Join one of our deep dive technical workshops to get a feel of the technology
|Time||Room 1 (Max 20 pax)||Speaker||Description||Room 2 (Max 20 pax)||Speaker||Description|
|1.00PM - 2.00PMTime||Security Everywhere: A Simulation of the Integrated and Multi-layered Approach to Threat Defence||Leong Wing Churn||This session features a scenario-based demonstration that follows a user and security analyst as they fight off a series of targeted malware attacks. See how Cisco Security products interact in a unified fashion to provide a multi-layered ‘Cisco on Cisco’ solution that protects the network against advanced malware threats. Before an attack, Cisco Security products maintain a constant state of network protection, predicting and preventing attacks. During an attack, they integrate to identify, repel and quarantine threats as they happen. Finally, the network analyst can access tools to connect, analyze and understand attacks after they occur, and return the network and users to normal functionality as quickly as possible.||Advanced Security Analytics and Machine Learning for Network Security||Candice Griswold/Eric Rennie|
|2.00PM - 3.00PMTime||Reap the benefits of SDN with Cisco ACI Virtual Edge||Kwai Seng Lai||"Many customers leverage ACI (Application Centric Infrastucture) as more than just SDN. It enables cloud native applications, threat containment, network analytics, and provides a consistent policy model across multi-cloud platforms. With Cisco ACI Virtual Edge, customers can now leverage ACI's benefits on the existing Nexus or any traditional IP Infrastructure. Find out how Cisco makes it possible.
This session is for infrastructure and planning teams. Participants should be familiar with the basics of Cisco SDN(ACI). "
|Next Generation Cybersecurity: Accelerating Incident Response||Teo Leh Tee|
|3.00PM - 3.20PMTime||Break|
|3.20PM - 4.20PMTime||Cisco SD-Access: Network Automation and Segmentation||Steven Lau||Building a Container-Ready Infrastructure||Kwai Seng Lai||Is your infrastructure container-ready? Supporting the container is more than just providing the connectivity and opening up the firewall ports. The infrastructure must be ready to embrace a set of infrastructure policies for dynamic instantiation, de-structuring of microservices and protecting the applications. Join us to find why a different approach is required and how technologies can be leveraged.
This session is for infrastructure and planning teams which desire an understanding of container and infrastructure requirements.
|4.20PM - 5.20PMTime||Under the Hood: Next-Gen Cisco SD-WAN (Viptela) Architecture||Shamil Fernando||This session provides an introduction to the Cisco Next-Gen SD-WAN architecture, highlighting key concepts such as: centralised control plane and orchestration; secure, distributed data plane operation; performance aware delivery of on-premise and cloud delivered applications; policy driven network topology, segmentation and forwarding. This session is for attendees responsible for the design, deployment, and operation of enterprise WAN. Knowledge of enterprise WAN and network fundamentals is recommended.||Cisco Spark design (Build a Spark Bot)||Anand Hariharan|
|5.20PM - 5.40PMTime||Wrap up and close|
Sorry, no results matched your search criteria(s). Please try again.