It's Cybersecurity Month
What's happening this month?
Giveaway
Sign up anytime in the month of October for a chance to win a FREE Cisco Security Digital course of your choice! Winner will be announced November 1st and will get 6-months access to digital course of choice!
Terms: Limit one entry per person. Only registrations with corporate emails will be accepted.
- Implementing and Operating Cisco Security Core Technologies (SCOR)
- Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
- Implementing Secure Solutions with Virtual Private Networks (SVPN)
- Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP)
- Performing CyberOps Using Cisco Security Technologies (CBRCOR)
- Conducting Forensic Analysis and Incident Response Using Cisco Technologies for CyberOps (CBRFIR)
- Implementing Automation for Cisco Security Solutions (SAUI)
- Securing Email with Cisco Email Security Appliance (SESA)
- Implementing and Configuring Cisco Identity Services Engine (SISE)
- Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRULES)
Securing the Web with Cisco Web Security Appliance (SWSA) - Conducting Threat Hunting & Defending using Cisco Technologies for CyberOps (CBRTHD)
- Designing & Implementing Secure Cloud Access for Users & Endpoints (SCAZT)
- Introducing Cisco Cloud Consumer Security (SECICC)
- Cisco DoD Comply-to-Connect (C2C)
- Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPF)
- Advanced Techniques for Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPA)
Quiz
Test your skills in our cybersecurity quiz anytime in the month of October for a chance to win an Amazon gift card! 5 random participants will be selected on November 1st!
Terms: Limit one entry per person. Only corporate emails will be accepted.
Webinars
Join our upcoming Cybersecurity Month webinars to enhance your skills and get a chance to access exclusive promotions! Topics include AI, Splunk, Comply-to-Connect, Cloud Security, and more!
October 7 | 11:00am – 12:00pm Eastern
AI, Ethics, and Privacy: Safeguarding the Digital Age
Explore the ethical and privacy challenges of AI’s role in managing sensitive data. Learn how to ensure compliance with frameworks like NIST AI RMF and implement best practices to protect personal information, equipping you to tackle generative AI challenges in today’s digital world.
October 14 | 11:00am – 12:00pm Eastern
Splunk: The Data-to-Everything Platform
Join us during Cybersecurity Month for an exclusive webinar on Splunk: The Data-to-Everything Platform, led by Arturo Hamilton, a multi-cloud solutions architect and IT expert. Explore how Splunk’s AI-powered analytics can transform how you manage and protect your data, from enhancing security to driving operational efficiency. Whether you’re focused on security or streamlining IT processes, this session will give you the insights you need to harness the full potential of your data. Register now and elevate your data strategy!
October 16 | 10:00am – 11:00am Eastern
Mastering Comply-To-Connect (C2C) Compliance
Join cybersecurity expert James Risler in a webinar on meeting DISA’s C2C requirements with Cisco’s Identity Services Engine (ISE). Learn about six C2C learning modules that simplify implementation and reporting, helping DoD leaders and technologists achieve Zero-Trust compliance and secure operations.
October 21 | 11:00am – 12:00pm Eastern
Zero Trust Architecture in Cloud Environments
In this webinar participants will explore the Zero Trust model a revolutionary approach to security in our increasingly digital world. It operates on the core principle of “never trust, always verify,” which is essential in a landscape where traditional security perimeters no longer suffice.
This model is built on three foundational elements: verifying explicitly, using least privilege access, and assuming breach. By implementing the Zero Trust model, organizations can adapt to the complexity of modern environments, embrace the mobile workforce, and protect critical data and applications regardless of their location.
It’s an end-to-end strategy that extends throughout the entire digital estate, providing a robust framework for defending against sophisticated cyber threats. With Azure’s guidance and resources, learners can dive deep into this model, understanding how to apply its principles to create a secure, resilient infrastructure.
October 22 | 12:00pm – 1:00pm Eastern
Best Practices for Cybersecurity in Cisco Intersight
In this 1-hour session, learn how to enhance security in a multi-tenant environment by mastering user account creation, applying permissions, and leveraging API access for Intersight configuration. We’ll also cover the critical role of certificates, including how to install and update them, to ensure a secure and efficient setup.