What you can do is set up a syslog server, and have the events from the Cisco device sent to the syslog server. Then have the SCSP agent monitor the syslog and match event patterns within the log for certain strings which would trigger events that are sent to the SCSP manager. You can also use variables, so you can capture non-static info like the device name if you are sending events to the syslog server from multiple devices.
If you are using a syslog server on Windows, base your policy off the the Windows Template Policy, then add and configure a custom Text Log rule. Use the UNIX Template Policy if you are hosting the syslog server on a UNIX machine.
See Appendix C "Virtual Agent Examples" (Pg 265) of the Symantec™ Critical System Protection Administration Guide (attached) for details on how to set this up.