Hi [[ session.user.profile.firstName ]]

Cisco Umbrella

  • Date
  • Rating
  • Views
  • 6 Degrees of Network Security
    6 Degrees of Network Security
    Negisa Taymourian, Product Marketing Manager, Cisco Umbrella Recorded: Feb 26 2019 37 mins
    Are common security pitfalls putting your network at risk? We get it. More and more users are working wherever they please — not always using the VPN. And you may not have visibility to all the apps in use across your organization. While firewalls are ok, they won’t protect users when they are off network. There’s a lot standing between you and a safe network. Your security shouldn’t be one of them. Join us for our webinar, "6 Degrees of Network Security," and learn how to avoid 6 common security pitfalls that put your users, their devices, and your data at risk.
  • Gearing up for 2019 — Best Practices to Consider
    Gearing up for 2019 — Best Practices to Consider
    John Strand and Jake Williams - SANS Senior Instructors & John Pescatore, SANS Director of Emerging Security Trends Recorded: Feb 19 2019 126 mins
    Join John Strand and Jake Williams - SANS Senior Instructors along with John Pescatore, SANS Director of Emerging Security Trends for a discussion on your best strategies to consider for 2019 to build and maintain your cybersecurity defenses. This special 2 hour webcast includes talks from John Strand and Jake and is followed by a lively panel of all three experts. Sponsored by Cisco.
  • LIVE DEMO: Meraki & Umbrella - A match made in the cloud
    LIVE DEMO: Meraki & Umbrella - A match made in the cloud
    Kevin Rollinson, Product Marketing Manager, Cisco Umbrella & Joe Aronow, Manager - Product Architectures, Cisco Meraki Recorded: Jan 25 2019 39 mins
    What if you could protect every user on your Meraki network in minutes without deploying an additional appliance? That’s the magic of combining the Meraki MR wireless access points and Cisco Umbrella. Cisco Umbrella is a DNS-layer security solution that blocks users from accessing malicious sites before the connection is made, proactively preventing against security breaches. With this integration, it is easier than ever to set custom policies and deploy them across your Meraki network. Join us for a live demo showcasing this new integration.
  • Hackers Don’t Take Holidays
    Hackers Don’t Take Holidays
    Duncan McAlynn, an industry expert, cybersecurity consultant, and a member of the FBI InfraGard Recorded: Nov 28 2018 59 mins
    With the holidays among us, one can’t help but to think about taking some much needed time off to spend with friends and family. However, hackers don’t really do holidays. In fact, according to the FBI, the holidays bring more intense activity from hacking groups, cyber terrorists and nation states because they know we’re more vulnerable during these times.

    Watch industry expert and cybersecurity consultant, Duncan McAlynn, discusses the top attack vectors being used by malicious actors today and what we can expect in the coming year. Mr. McAlynn, a member of the FBI InfraGard, will also briefly discuss the social and economic impact these attacks can have on our nation’s citizens, organizations and economy along with 5 key things that you can do right now to help protect and defend your company.
  • Hello Direct Internet Access; Hello Risk
    Hello Direct Internet Access; Hello Risk
    Kevin Rollinson, Product Marketing Manager, Cisco Umbrella Recorded: Nov 15 2018 41 mins
    Business today happens at the branch. But where does IT work? Typically, not at the branch. So enterprises struggle to manage nontraditional users and even more connected devices across disparate branch locations.

    As direct internet access increases, the risk of exposure to critical business resources rises. At the same time, application usage via multiple clouds (Office 365, G-suite, etc.) challenges the existing network architecture.

    What does this add up to? Pressure for IT staff as they struggle to reduce costs, improve security measures, and application performance. Join us to learn how to gain better performance and more security effectiveness for your branch offices.
  • Bye Bye Backhauling: Better Branch Office Protection
    Bye Bye Backhauling: Better Branch Office Protection
    Kevin Rollinson, Product Manager, Cisco Recorded: Nov 1 2018 31 mins
    Today, IT departments are under pressure to do more with less. With limited budgets and smaller teams, the race is on to deliver more effective security without any reduction in reliability or performance. The high cost of enterprise WAN connectivity and support, combined with the growth of cloud-based services and bandwidth-hungry streaming applications, is forcing many network admins and security professionals to search for alternative solutions. With more branch offices connecting directly to the internet, how can you quickly and easily protect users on any device, anywhere they roam?

    Find out how Cisco Umbrella is making it easier than ever to provide effective cloud security with centralized visibility and control. Watch to see how you can say bye bye to backhauling and hello to better branch security.
  • Off-Network: The New Security Normal
    Off-Network: The New Security Normal
    Christina Ayiotis, Cyber Strategy Consultant Recorded: Oct 22 2018 51 mins
    Long gone are the days when Security Professionals could protect their actual network and not have to worry about organization, employee, student or customer information being at risk. In today's always-connected world, much happens beyond the network (especially in the cloud) and the concept of perimeter security has all but evaporated.

    Wherever Users are - the office, the classroom, traveling, or working from home - organizations need to enable security so Users can easily and safely to do their jobs. Users want to be able to just "connect" and work-- oblivious to the dangers out there. Moving security "behind the scenes" means needing to be more predictive about how attacks will happen and engaging early in the attack cycle. DNS-layer security is an important component piece of an overall security strategy that aims to stop attacks before they cause irreparable harm. Watch this webcast to learn more.
  • Cryptomining: The Next Malware Attack
    Cryptomining: The Next Malware Attack
    Younsey Nunez, Group Information Security @ Wells Fargo & Richard Fairhurst, Regional Information Security @ Wells Faro Recorded: Oct 15 2018 57 mins
    Mining for cryptocurrencies is no small task; it takes a lot of CPU and GPU cycles to process the data necessary to generate the currencies. Not everyone has the technical wherewithal, financial resources and the massive amount of hardware to build their own cryptomine, so what options do they have? The answer is simple and as old as time: If you don’t have the resources, you “borrow” (steal?) from someone who does.

    This webcast looks at how cryptomining works and how to determine if your computing resources are being used without your knowledge for cryptomining.
  • Ransomware and Other Emerging Threats Within Healthcare Organizations
    Ransomware and Other Emerging Threats Within Healthcare Organizations
    Lee Kim, JD, CISSP, CIPP/US Director, Privacy & Security HIMSS North America Recorded: Oct 11 2018 61 mins
    The healthcare sector has been significantly impacted by ransomware in the last five years. Ransomware locks down computers, encrypts files, locks users out of their systems, and may disrupt patient care and business operations. A ransom is demanded for the safe return of the data by malicious actors. But, there is no guarantee that the data will be successfully recovered.

    Lee Kim, director of privacy and security for HIMSS North America shares how the ransomware threat has evolved over time, the current ransomware threat, and information on mitigating the threat. Lee will also share her predictions on what the healthcare and public health sector can expect in the future and the emergence of cryptojacking as a future threat.
  • Back to School Cybersecurity Checklist
    Back to School Cybersecurity Checklist
    Casey Ulaky, Product Marketing Manager, Cisco Umbrella Recorded: Sep 21 2018 27 mins
    As summer vacations draw to an end, and kids return to school, we’re hoping you have more time to focus on how to improve your organization’s security posture. Cisco cloud security product expert Casey Ulaky will walk you through our Back to School Cybersecurity Checklist, where you will learn how to:

    - Know if you are experiencing a targeted attack.
    - View unsanctioned cloud services and gain a better understanding of your internet activity across all devices, on and off the network.
    - Highlight some of our new features, like iOS protection, cryptomining security category, app discovery and more!

Embed in website or blog