Hi [[ session.user.profile.firstName ]]

Cisco Umbrella

  • Date
  • Rating
  • Views
  • Hackers Don’t Take Holidays
    Hackers Don’t Take Holidays
    Duncan McAlynn, an industry expert, cybersecurity consultant, and a member of the FBI InfraGard Recorded: Nov 28 2018 59 mins
    With the holidays among us, one can’t help but to think about taking some much needed time off to spend with friends and family. However, hackers don’t really do holidays. In fact, according to the FBI, the holidays bring more intense activity from hacking groups, cyber terrorists and nation states because they know we’re more vulnerable during these times.

    Watch industry expert and cybersecurity consultant, Duncan McAlynn, discusses the top attack vectors being used by malicious actors today and what we can expect in the coming year. Mr. McAlynn, a member of the FBI InfraGard, will also briefly discuss the social and economic impact these attacks can have on our nation’s citizens, organizations and economy along with 5 key things that you can do right now to help protect and defend your company.
  • Hello Direct Internet Access; Hello Risk
    Hello Direct Internet Access; Hello Risk
    Kevin Rollinson, Product Marketing Manager, Cisco Umbrella Recorded: Nov 15 2018 41 mins
    Business today happens at the branch. But where does IT work? Typically, not at the branch. So enterprises struggle to manage nontraditional users and even more connected devices across disparate branch locations.

    As direct internet access increases, the risk of exposure to critical business resources rises. At the same time, application usage via multiple clouds (Office 365, G-suite, etc.) challenges the existing network architecture.

    What does this add up to? Pressure for IT staff as they struggle to reduce costs, improve security measures, and application performance. Join us to learn how to gain better performance and more security effectiveness for your branch offices.
  • Bye Bye Backhauling: Better Branch Office Protection
    Bye Bye Backhauling: Better Branch Office Protection
    Kevin Rollinson, Product Manager, Cisco Recorded: Nov 1 2018 31 mins
    Today, IT departments are under pressure to do more with less. With limited budgets and smaller teams, the race is on to deliver more effective security without any reduction in reliability or performance. The high cost of enterprise WAN connectivity and support, combined with the growth of cloud-based services and bandwidth-hungry streaming applications, is forcing many network admins and security professionals to search for alternative solutions. With more branch offices connecting directly to the internet, how can you quickly and easily protect users on any device, anywhere they roam?

    Find out how Cisco Umbrella is making it easier than ever to provide effective cloud security with centralized visibility and control. Watch to see how you can say bye bye to backhauling and hello to better branch security.
  • Off-Network: The New Security Normal
    Off-Network: The New Security Normal
    Christina Ayiotis, Cyber Strategy Consultant Recorded: Oct 22 2018 51 mins
    Long gone are the days when Security Professionals could protect their actual network and not have to worry about organization, employee, student or customer information being at risk. In today's always-connected world, much happens beyond the network (especially in the cloud) and the concept of perimeter security has all but evaporated.

    Wherever Users are - the office, the classroom, traveling, or working from home - organizations need to enable security so Users can easily and safely to do their jobs. Users want to be able to just "connect" and work-- oblivious to the dangers out there. Moving security "behind the scenes" means needing to be more predictive about how attacks will happen and engaging early in the attack cycle. DNS-layer security is an important component piece of an overall security strategy that aims to stop attacks before they cause irreparable harm. Watch this webcast to learn more.
  • Cryptomining: The Next Malware Attack
    Cryptomining: The Next Malware Attack
    Younsey Nunez, Group Information Security @ Wells Fargo & Richard Fairhurst, Regional Information Security @ Wells Faro Recorded: Oct 15 2018 57 mins
    Mining for cryptocurrencies is no small task; it takes a lot of CPU and GPU cycles to process the data necessary to generate the currencies. Not everyone has the technical wherewithal, financial resources and the massive amount of hardware to build their own cryptomine, so what options do they have? The answer is simple and as old as time: If you don’t have the resources, you “borrow” (steal?) from someone who does.

    This webcast looks at how cryptomining works and how to determine if your computing resources are being used without your knowledge for cryptomining.
  • Ransomware and Other Emerging Threats Within Healthcare Organizations
    Ransomware and Other Emerging Threats Within Healthcare Organizations
    Lee Kim, JD, CISSP, CIPP/US Director, Privacy & Security HIMSS North America Recorded: Oct 11 2018 61 mins
    The healthcare sector has been significantly impacted by ransomware in the last five years. Ransomware locks down computers, encrypts files, locks users out of their systems, and may disrupt patient care and business operations. A ransom is demanded for the safe return of the data by malicious actors. But, there is no guarantee that the data will be successfully recovered.

    Lee Kim, director of privacy and security for HIMSS North America shares how the ransomware threat has evolved over time, the current ransomware threat, and information on mitigating the threat. Lee will also share her predictions on what the healthcare and public health sector can expect in the future and the emergence of cryptojacking as a future threat.
  • Back to School Cybersecurity Checklist
    Back to School Cybersecurity Checklist
    Casey Ulaky, Product Marketing Manager, Cisco Umbrella Recorded: Sep 21 2018 27 mins
    As summer vacations draw to an end, and kids return to school, we’re hoping you have more time to focus on how to improve your organization’s security posture. Cisco cloud security product expert Casey Ulaky will walk you through our Back to School Cybersecurity Checklist, where you will learn how to:

    - Know if you are experiencing a targeted attack.
    - View unsanctioned cloud services and gain a better understanding of your internet activity across all devices, on and off the network.
    - Highlight some of our new features, like iOS protection, cryptomining security category, app discovery and more!
  • Cybersecurity Made Simple
    Cybersecurity Made Simple
    Cisco Security Recorded: Sep 7 2018 2 mins
    Simple. Open. Automated. Effective: Cisco Security.

    Cisco built the network and now they’re building the most effective cybersecurity architecture in the world. Learn more via the links in the attachments tab.
  • Cisco Cloud Security Live Demo: Cisco Umbrella and Cloudlock
    Cisco Cloud Security Live Demo: Cisco Umbrella and Cloudlock
    Meg Diaz, Product at Cisco Umbrella Recorded: Aug 8 2018 49 mins
    As the industry’s first secure internet gateway, Cisco Umbrella provides the first line of defense against threats on the internet anywhere users go. Because Umbrella is delivered from the cloud, it is the easiest way to protect all of your users in minutes.

    Cisco Cloudlock is a cloud-native CASB and cloud cybersecurity platform that helps accelerate use of the cloud, including the apps you buy and build. Cloudlock helps you to secure your identities, data, and applications in the cloud.

    Join us to see how Cisco cloud security complements existing network security by providing an additional layer of protection when users connect directly to the internet and cloud services. Through a live demonstration, you'll see first-hand how our innovative approach sees threats other security solutions miss. If you or someone from your team would like to join us at an upcoming webinar session, please be sure to reserve your spot.

    Speaker bio:

    Meg Diaz is a member of the Cisco Umbrella (formerly OpenDNS) products team at Cisco, where she is responsible for the go-to-market strategy and execution across multiple products. Diaz has been in the security industry for more than seven years, with experience in network, endpoint, cloud, and data security. Prior to Cisco Umbrella, she worked at RSA, the Security Division of EMC in various roles. Diaz graduated with honors from Cornell University, where she majored in Applied Economics and Management and minored in Communication.
  • An Analysis of Cryptomining and Cryptojacking
    An Analysis of Cryptomining and Cryptojacking
    Josh Pyorre, Security Researcher, Cisco Recorded: Jul 25 2018 60 mins
    SANS Principal Instructor, Ted Demopoulos, sets the stage for Cisco Security Research Analyst, Josh Pyorre, to walk you through a brief history of cryptomining and cryptojacking, how it all works and the various steps you or your organization can take to detect and stop it.

    Josh Pyorre is a security researcher with Cisco. Previously, he worked as a threat analyst with NASA, where he was part of the team that initially built out the Security Operations Center. He has also done some time at Mandiant. His professional interests involve network, computer, and data security with a goal of maintaining and improving the security of as many systems and networks as possible

Embed in website or blog