Cisco Security Workshops
  • Home
    • Available Workshops
    • Current Registrations
  • Workshop Events
    • List All Workshops by Category
Cisco Security Workshops
  • Home
    • Available Workshops
    • Current Registrations
  • Workshop Events
    • List All Workshops by Category
  • Forgot your username? or password?
  • Create an account
Fields marked with an asterisk (*) are required.
Name *
Username *
Password *
Verify password *
Email *
Verify email *

Workshop Short Description Templates

Unlocking the Power of Cisco Secure Firewall 10.0

Details
By Brandon Newport
Brandon Newport
Category: Workshop Short Description Templates
10 March 2026
Hits: 22

Experience the latest innovations in Cisco Secure Firewall 10.0 in this lab. Discover how the Encrypted Visibility Engine (EVE) enables threat detection in encrypted traffic, while AI-driven SnortML provides protection against signature-less attacks. Take advantage of expanded SD-WAN features and improved OT security with advanced access control and containment. Seamless Splunk integration delivers robust security analytics for effective incident response. This lab will help you build the knowledge and skills needed to highlight the strengths of Cisco Secure Firewall 10.0.

Zero Trust Access Design Clinic

Details
By Andy Peterson
Andy Peterson
Category: Workshop Short Description Templates
03 February 2026
Hits: 227

Overview:
The Zero Trust Access Design Workshop is a comprehensive 2-hour interactive session designed to help organizations understand and leverage Cisco’s Zero Trust Access capabilities. This workshop combines a targeted presentation, hands-on collaboration, and strategic planning to help customers modernize their zero trust architecture, enhance security visibility, and optimize operational efficiency.


Agenda:

1. Introduction & Presentation (30 - minutes)

  • Overview of Cisco’s Zero Trust Access solution
  • Key Advantages: unified policy management, improved visibility, operational simplification, and cost savings
  • Real-world examples and customer success stories
  • Discussion on integrating a zero trust approach with existing infrastructures

2. Interactive Discussion & White-boarding (45 Minutes)

  • Open dialogue between customers and Cisco Solutions Engineers (SEs) on current zero trust management practices
  • Identification and mapping of all access types, vendors, and resource locations within the customer’s environment
  • White-boarding session to illustrate current state, highlight challenges, and reveal potential gaps in visibility or management
  • Discussion of integration opportunities and quick wins for zero trust deployment

3. Demonstration and Discussion (15 minutes)

  • Summary of key findings from the discussion and whiteboarding
  • Collaborative development of a high-level roadmap for adopting a zero trust access solution
  • Recommendations on next steps to streamline operations, reduce costs, and improve security posture
  • Q&A and assignment of follow-up actions or resources

Key Takeaways:

  • Clear understanding of Cisco’s Zero Trust Access solution and its advantages
  • A detailed map of the customer’s current zero trust acess landscape
  • Identification of immediate opportunities and long-term strategies for transformation
  • A customized roadmap to help achieve a unified, scalable, and efficient security architecture

Who Should Attend:

  • CISO and Security Leaders
  • Network and Identity Administrators & Teams
  • SecOps Leaders and Staff
  • Cisco SEs and Technical Architects

Format:

  • 2-hour session (in-person or virtual)
  • Combination of presentation, discussion, and collaborative white-boarding
  • Actionable deliverables and next steps tailored to customer environment

 

Notes:

  • Ensure stakeholders from all relevant teams participate for a holistic view.
  • Bring network topology diagrams and inventory lists for deeper engagement.
  • The session is interactive and tailored to specific customer needs.

Secure Workload Test Drive: 3 Hour hands on

Details
By Jamie Cresdee
Jamie Cresdee
Category: Workshop Short Description Templates
07 January 2026
Hits: 379

Secure Workload Test Drive: 3 Hour hands on experience with Secure Workload. Space is limited to 20 customers per session !!

Cisco Secure Workload Test Drive

Today’s applications and the security threats that confront them are dynamic and continually changing. 

Organizations are looking for flexibility, performance, and security, whether they deploy an application on-premises or in the cloud. Enter bare-metal, virtualization, microservices, and containerization across private and public clouds, and it becomes an architectural and operational challenge to enforce a consistent security policy. Cisco Secure Workload can enhance security with segmentation and reduce risk by decreasing your workload’s attack surface quickly and consistently without adding complexity. 

Join this interactive, 3 hour, hands-on experience with Cisco Secure Workload (formerly Tetration) to learn how to: 

Gain visibility into what’s running and critical by identifying workloads and enforcing policies 

Contain breaches and minimize lateral movement with application micro-segmentation 

Alert or block communications by continuously monitoring and responding to indicators of compromise 

Prior to the session, please go to https://id.cisco.com/signin/register for a CCO account. This will be needed and is mandatory to access the hands-on lab.

Secure Workload Workshops: 1 Hour presentation

Details
By Jamie Cresdee
Jamie Cresdee
Category: Workshop Short Description Templates
07 January 2026
Hits: 347

Secure Workload Webinar: 1 Hour presentation overview of Secure Workload and Use Cases.

Cisco Secure Workload Webinar

Enabling zero-trust segmentation in today’s highly complex application landscape can be extremely difficult to implement in the hybrid multi-cloud world. Lack of visibility, insufficient data, and inconsistent firewall policy frameworks expose these On-premises or Cloud applications to attackers. 

Join us at this 1 hour Workshop and learn how to address the challenges of application security for your On-premises and Cloud Workloads with Cisco Secure Workload (formerly Tetration). 

Join us as we discuss: 

Simplifying the task of microsegmentation and demystifying its complexity 

Understanding threats and your potential risks 

Proactively identifying workload vulnerabilities, taking action to reduce risk, and protecting assets  

  • 1
  • 2
  • 3

Page 1 of 3

Hybrid Mesh Firewalls Design Workshops

Hybrid Mesh Firewalls Design Workshops are coming soon click here for more information.

Read More