Tech Field Day

The Independent IT Influencer Event

  • Home
    • The Futurum Group
    • FAQ
    • Staff
  • Sponsors
    • Sponsor List
      • 2025 Sponsors
      • 2024 Sponsors
      • 2023 Sponsors
      • 2022 Sponsors
    • Sponsor Tech Field Day
    • Best of Tech Field Day
    • Results and Metrics
    • Preparing Your Presentation
      • Complete Presentation Guide
      • A Classic Tech Field Day Agenda
      • Field Day Room Setup
      • Presenting to Engineers
  • Delegates
    • Delegate List
      • 2025 Delegates
      • 2024 Delegates
      • 2023 Delegates
      • 2022 Delegates
      • 2021 Delegates
      • 2020 Delegates
      • 2019 Delegates
      • 2018 Delegates
    • Become a Field Day Delegate
    • What Delegates Should Know
  • Events
    • All Events
      • Upcoming
      • Past
    • Field Day
    • Field Day Extra
    • Field Day Exclusive
    • Field Day Experience
    • Field Day Live
    • Field Day Showcase
  • Topics
    • Tech Field Day
    • Cloud Field Day
    • Mobility Field Day
    • Networking Field Day
    • Security Field Day
    • Storage Field Day
  • News
    • Coverage
    • Event News
    • Podcast
  • When autocomplete results are available use up and down arrows to review and enter to go to the desired page. Touch device users, explore by touch or with swipe gestures.
You are here: Home / Appearances / Cisco Presents at Security Field Day 4

Cisco Presents at Security Field Day 4



Security Field Day 4

Remi Philippe of Cisco presented at Security Field Day 4

This Presentation date is October 21, 2020 at 13:00-15:00.

Presenters: Remi Philippe, Rob Tappenden, Tim Garner

‘Keep on partying like it’s 1999, but protect applications like it’s 2020 with Cisco Tetration’

Cloud adoption & DevOps methodology are dramatically changing how forward-looking organizations innovate today. In the midst of this transformation, Security owners are finding that the traditional perimeter, on-premise or hardware-based security controls are not keeping pace with today’s modern methodology and applications.

Come join Cisco Tetration team to learn how to protect your application workloads in today’s agile, hybrid and multi-cloud environment.
We will begin with an existing environment, full of applications, running on top of a mixture of infrastructures, on-premises, and multiple cloud, with VMs, containers and even legacy BM servers. We will walk you through step-by-step process of defining and enforcing segmentation policy through a combination of InfoSec provided “ground rules” and automated policies discovered by Tetration.

Come learn how to implement Segmentation and workload security, in Real World!

Additional Resources

  • Learn more about how to secure your workloads with Cisco Tetration
  • Cisco Design and Implementation Videos on Youtube
  • Cisco Tetration Youtube Playlist
  • Cisco Tetration virtual bootcamp


Follow on Twitter using the following hashtags or usernames: #XFD4

Cisco Introduction to Tetration and Overview Demo


Watch on YouTube
Watch on Vimeo

Modern applications have become the number one target for attacks and breaches. Reality is, they are highly distributed, complex, hard to box them in a perimeter – making it lot harder to protect. Come join us in this section to learn how Cisco Tetration can help. Tetration brings security down to the workload level, evolves with your application. It is not tied to any infrastructure, cloud or compute. Understand how you can secure & segment your applications in real world with a scalable, software based approach.

Does this seem unreal? We will show you in a live demo followed by the why, what & how of Tetration.

Personnel: Rob Tappenden

Cisco Automated Policy Discovery and Enforcement for Security Teams


Watch on YouTube
Watch on Vimeo

Now that we know what to do and what we want to secure our applications, where do we start? Do you know how your applications are dependent and communicating in your environment? How can you identify all the logical boundaries and connectivity to define & implement your segmentation & security policy? Even if you did figure that out, how do you keep them current and where do you enforce them?
Come join us in this section to learn how Tetration discovers the policy automatically, in your dynamic environment. How can it help keep your policies current & up to date, how does it ‘follow’ your application workload.
Once we discover the policy, we will also walk through where and how to enforce it in your environment to keep all your workloads secure, everywhere.

Personnel: Tim Garner

Cisco Capturing Policy at the CI:CD Level and Enforcement for Application Developers


Watch on YouTube
Watch on Vimeo

Shift Left: Start early! How can you adopt a DevOps model without sacrificing security? We discovered and enforced Tetration policy at the workload but now, how do you embed security that scales with the code and is not bound by infrastructure?
Come join us in this section to learn how you can embed fine-grained controls and policies in the code and consistently push the same across your legacy and existing environments, with Tetration
How can you be the enabler, for your developer.

Personnel: Remi Philippe


  • Bluesky
  • LinkedIn
  • Mastodon
  • RSS
  • Twitter
  • YouTube

Event Calendar

  • Jun 10-Jun 11 — Tech Field Day Extra at Cisco Live US 2025
  • Jul 9-Jul 10 — Networking Field Day 38
  • Jul 16-Jul 17 — Edge Field Day 4
  • Aug 19-Aug 20 — Tech Field Day Extra at SHARE Cleveland 2025
  • Sep 10-Sep 11 — AI Infrastructure Field Day 3
  • Sep 24-Sep 25 — Security Field Day 14
  • Oct 22-Oct 23 — Cloud Field Day 24
  • Oct 29-Oct 30 — AI Field Day 7

Latest Links

  • Techstrong Gang – May 20, 2025
  • How Nile Is Redefining Campus Networks with Zero Trust
  • Celona Shows How Flexible and Scalable Private Cellular can be!
  • Campus Gateway: The Missing Piece in Large-Scale Enterprise Deployments with Cisco Meraki
  • Powering Qlik Open Lakehouse with Apache Iceberg

Return to top of page

Copyright © 2025 · Genesis Framework · WordPress · Log in