This event had place on Thursday 29th, April 2021 at 10hrs PDT
In this session, Cisco Press authors and security experts talks about the relevance of CCIE Security in post-pandemic and increasingly remote and cloud driven networks. They discuss how the CCIE Security blueprint and guide prepares them for this changing landscape of networks and security. They also discuss Cisco’s approach to Secure Access Service Edge (SASE).
This event provides an opportunity to interact with the authors in real-time and learn more about them, their story, the story behind their publications, and how they became renowned experts.
Chad Mitchell is a Technical Solutions Architect at Cisco supporting the Department of Defense and supporting agencies. He supports the sales teams as a technical resource for all Cisco Security products and serves as the Identity Services Engine subject matter expert for Cisco’s US Public Sector team. Chad has been with Cisco since 2013, and prior to joining Cisco he spent seven years as a deployment engineer and systems administrator implementing Cisco Security products for customers. Chad holds a CCIE (#44090) in Security and many other industry certifications such as CCDA, CCNP, Network+, and Security+.
Vivek Santuka is a Principal Architect at Cisco. He has over 15 years of experience in security, focusing on identity management, access control, and cloud security. Vivek is a member of multiple technical advisory groups. He holds an RHCE, CISSP, and two CCIE certifications (#17621). Vivek is a distinguished speaker at Cisco Live and an author of multiple Cisco Press books.
Jamie Sanbower is a Principal Architect in Cisco’s Global Security Architecture Team. Jamie is a technical leader and member of numerous advisory and working groups. With over 15 years of technical experience in the networking and security industry, Jamie has developed, designed, implemented, and operated enterprise network and security solutions for a wide variety of large clients. Jamie is a Cisco Live Distinguished Speaker and a co-author of Cisco Press books. He holds two CCIE certifications (#13637).
Aaron Woland is a Principal Engineer in Cisco’s Advanced Threat Security & Integrations group and works with Cisco’s largest customers all over the world. His primary job responsibilities include security design, solution enhancements, standards development, advanced threat solution design, endpoint security, and futures. He has over 20 years of experience in the IT industry. Aaron has collaborated on several Cisco Press publications and he has published many papers and design guides. Aaron is a Hall of Fame Elite Member for distinguished speakers at Cisco Live. He holds several certifications: GHIC, GCFE, GSEC, Certified Ethical Hacker, MCSE, VCP, CCSP, CCNP, CCDP, and a CCIE (#20113) among others.
Integrated Security Technologies and Solutions – Volume II brings together more expert-level instruction in security design, deployment, integration, and support. It will help experienced security and network professionals manage complex solutions, succeed in their day-to-day jobs, and prepare for their CCIE Security written and lab exams.
This event is open for everyone, including Cisco customers & partners.
Do you know you can get answers before opening a TAC case by visiting the Cisco Community.
Listen: https://smarturl.it/CCRS8E42Follow us: twitter.com/CiscoChampion
APIClarity is an open source, cloud-native visibility tool for APIs. It utilizes a Service Mesh framework to capture and analyze API traffic and identify potential risks.
We have two ASA 5525Xs who's management interface is on our OOB management network (172.16.8.0/22). Until now, the ASAs were sending SNMP (for port traffic) and NetFlow traffic to a server (172.16.4.45) on one the ASAs standard interfaces (172.16.4.0/22)....
Hi,Currently I am integrating ISE(software version: v2.7, patch 5) with Fortinet switch. And my endpoint which is connected to the switch has been authenticated from ISE successfully, just like the snapshot below. However, in Live Sessions, "IP Address" c...
I have two Cisco Firepower 2110 in HA Configuration. I tried to perform version upgrade from 6.4. to 6.6. I got Device2 (Standbyd device) upgraded to 6.6. But the Device1 (Primary) failed the update. And the Device1 i showing up in maintenance mode after ...
Hello All,ASA 5525-XI created a new Group Policy and new Tunnel Group that we want to only be accessible for Clientless VPN access only.In the Group Policy, under Tunneling Protocols, I only enabled the checkbox (*on ASDM) for Clientless SSL VPN.However, ...