Tech Field Day

The Independent IT Influencer Event

  • Home
    • Gestalt IT
    • About Tech Field Day
    • FAQ
    • Staff
  • Sponsors
    • Sponsor List
    • Sponsor Tech Field Day
    • Results and Metrics
    • Preparing Your Presentation
      • Complete Presentation Guide
      • A Classic Tech Field Day Agenda
      • Field Day Room Setup
      • Presenting to Engineers
  • Delegates
    • Delegate List
      • 2023 Delegates
      • 2022 Delegates
      • 2021 Delegates
      • 2020 Delegates
      • 2019 Delegates
      • 2018 Delegates
    • Become a Field Day Delegate
    • What Delegates Should Know
  • Events
    • All Events
      • Upcoming
      • Past
    • Field Day
    • Field Day Extra
    • Field Day Exclusive
    • Field Day Experience
    • Field Day Live
    • Field Day Showcase
  • Topics
    • Tech Field Day
    • Cloud Field Day
    • Mobility Field Day
    • Networking Field Day
    • Security Field Day
    • Storage Field Day
You are here: Home / Appearances / Cisco Presents at Security Field Day 4

Cisco Presents at Security Field Day 4



Security Field Day 4

Remi Philippe of Cisco presented at Security Field Day 4


This Presentation date is October 21, 2020 at 13:00-15:00.

Presenters: Remi Philippe, Rob Tappenden, Tim Garner

‘Keep on partying like it’s 1999, but protect applications like it’s 2020 with Cisco Tetration’

Cloud adoption & DevOps methodology are dramatically changing how forward-looking organizations innovate today. In the midst of this transformation, Security owners are finding that the traditional perimeter, on-premise or hardware-based security controls are not keeping pace with today’s modern methodology and applications.

Come join Cisco Tetration team to learn how to protect your application workloads in today’s agile, hybrid and multi-cloud environment.
We will begin with an existing environment, full of applications, running on top of a mixture of infrastructures, on-premises, and multiple cloud, with VMs, containers and even legacy BM servers. We will walk you through step-by-step process of defining and enforcing segmentation policy through a combination of InfoSec provided “ground rules” and automated policies discovered by Tetration.

Come learn how to implement Segmentation and workload security, in Real World!

Additional Resources

  • Learn more about how to secure your workloads with Cisco Tetration
  • Cisco Design and Implementation Videos on Youtube
  • Cisco Tetration Youtube Playlist
  • Cisco Tetration virtual bootcamp


Follow on Twitter using the following hashtags or usernames: #XFD4


Cisco Introduction to Tetration and Overview Demo


Watch on YouTube
Watch on Vimeo

Modern applications have become the number one target for attacks and breaches. Reality is, they are highly distributed, complex, hard to box them in a perimeter – making it lot harder to protect. Come join us in this section to learn how Cisco Tetration can help. Tetration brings security down to the workload level, evolves with your application. It is not tied to any infrastructure, cloud or compute. Understand how you can secure & segment your applications in real world with a scalable, software based approach.

Does this seem unreal? We will show you in a live demo followed by the why, what & how of Tetration.

Personnel: Rob Tappenden

Cisco Automated Policy Discovery and Enforcement for Security Teams


Watch on YouTube
Watch on Vimeo

Now that we know what to do and what we want to secure our applications, where do we start? Do you know how your applications are dependent and communicating in your environment? How can you identify all the logical boundaries and connectivity to define & implement your segmentation & security policy? Even if you did figure that out, how do you keep them current and where do you enforce them?
Come join us in this section to learn how Tetration discovers the policy automatically, in your dynamic environment. How can it help keep your policies current & up to date, how does it ‘follow’ your application workload.
Once we discover the policy, we will also walk through where and how to enforce it in your environment to keep all your workloads secure, everywhere.

Personnel: Tim Garner

Cisco Capturing Policy at the CI:CD Level and Enforcement for Application Developers


Watch on YouTube
Watch on Vimeo

Shift Left: Start early! How can you adopt a DevOps model without sacrificing security? We discovered and enforced Tetration policy at the workload but now, how do you embed security that scales with the code and is not bound by infrastructure?
Come join us in this section to learn how you can embed fine-grained controls and policies in the code and consistently push the same across your legacy and existing environments, with Tetration
How can you be the enabler, for your developer.

Personnel: Remi Philippe


  • Facebook
  • Instagram
  • LinkedIn
  • RSS
  • Twitter
  • YouTube

Event Calendar

  • Feb 7-8 — Tech Field Day Extra at Cisco Live EMEA 2023
  • Feb 22-23 — Edge Field Day 1
  • Mar 8-10 — Tech Field Day 27
  • Mar 22-23 — Storage Field Day 25
  • Apr 12-14 — Networking Field Day 31
  • May 17-19 — Mobility Field Day 9
  • Jun 28-29 — Security Field Day 9

Latest Links

Is Kubernetes a Good Fit for Edge Computing?

Fortinet Red vs Blue for Cloud Native Visibility and Protection for the Application Lifecycle

Understanding the Building Blocks of Cloud-Native Infrastructure

Edge Computing – Reality or Myth?

Brief: When to Consider Anuta Networks for Automation

Recent Videos

Juniper Networks 2023 Company Update

Aryaka Unified SASE – Journey to Zero Trust WAN

Aryaka Unified SASE – Demo of MyAryaka Customer Portal

Solo.io Company and Market Overview

Watch Tech Field Day on YouTube

Best of Tech Field Day

Introduction to Tail-f and NCS

Why Does the Internet Need a Programmable Forwarding Plane with Nick McKeown

What is an Ethernet Fabric?

Victor Shtrom talks about Ruckus Wireless' beamforming and antennas

Watch Tech Field Day on YouTube

Return to top of page

Copyright © 2023 · Genesis Framework · WordPress · Log in