Look for any podcast host, guest or anyone
Showing episodes and shows of

Mike Veedock And Andres Sarmiento

Shows

Security in 45Security in 45S2 E3 - Breaking down Segmentation with Chad Buey and Sam BaxterThe meeting discussed the importance of segmentation for network performance and security, highlighting Cisco's role in providing solutions and support for implementing effective segmentation.The importance of rewatching the recorded meeting on various platforms like YouTube and Apple podcasts is mentioned.Micro segmentation using group based policy is considered more granular than VLAN to VLAN segmentation.The meeting discussed the topic of segmentation, with a focus on proper segmentation and its importance for network performance and security.The evolution of segmentation over the past ten years was highlighted, including the transition to dynamic segmentation and the impact of...2024-12-1355 minSecurity in 45Security in 45S2 E2 - Simplicity with SSE - Cisco Secure Access Discussion with David Keller and Justin MurphyThe meeting discussed updates and plans for Secure Access and User Suite, including hybrid cloud deployment, VPN enhancements, simplification of connectivity and policy management, and the consolidation of tools into a single dashboard. Secure Access and User Suite were discussed in a recent meeting, including plans for a hybrid cloud deployment. There have been updates to VPN, such as radius support and SMB version two for ZTA. The use of quick and mask for performance improvement is being discussed, but no claims are being made yet. Participants discussed their plans for trick-or-treating and handing out candy on Halloween. They...2024-11-0152 minSecurity in 45Security in 45XDR Conversation with Briana Farro and Matt RobertsonThe meeting discussed the features and benefits of Cisco XDR, including its integration capabilities, threat detection capabilities, and plans for expansion. Season two of the Security 45 show will feature live demos after each conversation. Matt Robertson, a distinguished engineer at Cisco, focuses on threat detection and oversees analytics stacks. XDR has gained higher demand and market traction over the past year, with Cisco XDR acquiring new customers. Cisco XDR defines XDR as a collection of telemetry from multiple sources and the application of analytics for threat detection and response. Cisco XDR is an open ecosystem that integrates with third-party...2024-10-021h 01Security in 45Security in 45Security & Artificial Intelligence with with Joel Sprague and Sudhir DesaiSummary (AI-Generated) what AI is and how it works; why we are seeing so much emphasis on AI these days; the dangers of AI, such as data exposure and wrong information; what Cisco is doing to secure AI; recommendations for customers who are using AI. Some key points from the video: AI is a fancy expensive autocomplete. We are seeing so much emphasis on AI these days because we have more resources to really see it explode and to see the benefits of it. The dangers of AI include data exposure, wrong information, and hacks. Cisco is working on...2024-10-0255 minSecurity in 45Security in 45Zero Trust with Estefania Fernandez and Neil LoveringMeeting summary AI-generated The meeting discussed technical challenges with editing webinar links, the concept of zero trust as a security approach, the importance of multi-factor authentication and endpoint protection in implementing zero trust, and the need for careful planning and a multi-vendor approach in achieving comprehensive security solutions. The participants discuss technical issues and difficulties with editing links for a webinar. They talk about their busy schedules and inability to say no to requests. They also have casual conversations about their backgrounds, camping experiences, and military service. The concept of zero trust originated more than 20 years ago as a...2024-10-0248 minSecurity in 45Security in 45Identity Management with John Newman and Sam BaxterCisco’s Identity and Access Management (IAM) tools, such as the Identity Services Engine (ISE), are designed to provide secure access to networks by ensuring that the right people or devices can access the appropriate resources. Some of the key features include: Centralized Access Control: ISE provides policy-based network access control, enabling administrators to define rules based on user identity, device type, and other contextual data. This is critical in enforcing security policies. Zero Trust Architecture: It supports a Zero Trust model, which requires users and devices to authenticate every time they request access to resources, reducing the risk of...2024-10-0250 minSecurity in 45Security in 45Whats new Firepower with Josh Scarbrough and Seth RichardsonNotes The conversation briefly touches on VPN vulnerabilities and internet connectivity issues. They also discuss the importance of building good relationships with colleagues and customers, emphasizing the value of being a trusted advisor and someone who can handle stressful situations without adding to the stress. The participant from the Department of Defense has experience in special operations programs and previously worked in the United States Navy. The participant from Cisco has been with the company for 10 years and focuses on adoption in their current role as a customer success specialist. Snort 3.0 is the latest version of the intrusion prevention...2024-10-0252 minSecurity in 45Security in 45Secure Access with David Keller and Justin MurphyKey features of Cisco Secure Access: Cisco Secure Services Edge (Cisco SSE) is a comprehensive security platform that provides secure access to applications and data for users, regardless of their location or device. It combines network access control (NAC), identity-based access control (IBAC), and endpoint security to ensure that only authorized users can access your network and applications. Secure Web Gateway (SWG): Provides protection against web-based threats, such as malware, phishing, and ransomware. Cloud Access Security Broker (CASB): Protects your cloud applications and data from unauthorized access and data breaches. Zero Trust Network Access (ZTNA): Provides secure access to...2024-10-0254 minSecurity in 45Security in 45Talos with Martin Lee and Joe MarshallCisco Talos is Cisco's threat intelligence group. It's a team of security experts who monitor the global threat landscape, analyze cyberattacks, and provide threat intelligence to Cisco customers and the broader security community. Key responsibilities of Cisco Talos include: Threat research: Talos researchers investigate new and emerging threats, analyzing malware, vulnerabilities, and attack techniques. Threat intelligence: They collect, analyze, and distribute threat intelligence to Cisco customers and partners, helping them to stay informed about the latest threats and protect their networks. Vulnerability management: Talos tracks and manages vulnerabilities in Cisco products and provides patches and updates to address them...2024-10-0257 minSecurity in 45Security in 45MultiCloud Defense with Jason Lunde and Sudhir DesaiCisco Multicloud Defense is a comprehensive security solution that provides visibility and control across your entire multicloud environment. It helps you to secure your applications, workloads, and data, regardless of where they are deployed. Key features of Cisco Multicloud Defense: Unified visibility: Cisco Multicloud Defense provides a single pane of glass for managing and monitoring your security across all your cloud environments. This gives you a complete picture of your security posture and allows you to quickly identify and address any potential threats. Automated protection: Cisco Multicloud Defense uses advanced AI and machine learning to automatically detect and block...2024-10-0248 minSecurity in 45Security in 45Securing the Cloud with Sudhir Desai and Ed McNicholasIn this episode we get to talk about Cloud Security. We will discuss the benefits of moving to the cloud, the different cloud providers, and how to secure resources in the cloud. Some of the key points discussed in the video include: The benefits of moving to the cloud, such as flexibility, scalability, and cost-effectiveness. The different cloud providers, such as AWS, Azure, and GCP. How to secure resources in the cloud, such as using multi-factor authentication, network segmentation, and encryption. The importance of having a cloud security posture management (CSPM) tool. The importance of being aware of the...2024-10-0245 minSecurity in 45Security in 45Securing the Endpoint & User with Chad Buey and Eric HowardCisco Secure Endpoint is a comprehensive endpoint security solution designed to protect devices from various cyber threats. It provides a range of security features to safeguard your endpoints, including: Endpoint Protection Platform (EPP): Offers real-time protection against malware, viruses, and ransomware attacks. Endpoint Detection and Response (EDR): Detects and responds to advanced threats, including file-less attacks and living-off-the-land attacks. Vulnerability Management: Identifies and prioritizes vulnerabilities on your endpoints, helping you patch them promptly. Data Loss Prevention (DLP): Prevents sensitive data from being exfiltrated from your endpoints. Network Access Control...2024-10-0250 minSecurity in 45Security in 45XDR with Briana Farro, Nate Austin and Matt RobertsonMeeting summary AI-generated The meeting discussed technical challenges with editing webinar links, the concept of zero trust as a security approach, the importance of multi-factor authentication and endpoint protection in implementing zero trust, and the need for careful planning and a multi-vendor approach in achieving comprehensive security solutions. The participants discuss technical issues and difficulties with editing links for a webinar. They talk about their busy schedules and inability to say no to requests. They also have casual conversations about their backgrounds, camping experiences, and military service. The concept of zero trust originated...2024-10-0245 minSecurity in 45Security in 45Firewall, with Keyonna Brown and Rob CoutureSummary Cisco’s “Security in 45” webinar series launched, focusing on security challenges and innovations, starting with firewalls and featuring expert discussions. Highlights 🔒 New monthly webinar series on security challenges. 🌐 Focus on Cisco’s history and evolution of firewalls. 💡 Introduction of innovative features like Encrypted Visibility Engine (EVE). 📊 Flexible management options for Firepower Threat Defense (FTD). 🛠️ Seamless integration with Active Directory and third-party solutions. 🚀 Opportunities for hands-on experiences with trials and sandbox labs. 🗓️ Next session on Cisco XDR scheduled for October 27th. Key Insights 🔍 The Evolution of Firewalls: Cisco’s...2024-10-0245 min