Meet the Authors Video - CCIE Security and Practical Applications in Today’s Network: Zero Trust
This event took place on Thursday 29th, October 2020 at 10hrs PDT
In this session, Cisco Press authors and security experts talks
about the relevance of CCIE Security in today’s evolving networks,
focusing on the importance of Zero Trust. They will discuss how the CCIE
Security Guide and exam prepare candidates and security experts to
implement and talk about Zero Trust. In addition, the session provides
the opportunity to interact with the authors and ask them questions in a
live Q&A session.
Join the world-class experts, who combined have over 70 years of
security experience, and learn more about Zero Trust and its importance
to becoming a security pro and succeeding on the CCIE Security exam. In
addition, they present key content featured in the book Integrated Security Technologies and Solutions - Volume I.
This
event provides an opportunity to interact with the authors in real-time
and learn more about them, their story, the story behind their
publications, and how they became renowned experts.
Mason Harris
is a Solutions Architect for Cisco focusing on cloud architectures with
Cisco’s largest customers. He has more than 24 years of experience in
information technology and is one of the few experts who holds five CCIE
certifications (#5916). Prior to joining Cisco, he was the Chief
Architect at cloud security startup vArmour Networks. Outside of work,
Mason can be found backpacking on long trails or at home with his
family.
Vivek Santuka
is a Technical Solutions Architect at Cisco and a security consultant
to some of Cisco’s largest customers. He has over 15 years of experience
in cyber security design, implementation, and troubleshooting. Vivek is
a member of multiple technical advisory groups. He holds an RHCE,
CISSP, and two CCIE certifications (#17621). Vivek is a distinguished
speaker at Cisco Live.
Jamie Sanbower
is a Principal Architect in Cisco’s Global Security Architecture Team.
Jamie is a technical leader and member of numerous advisory and working
groups. With over 15 years of technical experience in the networking and
security industry, Jamie has developed, designed, implemented, and
operated enterprise network and security solutions for a wide variety of
large clients. Jamie is a Cisco Live Distinguished Speaker and a
co-author of Cisco Press books. He holds three CCIE certifications
(#13637).
Aaron Woland
is a Principal Engineer in Cisco’s Advanced Threat Security &
Integrations group and works with Cisco’s largest customers all over the
world. His primary job responsibilities include security design,
solution enhancements, standards development, advanced threat solution
design, endpoint security, and futures. He has over 20 years of
experience in the IT industry. Aaron has collaborated on several Cisco
Press publications and he has published many papers and design guides.
Aaron is a Hall of Fame Elite Member for distinguished speakers at Cisco
Live. He holds several certifications: GHIC, GCFE, GSEC, Certified
Ethical Hacker, MCSE, VCP, CCSP, CCNP, CCDP, and a CCIE (#20113) among
others.
I wanted to thank you for this great Information and knowledge, I definitely loved every little bit of it. I have you bookmarked your web site to check out the latest stuff you post. Your blog is eye-catching. I get pleasure from it. Thanks for sharing this beautiful piece of writing with me, get more information at security company in singapore for more Olympia Secure related information and knowledge.
Your post is very informative for me. excellent article, I really like this post and thanks for sharing. we also provide CCIE Service Provider Training. for more info visit our website.
As a follow up to the previous post around Zero Trust Architecture , Cisco has been delivering zero trust architectures for customers for many years. With the platform approach provided by Cisco Zero Trust organizations gain better visibility across users, devices, containers, networks, and applications, verifying their security states with every access request. Adopting this model provides a balance between security and usability. Security teams can make it harder for attackers to collect what they need (user credentials, network access, and the ability to move laterally), and users can get a consistent and more productive security experience, regardless of where they’re located, what endpoints they’re using, or whether their applications are on-premises or in the cloud. Cisco Zero Trust provides a comprehensive approach to securing all access across applications and environment, from any user, device and location. It protects the workforce , workloads and workplac...
Increased remote work, vulnerabilities popping up and the #killthevpn movement has the cyber security industry laser focused on the transition from VPN to SDP. Let’s start with an acceptable definition of SDP from Wikipedia: “Software-defined perimeter (SDP) framework was developed by the Cloud Security Alliance (CSA) to control access to resources based on identity. Connectivity in a Software Defined Perimeter is based on a need-to-know model, in which device posture and identity are verified before access to application infrastructure is granted.” I hope we all can agree that the “ground truth" of SDP is valid and any organizations will benefit by adopting SDP architecture and principals(including Zero Trust). How is a Remote Access VPN any different than the “Client-to-gateway” deployment model defined for SDP? “In the client-to-gateway implementation, one or more servers are protected behind an Accepting SDP Host such that the Accepting SDP Host acts as a gateway between ...
Introduction After years of innovation around Network Access Control, Cisco has released its next generation NAC solution: Identity Services Engine. ISE is combines existing loosely coupled devices AAA, profiling, posture and guest management - in single, scalability appliance. As part of the Cisco TrustSec solution and Cisco’s SecureX architecture for Borderless Networks, the Cisco Identity Service Engine provides a centralized policy engine for business relevant policy definition and enforcement. This policy work horse enables centralized, coordinated policy creation and consistent policy enforcement across the entire corporate infrastructure, from head office to branch office. ISE Features & Benefits Visibility: Single Platform & Pane of Glass - Let IT see who and what is on the network for advanced discovery and troubleshooting Dynamically collects & consolidates endpoint information to make adaptive policy decisions based on ‘context’ Integrates functions previously d...
I wanted to thank you for this great Information and knowledge, I definitely loved every little bit of it. I have you bookmarked your web site to check out the latest stuff you post. Your blog is eye-catching. I get pleasure from it. Thanks for sharing this beautiful piece of writing with me, get more information at security company in singapore for more Olympia Secure related information and knowledge.
ReplyDelete
ReplyDeleteYour post is very informative for me. excellent article, I really like this post and thanks for sharing. we also provide CCIE Service Provider Training. for more info visit our website.
I examine your blog site presently share great information right below. Sophos Partner Brisbane
ReplyDeleteI should say only that its awesome! The blog is informational and always produce amazing things. Network Security Testing
ReplyDelete