Thursday, April 13, 2017
8 AM – 6 PM
Sheraton Pittsburgh Hotel at Station Square
300 W Station Square Dr
Pittsburgh, PA 15219
Register Now |
|
||||||
Joey Muniz is an architect at Cisco Systems and security researcher. He has extensive experience in designing security solutions and architectures for the top Fortune 500 corporations and US Government. Joey’s current role gives him visibility into the latest trends in cyber security from leading vendors and customers. Examples of Joey’s research are his RSA talk titled Social Media Deception quoted by many sources found by searching “Emily Williams Social Engineering” as well as articles in PenTest Magazine regarding various security topics. Joey runs The Security Blogger website, a popular resource for security and product implementation. He is the author and contributor of several publications including a recent Cisco Press book focused on security operations centers (SOC). |
8 – 8:45 AM Registration and Breakfast |
8:45 – 9:30 AM Keynote Address |
9:45 – 10:45 AM Session 1 |
11 AM – Noon Session 2 |
Noon – 12:30 PM Lunch |
12:30 – 1 PM Solutions Expo Hall |
1 – 2 PM Session 3 |
2:15 – 3:15 PM Session 4 |
3:30 – 4 PM Closing Remarks & Raffle* |
4 – 6 PM Happy Hour Sponsored by Arbor Networks Hard Rock Cafe 230 W Station Square Dr, Pittsburgh, PA 15219 |
*NO PURCHASE NECESSARY TO ENTER OR WIN. This event drawing is open and offered to all customer attendees of Cisco Connect Pittsburgh, held Thursday, April 13, 2017. All entrants must be mindful of, and consider their employer’s gift and ethics rules before entering into this raffle and/or accepting a prize. Limit one (1) entry per person. Must be present to win.
See Cisco's latest solutions in Content Collaboration. Learn how you can create, annotate, store and share co-authored content over multiple endpoints all within a seamless collaboration environment. Learn more about Cisco's Content Collaboration in the cloud!
Cisco is focused on helping customers modernize their data center with a hybrid-IT solution that maximizes application performance, mitigates risk and increases operational agility. Cisco empowers customers with the choice and flexibility to run any of their traditional and cloud-native applications using converged and hyperconverged infrastructure solutions that can be deployed across on-premises, managed and public clouds. This architectural approach ties analytics, simplicity, automation and protection (ASAP) tightly with a consistent policy across a hybrid cloud built with industry-leading data center networking, security, converged Infrastructures and software-defined solutions.
Check out Meraki's Cloud Automation/Analytics solution using the Meraki API and dive into Meraki's SD-WAN solution in this demonstration-focused session.
Join Cisco’s local Consulting Systems Engineers to learn about present day threats and Cisco’s architectural capabilities to identify, contain and mitigate them as they’re encountered. Cisco’s Talos is on the forefront of stopping cyber attacks and educating organizations about current threats. Join us for session in which you’ll learn about the scale and severity of the current threat landscape and what Cisco is doing and what your organization can do about these issues. Understand how Talos & Cisco’s Security architecture work together to address these threats.
It’s about your business outcomes. Learn how your business will benefit from solutions enabled on Apple iOS and why the Cisco and Apple partnership delivers greater business insights and capabilities through a Connected Mobile Experience.
Cloud collaboration capabilities are exploding at Cisco! This session will cover Cisco Spark and all of its offerings and integrations. This includes Spark Call, Spark Room and Spark APIs. Spark provides always-on, secure team messaging and file sharing along with meet anywhere capabilities and screen sharing. See what it's all about!
The data center space has witnessed tremendous innovation over the last decade including virtualization, cloud computing, software defined networking SDN, DevOps, containers and now microservices just to name a few. With so many technologies, how do you achieve operational efficiency, understand application dependencies and interaction and migrate applications? Cisco's answer is Tetration Analytics which delivers pervasive visibility across everything in the data center in real time.
Do you wish you knew more about DHCP Snooping, Storm Control or Root Guard? Do you have questions around how about to design multicast specific to Anycast and BSR? Come to this whiteboard/interactive discussion-based session and walk away with practical insight into these features and more and how they can be applied directly to your infrastructure.
Cisco Umbrella is a cloud security platform built into the foundation of the internet. Enforcing security at the DNS and IP layers, Umbrella blocks requests to malicious and unwanted destinations before a connection is even established - stopping threats over any port or protocol before they reach your network or endpoints. Join Security Consulting Systems Engineers for a dive deep into the Umbrella Secure Internet Gateway and how the SIG adds a critical security capability into your security architecture.
It’s about trust. The foundation of the Apple and Cisco partnership is the trust between your Apple Device and the Cisco Wi-Fi network. In this session, you’ll understand how 802.11 Wi-Fi standards can be automatically enabled to provide a better user experience. This also includes apple Fastlane which allows applications to be “whitelisted” to provide prioritization for business relevant applications.
See Cisco's latest solutions in Content Collaboration. Learn how you can create, annotate, store and share co-authored content over multiple endpoints all within a seamless collaboration environment. Learn more about Cisco's Content Collaboration in the cloud!
Cisco Application Centric Infrastructure (ACI) is taking data centers to the next step in automation, business agility, TCO reduction and acceleration of application deployments. As a technical introduction, this session will focus on how ACI behaves and functions with respect to the architecture, forwarding, features, configuration methods, stateless hardware and the use of overlays.
802.11ac Wave 2 is here. This session will explore the latest in wireless technologies and the impact they have on the network. In Prime, we'll look at the major areas including inventory, element and configuration management.
To stay one step ahead of today's sophisticated hackers and malware, you need a fully integrated security solution that offers comprehensive network visibility, threat intelligence, on premise, hybrid and cloud capabilities and retrospective security technology that can respond quickly to attacks.
Join Cisco’s Security Consulting Systems Engineers as they dive deep into the most recent Firepower Threat Defense software. See what makes the Firepower threat-focused approach so different from other security solutions. Get an exclusive, under-the-hood look at new Cisco Firepower hardware appliances, and go inside the unified Cisco Firepower Management Center, which lets you control applications and investigate and remediate malware outbreaks from a single management center interface.
Platform Integrity and Embedded Security. Choosing your platform for mobility is an essential business decision. You must have the confidence that the platform is inherently secure an trust that your confidential data is protected. With Apple iOS security is built-in and with Cisco’s WLAN Umbrella security, only Apple and Cisco can deliver the end-to-end capabilities to protect your business.
Cloud collaboration capabilities are exploding at Cisco! This session will cover Cisco Spark and all of its offerings and integrations. This includes Spark Call, Spark Room and Spark APIs. Spark provides always-on, secure team messaging and file sharing along with meet anywhere capabilities and screen sharing. See what it's all about!
When compute, storage and networking are combined in a single infrastructure, the result is software-defined infrastructure. We'll provide a deeper architectural understanding of Cisco's innovative HyperFlex systems that help with faster application delivery, better resource allocation and efficient operations.
Did you know that the Meraki 'full stack' now includes voice and video? Come to this session to better understand and experience Cloud-managed voice and physical security solutions from Meraki.
Email is the #1 exploited threat vector. Therefore, the greatest threat to an organization is sitting in your employees inboxes. See how Cisco Email Security can protect you better against advanced threats, business email compromise, spoofing and phishing. We will demonstrate our advanced threat intelligence and our multilayered approach inclusive of Advanced Malware Protection (AMP) to protect inbound messages and sensitive outbound data.
Enhancing Collaboration with the Cisco/Apple Partnership. Experience firsthand how Apple and Cisco are working together to help you empower your employees to be even more efficient. Transform and innovate your business by prioritizing business-critical apps easily over your enterprise wireless network for users on iOS devices.
Cisco only privacy policy: You are being invited to attend a Cisco-sponsored event. By providing your contact details, a representative may contact you regarding this event. All personal information will be handled in accordance with Cisco Privacy Statement