Guest

Cybersecurity Insights

Watch Cybersecurity Insights broadcast from Cisco Live Melbourne including Tech Talks, Threats Insights, Customer and Business Insights

Watch Live

Join us for 52+ Cybersecurity Insights sessions broadcast from Cisco Live

  •   6-9 March 2018

Register for Cybersecurity Insights at Cisco Live to view online sessions including: Tech Talks, Threats Insights, Customer Insights and Business Insights.

Register now

Cisco Live Melbourne 2018: Join the Experience online!

Between the 6th and 8th of March 2018 we will be live streaming our Cybersecurity Insights Talks so you don't miss out! Experience Tech Talks, Threat Insights, Business Insights and Customer Insights from a range of Cisco executives and industry thought leaders. Save the date to get access to exclusive online interviews and live demos.

2018 Recommended Sessions

Executive Insights with Stephen Dane

Executive Insights with Stephen Dane

Stephen Dane, Managing Director, Cisco Global Security Sales Organization, Asia Pacific and Japan.

Catch Stephen Dane share his insights around Cisco’s 2018 Annual Cybersecurity Report.

How to Defend Against Ransomware Threats So You Don’t Become a Hostage

How to Defend Against Ransomware Threats So You Don’t Become a Hostage

Matt Kaneko, Security Systems Architect, Cisco Security Business Group

How do you prevent ransomware from getting into your network, gaining control of your systems and files, and taking you hostage?

Threat Research at TALOS - A glimpse into the life of a Threat Hunter

Threat Research at TALOS - A glimpse into the life of a Threat Hunter

Nick Biasini, Threat Researcher Talos Security Intelligence and Research Group

People responsible for defending networks realize that the security threat landscape is constantly in flux as attackers evolve their skills.

A Guide for Encrypted Traffic Analysis

A Guide for Encrypted Traffic Analysis

TK Keanini, CTO of Cisco’s Advanced Threat Group.

Encryption can hide malware just as well as it can hide your own secrets. And that opened a whole can of worms (and Trojans, and viruses) for IT bosses.

2017 Top Sessions

Deakin University wanted a rapid uplift in their security’s visibility

Australia's leading tertiary provider resolves sophisticated cybersecurity needs.

Growing risk of cybersecurity attacks pushes this CEF business to get its security stack in order

WesCEF now has a greater sense of confidence armed with effective tools.

Mobile County Schools Stop Cyberattacks

Mobile County Public Schools needed an endpoint security solution that gave them rapid time to detection, more visibility into threats, automated detection and response.

Virginia State Agency Stops Threats Fast

Brad Johnson from Broadband Services Inc. explains how he deployed a next-generation endpoint security solution, Cisco AMP for Endpoints, at a Virginia State Agency.

Customer Insights

Innovative Security Operations: Effective Breach Readiness & Response

Innovative Security Operations: Effective Breach Readiness & Response

  • Wednesday, 7th March, 2018
  • 20 Minute Webinar
Innovative Secure Datacenter

Innovative Secure Datacenter

  •  Thursday, 8th March, 2018
  • 20 Minute Webinar
Innovative Secure Campus

Innovative Secure Campus

  •  Friday, 9th March, 2018
  • 20 Minute Webinar
Innovative Secure Cloud

Innovative Secure Cloud

  •  Friday, 9th March, 2018
  • 20 Minute Webinar

Business Insights

Changes facing the cybersecurity industry

Changes facing the cybersecurity industry

  • Wednesday, 7th March, 2018
  • 20 Minute Webinar
Endpoint Security, Strategy for Apple IOS.

Endpoint Security Strategy for Apple IOS.

  • Wednesday, 7th March, 2018
  • 20 Minute Webinar
Simple hacking tools for your network

Simple hacking tools for your network

  • Thursday, 8th March, 2018
  • 20 Minute Webinar
Designing ISE for Scale & High Availability

Designing ISE for Scale & High Availability

  •  Thursday, 8th March, 2018
  • 20 Minute Webinar

Threat Insights

Beers with Talos - Crossover Edition

Beers with Talos - Crossover Edition

  • Wednesday, 7th March, 2018
  • 20 Minute Webinar

How to Defend Against Ransomware Threats So You Don’t Become a Hostage

  • Wednesday, 7th March, 2018
  • 20 Minute Webinar
Threat Research at TALOS - A glimpse into the life of a Threat Hunter

Threat Research at TALOS - A glimpse into the life of a Threat Hunter

  • Wednesday, 7th March, 2018
  • 20 Minute Webinar
Don't Send, Deliver!

Don't Send, Deliver!

  •  Thursday, 8th March, 2018
  • 20 Minute Webinar

Tech Talks

Cisco Umbrella Investigation - The holy grail of incident response

Cisco Umbrella Investigation - The holy grail of incident response

  • Wednesday, 7th March, 2018
  • 20 Minute Webinar

Endpoint Security, Your Last Line of Defense.

  • Wednesday, 7th March, 2018
  • 20 Minute Webinar
Simple hacking tools for your network

Simple hacking tools for your network

  • Thursday, 8th March, 2018
  • 20 Minute Webinar
Designing ISE for Scale & High Availability

Designing ISE for Scale & High Availability

  •  Thursday, 8th March, 2018
  • 20 Minute Webinar