This event had place on Thursday 29th, April 2021 at 10hrs PDT
In this session, Cisco Press authors and security experts talks about the relevance of CCIE Security in post-pandemic and increasingly remote and cloud driven networks. They discuss how the CCIE Security blueprint and guide prepares them for this changing landscape of networks and security. They also discuss Cisco’s approach to Secure Access Service Edge (SASE).
This event provides an opportunity to interact with the authors in real-time and learn more about them, their story, the story behind their publications, and how they became renowned experts.
Chad Mitchell is a Technical Solutions Architect at Cisco supporting the Department of Defense and supporting agencies. He supports the sales teams as a technical resource for all Cisco Security products and serves as the Identity Services Engine subject matter expert for Cisco’s US Public Sector team. Chad has been with Cisco since 2013, and prior to joining Cisco he spent seven years as a deployment engineer and systems administrator implementing Cisco Security products for customers. Chad holds a CCIE (#44090) in Security and many other industry certifications such as CCDA, CCNP, Network+, and Security+.
Vivek Santuka is a Principal Architect at Cisco. He has over 15 years of experience in security, focusing on identity management, access control, and cloud security. Vivek is a member of multiple technical advisory groups. He holds an RHCE, CISSP, and two CCIE certifications (#17621). Vivek is a distinguished speaker at Cisco Live and an author of multiple Cisco Press books.
Jamie Sanbower is a Principal Architect in Cisco’s Global Security Architecture Team. Jamie is a technical leader and member of numerous advisory and working groups. With over 15 years of technical experience in the networking and security industry, Jamie has developed, designed, implemented, and operated enterprise network and security solutions for a wide variety of large clients. Jamie is a Cisco Live Distinguished Speaker and a co-author of Cisco Press books. He holds two CCIE certifications (#13637).
Aaron Woland is a Principal Engineer in Cisco’s Advanced Threat Security & Integrations group and works with Cisco’s largest customers all over the world. His primary job responsibilities include security design, solution enhancements, standards development, advanced threat solution design, endpoint security, and futures. He has over 20 years of experience in the IT industry. Aaron has collaborated on several Cisco Press publications and he has published many papers and design guides. Aaron is a Hall of Fame Elite Member for distinguished speakers at Cisco Live. He holds several certifications: GHIC, GCFE, GSEC, Certified Ethical Hacker, MCSE, VCP, CCSP, CCNP, CCDP, and a CCIE (#20113) among others.
Integrated Security Technologies and Solutions – Volume II brings together more expert-level instruction in security design, deployment, integration, and support. It will help experienced security and network professionals manage complex solutions, succeed in their day-to-day jobs, and prepare for their CCIE Security written and lab exams.
This event is open for everyone, including Cisco customers & partners.
Do you know you can get answers before opening a TAC case by visiting the Cisco Community.
Hello friends, I am trying to create new node with latest version of ISE and restore backup from old deployment.Do I need to restore backuped config to psns and secondary admin node before registering in new deployment?Or is that enough restoring bac...
My customer wants to have remote ssl vpn for his employees to access office network securely from their homes.Which is the best cost effective ssl remote vpn solution that i can provideWe have provided to customer isr 4451 as Internet CE router and ngfw21...
I recently installed a FMCv on VMware (v6.6.1) and 2x 2110 FTD units which came with 220.127.116.11. I expected updates for the 2110s to appear in the FMC so I could upgrade to 6.6.1. It keeps saying "no updates available". FDB and GeoDB updates are workin...
Can I connect to the firewall after AnyConnect VPN is established?192.168.0.1 - inside interface on Firewall192.168.0.2 - server in private networkAfter establishing a vpn connection, I can ping 192.168.0.2. I canconnect to 192.168.0.2, but i can't ping 1...
Hello,I found in cisco documentation that BFD is not available on OSPF, only BGP.So I use BGP protocol on my fw FTD 2130.I use FDM to configure this FTD fw. In the BGP part, I activated this line:"neighbor 18.104.22.168 fall-over bfd single-hop" When I run...