BEGIN:VCALENDAR
VERSION:2.0
PRODID:Events Booking
BEGIN:VEVENT
UID:69aa9a208f842
SUMMARY:Desales Media RiR
DESCRIPTION:
 In today’s fast-paced threat landscape\, organizations fac
 e sophisticated cyberattacks targeting endpoints\, networks\, and email sy
 stems. The ability to rapidly detect\, investigate\, and respond to incide
 nts across multiple vectors is vital for maintaining a strong security pos
 ture.
 This hands-on workshop is designed to empower security professiona
 ls with the practical knowledge and skills needed to orchestrate a rapid a
 nd effective incident response strategy using Cisco’s integrated securit
 y solutions\, as well as Microsoft Defender for endpoint protection. The s
 ession emphasizes the importance of securing email as a primary attack vec
 tor\, alongside endpoint and network security.
 Participants will gain ha
 nds-on experience with a powerful ecosystem of tools\, including Cisco XD
 R\, Secure Endpoint\, Umbrella\, Secure Malware Analytics\, Cisco Fire
 walls\, Cisco Email Threat Defense\, and Threat Intelligence. Additional
 ly\, we’ll explore how to seamlessly integrate these tools with Microso
 ft Defender to create a unified\, robust security strategy.
 Workshop Hi
 ghlights:
 This workshop will provide practical\, hands-on experience wit
 h:
 
 Cisco XDR: Consolidate and analyze telemetry from across your secu
 rity ecosystem to enable faster detection and response.
 Cisco Secure End
 point: Detect and mitigate endpoint threats with advanced EDR capabilities
  powered by real-time analytics.
 Cisco Umbrella: Protect users from mali
 cious domains\, phishing\, and malware with DNS-layer security and secure 
 web gateway features.
 Cisco Secure Malware Analytics: Conduct in-depth m
 alware analysis to uncover sophisticated threats and generate actionable i
 ntelligence.
 Cisco Firewall: Strengthen perimeter defenses with comprehe
 nsive threat protection and policy enforcement.
 Cisco Email Threat Defen
 se: Secure email\, the most targeted attack vector\, by identifying and bl
 ocking phishing\, business email compromise (BEC)\, and malicious attachme
 nts.
 Threat Intelligence: Leverage actionable threat intelligence to enh
 ance your ability to detect and respond to emerging threats.
 Microsoft D
 efender for Endpoint: Integrate and utilize Microsoft Defender to ensure s
 eamless endpoint protection across hybrid environments.
 
 Key Takeaways
 :
 
 Build a unified\, streamlined incident response strategy across ema
 il\, endpoint\, network\, and cloud environments.
 Gain practical experie
 nce with Cisco XDR and its integration with endpoint\, email\, and network
  security tools.
 Learn to operationalize threat intelligence to improve 
 detection and accelerate response times.
 Explore real-world workflows fo
 r detecting\, analyzing\, and neutralizing advanced threats\, including ra
 nsomware\, phishing\, and malware.
 Discover best practices for integrati
 ng Microsoft Defender with Cisco’s security solutions to create a multi-
 layered defense strategy.
 
 Who Should Attend:
 
 Security Operations
  Center (SOC) analysts
 Incident response teams
 Cybersecurity engineers
  and architects
 IT professionals responsible for securing enterprise env
 ironments
 
 Workshop Format:
 
 Duration: 4-6 hours (customizable bas
 ed on audience needs)
 Structure:
 
 Interactive presentations and demo
 nstrations
 Hands-on labs with guided exercises
 Live threat simulations
  and response workflows
 
 
 
 Prerequisites:
 
 You will need to br
 ing a laptop for this hands-on workshop
 Basic understanding of cybersecu
 rity concepts and frameworks.
 Familiarity with endpoint\, email\, and ne
 twork security tools is helpful but not required.
 Ensure you are able to
  access https://ciscosecurityworkshop.com/ portal or else ask your IT Ad
 min to allow this URL: https://ciscosecurityworkshop.com/ . If not possi
 ble\, please bring your personal Laptop.
 The workshop uses a Microsoft t
 enant (ciscothreathunting.ninja). This tenant should be allowed and tenant
  restrictions should not be applied.
 A dual monitor / screen would be he
 lpful for the workshop but not essential.
 
 Why Attend?
 This workshop
  provides a unique opportunity to strengthen your incident response capabi
 lities by mastering the integration of Cisco and Microsoft security soluti
 ons. Learn how to secure your organization’s email systems\, endpoints\,
  and network infrastructure against today’s most sophisticated cyber thr
 eats. With actionable insights and guided hands-on labs\, you’ll leave w
 ith the confidence to rapidly detect\, investigate\, and respond to threat
 s across multiple attack surfaces.
LOCATION:Virtual
DTSTART:20250708T130000Z
DTEND:20250708T160000Z
DTSTAMP:20250708T173720Z
ORGANIZER;CN=Cisco Security Workshops:MAILTO:no-reply@ciscosecurityworkshop
 .com
GEO:25;-80.226529
X-APPLE-STRUCTURED-LOCATION;VALUE=URI;X-ADDRESS=Virtual;X-APPLE-RADIUS=72;X
 -TITLE=Virtual:25;-80.226529
END:VEVENT
END:VCALENDAR