Webcasts

  • Sécurisation du télétravail – Offres gratuites Cisco (French)1:09:47

    Sécurisation du télétravail – Offres gratuites Cisco (French)

    La crise actuelle oblige les entreprises a massivement développer le télétravail et crée de nouveaux enjeux de sécurité. Les plateformes VPN sont extrêmement sollicitées. Afin de les soulager, nomb

    Watch Video
  • Balancing Flexibility and Security for Roaming Users55:23

    Balancing Flexibility and Security for Roaming Users

    We’ll discuss how #networking and #security teams can keep roaming users safe without sacrificing performance and keep #securityoperations teams happy, too.

    Watch Video
  • Cisco TV - How IT security is adapting to the changing environment in 20201:11:53

    Cisco TV - How IT security is adapting to the changing environment in 2020

    The average company has had to deal with more changes in 2020 than in previous years. Join our conversation as we discuss the IT security challenges these changes encounter and what organisations a

    Watch Video
  • Navigating Cybersecurity During a Pandemic: Latest Malware and Threat Actors12:23

    Navigating Cybersecurity During a Pandemic: Latest Malware and Threat Actors

    This 15-minute webinar will focus on the latest ways we’ve seen threat actors use the current health crisis in malicious campaigns.

    Watch Video
  • Security Efficacy: Is Your Program as Good as You Think It Is48:47

    Security Efficacy: Is Your Program as Good as You Think It Is

    Your information security program is the glue that holds together virtually all aspects of IT. It also defines your long-term outcomes in terms of business resilience. Watch this webinar to learn how.

    Watch Video
  • AV-Test places Cisco Umbrella first in security efficacy34:32

    AV-Test places Cisco Umbrella first in security efficacy

    Lots of network security providers claim they are the best. Well we’ve got proof! Brand new third-party research from AV-TEST reveals that Cisco Umbrella is the industry leader in security efficacy, a

    Watch Video
  • Virtual Cloud Security Summit: Securing Your Network from the Cloud50:58

    Virtual Cloud Security Summit: Securing Your Network from the Cloud

    Join Brian Roddy, VP of Cisco Cloud Security along with Product Managers Steve Brunetto and Adam Winn for an exploration into the cloud-delivered security services provided by Cisco Umbrella.

    Watch Video
  • 3 steps to secure remote workers and students27:32

    3 steps to secure remote workers and students

    Join us for 20 minutes to learn some simple steps you can take to secure remote employees and students, without overburdening your staff.

    Watch Video
  • Virtual Cloud Security Summit: Product Direction1:00:03

    Virtual Cloud Security Summit: Product Direction

    Join us for an inside look at Cisco Umbrella’s product direction. Hear from John Amaral, Head of Product for Cisco Cloud Security.

    Watch Video
  • How to Think Like a Cybercriminal (So You Can Outwit Them)59:51

    How to Think Like a Cybercriminal (So You Can Outwit Them)

    How well do you really know your environment, your security practices and policies? Do you know your cyberattackers’ tools, techniques and the procedures that they use to exploit your vulnerabilities?

    Watch Video
  • Research Reveals: Network Security is Converging in the Cloud47:41

    Research Reveals: Network Security is Converging in the Cloud

    Get recommendations to help you shape your security for 2020 and keep it simple, scalable, and flexible.

    Watch Video
  • Building an Incident Readiness and Response Playbook1:01:08

    Building an Incident Readiness and Response Playbook

    Don't make a data breach any harder than it needs to be. We’ll walk you through the Xs and Os of any good security incident readiness and response playbook. View webcast now.

    Watch Video
  • How to Leverage DNS to Get Your Security Program Under Control35:51

    How to Leverage DNS to Get Your Security Program Under Control

    A well-run information security program requires not only great visibility but also the necessary control. Security around DNS is often the weak link. Whether it’s an automated computer transaction or

    Watch Video
  • Why ransomware remains resilient in 2020 - and what to do about it!27:01

    Why ransomware remains resilient in 2020 - and what to do about it!

    Did you know that ransomware is one of THE top concerns keeping CEOs up at night in 2020?

    Watch Video
  • Threat intelligence: The New Driver for Incident Response42:40

    Threat intelligence: The New Driver for Incident Response

    Find out how you can shorten your response time and garner the information you need to be effective in one central place. We’ll explain the steps you can take to detect and investigate threats faster.

    Watch Video
  • Webinar: Is Your Cybersecurity on the Naughty List (Again)?1:01:06

    Webinar: Is Your Cybersecurity on the Naughty List (Again)?

    In this webcast, view now to learn from cybersecurity expert Duncan McAlynn on how to protect and defend your organization against menacing attacks in 2020.

    Watch Video
  • Threat Spotlight: Emotet9:01

    Threat Spotlight: Emotet

    It’s been five years since the discovery of Emotet yet it’s still making a buzz. Join us for a short history and evolution of the Emotet malware based on our own investigation.

    Watch Video
  • Punycode: Awareness and Protection12:37

    Punycode: Awareness and Protection

    This session covers the importance of DNS, a critical component of the Internet and how it's used to identify malicious domains.

    Watch Video
  • Abracadabra of Malwares: Obfuscation12:20

    Abracadabra of Malwares: Obfuscation

    This webinar focuses on how obfuscation is used in malwares, types of obfuscation and how new age malwares carry obfuscated content that delays reversing process.

    Watch Video
  • How Cryptocurrency is Changing Cyber Security6:42

    How Cryptocurrency is Changing Cyber Security

    With the rocketing crypto market cap soaring up to $835 billion at its peak — the name of the game is computing power. Is your environment safe?

    Watch Video
  • loading
    Loading More...