|
Remi Philippe of Cisco presented at Security Field Day 4 |
This Presentation date is October 21, 2020 at 13:00-15:00.
Presenters: Remi Philippe, Rob Tappenden, Tim Garner
‘Keep on partying like it’s 1999, but protect applications like it’s 2020 with Cisco Tetration’
Cloud adoption & DevOps methodology are dramatically changing how forward-looking organizations innovate today. In the midst of this transformation, Security owners are finding that the traditional perimeter, on-premise or hardware-based security controls are not keeping pace with today’s modern methodology and applications.
Come join Cisco Tetration team to learn how to protect your application workloads in today’s agile, hybrid and multi-cloud environment.
We will begin with an existing environment, full of applications, running on top of a mixture of infrastructures, on-premises, and multiple cloud, with VMs, containers and even legacy BM servers. We will walk you through step-by-step process of defining and enforcing segmentation policy through a combination of InfoSec provided “ground rules” and automated policies discovered by Tetration.
Come learn how to implement Segmentation and workload security, in Real World!
Additional Resources
- Learn more about how to secure your workloads with Cisco Tetration
- Cisco Design and Implementation Videos on Youtube
- Cisco Tetration Youtube Playlist
- Cisco Tetration virtual bootcamp
Follow on Twitter using the following hashtags or usernames: #XFD4
Cisco Introduction to Tetration and Overview Demo
Watch on YouTube
Watch on Vimeo
Modern applications have become the number one target for attacks and breaches. Reality is, they are highly distributed, complex, hard to box them in a perimeter – making it lot harder to protect. Come join us in this section to learn how Cisco Tetration can help. Tetration brings security down to the workload level, evolves with your application. It is not tied to any infrastructure, cloud or compute. Understand how you can secure & segment your applications in real world with a scalable, software based approach.
Does this seem unreal? We will show you in a live demo followed by the why, what & how of Tetration.
Personnel: Rob Tappenden
Cisco Automated Policy Discovery and Enforcement for Security Teams
Watch on YouTube
Watch on Vimeo
Now that we know what to do and what we want to secure our applications, where do we start? Do you know how your applications are dependent and communicating in your environment? How can you identify all the logical boundaries and connectivity to define & implement your segmentation & security policy? Even if you did figure that out, how do you keep them current and where do you enforce them?
Come join us in this section to learn how Tetration discovers the policy automatically, in your dynamic environment. How can it help keep your policies current & up to date, how does it ‘follow’ your application workload.
Once we discover the policy, we will also walk through where and how to enforce it in your environment to keep all your workloads secure, everywhere.
Personnel: Tim Garner
Cisco Capturing Policy at the CI:CD Level and Enforcement for Application Developers
Watch on YouTube
Watch on Vimeo
Shift Left: Start early! How can you adopt a DevOps model without sacrificing security? We discovered and enforced Tetration policy at the workload but now, how do you embed security that scales with the code and is not bound by infrastructure?
Come join us in this section to learn how you can embed fine-grained controls and policies in the code and consistently push the same across your legacy and existing environments, with Tetration
How can you be the enabler, for your developer.
Personnel: Remi Philippe