BEGIN:VCALENDAR
VERSION:2.0
PRODID:Events Booking
BEGIN:VEVENT
UID:69d0880967704
SUMMARY:BLN Test Course
DESCRIPTION:
 In today’s fast-paced threat landscape\, organizations fac
 e sophisticated cyberattacks targeting endpoints\, networks\, and email sy
 stems. The ability to rapidly detect\, investigate\, and respond to incide
 nts across multiple vectors is vital for maintaining a strong security pos
 ture.
 This hands-on workshop is designed to empower security professiona
 ls with the practical knowledge and skills needed to orchestrate a rapid a
 nd effective incident response strategy using Cisco’s integrated securit
 y solutions\, as well as Microsoft Defender for endpoint protection. The s
 ession emphasizes the importance of securing email as a primary attack vec
 tor\, alongside endpoint and network security.
 Participants will gain ha
 nds-on experience with a powerful ecosystem of tools\, including Cisco XDR
 \, Secure Endpoint\, Umbrella\, Secure Malware Analytics\, Cisco Firewalls
 \, Cisco Email Threat Defense\, and Threat Intelligence. Additionally\, we
 ’ll explore how to seamlessly integrate these tools with Microsoft Defen
 der to create a unified\, robust security strategy.
 Workshop Highlights:
 
 This workshop will provide practical\, hands-on experience with:
 
 C
 isco XDR: Consolidate and analyze telemetry from across your security ecos
 ystem to enable faster detection and response.
 Cisco Secure Endpoint: De
 tect and mitigate endpoint threats with advanced EDR capabilities powered 
 by real-time analytics.
 Cisco Umbrella: Protect users from malicious dom
 ains\, phishing\, and malware with DNS-layer security and secure web gatew
 ay features.
 Cisco Secure Malware Analytics: Conduct in-depth malware an
 alysis to uncover sophisticated threats and generate actionable intelligen
 ce.
 Cisco Firewall: Strengthen perimeter defenses with comprehensive thr
 eat protection and policy enforcement.
 Cisco Email Threat Defense: Secur
 e email\, the most targeted attack vector\, by identifying and blocking ph
 ishing\, business email compromise (BEC)\, and malicious attachments.
 Th
 reat Intelligence: Leverage actionable threat intelligence to enhance your
  ability to detect and respond to emerging threats.
 Microsoft Defender f
 or Endpoint: Integrate and utilize Microsoft Defender to ensure seamless e
 ndpoint protection across hybrid environments.
 
 Key Takeaways:
 
 Bu
 ild a unified\, streamlined incident response strategy across email\, endp
 oint\, network\, and cloud environments.
 Gain practical experience with 
 Cisco XDR and its integration with endpoint\, email\, and network security
  tools.
 Learn to operationalize threat intelligence to improve detection
  and accelerate response times.
 Explore real-world workflows for detecti
 ng\, analyzing\, and neutralizing advanced threats\, including ransomware\
 , phishing\, and malware.
 Discover best practices for integrating Micros
 oft Defender with Cisco’s security solutions to create a multi-layered d
 efense strategy.
 
 Who Should Attend:
 
 Security Operations Center (
 SOC) analysts
 Incident response teams
 Cybersecurity engineers and arch
 itects
 IT professionals responsible for securing enterprise environments
 
 
 Workshop Format:
 
 Duration: 4-6 hours (customizable based on aud
 ience needs)
 Structure:
 
 Interactive presentations and demonstration
 s
 Hands-on labs with guided exercises
 Live threat simulations and resp
 onse workflows
 
 
 
 Prerequisites:
 
 You will need to bring a lap
 top for this hands-on workshop
 Basic understanding of cybersecurity conc
 epts and frameworks.
 Familiarity with endpoint\, email\, and network sec
 urity tools is helpful but not required.
 Ensure you are able to access 
 https://ciscosecurityworkshop.com/ portal or else ask your IT Admin to all
 ow this URL: https://ciscosecurityworkshop.com/ . If not possible\, please
  bring your personal Laptop.
 The workshop uses a Microsoft tenant (cisco
 threathunting.ninja). This tenant should be allowed and tenant restriction
 s should not be applied.
 A dual monitor / screen would be helpful for th
 e workshop but not essential.
 
 Why Attend?
 This workshop provides a 
 unique opportunity to strengthen your incident response capabilities by ma
 stering the integration of Cisco and Microsoft security solutions. Learn h
 ow to secure your organization’s email systems\, endpoints\, and network
  infrastructure against today’s most sophisticated cyber threats. With a
 ctionable insights and guided hands-on labs\, you’ll leave with the conf
 idence to rapidly detect\, investigate\, and respond to threats across mul
 tiple attack surfaces.
LOCATION:Virtual
DTSTART:20251003T140000Z
DTEND:20251003T210000Z
DTSTAMP:20251001T202808Z
ORGANIZER;CN=Cisco Security Workshops:MAILTO:no-reply@ciscosecurityworkshop
 .com
GEO:25;-80.226529
X-APPLE-STRUCTURED-LOCATION;VALUE=URI;X-ADDRESS=Virtual;X-APPLE-RADIUS=72;X
 -TITLE=Virtual:25;-80.226529
END:VEVENT
END:VCALENDAR