No
Yes
View More
View Less
Working...
Close
OK
Cancel
Confirm
System Message
Delete
Schedule
An unknown error has occurred and your request could not be completed. Please contact support.
Scheduled
Wait Listed
Personal Calendar
Participant
Conference Event
Meeting
Interest
There aren't any available sessions at this time.
Conflict Found
This session is already scheduled at another time. Would you like to...
Loading...
Please enter a maximum of {0} characters.
{0} remaining of {1} character maximum.
Please enter a maximum of {0} words.
{0} remaining of {1} word maximum.
must be 50 characters or less.
must be 40 characters or less.
Session Summary
On-demand Library
Cisco Live Session Videos and Presentations Listing
Online Events
Upcoming Cisco Live events
Social Networking
Connect with Cisco Live
Solutions Center
Cisco Live Conference Exhibitors
Prizes
Cisco Live Survey
In-person Events
http://www.ciscolive.com/global/?cid=CLO-global
Cisco Live Milan 2014
http://www.ciscolive.com/emea/?cid=CLO-EU
Event Details
http://www.ciscolive.com/emea/details/?cid=CLO-EU
Scheduler
https://www.ciscolivemilan.com/connect/publicDashboard.ww?cid=CLO-EU
Social Media
http://www.ciscolive.com/emea/social-networking/?cid=CLO-EU
Cisco Live Melbourne 2014
http://www.cisco.com/web/ANZ/cisco-live/index.html
Cisco Live San Francisco 2014
http://www.ciscolive.com/us?cid=CLO-US
Event Details
http://www.ciscolive.com/us/details/?cid=CLO-US
Scheduler (Live Jan 13)
https://www.ciscolive2014.com/connect/publicDashboard.ww?cid=CLO-US
Social Media
http://www.ciscolive.com/us/attendees/social-networking/?cid=CLO-US
Cisco Live Cancun
http://www.cisco.com/web/MX/ciscolive2013/
Log in to access thousands of sessions on cloud, BYOD, data center, and more!
Join now to access free content from global Cisco Live conferences.
Add to My Interests
Add to My File Queue
Remove From My Interests
Remove from my File Queue
Incomplete Account Information
You have not yet completed your account information. Would you like to do so now?
Edit Account Now
Ignore
  File Download Queue
Search Catalog

Troy Sherman

Security Architect , Cisco

Speaker Bio

I have been at Cisco for over 16 years starting in Advanced Services, then Sales as a Systems Engineer, moving to Marketing as a Technical Marketing Engineer on security, then created the voice and video security design guide. I am now the Security Architect Cloud Services for software and network in as Software as a Service (SaaS) at Cisco. Also - they let you put anything in the Bio you want, so I like fluffy bunnies, pink cotton candy, Dr. Who, Dalek’s (exterminate, exterminate) and hate the new Star Wars films. This would be considered and Easter Egg – a call out to anyone that actually reads this stuff :)

Speaker Sessions

Understanding and Preventing Layer 2 Attacks in IPv4 Networks (2012 San Diego) Speaker(s): Troy Sherman

This session focuses on the network security issues surrounding Layer 2, the data link layer. Because many network attacks originate inside the corporate firewall, exploring this soft underbelly of data networking is critical for any secure network design. Issues covered include Address Resolution Protocol (ARP) spoofing, MAC flooding, VLAN hopping, Dynamic Host Configuration Protocol (DHCP) attacks, and Spanning Tree Protocol concerns. Common myths about Ethernet switch security are addressed and specific security lockdown recommendations are provided. Attack mitigation options presented include the new DHCP snooping and Dynamic ARP Inspection (DAI) functionality. Attendees can expect to learn Layer 2 design considerations from a security perspective and mitigation techniques for Layer 2 attacks. This session is for network designers, administrators, and engineers in all areas of data networking.

Understanding and Preventing Layer 2 Attacks in IPv4 Networks (2012 Melbourne) Speaker(s): Troy Sherman

This session focuses on the network security issues surrounding Layer 2, the data link layer. Because many network attacks originate inside the corporate firewall, exploring this soft underbelly of data networking is critical for any secure network design. Issues covered include Address Resolution Protocol (ARP) spoofing, MAC flooding, VLAN hopping, Dynamic Host Configuration Protocol (DHCP) attacks, and Spanning Tree Protocol concerns. Common myths about Ethernet switch security are addressed and specific security lockdown recommendations are provided. Attack mitigation options presented include the new DHCP snooping and Dynamic ARP Inspection (DAI) functionality. Attendees can expect to learn Layer 2 design considerations from a security perspective and mitigation techniques for Layer 2 attacks. This session is for network designers, administrators, and engineers in all areas of data networking.

Securing Enterprise Unified Communications (2013 Melbourne) Speaker(s): Troy Sherman

This session explores the various security technologies and tools that can be used to protect Enterprise IP Communications from various attacks. The session will show how attacks can be mitigated using both the network and the applications running on the network. The session will present methods of how to level set the appropriate security to a VoIP system in an enterprise network.

Social Networking Security (2012 San Diego) Speaker(s): Troy Sherman

This session will talk about the security concerns of social networking and the impact it has to employees and also the company. Even if the social software is hosted within the enterprise, how this affects your company – who owns the data, where is the data stored, what international or state laws apply. What Personally Identifiable Information (PII) is the company allowed to retain if the system is internal vs. external, where the data is required to be stored internal vs. external deployments. This session will also talk about mobile clients possible ways to control the data on those systems, if they are Bring Your Own Device (BYOD) and what users responsibilities are in the case that they are using their own devices within the enterprise. The session will also look at company policy and why a policy is required for any social networking software even if the employee uses a system for personal use only.

Securing Enterprise Unified Communications (2012 Melbourne) Speaker(s): Troy Sherman

This session explores the various security technologies and tools that can be used to protect Enterprise IP Communications from various attacks. The session will show how attacks can be mitigated using both the network and the applications running on the network. The session will present methods of how to level set the appropriate security to a VoIP system in an enterprise network.

Social Networking Security (2012 Melbourne) Speaker(s): Troy Sherman

This session would talk about the risks and overall issues companies are going to have allowing users to have social networking. It also will cover Cisco Quad and the security that companies will have even when they deploy social networking software within the enterprise.

Social Networking Security (2013 Orlando) Speaker(s): Troy Sherman

This session will talk about the security concerns of social networking and the impact it has to employees and also the company. Even if the social software is hosted within the enterprise, how this affects your company ? who owns the data, where is the data stored, what international or state laws apply. What Personally Identifiable Information (PII) is the company allowed to retain if the system is internal vs. external, where the data is required to be stored internal vs. external deployments. This session will also talk about mobile clients possible ways to control the data on those systems, if they are Bring Your Own Device (BYOD) and what users responsibilities are in the case that they are using their own devices within the enterprise. The session will also look at company policy and why a policy is required for any social networking software even if the employee uses a system for personal use only.

Understanding and Preventing Layer 2 Attacks in IPv4 Networks (2013 Orlando) Speaker(s): Troy Sherman

This session focuses on the network security issues surrounding Layer 2, the data link layer. Because many network attacks originate inside the corporate firewall, exploring this soft underbelly of data networking is critical for any secure network design. Issues covered include Address Resolution Protocol (ARP) spoofing, MAC flooding, VLAN hopping, Dynamic Host Configuration Protocol (DHCP) attacks, and Spanning Tree Protocol concerns. Common myths about Ethernet switch security are addressed and specific security lockdown recommendations are provided. Attack mitigation options presented include the new DHCP snooping and Dynamic ARP Inspection (DAI) functionality. Attendees can expect to learn Layer 2 design considerations from a security perspective and mitigation techniques for Layer 2 attacks. This session is for network designers, administrators, and engineers in all areas of data networking.

Fundamental IOS Security (2014 San Francisco) Speaker(s): Troy Sherman

As networks increases in complexity, so does the risk of attacks and vulnerability. This session explores design and deployment of integrated security solutions on Cisco IOS routers to mitigate and protect against these threats. The session will start with fundamental security considerations on how to harden a Cisco IOS router to protect network infrastructure. Topic covered will include password security, login control and user accounting. The session will then move towards protecting the router from resource exhaustion by securing the control plane. This helps protect the router from expected communication. The presentation then finishes with securing transit traffic. Cisco Zone Based Firewall as the framework for securing the data plane. Various defenses against denial of service attacks will be discussed. This presentation provides many real world examples to bridge the gap between theory and application.