Tech Talk Tuesday: Webinar Round Up for 8/11

As part of our mission to keep you informed, SSP is starting our Tech Talk Tuesday (#TechTalkTuesday on LinkedIn) series! If you've been having a hard time keeping track of webinars, we're here to round up the best webinars from our partners for you in one convenient spot. Check out this week's update below:


 
cisco34.png
 

Cisco

Lowering Cyber Risk - The Important Elements You Might Be Missing
When: On-Demand

Join Cisco’s webinar and see what’s needed (and what you might be missing) to effectively manage cyber risk in your environment. Learn how security and risk teams can join forces to tackle risk: the right security technology and devices, cybersecurity domain expertise, and enhanced cyber insurance.

Why AI and ML Will Be a Game Changer for Networking
When: On-Demand

Learn about the new AI/ML functionalities and how AI/ML is used to tackle the critical security issue of device classification and spoofing detection techniques using technologies that have never been developed in the Network industry in this webinar.


 
ciscomeraki175.png
 

Meraki

Adaptive Policy: Set Once, Secure Forever
When: On-Demand

See the announcing of Adaptive Policy – the simplest, most effective way to enforce access policies based on the intent of wired and wireless clients throughout your organization. Find out how this is made possible with the Cisco Secure Group Tagging (SGT) technology and experience a live demonstration of this enterprise security solution.


 
 
duo logo.png
 

Duo

Verifying Device Trust with Duo and Microsoft
When: On-Demand

View this webinar and learn about the importance of verifying device posture before granting application access, enforcing adaptive access controls, and best practices for good cyber hygiene!

What Does ‘Zero Trust’ Mean For Your Business?
When: On-Demand

Zero trust’s popularity has exploded in the industry. But where do you start when planning your organization’s zero-trust strategy? Join Duo’s Advisory CISO Richard Archdeacon in this to gain an executive perspective on zero-trust principles in practice and learn about the implications for your organization and where you can start today!


 
barracuda175.png
 

Barracuda

Secure SD-Wan That’s Easy to Deploy, Easy to Manage, and Fully Azure-Integrated
When: August 26, 10-11 AM PDT

Register for this webinar before August 26th find out how a new global secure SD-WAN service built natively into Azure can dramatically simplify the process and help you get all the benefits of the cloud faster, easier, and at lower cost.


 
 

Palo Alto Networks

3 Myths of Cloud Native Security
When: On-Demand

In every field and in every age, there are myths that develop over time. In the case of cloud security, there are many. View this webinar and join the team to bust three of the most common myths.

Strengthen Your GCP Security Posture
When: On-Demand

Watch this webinar and learn about the benefits of using VM-Series virtual firewalls on Google Cloud Platform. Hear details on integration points, recommendations for architectural design patterns, various use cases, and see a demo of one of these use cases.


 
fireeye34.png
 

FireEye

2020 Mandiant Security Effectiveness Report Findings
When: On-Demand

Register for this webinar and take a deep dive into the Mandiant Security Effectiveness Report 2020. Learn about cybersecurity performance across network, email, endpoint, and cloud-based security controls — and how to address these fears.

Building a Ransomware Defense
When: On-Demand

Listen to Government Technology and FireEye to hear how advanced detection and prevention and front-line response practices — supported by actionable threat intelligence — are the best defense against ransomware and other advanced attacks.


 
crowdstrike34.png
 

CrowdStrike

How Threat Hunting is Used in Real Intrusions
When: On-Demand

Dive into what threat hunting means and how you can use it to actively find intrusions in this webcast. Learn how to use it effectively and then look at techniques being used in actual intrusions, including real-world attacks by nation-states and eCrime groups and the exact command lines they executed, what the attacks accomplished, and how the bad guys attempted to avoid discovery.