Breakout Session

Evolve Your Security Strategy

We have all heard it in the news… Higher Education institutions, K-12 school districts, retailers, financial companies, etc, are all targets for hackers and victims of DDOS attacks.  In today’s dynamic security environment, it’s no longer a matter of “if” an attacker will get in, but “when.” Security professionals need to evolve their strategy from a point-in-time approach to a continuous model that addresses the full attack continuum before, during and after an attack.

BEFORE: You can’t protect what you can’t see. To defend against threats you need complete visibility of devices, operating systems, services, files, applications, users, vulnerabilities and more. How can you establish policies and controls across your network, applications and users without total visibility?
DURING: Advanced threats require advanced threat detection. Do you find yourself having to choose between performance and flexibility as you try to stop exploits, hackers, and other intrusions and attacks?
AFTER: Invariably attacks will be successful. Can you identify the point of entry, determine the scope of the damage, contain the event, remediate the issue and bring operations back to normal as quickly as possible?

Join us to:
–         Have an interactive discussion on what higher education institutions are doing to prepare themselves from being hacked or DDOS

–         Explore the Cisco approach to cybersecurity that is visibility-driven, threat-focused and platform-based

–         See how your Cisco network infrastructure can be used for added layer of security in Network as a Sensor and Network as an Enforcer