Distributed Security Analytics with Stealthwatch Learning Network
Stealthwatch learning Network License is an exciting new security solution for the Cisco Integrated Services Router (ISR). SLN consists of a learning agent that runs in a container in router memory and a centralized manager through which an user views identified anomalies. SLN distributes anomaly detection and analysis to the edge of the network and provides important detection data that alone or when correlated with other sources lead to faster incident and better policy enforcement. This talk will provide an overview of SLN and demonstrate some of the new version 2 features.
IoT Threat Defense. How Cisco is protecting the IoT
IoT devices, broadly speaking, are not capable of defending themselves, and device makers are not likely to build in cybersecurity capabilities any time soon for a number of reasons. Join us for a personal walkthrough and discussion of the IoT Threat defense solution.
Stomp Out Malware From Encrypted Traffic Using Cisco Stealthwatch and Machine Learning
Did you know that more than 40% of malware is hiding in encrypted traffic used by browsers, email, and cloud apps? Or that your company’s desktops and mobile devices may be have out-of-date, non-compliant, encryption software that makes it easy for malware to hide. Cisco’s new Encrypted Traffic Analytics addresses both these problems. Without decryption it detects hidden malware with high precision. And it instantly identifies older cyphers and protocols so they can be updated.
ETA shows the power of cloud based machine learning enabled by Cisco Stealthwatch, Cognitive Analytics and new networking technologies. Be sure to join us for a special online talk on Stealthwatch 6.9.2, in which Sandeep Agrawal and Peter Johnson will explain and demonstrate Cognitive Analytics and ETA.
OAuth Phishing and WannaCry Ransomware Attacks: Are You Protected?
Recent headlines show a new generation of worm threats going viral on a global scale. OAuth phishing and the WannaCry ransomware attacks are leaving many organizations unsure of what happened and how they may be impacted by future attacks.
Join our free webinar to learn what these threats are, what actually happened during these attacks, and how Cisco can help your organization better protect against these new types of attacks. In this webinar, you will:
Learn the history and recent surge of these attacks
Identify what your organization can do to protect itself from future attacks
Join our live Q&A for expert answers to your specific questions.
The Firepower Management Center is the heart of leveraging a Next Generation security architecture. Most users today only use it as a policy manager and an event viewer. In this session, we will dive into how the Firepower Manager works and can improve your security and business capabilities.
We will examine how the system actually reduces the amount of time required to respond to events using contextual information and flexible workflows, how to create your own custom correlations to reduce false positives, how to automate security response and integrate with other Cisco security technologies, and how to maximize reporting to demonstrate security effectiveness and the value you bring to your business.
The Rise of Enterprise Class Cybersecurity Vendors
More is more. But when it comes to cybersecurity, is the old adage really true? In this free webinar, join John Oltsik, Sr. Principal Analyst from ESG, as he shares the latest findings into the pros and cons of a multivendor approach to cybersecurity. With this blueprint, you’ll learn how you can achieve a security approach that’s simple, effective and automated.
Web Security Appliance Update: AsyncOS10.0 release and beyond
Cisco's WSA is essential for web security needs of an enterprise and provides malware protection, application visibility and control, acceptable use policy controls & insightful reporting for compliance. In this session, we will cover details of new features that have been added in the latest releases of Web Security Appliance.
Ransomware, Banking Trojans and Floki Bot: A Threat Trifecta
Malware seems to be the Swiss Army knife in an attacker’s toolkit; some threats like ransomware target the users data. Others, such as banking trojans seek to exfiltrate sensitive data. Join our live webinar lead by Talos Threat Researcher Edmund Brumaghin as he covers the recent evolutions in malware and offers a detailed analysis of one of the newest banking Trojans, Floki Bot.
Security administrators today suffer from a barrage of products that work in isolation, and tax an already limited security manpower budget to give hackers the advantage. A more intelligent security solution would be able to exchange information regarding events, policy, threats, and context to correlate events, automatically respond to attacks, close gaps in enforcement, increase network visibility.
This presentation and use case demo shows how Cisco has built such a solution; leveraging intercommunication to simplify security.
Join us to learn about the new Cisco Firepower 2100 Series NGFW. See how Cisco extends superior threat effectiveness and achieve digital business resilience. Plus learn about the details of the ASA 5585 End of Sale.
During this briefing:
Learn about the four new midrange models: Firepower 2110,2120, 2140, and 2150.
See the new Cisco Firepower 2100 Series and new software in action
Receive details on how the new NGFWs compare and help you evolve from ASA 5585-X
Adversaries never stop innovating. Learn what macro trends the threat researchers have discovered in the security industry from the past season. By discussing these new and emerging threats, the Talos team will help you understand new protection strategies and build better defenses.
ISE Integration & Compatibility with Third Party Network Devices
This session will cover ISE integration with 3rd party Network Access Devices (NADs). ISE 2.0 introduced extensive 3rd party NAD support via RADIUS and ISE 2.1 introduced support for 3rd party NAD via SNMP which will be covered during the session.After attending the session, you’ll gain knowledge on how ISE integrates with 3rd party NAD for advanced ISE functions including Central Web-Auth, Profiling, BYOD, Posture Compliance, and TrustSec.
Stop Phishing Attacks with Automated Incident Response
Detecting and responding to cyber-attacks is critical to business operations. What happens when something does get in? Will you respond by having a team of incident response professionals investigate the problem?Reduce response and triage time with automated incident response and security orchestration. Cisco has collaborated with Swimlane to deliver an integrated approach to automating the investigation and response activities needed to take action on threats.
Watch this session for an in-depth look at new threat intelligence and trend analysis detailed in the Cisco 2017 Annual Cybersecurity Report.This year’s report, released January 31, 2017, explores the push-and-pull between adversaries and defenders. Listen in to understand the challenges you must overcome to close the windows bad actors work to exploit so you can reduce costly breaches. You’ll also learn how your peers assess the state of security in their organizations.We’ll chat about:
Factors behind the explosion of attacks using adware and spam
An exclusive look at cybercriminals’ time to evolve
Expert analysis of top vulnerabilities
Continued progress collapsing time to detection
An annual update on the state of security preparedness
Brief overview of TrustSec followed by what’s new in the latest solution validation. Please come prepared with your questions to ask the product team in a live question and answer session at the end of this briefing.
Hello. I know I must be missing some small detail, but I've been unable to connect a firepower 1010 device on 6.6.1 to my FMC remotely. I've read so many different instructions from so many different versions/people, but the vast majority are suggesting t...
Reimage to 6.1 version in ASA sfr module in 5508-X. There is a pre-install package that i have to use in this installation but i dont know what have I to do with that file. Someone know the command to run this package or when I have to run it?&n...
Hi, I am trying to connect a RV260P router to the WAN using for the DHCP requests a resolver using DoT or DoH encryption for the DNS requests. Entering the static DNS to the appropriate resolver the internet connection for new requests does not work any m...
We are trying to setup MFA on our pfsense firewalls for the webGUI for management. We would like to use a radius setup with ISE to gain access using MFA. I am able to see my authentications pass in ISE but on pFsense I don't have a user group ...
Dears ; After upgrade Cisco ise 2.4 to cisco 3.0 , i noticed that the license change to evaluate state , after doing some research i find that i should migrate license before upgrade , it that mean that i lost my license thank in advance