25 past events found
Back to Search Begin New Search Save Search Auto-Notify
Prioritizing SSE to Protect the Modern...
Current IT environments and the reality of modern business practices have left organizations with no choice but to consider new security models. The need for security resilience and the ability for business leaders to protect the integrity of every aspect of their businesses so that they can withstand - not just survive - and emerge stronger from unpredictable threats or changes has never been greater. In this webinar, Enterprise Strategy Grou...
January 24, 2023
Organizer: Cisco
Location: Webcast
Add Favorite
Through the Eyes of the Wolf: Insights...
The once-upon-a-time security architecture that was just a stack of controls at mostly a point in the network for different security vectors is a methodology that most security practitioners know well. Fast forward to the present day where the security stack is more flexible to adapt to the borderless perimeter of most orgs – it’s fair to state that we’ve learned to architect these controls to adapt to the shift in the securi...
January 18, 2023
Organizer: Cisco
Location: Webcast
Add Favorite
Through the Eyes of the Wolf: Insights...
The once-upon-a-time security architecture that was just a stack of controls at mostly a point in the network for different security vectors is a methodology that most security practitioners know well. Fast forward to the present day where the security stack is more flexible to adapt to the borderless perimeter of most orgs – it’s fair to state that we’ve learned to architect these controls to adapt to the shift in the securi...
January 18, 2023
Organizer: Cisco
Location: Webcast
Add Favorite
Cut Through Cybersecurity Complexity by...
A rise in remote employees and an increased reliance on SaaS applications create new, wider gaps in security. It’s more challenging to protect users at the edge — ensuring seamless connections that optimize productivity without creating performance issues that drag down user satisfaction.
January 11, 2023
Organizer: Cisco
Location: Webcast
Add Favorite
How to Leverage Threat-Informed Defense...
Normally agility and innovation are good things. Unfortunately, adversaries have taken these traits to heart, leaving security operations overloaded and overwhelmed. Building on lessons learned from our friendly Red Team operators, how can we better control the situation and adapt to the shift in the security landscape? Are we even focused on the right threats for our environment? View the webinar to take a look at how we can bring clarity to...
January 11, 2023
Organizer: Cisco
Location: Webcast
Add Favorite
Bring Zero Trust Architecture into focu...
Zero Trust can be just out of reach for many organizations or remain stuck as an InfoSec initiative. To make Zero Trust relevant as a way of doing business, organizations use DMARC deployment as their first step in embracing Zero Trust. DMARC is an email interoperability standard that replaces the "trust everything by default and filter out bad email" model with a "trust only DMARC-compliant email" model to realize the goal of Zero Trust withi...
May 17, 2022
Organizer: Cisco
Location: Webcast
Add Favorite
Announcing New Secure Connection Capabi...
Our operational world is rapidly evolving and expanding to connect and provide new capabilities for industrial systems. As you bring more systems onto an IP backbone, new solutions are needed to connect an ever-increasing number of industrial devices, at faster speeds and greater availability, with asset security, edge applications, and flexible management that can scale across the entire operational network.Cisco is the market leader in bring...
January 25, 2022
Organizer: Cisco
Location: Webcast
Add Favorite
Go Dox Yourself: Staying Safe(r) Online...
In this webinar, you will learn: Why doxxing happens, and the most common doxxing methods used by attackers How to instruct a non-security audience on the security mindset What recycling slogans can teach us about maintaining our online presence News reports on doxxing (the practice of researching private or identifying information about someone online, typically with the intent to publicize it) have increased exponentially over the last sever...
January 19, 2022
Organizer: Cloud Security Alliance (CSA)
Location: Webcast
Add Favorite
#CiscoChat Live: Redefining NetWORK Security
Our Cisco experts and guests chat about how the integration of Cisco Secure Firewall + Secure Workload is securely accelerating application delivery by allowing NetOps to start running at DevOps speed, and what that means for business success.
June 9, 2021
Organizer: Cisco
Location: Virtual
Add Favorite
Delivering Critical Customer Outcomes w...
Working from home is here to stay. For businesses of all shapes and sizes, the needs are clear: great broadband connectitivy, protection from cyber criminals and threat actors, maintaining the in-office collaboration experience, flexibility to provide this outcome for the organization in a financially responsible way with OPEX models. The good news is for communication services providers (CSPs), these needs represent a valuable, monetizable, c...
October 27, 2020
Organizer: Cisco
Location: Webcast
Add Favorite
Back to Search Begin New Search