Virtual Cloud Security Summit: Securing Your Network from the Cloud
As security shifts and converges in the cloud, existing security models are falling short. Hear from Cisco Cloud Security Product Managers, Steve Brunetto and Adam Wynn, for an exploration into the cloud-delivered security services provided by Cisco Umbrella, along with relevant use cases and lively discussions. Participants will learn how Umbrella unifies multiple security capabilities in the cloud to secure cloud adoption and direct internet access. We will cover DNS-layer security, full proxy, and firewall-as-a-service.
RecordedFeb 24 202151 mins
Your place is confirmed, we'll send you email reminders
Martin Lee with Cisco Talos, and Paul D'Cruz, Director, Cyber Security EMEAR
Organisations have had to deal with more changes in the last year than ever before. As companies turn to the cloud in order to reduce complexity and deliver greater flexibility, they must also adapt to meet these changes head on.
In this session we will cover…
• How have the changes in 2020 impacted the roadmap in 2021 and beyond for organisations
• How are companies adapting to more employees and customers working from home - what added responsibility does this have on the CISO and security teams?
•Considerations to ensure improved Security Visibility and Automation what options are available?
Key takeaways:
- Cybersecurity threats for FY21
- How AI in Cybersecurity is set to increase
- Trends we are seeing with the implementation of SASE and Zero Trust as a strategy
- Best practice for companies to protect their workers and customers
Martin Lee from Cisco Talos, Paul D'Cruz, Director of Cyber Security EMEAR
Will SASE transform IT security for businesses? The past few months have seen IT transformation on an unprecedented scale as organisations across the globe change how they do business.
With the adoption of cloud-delivered services, SD-WAN has proved that it can deliver improved application performance, reduced costs, and simplified branch operations. But, despite all these benefits, security remains one of the biggest concerns.
How do you secure users accessing the internet or cloud apps, either remotely or at multiple branch offices? What is Secure Access Service Edge (SASE) and how can it deliver multiple security functions from the cloud? How does the quality of threat intelligence you have access to help avoid security blind spots and stop false alerts?
If you’re considering the move to SD-WAN, or if SD-WAN is already part of your infrastructure, join us as we discuss the latest developments in security networking. Understand the key challenges and learn how to set up your business for success today and in the future.
Key takeaways:
- What is SASE and why are we seeing a rapid rise in companies shifting to SASE?
- How will the business challenges we have seen this year adapt the roadmap and vision for an organisation in 2021?
- What threats are we seeing as a result of the remote working trends from Talos; what does the cloud centric threat landscape look like and the trends we expect to see over the coming months.
- How securing SD-WAN with Cisco Umbrella can simplify your cloud security strategy
Josh Green, Technical Marketing Engineer, and Chris Frost, Technical Solutions Architect
For some time it has been recognised that an organisation cannot rely on its perimeter defences alone. Compromised accounts have become a major threat and point of entry. The perimeter has now moved down to the level of the user and the device. This is referred to as the BeyondCorp or zero trust model.
Duo Security, is the leading provider of Trusted Access security and multi-factor authentication. Duo's zero-trust security platform, Duo Beyond, enables organizations to provide trusted access to all of their critical applications - for any user, from anywhere, and with any device.
Cisco Umbrella is a cloud security platform that provides the first line of defence against threats on the internet wherever users go. And because it’s built into the foundation of the internet and delivered from the cloud, Umbrella is the simplest security product to deploy and delivers powerful, effective protection.
Register today to join this 20 minute webinar with our experts to learn how you can secure access to the internet and protect the usage of cloud apps with Cisco Umbrella and Duo Security. We will showcase best practices for securing your multi-cloud environment and look at establishing trust at the user and device level and using policy to allow access to applications and data.
Chris Frost, Technical Solutions Architect at Cisco Umbrella
The network and security landscape has changed dramatically in 2020, which leaves gaps in your existing security. These changes have paved the way for a new concept: the Secure Access Service Edge (SASE), which delivers a combined set of security and networking capabilities to provide improved performance and robust security for any device, location, and user.
Join us now for this short, information-packed, 15-minute webinar.
You’ll hear about how cloud-delivered security can help your organization meet these challenges head-on. Topics we’ll cover:
- Network traffic changes and the risk and performance issues they cause
- What’s needed to address current challenges and enable a secure cloud transition
- How a cloud security platform with integrated networking options can simplify your environment
- Benefits of a SASE approach
James Brown, Head of Product Growth at Cisco Umbrella
As 2019 came to an end, Gartner defined a new type of security platform — an evolution of SIG (Secure Internet Gateway) called Secure Access Service Edge, or SASE (pronounced “sassy”). Gartner predicts that SASE will become the new standard for security in the coming years, with at least 40% of enterprises adopting explicit SASE strategies by 2024. As security shifts to the cloud, the tried-and-true perimeter-based model just can’t keep up. Today’s cybersecurity professionals are contending with an entirely new type of network and an entirely new set of security needs.
In this webinar, we’ll look at:
- Where the security landscape is heading
- Identify the gaps in today's security stack
- Highlight the steps you can take to keep your organisation safe and secure, today and tomorrow
Kate MacLean, Head of Product Marketing, Austin McBride, Data Scientist, Randy Silver, Global SMB Sales
There are more than 30 million small businesses in the United States alone, and each one is a potential target for internet-based threats, attacks, and malicious actors. Small businesses face the same security threats as larger enterprises but must cope with additional challenges like limited budget or no dedicated IT staff. Meanwhile, research shows that phishing attacks have doubled over the past year, and cybercriminals often see small businesses as low-hanging fruit with a lower level of protection.
Join us with Kate MacLean, head of product marketing for Cisco Umbrella, as she moderates a discussion about cybersecurity for small businesses. We’ll talk about the specific cyberthreats facing small businesses today and how small businesses can protect themselves with effective, easy-to-manage security without breaking the bank.
Ishaan Korotane, Consulting Systems Engineer at Cisco Umbrella
Find out how a secure internet gateway can help you reduce the time it takes to detect and contain threats. Join us to hear from Cisco cloud security expert Ishaan Korotane as he walks you through our Back to Work: Cybersecurity Checklist.
During this webinar, you will learn how to:
• Protect the workforce, regardless of where they may be
• Gain a better understanding of your internet activity across all devices, on and off the network
• Report and monitor unsanctioned cloud services
Plus, we’ll highlight some of our new features, like iOS and Android protection, App Discovery and the Threat report.
Threat actors have always played the game of emotions. Fear is the emotion they are using right now to lure users to click on an email or manipulate them to install an application.
In the last four months, cyber criminals have used fear as their main weapon to compromise users by using pandemic-related themes to deliver malware. The dropped malwares are deadlier and stealthier and are hybrid in nature. There is a need for advanced investigation techniques, like memory forensics in the case of ransomware attacks that are ransacking health sectors and entropy-based detection for new-age trojan exfiltrations.
Learn how we use traditional methods to identify these threats and also add a pinch of new-age forensics tricks to do some big reveals.
Luke Hebditch, Systems Engineer, Cloud Security at Cisco Umbrella and Mark Anderson, Consulting Systems Engineer Cisco Meraki
Cisco Umbrella and Cisco Meraki have both revolutionised the way we manage and protect our networks and devices through the cloud. Both solutions provide rapid provisioning, an intuitive dashboard and simple policy-based management.
Cisco Meraki MX Security appliances and Cisco Umbrella offer simple and effective protection for your network. Umbrella is a DNS-layer security solution built into the backbone of the Internet. It blocks users from accessing malicious sites before the connection is made, and offers the first line of defense against security breaches in your organisation.
With Cisco Umbrella, it takes only a few clicks to set up custom policies and deploy them across your Meraki MX security appliances in minutes.
We know already that most malware infections happen in one of 3 ways. So why can’t we stop these attacks more easily? Join us as we take a closer look at the #1 vector for attacks: email, the #1 target for attacks: endpoint and the #1 source of most attacks, the Internet. As networks transform and more organizations embrace the cloud, it’s more important than ever to take a new approach to securing your users and devices. Find out how to stop these attacks before they start, and safeguard your organization with a layered approach to cybersecurity.
Cisco Cloud Security Product Managers Steve Brunetto and Adam Winn
As security shifts and converges in the cloud, existing security models are falling short. Hear from Cisco Cloud Security Product Managers, Steve Brunetto and Adam Wynn, for an exploration into the cloud-delivered security services provided by Cisco Umbrella, along with relevant use cases and lively discussions. Participants will learn how Umbrella unifies multiple security capabilities in the cloud to secure cloud adoption and direct internet access. We will cover DNS-layer security, full proxy, and firewall-as-a-service.
Ishaan Korotane, Technical Solutions Specialist at Cisco Umbrella
Users today work from anywhere — and they’ll often bypass the VPN to get work done. Sound familiar? Get the boost you need to secure your apps, data, and users whenever they’re on the move.
Built into the foundation of the internet, Cisco Umbrella is a cloud security service that provides a first line of defense against threats, wherever users access the internet — on or off the corporate network. Umbrella is deployed enterprise-wide in minutes and gives your security team the threat intelligence and context they need to block threats before they become attacks.
Join this 20 minute live demo to learn how you can:
-See and block threats other solutions miss
-Reduce alerts and gain context into high-priority threats
-Deploy in minutes to protect all devices and locations
-Integrate seamlessly with your existing security stack
Cisco Cloud Security Product Managers Steve Brunetto and Adam Winn
As security shifts and converges in the cloud, existing security models are falling short. Hear from Cisco Cloud Security Product Managers, Steve Brunetto and Adam Wynn, for an exploration into the cloud-delivered security services provided by Cisco Umbrella, along with relevant use cases and lively discussions. Participants will learn how Umbrella unifies multiple security capabilities in the cloud to secure cloud adoption and direct internet access. We will cover DNS-layer security, full proxy, and firewall-as-a-service.
Determining which rules and regulations apply to an organization is not easy undertaking. Oftentimes, companies need to comply with multiple controls and regulations, many of which have overlapping statutes along with stiff penalties for non-compliance. Watch our on-demand webinar as Duncan McAlynn demystifies common cybersecurity frameworks and regulatory requirements to help organizations improve their security posture and achieve compliance.
Key takeaways:
* Compliance versus security and how to recognize the difference
* Know which regulations are related to your company or industry
* How to keep up with the ever-changing state regulations
* What to do and who to notify when you’ve suffered a security incident
* How to establish a security roadmap for your organization
Chris Frost, Technical Solutions Architect at Cisco Umbrella
A well-run information security program requires not only great visibility but also the necessary control.
You can be doing all the right things with security –solid standards and well-documented policies, ongoing user education, and seemingly reasonable network and endpoints controls –but gaps can still exist.
Watch this session as we explore how DNS plays a part in your overall security posture and risk mitigation.
If your information security initiatives are to be worthwhile, you must measure to improve. With all of the time, effort, and money that you’ve invested in IT and security to this point, why not take the next few steps and seek out the tweaks you need to make?
By using the right metrics in the right ways, you can go from wondering when the next incident or breach is going to occur, to being able to confidently say where things truly stand. In this webinar, Kevin Beaver, information security expert and author of the best-selling book Hacking For Dummies, will discuss measurable steps you can take to improve your security.
Stop guessing where the gaps are. No more assumptions about where the business stands in terms of network resilience. No MBA required. Watch now for some down-to-earth advice you can immediately put to use in order to flesh out your security efforts.
The session is focused on the ways DNS can be used to improve protection against ransomware campaigns and speed up investigations of such incidents. We will cover fresh tactics, techniques, and procedures (TTPs) used by ransomware actors which actively adopt advanced persistent threat (APT)-style tactics and evasion techniques.
These actors’ goals have shifted from deploying ransomware on a few vulnerable machines to achieving persistence in the network and causing maximum damage to push victims into paying the ransom.
We will share DNS-based classifiers developed by the Cisco Umbrella team and discuss our approach to building them based on changes in the threats landscape.
Ishaan Korotane, Consulting Systems Engineer at Cisco Umbrella
This webinar is for any small to medium sized business that may be feeling overwhelmed by IT security threats. During this session we will look at how Cisco Umbrella can help small businesses and what you can do to protect your data and employees
Join this live demo to learn how you can:
- See and block threats other solutions miss
- Reduce alerts and gain context into high-priority threats
- Deploy in minutes to protect all devices and locations
- Secure your apps, data and users whenever they are on the move
- Integrate seamlessly with your existing security stack
You’ll see how easy it is and that you don’t need to be an IT expert to use Cisco Umbrella. Register now to view this session!
More about Cisco Umbrella: Built into the foundation of the internet, Cisco Umbrella is a cloud security platform that provides a first line of defense against threats, wherever users access the internet — on or off the corporate network. Umbrella is deployed enterprise-wide in minutes and gives you the threat intelligence and context you need to block threats before they become attacks.
Paul D'Cruz Director, Cyber Security EMEAR at Cisco Umbrella and John Grady , Analyst at ESG
Threats, network complexity, and inefficient tools — all of these factors drive the need for a new approach to network security.
With more mobile devices, more cloud access, and a wide assortment of point tools, it’s hard for organisations to enforce consistent policy and efficiently respond to threats. SASE has seen immense interest, but questions remain about what functionality should be included, the drivers for this transition, and the most important attributes for these types of solutions. Recent ESG research on elastic cloud gateways provides answers to these and other related questions.
Join us and find out why more than 90% of organisations are fed up with managing multiple tools and are interested in a converged, cloud-delivered approach to network security.
Determining which rules and regulations apply to an organization is not easy undertaking. Oftentimes, companies need to comply with multiple controls and regulations, many of which have overlapping statutes along with stiff penalties for non-compliance. Watch our on-demand webinar as Duncan McAlynn demystifies common cybersecurity frameworks and regulatory requirements to help organizations improve their security posture and achieve compliance.
Key takeaways:
* Compliance versus security and how to recognize the difference
* Know which regulations are related to your company or industry
* How to keep up with the ever-changing state regulations
* What to do and who to notify when you’ve suffered a security incident
* How to establish a security roadmap for your organization
Cisco Umbrella provides a cloud-delivered network security service that blocks advanced attacks, as well as malware, botnets and phishing threats regardless of port, protocol or application. Our predictive intelligence uses machine learning to automate protection against emergent threats before your organization is attacked. Umbrella protects all your devices globally without hardware to install or software to maintain.
Virtual Cloud Security Summit: Securing Your Network from the CloudCisco Cloud Security Product Managers Steve Brunetto and Adam Winn[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]51 mins