BEGIN:VCALENDAR
VERSION:2.0
PRODID:Events Booking
BEGIN:VEVENT
UID:69aa8c5099008
SUMMARY:Rapid Incident Response - Com East
DESCRIPTION:
 Rapid Incident Response Hands-On Workshop: Mastering Cisco X
 DR
 
 
 
 ByBrandon Newport
 Category:Workshop Short Description Temp
 lates
 05 June 2025
 Hits: 380
 
 
 
 
 In today’s fast-paced thr
 eat landscape\, organizations face sophisticated cyberattacks targeting en
 dpoints\, networks\, and email systems. The ability to rapidly detect\, in
 vestigate\, and respond to incidents across multiple vectors is vital for 
 maintaining a strong security posture.
 This hands-on workshop is designe
 d to empower security professionals with the practical knowledge and skill
 s needed to orchestrate a rapid and effective incident response strategy u
 sing Cisco’s integrated security solutions\, as well as Microsoft Defend
 er for endpoint protection. The session emphasizes the importance of secur
 ing email as a primary attack vector\, alongside endpoint and network secu
 rity.
 Participants will gain hands-on experience with a powerful ecosyst
 em of tools\, including Cisco XDR\, Secure Endpoint\, Umbrella\, Secur
 e Malware Analytics\, Cisco Firewalls\, Cisco Email Threat Defense\, and
  Threat Intelligence. Additionally\, we’ll explore how to seamlessly in
 tegrate these tools with Microsoft Defender to create a unified\, robust
  security strategy.
 Workshop Highlights:
 This workshop will provide pr
 actical\, hands-on experience with:
 
 Cisco XDR: Consolidate and analyz
 e telemetry from across your security ecosystem to enable faster detection
  and response.
 Cisco Secure Endpoint: Detect and mitigate endpoint threa
 ts with advanced EDR capabilities powered by real-time analytics.
 Cisco 
 Umbrella: Protect users from malicious domains\, phishing\, and malware wi
 th DNS-layer security and secure web gateway features.
 Cisco Secure Malw
 are Analytics: Conduct in-depth malware analysis to uncover sophisticated 
 threats and generate actionable intelligence.
 Cisco Firewall: Strengthen
  perimeter defenses with comprehensive threat protection and policy enforc
 ement.
 Cisco Email Threat Defense: Secure email\, the most targeted atta
 ck vector\, by identifying and blocking phishing\, business email compromi
 se (BEC)\, and malicious attachments.
 Threat Intelligence: Leverage acti
 onable threat intelligence to enhance your ability to detect and respond t
 o emerging threats.
 Microsoft Defender for Endpoint: Integrate and utili
 ze Microsoft Defender to ensure seamless endpoint protection across hybrid
  environments.
 
 Key Takeaways:
 
 Build a unified\, streamlined inci
 dent response strategy across email\, endpoint\, network\, and cloud envir
 onments.
 Gain practical experience with Cisco XDR and its integration wi
 th endpoint\, email\, and network security tools.
 Learn to operationaliz
 e threat intelligence to improve detection and accelerate response times.
 
 Explore real-world workflows for detecting\, analyzing\, and neutralizin
 g advanced threats\, including ransomware\, phishing\, and malware.
 Disc
 over best practices for integrating Microsoft Defender with Cisco’s secu
 rity solutions to create a multi-layered defense strategy.
 
 Who Should
  Attend:
 
 Security Operations Center (SOC) analysts
 Incident respons
 e teams
 Cybersecurity engineers and architects
 IT professionals respon
 sible for securing enterprise environments
 
 Workshop Format:
 
 Dura
 tion: 4-6 hours (customizable based on audience needs)
 Structure:
 
 I
 nteractive presentations and demonstrations
 Hands-on labs with guided ex
 ercises
 Live threat simulations and response workflows
 
 
 
 Prereq
 uisites:
 
 You will need to bring a laptop for this hands-on workshop

  Basic understanding of cybersecurity concepts and frameworks.
 Familiari
 ty with endpoint\, email\, and network security tools is helpful but not r
 equired.
 Ensure you are able to access https://ciscosecurityworkshop.co
 m/ portal or else ask your IT Admin to allow this URL: https://ciscosecu
 rityworkshop.com/ . If not possible\, please bring your personal Laptop.
 
 The workshop uses a Microsoft tenant (ciscothreathunting.ninja). This te
 nant should be allowed and tenant restrictions should not be applied.
 A 
 dual monitor / screen would be helpful for the workshop but not essential.
 
 
 
LOCATION:Virtual
DTSTART:20250820T140000Z
DTEND:20250820T180000Z
DTSTAMP:20250819T181127Z
ORGANIZER;CN=Cisco Security Workshops:MAILTO:no-reply@ciscosecurityworkshop
 .com
GEO:25;-80.226529
X-APPLE-STRUCTURED-LOCATION;VALUE=URI;X-ADDRESS=Virtual;X-APPLE-RADIUS=72;X
 -TITLE=Virtual:25;-80.226529
END:VEVENT
END:VCALENDAR