Cyber Threat Response

Stop the Cybercriminals

Defending real world cyber threats requires a layered approach as no single defense tactic is 100% effective. Read the CTR (Cyber Threat Response magazine how the cyber criminals are taking advantage and exploiting the breaches and how the good guys are stopping the threats.



Smash and Grab

Mr. Black partners with Mr. Orange to attack HackMDs servers, exploiting new vulnerabilities to gain network control. Download chapter 1 to find if HackMDs will be able to stop the attack.

Download Chapter


Dr. Howser and any regular employee can help hacker to hijack your data through Phishing. Download chapter 2 and check it out how HackMDs stopped the Hospital from being attacked by Ransomware.

Download Chapter

Insider Threats

After last failed attempt to infiltrate the network, Mr. Black hires Mr. Brown to get into the hospital using stolen credentials. Can the tech team stop this inside threat? Download chapter three to find out.


Download Chapter

Compromised Laptop

Dr. Howser unprotected home network will be used by Mr. Black as a way to infect HackMDs network.  How can HackMDs protect the edge of their network? Download chapter four to know how to.


Download Chapter

Attack the Branch

Mr. White is trying to plant a physical device in the branch office, Mr. Black is getting frustrated with his many failed attempts, this time the plan is too good to fail. Download the last chapter (Five) to see the results.


Download Chapter

Cyber Threat Response Magazine

If you would like us to send you hard copy, please complete the form. All fields are mandatory. Offer valid while stocks last.


Cisco Live Melbourne 2018: Join the experience online!

Live streaming and exclusive online interviews. 6-9 March 2018

Watch here
Cisco Live Melbourne 2018: Join the experience online!

Cybersecurity Insights

Security at the Boardroom

Cybersecurity Executive Insights with Stephen Dane. Check out the Insight from Stephen Dane talking to David Braue from CSO Magazine.

Threats Everywhere, Get Security Everywhere

Advanced Malware Protection (AMP) and Threat Grid Sandboxing Have a better understanding.

Dynamic Threat Landscape

Cybersecurity Executive Insights with Steve Martino (Vice President, Chief Information Security Officer, Cisco); David Braue (CSO Magazine Journalist).

Discover More with the Cisco Stealthwatch

Network Visibility & Enforcement– Cisco Stealthwatch David Cocchiara (Director of Customer Success & Stealthwatch Operations, Cisco) & Gail Ellison (Cisco Security Marketing Manager).

You may also be interested in:


Cisco Enterprise Agreement

Protect with network security, email and web security, and network policy and visibility technologies.

Learn More →


The Anatomy of an

See how easily one hacker hooks a big business. Learn how to avoid being lured in next

Get your Cybersecurity Guide →



It helps to have the largest threat detection network in the world protecting your organization.

Meet Talos →


Security products and solutions

Find out all the ways Cisco detects, responds to, and protects against attacks.

Extend security →