
In today’s fast-paced threat landscape, organizations face sophisticated cyberattacks targeting endpoints, networks, and email systems. The ability to rapidly detect, investigate, and respond to incidents across multiple vectors is vital for maintaining a strong security posture.
This hands-on workshop is designed to empower security professionals with the practical knowledge and skills needed to orchestrate a rapid and effective incident response strategy using Cisco’s integrated security solutions, as well as Microsoft Defender for endpoint protection. The session emphasizes the importance of securing email as a primary attack vector, alongside endpoint and network security.
Participants will gain hands-on experience with a powerful ecosystem of tools, including Cisco XDR, Secure Endpoint, Umbrella, Secure Malware Analytics, Cisco Firewalls, Cisco Email Threat Defense, and Threat Intelligence. Additionally, we’ll explore how to seamlessly integrate these tools with Microsoft Defender to create a unified, robust security strategy.
Workshop Highlights:
This workshop will provide practical, hands-on experience with:
- Cisco XDR: Consolidate and analyze telemetry from across your security ecosystem to enable faster detection and response.
- Cisco Secure Endpoint: Detect and mitigate endpoint threats with advanced EDR capabilities powered by real-time analytics.
- Cisco Umbrella: Protect users from malicious domains, phishing, and malware with DNS-layer security and secure web gateway features.
- Cisco Secure Malware Analytics: Conduct in-depth malware analysis to uncover sophisticated threats and generate actionable intelligence.
- Cisco Firewall: Strengthen perimeter defenses with comprehensive threat protection and policy enforcement.
- Cisco Email Threat Defense: Secure email, the most targeted attack vector, by identifying and blocking phishing, business email compromise (BEC), and malicious attachments.
- Threat Intelligence: Leverage actionable threat intelligence to enhance your ability to detect and respond to emerging threats.
- Microsoft Defender for Endpoint: Integrate and utilize Microsoft Defender to ensure seamless endpoint protection across hybrid environments.
Key Takeaways:
- Build a unified, streamlined incident response strategy across email, endpoint, network, and cloud environments.
- Gain practical experience with Cisco XDR and its integration with endpoint, email, and network security tools.
- Learn to operationalize threat intelligence to improve detection and accelerate response times.
- Explore real-world workflows for detecting, analyzing, and neutralizing advanced threats, including ransomware, phishing, and malware.
- Discover best practices for integrating Microsoft Defender with Cisco’s security solutions to create a multi-layered defense strategy.
Who Should Attend:
- Security Operations Center (SOC) analysts
- Incident response teams
- Cybersecurity engineers and architects
- IT professionals responsible for securing enterprise environments
Workshop Format:
- Duration: 6-8 hours (customizable based on audience needs)
- Structure:
- Interactive presentations and demonstrations
- Hands-on labs with guided exercises
- Live threat simulations and response workflows
Prerequisites:
- You will need to bring a laptop for this hands-on workshop
- Basic understanding of cybersecurity concepts and frameworks.
- Familiarity with endpoint, email, and network security tools is helpful but not required.
- Ensure you are able to access https://ciscosecurityworkshop.com/ portal or else ask your IT Admin to allow this URL: https://ciscosecurityworkshop.com/ . If not possible, please bring your personal Laptop.
- The workshop uses a Microsoft tenant (ciscothreathunting.ninja). This tenant should be allowed and tenant restrictions should not be applied.
- A dual monitor / screen would be helpful for the workshop but not essential.
Why Attend?
This workshop provides a unique opportunity to strengthen your incident response capabilities by mastering the integration of Cisco and Microsoft security solutions. Learn how to secure your organization’s email systems, endpoints, and network infrastructure against today’s most sophisticated cyber threats. With actionable insights and guided hands-on labs, you’ll leave with the confidence to rapidly detect, investigate, and respond to threats across multiple attack surfaces.