Template Description:

This example event shows what a complete workshop event page can look like when key fields are fully populated, including speaker details, sponsor logos, and gallery images. Use this page as a reference for structure, presentation, and content quality.

Speaker images

Speaker images are most effectively presented when they are square, centrally aligned, and of high resolution. A square headshot produces the most refined presentation within the speaker section. Please ensure that a description is included. Keep the face centered. Avoid landscape banners or portrait crops with the subject near the edge. Non-square images are accepted, but they produce an inconsistent result.

Recommended: 800 × 800 px or larger

Sponsor logos

Sponsor logos should be displayed in a manner that is clean, centered, and cropped with minimal unnecessary whitespace. Horizontal logos typically produce the most consistent appearance. It is advisable to prefer horizontal or well-balanced square logos. Very tall logos should be avoided to ensure uniform presentation. Excess whitespace should be removed. Padding and proportions across different sponsors should be standardized to maintain consistency within the row. When available, transparent PNG files are preferred.

Recommended: 800 to 1400 px wide
Best practice: use transparent PNG files when possible

Gallery images

Gallery images are displayed as square thumbnails and must remain understandable when viewed at a smaller scale. Choose images with clear focal points and, where possible, reduce the use of visuals with extensive text. Ensure images are composed to crop neatly into a square format, with the primary subject positioned centrally. Refrain from dense screenshots, small text, or layouts placing information at the edges, as these are not easily legible at thumbnail size.

Recommended: 1000 × 1000 px or larger
Minimum: 600 × 600 px

 

Example Below:



Overview:

The Zero Trust Access Design Workshop is a comprehensive 2-hour interactive session designed to help organizations understand and leverage Cisco’s Zero Trust Access capabilities. This workshop combines a targeted presentation, hands-on collaboration, and strategic planning to help customers modernize their zero trust architecture, enhance security visibility, and optimize operational efficiency.


Agenda:

1. Introduction & Presentation (30 - minutes)

  • Overview of Cisco’s Zero Trust Access solution
  • Key Advantages: unified policy management, improved visibility, operational simplification, and cost savings
  • Real-world examples and customer success stories
  • Discussion on integrating a zero trust approach with existing infrastructures

2. Interactive Discussion & White-boarding (45 Minutes)

  • Open dialogue between customers and Cisco Solutions Engineers (SEs) on current zero trust management practices
  • Identification and mapping of all access types, vendors, and resource locations within the customer’s environment
  • White-boarding session to illustrate current state, highlight challenges, and reveal potential gaps in visibility or management
  • Discussion of integration opportunities and quick wins for zero trust deployment

3. Demonstration and Discussion (15 minutes)

  • Summary of key findings from the discussion and whiteboarding
  • Collaborative development of a high-level roadmap for adopting a zero trust access solution
  • Recommendations on next steps to streamline operations, reduce costs, and improve security posture
  • Q&A and assignment of follow-up actions or resources

Key Takeaways:

  • Clear understanding of Cisco’s Zero Trust Access solution and its advantages
  • A detailed map of the customer’s current zero trust acess landscape
  • Identification of immediate opportunities and long-term strategies for transformation
  • A customized roadmap to help achieve a unified, scalable, and efficient security architecture

Who Should Attend:

  • CISO and Security Leaders
  • Network and Identity Administrators & Teams
  • SecOps Leaders and Staff
  • Cisco SEs and Technical Architects

Format:

  • 2-hour session (in-person or virtual)
  • Combination of presentation, discussion, and collaborative white-boarding
  • Actionable deliverables and next steps tailored to customer environment

Notes:

  • Ensure stakeholders from all relevant teams participate for a holistic view.
  • Bring network topology diagrams and inventory lists for deeper engagement.
  • The session is interactive and tailored to specific customer needs.

Sponsors

  • Cisco Systems

  • PseudoCo

  • Starbucks Corporation

[ZTA] Documentation Test

Event Information
Event Date 2028-04-14
Event Location Timezone UTC
Event Start Time 10:00 AM
Event End Time 2:00 PM
Capacity 2
Registered 0
Available Place 2
Created By Avery Adams
Geolocation: amer
Type of event: cisco-internal
Location Virtual

Speakers

  • John Doe

    Solution Architect

    John Doe, Solutions Architect focused on helping organizations strengthen their cybersecurity posture through practical architecture, design, and operational planning. I work with security leaders, architects, engineers, and infrastructure teams to evaluate current challenges, define security priorities, and align solutions to real business and technical needs.

    In this workshop, I’ll walk you through common cybersecurity challenges organizations are facing today and show how modern security approaches can improve visibility, reduce risk, and support more secure operations. My goal is to make the session practical, relevant, and useful for teams evaluating how to move forward.