It's Cybersecurity Month

Throughout the month of October, we’re celebrating Cybersecurity Month with a range of resources, special events, and exciting giveaways. Dive into our webinars, expert insights, and tools to enhance your cybersecurity knowledge, and don’t miss your chance to win great prizes along the way!

What's happening this month?

01

Giveaway

Sign up anytime in the month of October for a chance to win a FREE Cisco Security Digital course of your choice!

02

Quiz

Test your skills in our cybersecurity quiz anytime in the month of October for a chance to win an Amazon gift card!

03

Webinars

Join our upcoming Cybersecurity Month webinars to enhance your skills and get a chance to access exclusive promotions!

Giveaway

Sign up anytime in the month of October for a chance to win a FREE Cisco Security Digital course of your choice! Winner will be announced November 1st and will get 6-months access to digital course of choice!

Terms: Limit one entry per person. Only registrations with corporate emails will be accepted.

  • Implementing and Operating Cisco Security Core Technologies (SCOR)
  • Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
  • Implementing Secure Solutions with Virtual Private Networks (SVPN)
  • Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP)
  • Performing CyberOps Using Cisco Security Technologies (CBRCOR)
  • Conducting Forensic Analysis and Incident Response Using Cisco Technologies for CyberOps (CBRFIR)
  • Implementing Automation for Cisco Security Solutions (SAUI)
  • Securing Email with Cisco Email Security Appliance (SESA)
  • Implementing and Configuring Cisco Identity Services Engine (SISE)
  • Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRULES)
    Securing the Web with Cisco Web Security Appliance (SWSA)
  • Conducting Threat Hunting & Defending using Cisco Technologies for CyberOps (CBRTHD)
  • Designing & Implementing Secure Cloud Access for Users & Endpoints (SCAZT)
  • Introducing Cisco Cloud Consumer Security (SECICC)
  • Cisco DoD Comply-to-Connect (C2C)
  • Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPF)
  • Advanced Techniques for Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPA)
Cisco Icon - Security

Quiz

Test your skills in our cybersecurity quiz anytime in the month of October for a chance to win an Amazon gift card! 5 random participants will be selected on November 1st!

Terms: Limit one entry per person. Only corporate emails will be accepted.

Webinars

Join our upcoming Cybersecurity Month webinars to enhance your skills and get a chance to access exclusive promotions!​ Topics include AI, Splunk, Comply-to-Connect, Cloud Security, and more! 

October 7 | 11:00am – 12:00pm Eastern

AI, Ethics, and Privacy: Safeguarding the Digital Age

Explore the ethical and privacy challenges of AI’s role in managing sensitive data. Learn how to ensure compliance with frameworks like NIST AI RMF and implement best practices to protect personal information, equipping you to tackle generative AI challenges in today’s digital world. 

Register Here

October 14 | 11:00am – 12:00pm Eastern

Splunk: The Data-to-Everything Platform

Join us during Cybersecurity Month for an exclusive webinar on Splunk: The Data-to-Everything Platform, led by Arturo Hamilton, a multi-cloud solutions architect and IT expert. Explore how Splunk’s AI-powered analytics can transform how you manage and protect your data, from enhancing security to driving operational efficiency. Whether you’re focused on security or streamlining IT processes, this session will give you the insights you need to harness the full potential of your data. Register now and elevate your data strategy!

Register Here

October 16 | 10:00am – 11:00am Eastern

Mastering Comply-To-Connect (C2C) Compliance

Join cybersecurity expert James Risler in a webinar on meeting DISA’s C2C requirements with Cisco’s Identity Services Engine (ISE). Learn about six C2C learning modules that simplify implementation and reporting, helping DoD leaders and technologists achieve Zero-Trust compliance and secure operations.

Register Here

October 21 | 11:00am – 12:00pm Eastern

Zero Trust Architecture in Cloud Environments

In this webinar participants will explore the Zero Trust model a revolutionary approach to security in our increasingly digital world. It operates on the core principle of “never trust, always verify,” which is essential in a landscape where traditional security perimeters no longer suffice.

This model is built on three foundational elements: verifying explicitly, using least privilege access, and assuming breach. By implementing the Zero Trust model, organizations can adapt to the complexity of modern environments, embrace the mobile workforce, and protect critical data and applications regardless of their location.

It’s an end-to-end strategy that extends throughout the entire digital estate, providing a robust framework for defending against sophisticated cyber threats. With Azure’s guidance and resources, learners can dive deep into this model, understanding how to apply its principles to create a secure, resilient infrastructure.

Register Here

October 22 | 12:00pm – 1:00pm Eastern

Best Practices for Cybersecurity in Cisco Intersight

In this 1-hour session, learn how to enhance security in a multi-tenant environment by mastering user account creation, applying permissions, and leveraging API access for Intersight configuration. We’ll also cover the critical role of certificates, including how to install and update them, to ensure a secure and efficient setup.

Register Here