Search results

Test

dddddd

Event Date 2025-02-03
Event Location Timezone UTC
Event Start Time 8:00 AM
Event End Time 2:00 PM
Capacity 2
Registered 0
Available Place 2
Created By Rita Butman
Geolocation: emea
Type of event: partner
Location Virtual

We are no longer accepting registration for this event

Event Date 2025-03-24
Event Location Timezone UTC
Event Start Time 4:00 PM
Event End Time 4:00 AM
Capacity 4
Registered 2
Available Place 2
Created By Rita Butman
Location Virtual

We are no longer accepting registration for this event

Event Date 2025-03-24
Event Location Timezone UTC
Event Start Time 4:00 PM
Event End Time 4:00 AM
Capacity 4
Registered 0
Available Place 4
Created By Rita Butman
Location Virtual

We are no longer accepting registration for this event

Event Date 2025-04-28
Event Location Timezone UTC
Event Start Time 12:00 AM
Event End Time 12:00 AM
Capacity 3
Registered 0
Available Place 3
Created By Rita Butman

We are no longer accepting registration for this event

Event Date 2025-05-19
Event Location Timezone UTC
Event Start Time 11:00 AM
Event End Time 10:00 PM
Capacity Unlimited
Registered 1
Created By Rita Butman
Location Calgary

We are no longer accepting registration for this event

Bechtle Rapid Incident Response Workshop @ Neckarsulm

Join us for an interactive, hands-on Rapid Incident Response Workshop featuring Cisco XDR — designed to show you how today’s most advanced tools work together to track, investigate, and respond to sophisticated cyber threats.

Step into the role of a Security Analyst responding to a simulated APT breach at a fictional company. From initial alert to final containment, you’ll experience how Cisco’s security portfolio works in concert to expose attackers and stop threats fast — across endpoints, email, DNS, and more.

  • Explore a real-world attack simulation built around a custom APT campaign.
  • Walk through a coordinated response using Cisco Secure Endpoint, Umbrella, Email Threat Defense, and Cisco XDR
  • Hands-on lab environment with a fully guided experience
  • Perfect for engineers, security analysts, and decision makers looking to better understand Cisco's capabilities

This isn’t a product pitch — it’s a fully immersive incident response simulation guided by experts. You’ll leave with a solid understanding of the tools and strategies needed to respond to a real-world incident — and how Cisco can help your team stay ahead of the curve.

Ready to take the lead? Secure your seat today.

 

Agenda :

 

14:00- 14:30 use cases, Ideal Customer and XDR positioning

14:30-15:30 Technical XDR Update

15:30- 17:30 XDR Rapid Incident Response

Event Date 2025-06-23
Event Location Timezone UTC
Event Start Time 2:00 PM
Event End Time 5:30 PM
Capacity Unlimited
Registered 0
Created By Rita Butman
Location Neckarsulm

We are no longer accepting registration for this event

Düsseldorf Cisco's Hybrid Mesh Firewall Workshop

Key topics of this single day in-person event include:

  • Getting Started: Setting up and provisioning your environment with Cisco Security Cloud Control
  • Threat Overview: Assessing risk using Caldera for real-world insights
  • SD-WAN: Exploring Software Defined Networking for optimized performance
  • AI Integration: Unlocking the power of AI Assistant & AIOps for enhanced security
  • Segmentation: Deep dive into firewall and workload integration for advanced network security focusing on Cisco Secure Workload integrations with Cisco Secure Firewall.

We look forward to seeing you there – it’s time to take your knowledge of Cisco’s Hybrid Mesh Firewall to the next leve

Event Date 2025-07-07
Event Location Timezone UTC
Event Start Time 1:00 AM
Event End Time 1:00 AM
Capacity 25
Registered 1
Available Place 24
Created By Rita Butman
Geolocation: emea
Type of event: partner
Location Düsseldorf

We are no longer accepting registration for this event

Düsseldorf Cisco's Hybrid Mesh Firewall Workshop

Key topics of this single day in-person event include:

  • Getting Started: Setting up and provisioning your environment with Cisco Security Cloud Control
  • Threat Overview: Assessing risk using Caldera for real-world insights
  • SD-WAN: Exploring Software Defined Networking for optimized performance
  • AI Integration: Unlocking the power of AI Assistant & AIOps for enhanced security
  • Segmentation: Deep dive into firewall and workload integration for advanced network security focusing on Cisco Secure Workload integrations with Cisco Secure Firewall.

We look forward to seeing you there – it’s time to take your knowledge of Cisco’s Hybrid Mesh Firewall to the next leve

Event Date 2025-07-07
Event Location Timezone UTC
Event Start Time 1:00 AM
Event End Time 1:00 AM
Capacity 25
Registered 0
Available Place 25
Created By Rita Butman
Geolocation: emea
Type of event: partner
Location Düsseldorf

The event was cancelled. We are not longer accepting registration

Event Date 2025-11-10
Event Location Timezone Europe/Berlin
Event Start Time 7:00 AM
Event End Time 7:00 PM
Capacity 15
Registered 3
Available Place 12
Created By Rita Butman
Geolocation: emea
Type of event: partner
Location 123 abc st

We are no longer accepting registration for this event

Event Date 2025-11-11
Event Location Timezone Europe/Berlin
Event Start Time 8:00 AM
Event End Time 6:00 PM
Capacity 12
Registered 4
Available Place 8
Created By Rita Butman
Geolocation: emea
Type of event: partner
Location Cisco Office Amsterdam

We are no longer accepting registration for this event

Event Date 2025-11-25
Event Location Timezone UTC
Event Start Time 10:00 AM
Event End Time 11:00 PM
Capacity 1
Registered 1
Available Place 0
Created By Rita Butman
Geolocation: emea
Type of event: partner
Location Virtual

Sorry, the event is now full and we could not accept more registration

Event Date 2025-12-08
Event Location Timezone Europe/Berlin
Event Start Time 7:00 AM
Event End Time 11:00 PM
Capacity 26
Registered 0
Available Place 26
Created By Rita Butman
Location Düsseldorf

We are no longer accepting registration for this event

Fire Jumper Tour XDR Ignite

Welcome to the XDR Ignite course. Hopefully, you're as excited to be here as we are. We look forward to giving you the experience of deploying Cisco XDR in a friendly environment. 

 

This course is best viewed with the Chrome browser. Only Chrome has been checked to ensure that copy and paste works between your desktop and the lab environment in dCloud.

 

 

The XDR environment you are about to be in, is a live environment that will be used by multiple engineers such as yourself. So please follow the guide, have fun, but please DO NOT modify anything outside of the guide.

There are 11 scenarios in this course. If you complete the 11 scenarios and wish to do more, please feel free to continue with the Optional labs.

Throughout the course, you will see several colored sections and markers to help guide you:

Start:  means that it is the start of a Scenario.

Introduction:  provides information pertaining to the lesson you are currently on.

Critical.png Critical information regarding the lab and it's function.

Informational.png Tips provides useful information.

Note.png Notes are handy things to remember.

The goal of this dCloud hands-on lab environment is to provide engineers with the skills and methodology required to successfully configure and deploy Cisco XDR. 

 

 

By completing this deployment training, you will prepare yourself for any upcoming XDR related customer implementations, Proof-of-Value (POV) installations, or customer demonstrations. 

The lab scenarios will provide you with the required XDR knowledge by walking you through successful integration of multiple data sources, configuration of the XDR console, as well as additional device configuration that may be required within a customer environment. 

Once you have completed all lab scenarios, you should be familiar with the deployment of XDR prior to performing these tasks in a customer’s production environment.

 

When completing a page, click 'Next Activity' at the bottom of the page to progress to the next lesson. 

If at any time you wish to review anything you have already seen, press the 'Previous Activity' at the bottom of the page to see the previous lesson. You can also jump to any lesson at any time using the drop down in the middle of the two activity links

Event Date 2025-12-08
Event Location Timezone Europe/Berlin
Event Start Time 8:00 AM
Event End Time 11:00 PM
Capacity 20
Registered 0
Available Place 20
Created By Rita Butman
Location Düsseldorf

We are no longer accepting registration for this event

Event Date 2025-12-09
Event Location Timezone Europe/Berlin
Event Start Time 6:00 AM
Event End Time 11:00 PM
Capacity 25
Registered 13
Available Place 12
Created By Rita Butman
Location Düsseldorf

We are no longer accepting registration for this event

Hybrid Mesh Firewall Germany

 

Overview:
The Hybrid Mesh Firewall Design Workshop is a comprehensive 4-hour interactive session designed to help organizations understand and leverage Cisco’s Hybrid Mesh Firewall capabilities. This workshop combines a targeted presentation, hands-on collaboration, and strategic planning to help customers modernize their firewall architecture, enhance security visibility, and optimize operational efficiency.

Join us in-person for a comprehensive instructor-led event designed to deliver an immersive, hands-on experience. Dive deep into the game-changing features of this cutting-edge firewall technology through practical labs.

 

We do recommend all participants watch the Tech Talk series on Cisco’s Hybrid Mesh Firewall before attending. Check out either of the live Tech Talk deliveries or watch the recording. HERE

 

This workshop is all about building expertise through hands-on labs and technical training. You'll get practical experience configuring and deploying the FTD system end-to-end to foster confidence and technical prowess. Additionally, you'll have access to a Breach and Attack Simulation solution, allowing you to test, validate, and fine-tune optimal policy configurations to ensure your environment is secure and running with optimal efficiently. This self-contained virtual lab will provide hands on time with Cisco Security Cloud Control managing firewalls in Cisco dCloud.

 

Key topics of this single day in-person event include:

  • Getting Started: Setting up and provisioning your environment with Cisco Security Cloud Control
  • Threat Overview: Assessing risk using Caldera for real-world insights
  • SD-WAN: Exploring Software Defined Networking for optimized performance
  • AI Integration: Unlocking the power of AI Assistant & AIOps for enhanced security
  • Segmentation: Deep dive into firewall and workload integration for advanced network security focusing on Cisco Secure Workload integrations with Cisco Secure Firewall.
Event Date 2026-01-20
Event Location Timezone Europe/Berlin
Event Start Time 7:00 AM
Event End Time 8:00 PM
Capacity 19
Registered 0
Available Place 19
Created By Rita Butman
Geolocation: emea
Type of event: partner
Location Düsseldorf

The event was cancelled. We are not longer accepting registration

Event Date 2026-02-19
Event Location Timezone Europe/Berlin
Event Start Time 4:00 AM
Event End Time 11:00 PM
Capacity 17
Registered 0
Available Place 17
Created By Rita Butman
Geolocation: emea
Type of event: partner
Location Hamburg

The event was cancelled. We are not longer accepting registration

Bechtle Bremen Secure Access Deep Dive V1

Solution Overview

Modern organizations like PseudoCo face increasing challenges in deploying consistent security policies across their hybrid environments, encompassing headquarters, data centers, branches, and remote users. The evolving threat landscape, distributed workforce, and the complexity of rapidly onboarding new locations, users, and devices often lead to inconsistent policy enforcement and dangerous visibility gaps.

PseudoCo recognized that when their users and IoT devices move between locations—from office to home or branch to cloud—inconsistent policy enforcement created dangerous visibility gaps, leaving their security teams blind to threats as policies failed to follow users in real-time.

To address these critical security and access challenges, PseudoCo has decided to deploy Cisco SASE with Cisco Secure Access and Duo, aiming to achieve the best in Zero Trust Access. This lab provides a hands-on experience in configuring and validating such a solution.

What is Cisco Secure Access 

Cisco Secure Access is a comprehensive Zero Trust Access solution designed to provide secure, identity-based access to private applications and resources, regardless of user location or device. It ensures that security policies are consistently applied and follow users in real-time, eliminating visibility gaps and enhancing overall security posture. For PseudoCo, Cisco Secure Access is the cornerstone of their strategy to overcome the complexities of securing a distributed workforce and hybrid IT infrastructure.

What it delivers

Cisco Secure Access delivers a unified approach to security and access, enabling organizations like PseudoCo to implement:

  • Consistent Security Policy Enforcement: Deploy and enforce uniform security policies across diverse environments, including headquarters, data centers, branches, and for remote users, ensuring that security travels with the user and device. 
  • Enhanced Visibility and Control: Eliminate dangerous visibility gaps by ensuring policies follow users in real-time, providing security teams with continuous insight into access patterns and potential threats.
  • Simplified Onboarding: Streamline the process of onboarding new locations, users, and devices rapidly and securely, reducing operational overhead.
  • Zero Trust Access: Implement a robust Zero Trust framework where every access request is verified, minimizing the attack surface and protecting critical private applications.
  • Secure Connectivity: Provide secure and optimized connectivity for remote users to private applications hosted in data centers, improving user experience while maintaining stringent security. 

What You Will Learn

In this guided, hands-on course, you will explore how to design, deploy, and validate a modern Zero Trust Access solution using Cisco Secure Access, specifically tailored to PseudoCo's needs. You will learn:

  • How to onboard private data center routers and create Network Tunnel Groups (NTGs).
  • How to deploy and configure Resource Connectors to enable secure access to private applications. 
  • How to integrate Active Directory and Duo Security with Secure Access for identity-based access control.
  • How to implement SAML-based authentication for Zero Trust proxy workflows.
  • How to configure device posture profiles, private resources, and access policies that follow users and devices based on Identity.
  • How to validate route propagation, tunnel health, and user access through CLI and dashboard tools. 
  • How to integrate ThousandEyes for performance visibility.

Explore Key Features

During this lab, you will actively configure and explore key features of Cisco Secure Access that PseudoCo is leveraging to secure their environment:

  • Network Tunnel Groups (NTGs): You will learn to establish secure tunnels from PseudoCo's private data center to Cisco Secure Access, enabling secure access to internal applications. 
  • Resource Connector: Learn to deploy and configure Resource Connectors to provide secure, policy-driven access to private applications in PseudoCo’s environment.
  • Identity-Based Access Control: Experience integrating PseudoCo's existing Active Directory with Duo Security and Cisco Secure Access to enforce granular access policies based on user identity and multi-factor authentication.
  • SAML-based Authentication: Implement SAML for seamless and secure authentication workflows, critical for PseudoCo's Zero Trust proxy model.
  • Device Posture Profiles: Configure policies that assess the security posture of PseudoCo's user devices, ensuring only compliant devices can access sensitive resources. 
  • Dynamic Access Policies: Create and test access policies that dynamically adjust based on user identity, device posture, and application, ensuring consistent security as PseudoCo's users move between locations.
  • ThousandEyes Integration: Understand how to integrate ThousandEyes to gain end-to-end visibility into the performance and availability of PseudoCo's applications and network paths through Secure Access.

Customer Business Outcomes

Upon completing this lab, you will understand how PseudoCo achieves significant business outcomes through their Cisco Secure Access deployment, including: 

  • Enhanced Security Posture: A robust Zero Trust architecture that consistently protects PseudoCo's private resources from evolving threats.
  • Operational Efficiency: Streamlined security management and reduced complexity in securing a hybrid and distributed environment.
  • Improved User Experience: Seamless and secure access for PseudoCo's remote and branch users to critical applications, fostering productivity.
  • Regulatory Compliance: The ability to enforce consistent policies helps PseudoCo meet compliance requirements across their global operations. 
  • Reduced Risk: Minimized visibility gaps and proactive threat detection through real-time policy enforcement and integrated monitoring.

Lab Requirements

To complete this lab, you will need a laptop or desktop, a mobile phone, and the Duo Mobile app.

Attendees will be provided with all necessary access and environments for this hands-on lab:

  • Full admin access to a virtual data center environment deployed in one of Cisco's dCloud Data Center locations. This environment will simulate PseudoCo's own infrastructure.
  • Full access to a unique Cisco Secure Access organization, representing PseudoCo's Secure Access implementation. These Secure Access Orgs are fully provisioned to be configured for infrastructure in any Secure Access region.
  • Basic understanding of networking concepts and security principles is recommended. 
  • You will act as both a Security Administrator and an End-User for PseudoCo during this lab.
  • You will be given step-by-step guided tasks using virtual lab infrastructure, performing CLI verification, dashboard workflows, and real-world attack simulation scenarios.

If you are unsure which dCloud Data Center your lab infrastructure is located in, please check with your proctor.

Components 

This lab focuses on the integration and configuration of the following key Cisco and related technologies for PseudoCo's Zero Trust Access solution:

  • Cisco Secure Access: The core Zero Trust Access platform.
  • Cisco Duo Security: For multi-factor authentication and identity-based access policies.
  • Cisco SASE: The broader Secure Access Service Edge framework that Cisco Secure Access is part of. 
  • Active Directory: PseudoCo's existing identity provider for user authentication.
  • ThousandEyes: For network and application performance monitoring and visibility.
  • Private Data Center Routers: Representing PseudoCo's on-premises network infrastructure.

Recommendation

Attendees will connect to a unique Cisco Secure Access organization, which acts as the policy enforcement point. It is recommended that Tunnels, IP Pools, and VPN configurations are set up in the Secure Access region closest to the dCloud Data Center virtual data center environment you are using, optimizing connectivity between PseudoCo's simulated private resources and the Secure Access cloud. This setup allows for hands-on configuration of secure connectivity between remote users and private applications within PseudoCo's secure data center.

 

Event Date 2026-02-19
Event Location Timezone Europe/Berlin
Event Start Time 4:00 AM
Event End Time 11:00 PM
Capacity 15
Registered 7
Available Place 8
Created By Rita Butman
Location Germany

We are no longer accepting registration for this event

Event Date 2026-03-12
Event Location Timezone Europe/Berlin
Event Start Time 3:00 AM
Event End Time 8:00 PM
Capacity 12
Registered 0
Available Place 12
Created By Rita Butman
Geolocation: emea
Type of event: partner
Location Düsseldorf