Hi [[ session.user.profile.firstName ]]

Palo Alto Networks

  • Date
  • Rating
  • Views
  • The Hacker You Don’t Know – Uncovering Active Cyberattacks
    The Hacker You Don’t Know – Uncovering Active Cyberattacks
    Ahmed Hussein, Systems Engineer and Eric Kampling, Systems Engineer Recorded: Dec 6 2018 26 mins
    If an active attacker were operating inside your network right now, could you see them? IT security professionals today are challenged with detecting active attackers in addition to stopping malware & risky behavior. Learn how to leverage the power of machine learning to stop active cyberattacks before it’s too late.
  • Compliance is a Team Sport
    Compliance is a Team Sport
    Tighe Schlottog, Security Architect - Cross Industries at Palo Alto Networks and Aaron Wilson, Founder, ScaleSec Recorded: Dec 6 2018 56 mins
    Too often, organizations make the move to the cloud without considerations for how it will be in compliance. Whether you need to maintain compliance for regulatory or business obligations it is best to go into the cloud with those requirements in mind.

    In this webinar, our experts will discuss some of the common misconceptions and mistakes that are made in working toward cloud compliance. They will provide practical advice about how to get your cloud compliance program in the best shape possible.

    -Where to start, whether you’re starting from scratch or modifying your existing program
    -Who to involve and when
    -How to manage reporting, audits, and communication

    Given the maturity of the cloud platforms, it isn’t hard to be compliant in the cloud --you just need to prepare appropriately and share the work across the organization to ensure you maintain compliance.
  • Compliance is a Team Sport
    Compliance is a Team Sport
    Tighe Schlottog, Security Architect - Cross Industries at Palo Alto Networks and Aaron Wilson, Founder, ScaleSec Recorded: Dec 6 2018 55 mins
    Too often, organizations make the move to the cloud without considerations for how it will be in compliance. Whether you need to maintain compliance for regulatory or business obligations it is best to go into the cloud with those requirements in mind.

    In this webinar, our experts will discuss some of the common misconceptions and mistakes that are made in working toward cloud compliance. They will provide practical advice about how to get your cloud compliance program in the best shape possible.

    -Where to start, whether you’re starting from scratch or modifying your existing program
    -Who to involve and when
    -How to manage reporting, audits, and communication

    Given the maturity of the cloud platforms, it isn’t hard to be compliant in the cloud --you just need to prepare appropriately and share the work across the organization to ensure you maintain compliance.
  • Who Else is Viewing my One Drive? (Securing Public SaaS Applications)
    Who Else is Viewing my One Drive? (Securing Public SaaS Applications)
    Steven Hansen, Systems Engineer and Aymen Khan, Systems Engineer Recorded: Dec 5 2018 28 mins
    The appeal of SaaS applications, such as Office 365®, Google G Suite, Box and Salesforce is growing, but so are the hidden threats in SaaS offerings: accidental data exposure, malicious outsiders, promiscuous sharing and so on. Even sanctioned SaaS adoption can increase the risk of breaches and non-compliance.

    Attend this webinar to learn how Aperture SaaS security service helps eliminate the risks.
  • Protection for Advanced Malware in the Wild
    Protection for Advanced Malware in the Wild
    Matt Elliott, Systems Engineer Recorded: Dec 4 2018 50 mins
    If an active sample of malware was executed in your environment right now, how would you block it? IT professionals today are challenged to sift through countless alerts and false positives to try to successfully prevent malware and risky behavior.

    Attend this webinar to learn how to leverage the power of machine learning to stop active cyberattacks.
  • Are your point of sale environments protected?
    Are your point of sale environments protected?
    Lawrence Chin Recorded: Nov 28 2018 41 mins
    Point of Sale (POS) systems are the lifeblood of any industry that conducts in-person transactions with its customers. Retail, hospitality, accommodation, etc. rely on their POS environments to process purchases, support customer loyalty programs, update inventory, and drive the supply chain. However, the processing of customer payment card and collection of personally identifiable information still makes POS systems a favorite target of cyberattackers. Media reports on data breaches stemming from compromised POS systems have become all too common. Although compliance with the PCI DSS is a expected, it’s only the bare minimum to conduct business.
    In this webinar you will:
    -Hear a customer case study on POS protection
    -Realize greater security controls over your CDE and customer PII
    -Exceed PCI DSS for greater cyber hygiene
    -Understand the capabilities of a security operating platform for POS
  • Securing Building Management Systems
    Securing Building Management Systems
    Del Rodillas, Director of Industrial and IoT Cybersecurity Product Marketing, Palo Alto Networks Recorded: Nov 27 2018 64 mins
    An often-forgotten area in the enterprise network which poses a significant risk to your organization if compromised are Building Management/Automation Systems (BMS/BAS). These IoT and industrial control systems which are integral to realizing "smart" and efficient buildings and facilities include Heating, Ventilation and Air-conditioning (HVAC), energy management, surveillance, fire safety, physical access controls, electric car charging systems, and other connected systems. As these systems undergo digital transformation and become more connected, the risk associated with cyberattacks also increases. Organizations need to act today to learn more about this growing risk and to include securing BMS/BAS in their enterprise cybersecurity strategy.

    Listen to this webinar to learn about:
    •The rising threat landscape associated with smart buildings and facilities
    •Strategic tenets for protecting BMS/BAS
    •A reference blueprint and case study for BMS cybersecurity
  • Bridging Security Gaps with Networks-to-Endpoint Integration
    Bridging Security Gaps with Networks-to-Endpoint Integration
    Konstantin Rychkov, IDC, Senior Research Analyst Recorded: Nov 20 2018 37 mins
    The typical enterprise uses an average of 30 security products, most of which from variety of vendors and typically do not integrate well and offer little information sharing…if any. Using a portfolio of integrated products from fewer vendors means greater synergies and efficiencies. This is especially true of endpoint security software, where many organizations have long and established relationships with a favorite vendor. This can lead to a sense of complacency, and there may also exist a disincentive to replace software on all of an organization’s endpoint devices, leaving organizations potentially exposed to an evolving threat landscape.

    Join us for this informative webinar where IDC analyst Konstantin Rychkov will:

    • Introduce the concept of endpoint protection integrated with network security components
    • Demonstrate how the two together provide greater effectiveness and efficiency in security
    • Detail how an integrated security stack is instrumental to holistic enterprise-wide security
  • Securing connected vehicles
    Securing connected vehicles
    Dharminder Debisarun : Cybersecurity strategist for automotive Moshe Shlisel : CEO GuardKnox Recorded: Oct 30 2018 36 mins
    The end-to-end cybersecurity strategy that protects connected vehicles.

    With the expected surge in connected vehicles, cloud security remains critically important to passenger safety and well-being.

    In fact, Gartner is predicting a quarter billion connected vehicles on the road by 2020.

    The average modern car now features over 100 computers, all communicating with one another – often through the cloud. These connections increase the chances of cyberattacks, which can lead to accidents and cause extensive recalls.

    We’ve joined forces with GuardKnox to provide an end-to-end cybersecurity strategy for the modern connected vehicle.

    In this webinar, you’ll learn:

    •How to protect connected cars against cyberattacks
    •Why encryption is so important for connected vehicles
    •How to eliminate challenges when implementing security

    Register/Join the webinar to learn how to prevent successful cyberattacks on connected vehicles.
  • Machine Learning 101: Streamline Security and Speed Up Response Time
    Machine Learning 101: Streamline Security and Speed Up Response Time
    Join Yinnon Meshi, Sr. Data Scientist and Kasey Cross, Senior Product Manager Recorded: Oct 30 2018 48 mins
    Machine learning is changing the way we live our lives. It can reduce errors and even achieve the impossible by accomplishing tasks that cannot be performed manually.

    But how does it change the cybersecurity landscape? And, perhaps more importantly, how will it impact your career in security?

    Join Yinnon Meshi, Sr. Data Scientist and Kasey Cross, Senior Product Marketing Manager to understand how to apply machine learning to threat hunting and malware analysis.

    You will come away understanding:

    •Where machine learning is used today in security
    •How it will be leveraged in the future
    •How you can simplify security operations with automation and machine learning

Embed in website or blog