Balancing Flexibility and Security for Roaming Users
We’ll discuss how #networking and #security teams can keep roaming users safe without sacrificing performance and keep #securityoperations teams happy, too.
Cisco TV - How IT security is adapting to the changing environment in 2020
The average company has had to deal with more changes in 2020 than in previous years. Join our conversation as we discuss the IT security challenges these changes encounter and what organisations a
Navigating Cybersecurity During a Pandemic: Latest Malware and Threat Actors
This 15-minute webinar will focus on the latest ways we’ve seen threat actors use the current health crisis in malicious campaigns.
Security Efficacy: Is Your Program as Good as You Think It Is
Your information security program is the glue that holds together virtually all aspects of IT. It also defines your long-term outcomes in terms of business resilience. Watch this webinar to learn how.
AV-Test places Cisco Umbrella first in security efficacy
Lots of network security providers claim they are the best. Well we’ve got proof! Brand new third-party research from AV-TEST reveals that Cisco Umbrella is the industry leader in security efficacy, a
Virtual Cloud Security Summit: Securing Your Network from the Cloud
Join Brian Roddy, VP of Cisco Cloud Security along with Product Managers Steve Brunetto and Adam Winn for an exploration into the cloud-delivered security services provided by Cisco Umbrella.
3 steps to secure remote workers and students
Join us for 20 minutes to learn some simple steps you can take to secure remote employees and students, without overburdening your staff.
Virtual Cloud Security Summit: Product Direction
Join us for an inside look at Cisco Umbrella’s product direction. Hear from John Amaral, Head of Product for Cisco Cloud Security.
How to Think Like a Cybercriminal (So You Can Outwit Them)
How well do you really know your environment, your security practices and policies? Do you know your cyberattackers’ tools, techniques and the procedures that they use to exploit your vulnerabilities?
Research Reveals: Network Security is Converging in the Cloud
Get recommendations to help you shape your security for 2020 and keep it simple, scalable, and flexible.
Building an Incident Readiness and Response Playbook
Don't make a data breach any harder than it needs to be. We’ll walk you through the Xs and Os of any good security incident readiness and response playbook. View webcast now.
How to Leverage DNS to Get Your Security Program Under Control
A well-run information security program requires not only great visibility but also the necessary control. Security around DNS is often the weak link. Whether it’s an automated computer transaction or
Why ransomware remains resilient - and what to do about it!
Did you know that ransomware is one of THE top concerns keeping CEOs up at night in 2020?
Threat intelligence: The New Driver for Incident Response
Find out how you can shorten your response time and garner the information you need to be effective in one central place. We’ll explain the steps you can take to detect and investigate threats faster.
Webinar: Is Your Cybersecurity on the Naughty List (Again)?
In this webcast, view now to learn from cybersecurity expert Duncan McAlynn on how to protect and defend your organization against menacing attacks in 2020.
Punycode: Awareness and Protection
This session covers the importance of DNS, a critical component of the Internet and how it's used to identify malicious domains.
Abracadabra of Malwares: Obfuscation
This webinar focuses on how obfuscation is used in malwares, types of obfuscation and how new age malwares carry obfuscated content that delays reversing process.
Threat Spotlight: Emotet
It’s been five years since the discovery of Emotet yet it’s still making a buzz. Join us for a short history and evolution of the Emotet malware based on our own investigation.
How Cryptocurrency is Changing Cyber Security
With the rocketing crypto market cap soaring up to $835 billion at its peak — the name of the game is computing power. Is your environment safe?
Manage security breaches in real-time with Cisco
In this webinar, we will show you how to build a strong security posture and integrated defence system that will allow you to quickly respond to breaches.