Search results
Test
dddddd
| Event Date | 2025-02-03 |
| Event Location Timezone | UTC |
| Event Start Time | 8:00 AM |
| Event End Time | 2:00 PM |
| Capacity | 2 |
| Registered | 0 |
| Available Place | 2 |
| Created By | Rita Butman |
| Geolocation: | emea |
| Type of event: | partner |
| Location | Virtual |
Happie RIP Test
enjoy
| Event Date | 2025-03-24 |
| Event Location Timezone | UTC |
| Event Start Time | 4:00 PM |
| Event End Time | 4:00 AM |
| Capacity | 4 |
| Registered | 2 |
| Available Place | 2 |
| Created By | Rita Butman |
| Location | Virtual |
Happie RIP Test
enjoy
| Event Date | 2025-03-24 |
| Event Location Timezone | UTC |
| Event Start Time | 4:00 PM |
| Event End Time | 4:00 AM |
| Capacity | 4 |
| Registered | 0 |
| Available Place | 4 |
| Created By | Rita Butman |
| Location | Virtual |
Rita. Test
test
| Event Date | 2025-04-28 |
| Event Location Timezone | UTC |
| Event Start Time | 12:00 AM |
| Event End Time | 12:00 AM |
| Capacity | 3 |
| Registered | 0 |
| Available Place | 3 |
| Created By | Rita Butman |
Test RIRV7
test
| Event Date | 2025-05-19 |
| Event Location Timezone | UTC |
| Event Start Time | 11:00 AM |
| Event End Time | 10:00 PM |
| Capacity | Unlimited |
| Registered | 1 |
| Created By | Rita Butman |
| Location | Calgary |
Bechtle Rapid Incident Response Workshop @ Neckarsulm
Join us for an interactive, hands-on Rapid Incident Response Workshop featuring Cisco XDR — designed to show you how today’s most advanced tools work together to track, investigate, and respond to sophisticated cyber threats.
Step into the role of a Security Analyst responding to a simulated APT breach at a fictional company. From initial alert to final containment, you’ll experience how Cisco’s security portfolio works in concert to expose attackers and stop threats fast — across endpoints, email, DNS, and more.
- Explore a real-world attack simulation built around a custom APT campaign.
- Walk through a coordinated response using Cisco Secure Endpoint, Umbrella, Email Threat Defense, and Cisco XDR
- Hands-on lab environment with a fully guided experience
- Perfect for engineers, security analysts, and decision makers looking to better understand Cisco's capabilities
This isn’t a product pitch — it’s a fully immersive incident response simulation guided by experts. You’ll leave with a solid understanding of the tools and strategies needed to respond to a real-world incident — and how Cisco can help your team stay ahead of the curve.
Ready to take the lead? Secure your seat today.
Agenda :
14:00- 14:30 use cases, Ideal Customer and XDR positioning
14:30-15:30 Technical XDR Update
15:30- 17:30 XDR Rapid Incident Response
| Event Date | 2025-06-23 |
| Event Location Timezone | UTC |
| Event Start Time | 2:00 PM |
| Event End Time | 5:30 PM |
| Capacity | Unlimited |
| Registered | 0 |
| Created By | Rita Butman |
| Location | Neckarsulm |
Düsseldorf Cisco's Hybrid Mesh Firewall Workshop
Key topics of this single day in-person event include:
- Getting Started: Setting up and provisioning your environment with Cisco Security Cloud Control
- Threat Overview: Assessing risk using Caldera for real-world insights
- SD-WAN: Exploring Software Defined Networking for optimized performance
- AI Integration: Unlocking the power of AI Assistant & AIOps for enhanced security
- Segmentation: Deep dive into firewall and workload integration for advanced network security focusing on Cisco Secure Workload integrations with Cisco Secure Firewall.
We look forward to seeing you there – it’s time to take your knowledge of Cisco’s Hybrid Mesh Firewall to the next leve
| Event Date | 2025-07-07 |
| Event Location Timezone | UTC |
| Event Start Time | 1:00 AM |
| Event End Time | 1:00 AM |
| Capacity | 25 |
| Registered | 1 |
| Available Place | 24 |
| Created By | Rita Butman |
| Geolocation: | emea |
| Type of event: | partner |
| Location | Düsseldorf |
Düsseldorf Cisco's Hybrid Mesh Firewall Workshop
Key topics of this single day in-person event include:
- Getting Started: Setting up and provisioning your environment with Cisco Security Cloud Control
- Threat Overview: Assessing risk using Caldera for real-world insights
- SD-WAN: Exploring Software Defined Networking for optimized performance
- AI Integration: Unlocking the power of AI Assistant & AIOps for enhanced security
- Segmentation: Deep dive into firewall and workload integration for advanced network security focusing on Cisco Secure Workload integrations with Cisco Secure Firewall.
We look forward to seeing you there – it’s time to take your knowledge of Cisco’s Hybrid Mesh Firewall to the next leve
| Event Date | 2025-07-07 |
| Event Location Timezone | UTC |
| Event Start Time | 1:00 AM |
| Event End Time | 1:00 AM |
| Capacity | 25 |
| Registered | 0 |
| Available Place | 25 |
| Created By | Rita Butman |
| Geolocation: | emea |
| Type of event: | partner |
| Location | Düsseldorf |
| Event Date | 2025-11-10 |
| Event Location Timezone | Europe/Berlin |
| Event Start Time | 7:00 AM |
| Event End Time | 7:00 PM |
| Capacity | 15 |
| Registered | 3 |
| Available Place | 12 |
| Created By | Rita Butman |
| Geolocation: | emea |
| Type of event: | partner |
| Location | 123 abc st |
| Event Date | 2025-11-11 |
| Event Location Timezone | Europe/Berlin |
| Event Start Time | 8:00 AM |
| Event End Time | 6:00 PM |
| Capacity | 12 |
| Registered | 4 |
| Available Place | 8 |
| Created By | Rita Butman |
| Geolocation: | emea |
| Type of event: | partner |
| Location | Cisco Office Amsterdam |
| Event Date | 2025-11-25 |
| Event Location Timezone | UTC |
| Event Start Time | 10:00 AM |
| Event End Time | 11:00 PM |
| Capacity | 1 |
| Registered | 1 |
| Available Place | 0 |
| Created By | Rita Butman |
| Geolocation: | emea |
| Type of event: | partner |
| Location | Virtual |
| Event Date | 2025-12-08 |
| Event Location Timezone | Europe/Berlin |
| Event Start Time | 7:00 AM |
| Event End Time | 11:00 PM |
| Capacity | 26 |
| Registered | 0 |
| Available Place | 26 |
| Created By | Rita Butman |
| Location | Düsseldorf |
Fire Jumper Tour XDR Ignite
Welcome to the XDR Ignite course. Hopefully, you're as excited to be here as we are. We look forward to giving you the experience of deploying Cisco XDR in a friendly environment.
The XDR environment you are about to be in, is a live environment that will be used by multiple engineers such as yourself. So please follow the guide, have fun, but please DO NOT modify anything outside of the guide.
There are 11 scenarios in this course. If you complete the 11 scenarios and wish to do more, please feel free to continue with the Optional labs.
Throughout the course, you will see several colored sections and markers to help guide you:
Start: means that it is the start of a Scenario.
Introduction: provides information pertaining to the lesson you are currently on.
Critical information regarding the lab and it's function.
Tips provides useful information.
Notes are handy things to remember.
The goal of this dCloud hands-on lab environment is to provide engineers with the skills and methodology required to successfully configure and deploy Cisco XDR.
By completing this deployment training, you will prepare yourself for any upcoming XDR related customer implementations, Proof-of-Value (POV) installations, or customer demonstrations.
The lab scenarios will provide you with the required XDR knowledge by walking you through successful integration of multiple data sources, configuration of the XDR console, as well as additional device configuration that may be required within a customer environment.
Once you have completed all lab scenarios, you should be familiar with the deployment of XDR prior to performing these tasks in a customer’s production environment.
When completing a page, click 'Next Activity' at the bottom of the page to progress to the next lesson.
If at any time you wish to review anything you have already seen, press the 'Previous Activity' at the bottom of the page to see the previous lesson. You can also jump to any lesson at any time using the drop down in the middle of the two activity links
| Event Date | 2025-12-08 |
| Event Location Timezone | Europe/Berlin |
| Event Start Time | 8:00 AM |
| Event End Time | 11:00 PM |
| Capacity | 20 |
| Registered | 0 |
| Available Place | 20 |
| Created By | Rita Butman |
| Location | Düsseldorf |
| Event Date | 2025-12-09 |
| Event Location Timezone | Europe/Berlin |
| Event Start Time | 6:00 AM |
| Event End Time | 11:00 PM |
| Capacity | 25 |
| Registered | 13 |
| Available Place | 12 |
| Created By | Rita Butman |
| Location | Düsseldorf |
Hybrid Mesh Firewall Germany

Overview:
The Hybrid Mesh Firewall Design Workshop is a comprehensive 4-hour interactive session designed to help organizations understand and leverage Cisco’s Hybrid Mesh Firewall capabilities. This workshop combines a targeted presentation, hands-on collaboration, and strategic planning to help customers modernize their firewall architecture, enhance security visibility, and optimize operational efficiency.
Join us in-person for a comprehensive instructor-led event designed to deliver an immersive, hands-on experience. Dive deep into the game-changing features of this cutting-edge firewall technology through practical labs.
We do recommend all participants watch the Tech Talk series on Cisco’s Hybrid Mesh Firewall before attending. Check out either of the live Tech Talk deliveries or watch the recording. HERE
This workshop is all about building expertise through hands-on labs and technical training. You'll get practical experience configuring and deploying the FTD system end-to-end to foster confidence and technical prowess. Additionally, you'll have access to a Breach and Attack Simulation solution, allowing you to test, validate, and fine-tune optimal policy configurations to ensure your environment is secure and running with optimal efficiently. This self-contained virtual lab will provide hands on time with Cisco Security Cloud Control managing firewalls in Cisco dCloud.
Key topics of this single day in-person event include:
- Getting Started: Setting up and provisioning your environment with Cisco Security Cloud Control
- Threat Overview: Assessing risk using Caldera for real-world insights
- SD-WAN: Exploring Software Defined Networking for optimized performance
- AI Integration: Unlocking the power of AI Assistant & AIOps for enhanced security
- Segmentation: Deep dive into firewall and workload integration for advanced network security focusing on Cisco Secure Workload integrations with Cisco Secure Firewall.
| Event Date | 2026-01-20 |
| Event Location Timezone | Europe/Berlin |
| Event Start Time | 7:00 AM |
| Event End Time | 8:00 PM |
| Capacity | 19 |
| Registered | 0 |
| Available Place | 19 |
| Created By | Rita Butman |
| Geolocation: | emea |
| Type of event: | partner |
| Location | Düsseldorf |
| Event Date | 2026-02-19 |
| Event Location Timezone | Europe/Berlin |
| Event Start Time | 4:00 AM |
| Event End Time | 11:00 PM |
| Capacity | 17 |
| Registered | 0 |
| Available Place | 17 |
| Created By | Rita Butman |
| Geolocation: | emea |
| Type of event: | partner |
| Location | Hamburg |
Bechtle Bremen Secure Access Deep Dive V1
Solution Overview
Modern organizations like PseudoCo face increasing challenges in deploying consistent security policies across their hybrid environments, encompassing headquarters, data centers, branches, and remote users. The evolving threat landscape, distributed workforce, and the complexity of rapidly onboarding new locations, users, and devices often lead to inconsistent policy enforcement and dangerous visibility gaps.
PseudoCo recognized that when their users and IoT devices move between locations—from office to home or branch to cloud—inconsistent policy enforcement created dangerous visibility gaps, leaving their security teams blind to threats as policies failed to follow users in real-time.
To address these critical security and access challenges, PseudoCo has decided to deploy Cisco SASE with Cisco Secure Access and Duo, aiming to achieve the best in Zero Trust Access. This lab provides a hands-on experience in configuring and validating such a solution.
What is Cisco Secure Access
Cisco Secure Access is a comprehensive Zero Trust Access solution designed to provide secure, identity-based access to private applications and resources, regardless of user location or device. It ensures that security policies are consistently applied and follow users in real-time, eliminating visibility gaps and enhancing overall security posture. For PseudoCo, Cisco Secure Access is the cornerstone of their strategy to overcome the complexities of securing a distributed workforce and hybrid IT infrastructure.
What it delivers
Cisco Secure Access delivers a unified approach to security and access, enabling organizations like PseudoCo to implement:
- Consistent Security Policy Enforcement: Deploy and enforce uniform security policies across diverse environments, including headquarters, data centers, branches, and for remote users, ensuring that security travels with the user and device.
- Enhanced Visibility and Control: Eliminate dangerous visibility gaps by ensuring policies follow users in real-time, providing security teams with continuous insight into access patterns and potential threats.
- Simplified Onboarding: Streamline the process of onboarding new locations, users, and devices rapidly and securely, reducing operational overhead.
- Zero Trust Access: Implement a robust Zero Trust framework where every access request is verified, minimizing the attack surface and protecting critical private applications.
- Secure Connectivity: Provide secure and optimized connectivity for remote users to private applications hosted in data centers, improving user experience while maintaining stringent security.
What You Will Learn
In this guided, hands-on course, you will explore how to design, deploy, and validate a modern Zero Trust Access solution using Cisco Secure Access, specifically tailored to PseudoCo's needs. You will learn:
- How to onboard private data center routers and create Network Tunnel Groups (NTGs).
- How to deploy and configure Resource Connectors to enable secure access to private applications.
- How to integrate Active Directory and Duo Security with Secure Access for identity-based access control.
- How to implement SAML-based authentication for Zero Trust proxy workflows.
- How to configure device posture profiles, private resources, and access policies that follow users and devices based on Identity.
- How to validate route propagation, tunnel health, and user access through CLI and dashboard tools.
- How to integrate ThousandEyes for performance visibility.
Explore Key Features
During this lab, you will actively configure and explore key features of Cisco Secure Access that PseudoCo is leveraging to secure their environment:
- Network Tunnel Groups (NTGs): You will learn to establish secure tunnels from PseudoCo's private data center to Cisco Secure Access, enabling secure access to internal applications.
- Resource Connector: Learn to deploy and configure Resource Connectors to provide secure, policy-driven access to private applications in PseudoCo’s environment.
- Identity-Based Access Control: Experience integrating PseudoCo's existing Active Directory with Duo Security and Cisco Secure Access to enforce granular access policies based on user identity and multi-factor authentication.
- SAML-based Authentication: Implement SAML for seamless and secure authentication workflows, critical for PseudoCo's Zero Trust proxy model.
- Device Posture Profiles: Configure policies that assess the security posture of PseudoCo's user devices, ensuring only compliant devices can access sensitive resources.
- Dynamic Access Policies: Create and test access policies that dynamically adjust based on user identity, device posture, and application, ensuring consistent security as PseudoCo's users move between locations.
- ThousandEyes Integration: Understand how to integrate ThousandEyes to gain end-to-end visibility into the performance and availability of PseudoCo's applications and network paths through Secure Access.
Customer Business Outcomes
Upon completing this lab, you will understand how PseudoCo achieves significant business outcomes through their Cisco Secure Access deployment, including:
- Enhanced Security Posture: A robust Zero Trust architecture that consistently protects PseudoCo's private resources from evolving threats.
- Operational Efficiency: Streamlined security management and reduced complexity in securing a hybrid and distributed environment.
- Improved User Experience: Seamless and secure access for PseudoCo's remote and branch users to critical applications, fostering productivity.
- Regulatory Compliance: The ability to enforce consistent policies helps PseudoCo meet compliance requirements across their global operations.
- Reduced Risk: Minimized visibility gaps and proactive threat detection through real-time policy enforcement and integrated monitoring.
Lab Requirements
To complete this lab, you will need a laptop or desktop, a mobile phone, and the Duo Mobile app.
Attendees will be provided with all necessary access and environments for this hands-on lab:
- Full admin access to a virtual data center environment deployed in one of Cisco's dCloud Data Center locations. This environment will simulate PseudoCo's own infrastructure.
- Full access to a unique Cisco Secure Access organization, representing PseudoCo's Secure Access implementation. These Secure Access Orgs are fully provisioned to be configured for infrastructure in any Secure Access region.
- Basic understanding of networking concepts and security principles is recommended.
- You will act as both a Security Administrator and an End-User for PseudoCo during this lab.
- You will be given step-by-step guided tasks using virtual lab infrastructure, performing CLI verification, dashboard workflows, and real-world attack simulation scenarios.
If you are unsure which dCloud Data Center your lab infrastructure is located in, please check with your proctor.
Components
This lab focuses on the integration and configuration of the following key Cisco and related technologies for PseudoCo's Zero Trust Access solution:
- Cisco Secure Access: The core Zero Trust Access platform.
- Cisco Duo Security: For multi-factor authentication and identity-based access policies.
- Cisco SASE: The broader Secure Access Service Edge framework that Cisco Secure Access is part of.
- Active Directory: PseudoCo's existing identity provider for user authentication.
- ThousandEyes: For network and application performance monitoring and visibility.
- Private Data Center Routers: Representing PseudoCo's on-premises network infrastructure.
Recommendation
Attendees will connect to a unique Cisco Secure Access organization, which acts as the policy enforcement point. It is recommended that Tunnels, IP Pools, and VPN configurations are set up in the Secure Access region closest to the dCloud Data Center virtual data center environment you are using, optimizing connectivity between PseudoCo's simulated private resources and the Secure Access cloud. This setup allows for hands-on configuration of secure connectivity between remote users and private applications within PseudoCo's secure data center.
| Event Date | 2026-02-19 |
| Event Location Timezone | Europe/Berlin |
| Event Start Time | 4:00 AM |
| Event End Time | 11:00 PM |
| Capacity | 15 |
| Registered | 7 |
| Available Place | 8 |
| Created By | Rita Butman |
| Location | Germany |
| Event Date | 2026-03-12 |
| Event Location Timezone | Europe/Berlin |
| Event Start Time | 3:00 AM |
| Event End Time | 8:00 PM |
| Capacity | 12 |
| Registered | 0 |
| Available Place | 12 |
| Created By | Rita Butman |
| Geolocation: | emea |
| Type of event: | partner |
| Location | Düsseldorf |