Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Prioritizing SSE to Protect the Modern Digital Business John Grady - Senior Analyst, Enterprise Strategy Group & Doug Browne, Director for Cloud Security & SSE, APJC - Cisco Systems Current IT environments and the reality of modern business practices have left organizations with no choice but to consider new security models. The n... 3 days ago | 45 mins How to Leverage Threat-Informed Defense in Your Environment Mike McPhee - Cybersecurity Architect - Cisco Normally agility and innovation are good things. Unfortunately, adversaries have taken these traits to heart, leaving security operations overloaded a... January 31, 2023 1:00pm Umbrella and Duo are Better Together! Kedar Hiremath and Matt Brooks In this presentation we will discuss what Zero Trust is and what Cisco’s approach to it is. We’ll highlight solutions to supply strong Multi-factor Au... February 7, 2023 1:00pm Through the Eyes of the Wolf: Insights into the Chain of Cyber Threats Stevan Sheely, Technical Solutions Architect, Cisco The once-upon-a-time security architecture that was just a stack of controls at mostly a point in the network for different security vectors is a meth... 1 week ago | 51 mins Through the Eyes of the Wolf: Insights into the Chain of Cyber Threats Stevan Sheely, Technical Solutions Architect, Cisco The once-upon-a-time security architecture that was just a stack of controls at mostly a point in the network for different security vectors is a meth... 1 week ago | 51 mins How to Leverage Threat-Informed Defense in Your Environment Mike McPhee - Cybersecurity Architect - Cisco Normally agility and innovation are good things. Unfortunately, adversaries have taken these traits to heart, leaving security operations overloaded a... 2 weeks ago | 46 mins Cisco and SASE: Capabilities, concepts and a vision for the future Gene Hall, VP Product Marketing, Cisco What are the key components of SASE architecture? What drove the creation of the Secure Access Service Edge model? How can Cisco help? Join us for Cis... 1 month ago | 49 mins Easy On-Boarding to Umbrella SIG with Cisco Meraki James Howe, Technical Solutions Specialist, Cisco James will talk through steps required to integrate a Meraki MX firewall with Cisco Umbrella's Secure Internet Gateway (SIG) and Secure Web Gateway (S... 3 months ago | 37 mins Easy On-Boarding to Umbrella SIG with Cisco Meraki James Howe, Technical Solutions Specialist, Cisco James will talk through steps required to integrate a Meraki MX firewall with Cisco Umbrella's Secure Internet Gateway (SIG) and Secure Web Gateway (S... 3 months ago | 37 mins Using Umbrella and Secure Endpoint Together for a Better Threat Defense Eric Howard, Technical Leader, Cisco Secure Endpoint Join us for this 45-minute session, which covers how Umbrella and Secure Endpoint together create a powerful combination of effective, automated, alwa... 2 months ago | 40 mins Load more