Hi [[ session.user.profile.firstName ]]
Sort by:
    • Fast-Track Your Cybersecurity Career in 2014! Fast-Track Your Cybersecurity Career in 2014! ITPG and Mission Critical Institute Recorded: Sep 16 2014 4:00 pm UTC 42 mins
    • What do you need to fast-track your cybersecurity career in 2014-2015? Perhaps you want to acquire more cybersecurity project experience? Earn one or more 8570 certification(s)? Attain a cybersecurity graduate certificate and/or degree? Hold a security clearance? Attend this webinar and learn how to gain the keys to your cybersecurity success!

      Whether you seek to enter or advance in cybersecurity, achieve leadership status, or start your own cybersecurity venture you will learn specific steps you can take to reach your goals. Special Bonus: At the webinar, you can schedule your personal complimentary Cybersecurity Career Planning Consultation by clicking on the Attachments Tab.

      Read more >
    • 10 Things Your Next Cybersecurity Solution Must Do 10 Things Your Next Cybersecurity Solution Must Do Kate Taylor, Manager, Advanced Threat Prev Recorded: Dec 29 2015 9:00 am UTC 38 mins
    • Protecting your organization from cyberthreats can be a challenging task, but choosing the right solution doesn’t have to be.

      In this live webinar, you’ll find out the 10 Things Your Next Cybersecurity Solution Must Do to block cyberattacks and protect allowed traffic from threats. Then learn how to effectively evaluate cybersecurity solutions through the Request for Proposal (RFP) process.

      Specifically, we’ll take a look at how to:

      •Overcome the gaps in visibility caused by the overwhelming volume of alerts and manual processes.
      •Efficiently correlate information to identify infected systems and weaknesses throughout the network, and then execute protections.
      •Bridge the gaps between different security products for cohesive and rapid detection, analysis, and protection.

      Read more >
    • 10 Things Your Next Cybersecurity Solution Must Do 10 Things Your Next Cybersecurity Solution Must Do Kate Taylor, Manager, Advanced Threat Prevention Recorded: Dec 29 2015 2:00 am UTC 38 mins
    • Protecting your organization from cyberthreats can be a challenging task, but choosing the right solution doesn’t have to be.

      In this live webinar, you’ll find out the 10 Things Your Next Cybersecurity Solution Must Do to block cyberattacks and protect allowed traffic from threats. Then learn how to effectively evaluate cybersecurity solutions through the Request for Proposal (RFP) process.

      Specifically, we’ll take a look at how to:

      •Overcome the gaps in visibility caused by the overwhelming volume of alerts and manual processes.
      •Efficiently correlate information to identify infected systems and weaknesses throughout the network, and then execute protections.
      •Bridge the gaps between different security products for cohesive and rapid detection, analysis, and protection.

      Read more >
    • Flipping the Economics of Cyber Attacks Flipping the Economics of Cyber Attacks Scott Simkin, Palo Alto Cybersecurity Team and Dr. Larry Ponemon, Chairman and Founder of the Ponemon Institute Recorded: Apr 19 2016 11:00 am UTC 61 mins
    • There are two ends of the spectrum of an attack: the cost of a breach to the victim, and the economic motivation of the cybercriminal. Much focus has been spent on understanding the increasing cost of breaches, and potential damages they can cause organizations. As cybercrime has increasingly become a business, we must also understand the relationship between time, cost and potential profit for an attacker. Like any business, it is a simple math problem, the benefit must outweigh the cost. Security decision makers can use this information to increase the cost of conducting successful data breaches to their organization, taking away the economic incentive, and majority of motivation for attackers.

      This session will present compelling new research, including:
      • Average time to breach an organization
      • Typical yearly earnings of a cybercriminal
      • Cost of conducing a breach for an attacker
      • Most effective methods for dissuading or preventing attacks

      Read more >
    • The Framework for Resilient Cybersecurity The Framework for Resilient Cybersecurity Michael Kaczmarek, Sr. Director of Product Management, Verisign Recorded: Apr 26 2016 2:00 pm UTC 38 mins
    • Cyberattacks are a threat to businesses worldwide, and they are getting larger and more sophisticated. The industry’s approach to protecting against these threats must change fundamentally to stay ahead of this growing threat. For too long, the problem has been tackled piecemeal, using isolated devices or services, but protecting against advanced cyberattacks requires communication and coordination among many components – from networking equipment, to specialized appliances, cloud-based services, as well as actionable threat intelligence.

      A shift in security architecture is needed, to an open platform where devices and services from different vendors can share, and act, on threat intelligence information, all in concert and in the proper context. It must be a hybrid platform; allowing on-premises security appliances to detect and mitigate attacks, locally, while automating alerts, and switchover, to cloud-based services should an attack threaten to swamp the business’ network connection.

      Join Michael Kaczmarek, Sr. Director of Product Management, and learn how to assist with designing a resilient security ecosystem by maximizing an API-centric approach. In this session, Mike will discuss how to:

      · Evaluate the Threat Landscape

      · Design for Both Security and Flexibility

      · Prepare for Incidents – Orchestrate Responses

      · Expand to a Hybrid Premise and Cloud Security Architecture

      Read more >
    • Cybersecurity and Investors Cybersecurity and Investors Jacob Olcott, Vice President, BitSight, Nell Minow Recorded: Oct 26 2015 6:00 pm UTC 49 mins
    • There’s no doubt that cyber attacks cause real financial harm to businesses. Money can be stolen, business operations disrupted. Cyber theft can provide international competitors with years worth of valuable intellectual property or trade secrets virtually overnight, jeopardizing current and future market opportunities. Cyber attacks can seriously damage an organization’s reputation with customers and result in legal liability for the company, executives, and board members.

      As companies race to protect themselves, how do investors know if the organizations they are investing in are secure?

      Join Jacob Olcott, VP at BitSight, and Nell Minow, corporate governance expert and co-founder of Institutional Shareholder Services (ISS), for a discussion of key issues, including:

      -How investors assess cybersecurity in the M&A diligence process

      -What institutional shareholders want to know about cyber risks to their investments

      -How shareholders can meaningfully engage with companies on cybersecurity

      Read more >
    • EMEA Breach Prevention Week: How will EU regulations impact cybersecurity? EMEA Breach Prevention Week: How will EU regulations impact cybersecurity? Andrew Shepherd, Greg Day, Duncan Brown & Oliver Newbury Recorded: Mar 7 2016 12:55 pm UTC 62 mins
    • Palo Alto Network’s Greg Day, VP and Chief Security Officer for EMEA, is joined by industry experts like IDC for a live panel discussion on the impact of the upcoming EU Regulations. Our panelists will address several topics including the New Data Protection Regulation Reform and how public and private organisations need to be “state of the art” in terms of technical and organizational measures to manage their risks.

      Please note that the information provided with this video panel, concerning technical legal or professional subject matters is for general awareness only and does not constitute legal or professional advice. Always consult a qualified lawyer on any specific legal problem or matter. Palo Alto Networks assumes no responsibility and disclaims all liability in respect of such information.

      Read more >
    • 10 Things Your Next Cybersecurity Solution Must Do 10 Things Your Next Cybersecurity Solution Must Do Kate Taylor, Manager, Advanced Threat Prevention Recorded: Oct 20 2015 3:00 pm UTC 38 mins
    • Protecting your organization from cyberthreats can be a challenging task, but choosing the right solution doesn’t have to be.

      In this live webinar, you’ll find out the 10 Things Your Next Cybersecurity Solution Must Do to block cyberattacks and protect allowed traffic from threats. Then learn how to effectively evaluate cybersecurity solutions through the Request for Proposal (RFP) process.

      Specifically, we’ll take a look at how to:

      •Overcome the gaps in visibility caused by the overwhelming volume of alerts and manual processes.
      •Efficiently correlate information to identify infected systems and weaknesses throughout the network, and then execute protections.
      •Bridge the gaps between different security products for cohesive and rapid detection, analysis, and protection.

      Read more >