Webcasts

  • Cisco Stealthwatch Webinar38:18

    Cisco Stealthwatch Webinar

    Join us to hear from Cisco cloud security expert, as he discusses best practices for securing your multi-cloud environment with Cisco Stealthwatch Cloud. Topics include: - Avoiding pitfalls of mig

    Watch Video
  • Back to School Cybersecurity Checklist26:13

    Back to School Cybersecurity Checklist

    During this webinar you will learn how to know if you are experiencing a targeted attack, view unsanctioned cloud services and gain a better understanding of your internet activity across all devices.

    Watch Video
  • WEBINAR   Inside App Discovery with Doni Brass48:43

    WEBINAR Inside App Discovery with Doni Brass

    Watch Video
  • Once Upon A Network Webinar23:47

    Once Upon A Network Webinar

    We don’t think having the best security for your users, data and apps should have to be a fairy tale. If you’re looking for speed, reliability and the best threat intelligence to see and stop attacks

    Watch Video
  • The Latest Threat to your Endpoint Security: Cryptojacking52:00

    The Latest Threat to your Endpoint Security: Cryptojacking

    In this panel discussion, independent information security consultant and author of Hacking For Dummies, Kevin Beaver and consultant and Virtual CIO Andrew Baker will discuss cryptojacking.

    Watch Video
  • We pass the costs to you! An analysis of cryptomining and cryptojacking1:00:16

    We pass the costs to you! An analysis of cryptomining and cryptojacking

    SANS Principal Instructor, Ted Demopoulos, sets the stage for Cisco Security Research Analyst, Josh Pyorre, to walk you through a brief history of cryptomining and cryptojacking, how it all works and

    Watch Video
  • Improve threat detection through automation and orchestration55:28

    Improve threat detection through automation and orchestration

    Threat detection is an inherently difficult practice due to cunning adversaries and evolving attack methods.

    Watch Video
  • Move over ransomware, cryptocurrency miners making headlines49:15

    Move over ransomware, cryptocurrency miners making headlines

    Join Ortho-Clinical Diagnostics and Cisco Umbrella as they discuss and debate how they use threat intelligence.

    Watch Video
  • Cisco Umbrella - EDU Webinar58:09

    Cisco Umbrella - EDU Webinar

    Cyberattacks are evolving and schools, Colleges and Universities are spending a lot of their time handling or mitigating attacks or the consequences of them. Even with academic freedom in mind the

    Watch Video
  • Cisco Cloud Security Customer Story: University of Oklahoma43:21

    Cisco Cloud Security Customer Story: University of Oklahoma

    Are your users accessing the internet from many locations and devices? Are you relying on SaaS apps like Office 365, G-Suite, Box and Salesforce to improve collaboration and productivity?

    Watch Video
  • Coffee Hour with Experian and Cisco Umbrella33:35

    Coffee Hour with Experian and Cisco Umbrella

    Experian discusses how Cisco Umbrella - and Talos threat intelligence - fits into their security strategy and is the first line of defense against threats on the internet.

    Watch Video
  • Cisco Umbrella - Ransomware Webinar with Rob Gregg36:40

    Cisco Umbrella - Ransomware Webinar with Rob Gregg

    Imagine losing access to all of your data, only to find out you are being extorted by criminals who require payment to get it back. These attacks have affected every industry – and there is a flurry

    Watch Video
  • The Secret To Thinking Like A Security Researcher29:08

    The Secret To Thinking Like A Security Researcher

    Machine learning - what's it all about? Machine learning has become a buzzword. We hear it all the time, but what does it mean? At Cisco Umbrella, we have spent years using machine and assisted learn

    Watch Video
  • Threat Intelligence - buzzword or buzz-worthy?1:01:34

    Threat Intelligence - buzzword or buzz-worthy?

    Join Bechtel and Cisco Umbrella as they discuss and debate how they use threat intelligence.

    Watch Video
  • Bye Bye Backhauling: Better branch office protection30:24

    Bye Bye Backhauling: Better branch office protection

    Today, IT departments are under pressure to do more with less. With limited budgets and smaller teams, the race is on to deliver more effective security without any reduction in reliability or perform

    Watch Video
  • Cisco Cloud Security - Partner Webinar54:23

    Cisco Cloud Security - Partner Webinar

    Adding more boxes to your security stack won’t provide the protection you need for today’s decentralized networks. And it won’t protect remote employees, unmanaged devices, or applications in the clou

    Watch Video
  • The Deepest Enterprise Visibility and Control for iOS Devices56:26

    The Deepest Enterprise Visibility and Control for iOS Devices

    The Cisco Security Connector app makes it easy to ensure compliance of your enterprise-owned iOS devices, whether they’re on the corporate network, public Wi-Fi or cellular networks. You can simplify

    Watch Video
  • Cisco Umbrella - Ransomware Webinar 201842:50

    Cisco Umbrella - Ransomware Webinar 2018

    Imagine losing access to all of your data, only to find out you are being extorted by criminals who require payment to get it back. These attacks have affected every industry – and there is a flurry o

    Watch Video
  • Cisco Cloudlock Webinar - Defend your cloud territory34:24

    Cisco Cloudlock Webinar - Defend your cloud territory

    Secure your cloud users, data, and applications Dan Silverston - Cybersecurity Specialist (EMEAR)

    Watch Video
  • Is your security stack ready for 2018?44:28

    Is your security stack ready for 2018?

    2017 brought forth an increase in breaches, attacks, and ransomware instances. Trends around mobility, the growing number of IoT devices, SaaS app usage and the amount of sensitive data stored in the

    Watch Video
  • loading
    Loading More...