AMP), Umbrella, Secure Internet Gateway (SIG), Stealthwatch, Stealthwatch Cloud||Threat Response|
|Security in a Multicloud World||Cloudlock, Stealthwatch, Stealthwatch Cloud, Umbrella, Secure Internet Gateway (SIG)||Cloud Security|
Sorry, no results matched your search criteria(s). Please try again.
Drop in each week for a 60-minute live technical demo and Q&A with Cisco Security experts.
Request a free demonstration today to see Cisco integrated security solutions in action.