Guest

Cybersecurity Insights

Watch Cybersecurity Insight sessions on-demand including Tech Talks, Threats Insights, Customer and Business Insights.

Watch Live Network Security Broadcast

Upcoming Livecast: Cybersecurity Threat Insights and Securing the Network of the Future

  •  Thursday, 8th February, 2018
  •  60 Minute Live Broadcast

Join Cybersecurity Insights Live, where we will showcase the latest Cyber Threat updates and discussions on how to secure the Network of the Future. Learn how to use your network to detect and protect your business’s valuable data. We all want our networks to be secure, but how do you actually do this?

Register now

Cisco Live Melbourne 2018: Join the Experience online!

Between the 6th and 8th of March 2018 we will be live streaming our Cybersecurity Insights Talks so you don't miss out! Experience Tech Talks, Threat Insights, Business Insights and Customer Insights from a range of Cisco executives and industry thought leaders. Save the date to get access to exclusive online interviews and live demos.

2018 Recommended Sessions

Executive Insights with Stephen Dane

Executive Insights with Stephen Dane

Stephen Dane, Managing Director, Cisco Global Security Sales Organization, Asia Pacific and Japan.

Catch Stephen Dane share his insights around Cisco’s 2018 Annual Cybersecurity Report.

How to Defend Against Ransomware Threats So You Don’t Become a Hostage

How to Defend Against Ransomware Threats So You Don’t Become a Hostage

Matt Kaneko, Security Systems Architect, Cisco Security Business Group

How do you prevent ransomware from getting into your network, gaining control of your systems and files, and taking you hostage?

Threat Research at TALOS - A glimpse into the life of a Threat Hunter

Threat Research at TALOS - A glimpse into the life of a Threat Hunter

Nick Biasini, Threat Researcher Talos Security Intelligence and Research Group

People responsible for defending networks realize that the security threat landscape is constantly in flux as attackers evolve their skills.

A Guide for Encrypted Traffic Analysis

A Guide for Encrypted Traffic Analysis

TK Keanini, CTO of Cisco’s Advanced Threat Group.

Encryption can hide malware just as well as it can hide your own secrets. And that opened a whole can of worms (and Trojans, and viruses) for IT bosses.

 

2017 Top Sessions

Deakin University wanted a rapid uplift in their security’s visibility

Australia's leading tertiary provider resolves sophisticated cybersecurity needs.

Growing risk of cybersecurity attacks pushes this CEF business to get its security stack in order

WesCEF now has a greater sense of confidence armed with effective tools.

Mobile County Schools Stop Cyberattacks

Mobile County Public Schools needed an endpoint security solution that gave them rapid time to detection, more visibility into threats, automated detection and response.

Virginia State Agency Stops Threats Fast

Brad Johnson from Broadband Services Inc. explains how he deployed a next-generation endpoint security solution, Cisco AMP for Endpoints, at a Virginia State Agency.

Customer Insights

Innovative Security Operations: Effective Breach Readiness & Response

Innovative Security Operations: Effective Breach Readiness & Response

Innovative Secure Datacenter

Innovative Secure Datacenter

Innovative Secure Campus

Innovative Secure Campus

Innovative Secure Cloud

Innovative Secure Cloud

  • Wednesday, 7th March, 2018
  • 20 Minute Webinar
  •  Thursday, 8th March, 2018
  • 20 Minute Webinar
  •  Friday, 9th March, 2018
  • 20 Minute Webinar
  •  Friday, 9th March, 2018
  • 20 Minute Webinar

Business Insights

Changes facing the cybersecurity industry

Changes facing the cybersecurity industry

Endpoint Security, Your Last Line of Defense.

Endpoint Security, Your Last Line of Defense.

Simple hacking tools for your network

Simple hacking tools for your network

Designing ISE for Scale & High Availability

Designing ISE for Scale & High Availability

  • Wednesday, 7th March, 2018
  • 20 Minute Webinar
  • Wednesday, 7th March, 2018
  • 20 Minute Webinar
  • Thursday, 8th March, 2018
  • 20 Minute Webinar
  •  Thursday, 8th March, 2018
  • 20 Minute Webinar

Threat Insights

Beers with Talos - Crossover Edition

Beers with Talos - Crossover Edition

How to Defend Against Ransomware Threats So You Don’t Become a Hostage

Threat Research at TALOS - A glimpse into the life of a Threat Hunter

Threat Research at TALOS - A glimpse into the life of a Threat Hunter

Don't Send, Deliver!

Don't Send, Deliver!

  • Wednesday, 7th March, 2018
  • 20 Minute Webinar
  • Wednesday, 7th March, 2018
  • 20 Minute Webinar
  • Thursday, 8th March, 2018
  • 20 Minute Webinar
  •  Thursday, 8th March, 2018
  • 20 Minute Webinar

Tech Talks

Cisco Umbrella Investigation - The holy grail of incident response

Cisco Umbrella Investigation - The holy grail of incident response

Endpoint Security, Your Last Line of Defense.

Simple hacking tools for your network

Simple hacking tools for your network

Designing ISE for Scale & High Availability

Designing ISE for Scale & High Availability

  • Wednesday, 7th March, 2018
  • 20 Minute Webinar
  • Wednesday, 7th March, 2018
  • 20 Minute Webinar
  • Thursday, 8th March, 2018
  • 20 Minute Webinar
  •  Thursday, 8th March, 2018
  • 20 Minute Webinar