Hi [[ session.user.profile.firstName ]]

Palo Alto Networks

  • Date
  • Rating
  • Views
  • Exploit Kits and Ransomware in State & Local Governments & Education Exploit Kits and Ransomware in State & Local Governments & Education Brad Duncan - Threat Intelligence Analyst - Palo Alto Networks Recorded: Oct 26 2016 53 mins
    Criminal groups use exploit kits as one of the main distribution methods to infect Windows hosts with malware. Exploit kits are designed to work behind the scenes while you are browsing the web. During the past year, the most common malware distributed by exploit kits has been ransomware.

    In most cases, a potential victim visits a compromised website as the first step in an infection chain. Behind the scenes, the victim is redirected to an exploit kit. The exploit kit gathers information about the victim's system, determines the appropriate exploit, and infects any vulnerable hosts.

    In this presentation, Brad Duncan reviews fundamental concepts of exploit kit activity for the SLED vertical and demonstrates how ransomware infections happen through this method. Brad also discusses preventative measures people and organizations can take to combat this very real threat.
  • Auto Scaling Next-Gen Firewalls on AWS Auto Scaling Next-Gen Firewalls on AWS Matt Keil, Director of Product Marketing, Data Center and Warby Warburton, Manager, Technical Marketing Engineering Recorded: Oct 25 2016 46 mins
    Through integration with AWS services, like Auto Scaling and AWS Elastic Load Balancing (AWS ELB), you can now build a next-generation security infrastructure that will dynamically, yet independently, scale to protect your AWS workloads as their traffic patterns fluctuate. This architecture will allow you to reduce costs by utilizing the firewall capacities intelligently and efficiently based on user-defined metrics. By scaling the security separately from the application workloads, this solution allows each firewall to be identically configured and managed centrally, resulting in lower administrative costs.

    Join us for an educational webinar to learn how you can scale next-generation security using AWS Auto Scaling and ELB. Using native AWS Services and VM-Series automation features, you can now dynamically, yet independently scale the VM-Series next-generation firewalls on AWS.

    This webinar will cover
    • Auto Scaling the VM-Series architecture
    • Auto Scaling and ELB integration details
    • Alternative architectures for protecting many VPCs
  • Rethink Security for SaaS: Power of the Platform Rethink Security for SaaS: Power of the Platform Anuj Sawani, Product Marketing Manager, Navneet Singh, Product Marketing Director Recorded: Oct 25 2016 60 mins
    The challenges of SaaS applications such as Office 365 or Box are already here whether they are enabled by IT or end users themselves. With the adoption of SaaS, your data is now outside your traditional network perimeter and any changes to how the data is shared, who it is shared with and if it is free of malware is no longer known by your organization. History has shown that when a significant risk arises, a point solution is applied to address it. Defenses made up of multiple point products that do not integrate leave gaps that may expose your organization to attack.

    Join us for this live webinar where we will examine the various stages of a real-world attack targeting your SaaS applications. You will learn how to prevent these attacks at every single point in the security kill chain with a natively integrated Next Generation Security Platform and learn how to:

    * Gain visibility and granular, context-based control of SaaS applications

    * Protect corporate data from malicious and inadvertent exposure after it has left the traditional corporate perimeter.

    *Satisfy compliance requirements while still maintaining the benefits of SaaS based application services
  • Attain PCI Compliance without AV Attain PCI Compliance without AV Michael Moshiri Director, Advanced Endpoint Protection Recorded: Oct 25 2016 51 mins
    Many PCI-compliant organizations continue to deploy traditional AV -- not because of its superior security capabilities, but because they wrongly assume it’s required to remain PCI compliant. Join us for this webinar to learn how to achieve and maintain PCI compliance while replacing traditional AV with superior security capabilities, specifically:

    •Which PCI requirements prescribe the use of traditional AV
    •How auditors and Qualified Security Assessors (QSA) interpret those requirements today
    •How Palo Alto Networks customers replace traditional AV with real prevention -- while maintaining PCI compliance

    Read CoalFire PCI DSS Validation of Traps

    Learn More About Traps
  • Ransomware in Healthcare Ransomware in Healthcare Matt Mellen - Security Architect & Healthcare Solution Lead - Palo Alto Networks Recorded: Oct 20 2016 46 mins
    The business model behind crimeware has changed. As the price of stolen records has plummeted, many attackers looking for new sources of income. Many attackers have turned to ransomware due to recent advances in attack distribution, anonymous payments, and the ability to reliably encrypt and decrypt data.

    Join this informative webinar where a former Information Security Lead at a hospital, will discuss practical steps healthcare organizations can take to stop ransomware. Drawing from his first-hand experience responding to ransomware, combined with recommendations from the FBI, Matt will cover practical steps healthcare organizations can take on systems and network devices to prevent exposure to this rampant attack.

    Register today to learn more about:

    • How the most current variants of ransomware work
    • How to prevent successful ransomware attacks in Healthcare

  • Protecting the ICS through Segmentation Protecting the ICS through Segmentation Lionel Jacobs - Sr. Architect, Industrial Controls Systems - Palo Alto Networks Recorded: Oct 19 2016 50 mins
    Segmentation is a crucial element to modern network design and accepted widely as a recommended best practice. It is believed that many of the current successful cyber-attacks against ICS/SCADA infrastructures could have been prevented or contained if proper segmentation had been in place.

    Unfortunately, many existing ICS/SCADA systems predate modern best practices. Owner-operators are challenged to face cybersecurity risks with outdated defense mechanisms. Implemented during an era where air gaps existed, the use of commercially available off-the-shelf products (COTS) have connected the serial based on brownfield systems into the industrial Internet of things (IIoT). In doing so exposing the ICS/SCADA to the same threats and perils as its enterprise counterpart. Come join us as we discuss ways and techniques that Palo Alto Networks NGFW can be used to achieve ideal network segmentation.
  • The Data Breach War: How banks can step up their line of defence The Data Breach War: How banks can step up their line of defence JP Vergne (Scotiabank Lab, Ivey B-School), Nik Walser (EY), Mario Maawad (CaixaBank), Lawrence Chin (Palo Alto Networks) Recorded: Oct 19 2016 62 mins
    As holders of valuable client and financial data, banks have been prime targets for hackers and thieves. Entire payment systems can be compromised in the blink of an eye and clients also risk having their identities stolen.

    Join this panel session where our experts will discuss:

    -Best practices for preventing cyberattacks at every stage
    -Top mistakes banks and financial institutions make when dealing with valuable data
    -What makes you a target?
    -Using real-time analytics to identify anomalies and act on them immediately
    -Malware, threat prevention, next-generation security — what are they, what do you need to know?
  • Lessons Learned from Recent Data Breaches in the Banking Industry Lessons Learned from Recent Data Breaches in the Banking Industry Lawrence Chin - Financial Services Security Market Architect - Palo Alto Networks Recorded: Oct 18 2016 49 mins
    They say that hindsight is 20/20 and in recent months, news of data breaches at several SWIFT (Society for Worldwide Interbank Financial Telecommunications) members has seen many reassessing their cybersecurity strategies.

    Palo Alto Networks invites you to join a webinar where Lawrence Chin, Security Market Architect, will discuss:

    ● A review of these attacks and some of the commonalities
    ● The role of cyber security hygiene, and subsequent recommendations from SWIFT, FS-ISAC (Financial Services Information Sharing and Analysis Center), and US FFIEC (Federal Financial Institutions Examination Council).
    ● Best practices that may prevent similar cyberattacks on financial institutions from succeeding in the future.

    Register today and learn how the confidence and trust can be protected in the increasingly complex digital world in which we live.
  • The Advantages of User ID/Awareness in Public Sector Network Security The Advantages of User ID/Awareness in Public Sector Network Security Neil Mantle - Systems Engineer - Palo Alto Networks Recorded: Oct 17 2016 32 mins
    To serve their citizens, federal/national, state and local governments must gather, create, or process sensitive information. As various high-profile breaches have demonstrated, this data is not sufficiently protected, particularly from the insiders whose actions are responsible for the majority of public sector security incidents. Traditional network security focuses on detecting outsiders attempting to steal data or disrupt network operations, but does little to monitor or limit the actions of legitimate users that make mistakes or deliberately misuse data. User and directory controls verify legitimate users, but they won't prevent accidental disclosure of sensitive data, exfiltration of sensitive data by legitimate users, or insiders with stolen credentials from accessing data. Preventing security incidents and protecting government information requires a comprehensive, organization-wide access approach that can accommodate the context of individual users, the data they need access to, and the limits on what they can do with that data.

    The Palo Alto Networks Next-Generation Security Platform prevents security incidents while fully enabling user productivity by granting access contextually to those who need it, and denying it to all others. This, coupled with denying all applications that are not needed by the organization, immediately reduces a government organization’s threat posture. Join us to learn more.
  • Defeating Advanced Threats Across Your Network and Applications with Splunk Defeating Advanced Threats Across Your Network and Applications with Splunk Jennifer Zientek, Federal Systems Engineer, Palo Alto Networks & David Page, Sr. Sales Engineer, Splunk Recorded: Oct 11 2016 45 mins
    Palo Alto Networks + Splunk - Defeat Advanced Threats While Maximizing Visibility, Control and Security of the Network and Applications in the Public Sector.

    As cyber attacks become more sophisticated, it becomes increasingly hard for legacy systems to detect threats early enough to prevent loss or damage to sensitive data. With valuable data at risk, organizations need a security platform that correlates data and automatically implements protections. Learn how by combining next-generation solutions, Palo Alto Networks and Splunk can provide the visibility and insight necessary to prevent attacks and keep your organization from becoming the next victim.

Embed in website or blog