BEGIN:VCALENDAR
VERSION:2.0
PRODID:Events Booking
BEGIN:VEVENT
UID:69dc153c4dfb5
SUMMARY:[ZTA] Documentation Test
DESCRIPTION:Template Description:
 This example event shows what a complet
 e workshop event page can look like when key fields are fully populated\, 
 including speaker details\, sponsor logos\, and gallery images. Use this p
 age as a reference for structure\, presentation\, and content quality.
 S
 peaker images
 Speaker images are most effectively presented when they ar
 e square\, centrally aligned\, and of high resolution. A square headshot p
 roduces the most refined presentation within the speaker section. Please e
 nsure that a description is included. Keep the face centered. Avoid landsc
 ape banners or portrait crops with the subject near the edge. Non-square i
 mages are accepted\, but they produce an inconsistent result.
 Recommende
 d: 800 × 800 px or larger
 Sponsor logos
 Sponsor logos should be displ
 ayed in a manner that is clean\, centered\, and cropped with minimal unnec
 essary whitespace. Horizontal logos typically produce the most consistent 
 appearance. It is advisable to prefer horizontal or well-balanced square l
 ogos. Very tall logos should be avoided to ensure uniform presentation. Ex
 cess whitespace should be removed. Padding and proportions across differen
 t sponsors should be standardized to maintain consistency within the row. 
 When available\, transparent PNG files are preferred.
 Recommended: 800 t
 o 1400 px wideBest practice: use transparent PNG files when possible
 Gal
 lery images
 Gallery images are displayed as square thumbnails and must r
 emain understandable when viewed at a smaller scale. Choose images with cl
 ear focal points and\, where possible\, reduce the use of visuals with ext
 ensive text. Ensure images are composed to crop neatly into a square forma
 t\, with the primary subject positioned centrally. Refrain from dense scre
 enshots\, small text\, or layouts placing information at the edges\, as th
 ese are not easily legible at thumbnail size.
 Recommended: 1000 × 1000 
 px or largerMinimum: 600 × 600 px
  
 Example Below:
 Overview:The Ze
 ro Trust Access Design Workshop is a comprehensive 2-hour interactive sess
 ion designed to help organizations understand and leverage Cisco’s Zero 
 Trust Access capabilities. This workshop combines a targeted presentation\
 , hands-on collaboration\, and strategic planning to help customers modern
 ize their zero trust architecture\, enhance security visibility\, and opti
 mize operational efficiency.
 
 Agenda:
 1. Introduction &amp\; Present
 ation (30 - minutes)
 
 Overview of Cisco’s Zero Trust Access solution
 
 Key Advantages: unified policy management\, improved visibility\, opera
 tional simplification\, and cost savings
 Real-world examples and custome
 r success stories
 Discussion on integrating a zero trust approach with e
 xisting infrastructures
 
 2. Interactive Discussion &amp\; White-boardi
 ng (45 Minutes)
 
 Open dialogue between customers and Cisco Solutions E
 ngineers (SEs) on current zero trust management practices
 Identification
  and mapping of all access types\, vendors\, and resource locations within
  the customer’s environment
 White-boarding session to illustrate curre
 nt state\, highlight challenges\, and reveal potential gaps in visibility 
 or management
 Discussion of integration opportunities and quick wins for
  zero trust deployment
 
 3. Demonstration and Discussion (15 minutes)

  
 Summary of key findings from the discussion and whiteboarding
 Collab
 orative development of a high-level roadmap for adopting a zero trust acce
 ss solution
 Recommendations on next steps to streamline operations\, red
 uce costs\, and improve security posture
 Q&amp\;A and assignment of foll
 ow-up actions or resources
 
 
 Key Takeaways:
 
 Clear understanding
  of Cisco’s Zero Trust Access solution and its advantages
 A detailed m
 ap of the customer’s current zero trust acess landscape
 Identification
  of immediate opportunities and long-term strategies for transformation
 
 A customized roadmap to help achieve a unified\, scalable\, and efficient 
 security architecture
 
 
 Who Should Attend:
 
 CISO and Security Le
 aders
 Network and Identity Administrators &amp\; Teams
 SecOps Leaders 
 and Staff
 Cisco SEs and Technical Architects
 
 
 Format:
 
 2-hour
  session (in-person or virtual)
 Combination of presentation\, discussion
 \, and collaborative white-boarding
 Actionable deliverables and next ste
 ps tailored to customer environment
 
 
 Notes:
 
 Ensure stakeholder
 s from all relevant teams participate for a holistic view.
 Bring network
  topology diagrams and inventory lists for deeper engagement.
 The sessio
 n is interactive and tailored to specific customer needs.
 
LOCATION:Virtual
DTSTART:20280414T100000Z
DTEND:20280414T140000Z
DTSTAMP:20260409T100747Z
ORGANIZER;CN=Cisco Security Workshops:MAILTO:no-reply@ciscosecurityworkshop
 .com
GEO:25;-80.226529
X-APPLE-STRUCTURED-LOCATION;VALUE=URI;X-ADDRESS=Virtual;X-APPLE-RADIUS=72;X
 -TITLE=Virtual:25;-80.226529
END:VEVENT
END:VCALENDAR