This example event shows what a complete workshop event page can look like when key fields are fully populated, including speaker details, sponsor logos, and gallery images. Use this page as a reference for structure, presentation, and content quality.
Speaker images
Speaker images are most effectively presented when they are square, centrally aligned, and of high resolution. A square headshot produces the most refined presentation within the speaker section. Please ensure that a description is included. Keep the face centered. Avoid landscape banners or portrait crops with the subject near the edge. Non-square images are accepted, but they produce an inconsistent result.
Recommended: 800 × 800 px or larger
Sponsor logos
Sponsor logos should be displayed in a manner that is clean, centered, and cropped with minimal unnecessary whitespace. Horizontal logos typically produce the most consistent appearance. It is advisable to prefer horizontal or well-balanced square logos. Very tall logos should be avoided to ensure uniform presentation. Excess whitespace should be removed. Padding and proportions across different sponsors should be standardized to maintain consistency within the row. When available, transparent PNG files are preferred.
Recommended: 800 to 1400 px wide
Best practice: use transparent PNG files when possible
Gallery images
Gallery images are displayed as square thumbnails and must remain understandable when viewed at a smaller scale. Choose images with clear focal points and, where possible, reduce the use of visuals with extensive text. Ensure images are composed to crop neatly into a square format, with the primary subject positioned centrally. Refrain from dense screenshots, small text, or layouts placing information at the edges, as these are not easily legible at thumbnail size.
Recommended: 1000 × 1000 px or larger
Minimum: 600 × 600 px

Overview:
The Zero Trust Access Design Workshop is a comprehensive 2-hour interactive session designed to help organizations understand and leverage Cisco’s Zero Trust Access capabilities. This workshop combines a targeted presentation, hands-on collaboration, and strategic planning to help customers modernize their zero trust architecture, enhance security visibility, and optimize operational efficiency.
Agenda:
1. Introduction & Presentation (30 - minutes)
2. Interactive Discussion & White-boarding (45 Minutes)
3. Demonstration and Discussion (15 minutes)
Key Takeaways:
Who Should Attend:
Format:
Notes: