Template Description:
This example event shows what a complete workshop event page can look like when key fields are fully populated, including speaker details, sponsor logos, and gallery images. Use this page as a reference for structure, presentation, and content quality.
Speaker images
Speaker images are most effectively presented when they are square, centrally aligned, and of high resolution. A square headshot produces the most refined presentation within the speaker section. Please ensure that a description is included. Keep the face centered. Avoid landscape banners or portrait crops with the subject near the edge. Non-square images are accepted, but they produce an inconsistent result.
Recommended: 800 × 800 px or larger
Sponsor logos
Sponsor logos should be displayed in a manner that is clean, centered, and cropped with minimal unnecessary whitespace. Horizontal logos typically produce the most consistent appearance. It is advisable to prefer horizontal or well-balanced square logos. Very tall logos should be avoided to ensure uniform presentation. Excess whitespace should be removed. Padding and proportions across different sponsors should be standardized to maintain consistency within the row. When available, transparent PNG files are preferred.
Recommended: 800 to 1400 px wide
Best practice: use transparent PNG files when possible
Gallery images
Gallery images are displayed as square thumbnails and must remain understandable when viewed at a smaller scale. Choose images with clear focal points and, where possible, reduce the use of visuals with extensive text. Ensure images are composed to crop neatly into a square format, with the primary subject positioned centrally. Refrain from dense screenshots, small text, or layouts placing information at the edges, as these are not easily legible at thumbnail size.
Recommended: 1000 × 1000 px or larger
Minimum: 600 × 600 px
Example Below:

Overview:
The Zero Trust Access Design Workshop is a comprehensive 2-hour interactive session designed to help organizations understand and leverage Cisco’s Zero Trust Access capabilities. This workshop combines a targeted presentation, hands-on collaboration, and strategic planning to help customers modernize their zero trust architecture, enhance security visibility, and optimize operational efficiency.
Agenda:
1. Introduction & Presentation (30 - minutes)
- Overview of Cisco’s Zero Trust Access solution
- Key Advantages: unified policy management, improved visibility, operational simplification, and cost savings
- Real-world examples and customer success stories
- Discussion on integrating a zero trust approach with existing infrastructures
2. Interactive Discussion & White-boarding (45 Minutes)
- Open dialogue between customers and Cisco Solutions Engineers (SEs) on current zero trust management practices
- Identification and mapping of all access types, vendors, and resource locations within the customer’s environment
- White-boarding session to illustrate current state, highlight challenges, and reveal potential gaps in visibility or management
- Discussion of integration opportunities and quick wins for zero trust deployment
3. Demonstration and Discussion (15 minutes)
- Summary of key findings from the discussion and whiteboarding
- Collaborative development of a high-level roadmap for adopting a zero trust access solution
- Recommendations on next steps to streamline operations, reduce costs, and improve security posture
- Q&A and assignment of follow-up actions or resources
Key Takeaways:
- Clear understanding of Cisco’s Zero Trust Access solution and its advantages
- A detailed map of the customer’s current zero trust acess landscape
- Identification of immediate opportunities and long-term strategies for transformation
- A customized roadmap to help achieve a unified, scalable, and efficient security architecture
Who Should Attend:
- CISO and Security Leaders
- Network and Identity Administrators & Teams
- SecOps Leaders and Staff
- Cisco SEs and Technical Architects
Format:
- 2-hour session (in-person or virtual)
- Combination of presentation, discussion, and collaborative white-boarding
- Actionable deliverables and next steps tailored to customer environment
Notes:
- Ensure stakeholders from all relevant teams participate for a holistic view.
- Bring network topology diagrams and inventory lists for deeper engagement.
- The session is interactive and tailored to specific customer needs.