Hi [[ session.user.profile.firstName ]]
Sort by:
    • Breaches are Coming! What To Do When They Go Beyond the Wall
      Breaches are Coming! What To Do When They Go Beyond the Wall Tony Thompson, Vice President; Rajdeep Wadhwa, Product Management Recorded: Aug 10 2016 5:00 pm UTC 39 mins
    • Cyber threats are more sophisticated than ever, slipping past perimeter defenses and hiding in the normal flow of network communications. For all you GOT fans, it’s a lot like Wildlings slipping past The Wall.

      Data breaches are going undetected for more than 200 days, and in most cases, the breached company learns about the breach from outside their organization. What’s the common denominator? The Network. Much like the North, the network remembers.

      A lack of high-definition network visibility has extended the breach detection window and prolonged data breach investigations. New methods of network visibility, learning analytics and automation are now available to accelerate and simplify the breach-hunting journey – past, present and future.

      In this webinar, we will examine:
      • Why IT and cyber security organizations today struggle with breach detection and investigations
      • Why legacy approaches to analyze network traffic (SIEM, packet recorders, network forensics) are extending and complicating cyber investigations, and
      • A new “time machine” model of network security analytics that accelerates the breach detection and incident response workflow

      This event will also look at the architectural considerations and investment required for implementing this new model of network-based breach detection, as well as examples of the types of threats that can be discovered after the threat slips past preventative security measures, such as firewalls, anti-virus and intrusion prevention.

      Read more >
    • [Video Interview] Understanding the Role of Stolen Credentials in Data Breaches
      [Video Interview] Understanding the Role of Stolen Credentials in Data Breaches Josh Downs, BrightTALK & Alexander Hinchliffe, Threat Intelligence Analyst at Unit 42, Palo Alto Networks Recorded: May 16 2017 2:00 pm UTC 21 mins
    • Protecting user identities and preventing phishing attacks are key tactical priorities for today’s security professional. The majority of breaches involve password theft at some stage of the attack. Nearly two-thirds of the breaches analyzed by Verizon in the 2016 Data Breach Incident Report (DBIR) used stolen credentials. This is because the vast majority of organizations continue to use password-based credentials as the primary means of securing user access, and it is easier for an attacker to steal passwords than it is to find and hack a vulnerable system.

      As a result, password stealing techniques are used by a broad spectrum of attackers to breach organizations, compromise their networks and steal critical data from internal data centers and the cloud. Traditional approaches to stop credential phishing rely only on classifying the phishing site before the user encounters it. If the organization’s security products miss a new phishing site, their only recourse is hoping the user doesn’t proceed and enters his credentials.

      Tune into this BrightTALK - Palo Alto Networks video interview as Alexander Hinchliffe discusses the need to protect user credentials and advises how to improve your businesses security stature.

      Read more >
    • An Analysis of Recent Data Breaches in the Banking Industry
      An Analysis of Recent Data Breaches in the Banking Industry Lawrence Chin - Financial Services Security Market Architect - Palo Alto Networks Recorded: Nov 30 2016 3:00 pm UTC 42 mins
    • They say that hindsight is 20/20 and in recent months, news of data breaches at several SWIFT (Society for Worldwide Interbank Financial Telecommunications) members has seen many reassessing their cybersecurity strategies.

      Palo Alto Networks invites you to join a webinar where Lawrence Chin, Security Market Architect, will discuss:

      ● A review of these attacks and some of the commonalities
      ● The role of cyber security hygiene, and subsequent recommendations from SWIFT, FS-ISAC (Financial Services Information Sharing and Analysis Center), and US FFIEC (Federal Financial Institutions Examination Council).
      ● Best practices that may prevent similar cyberattacks on financial institutions from succeeding in the future.

      Register today and learn how the confidence and trust can be protected in the increasingly complex digital world in which we live.

      Read more >
    • Mega Breaches of 2016 - Yahoo Next Victim
      Mega Breaches of 2016 - Yahoo Next Victim Alex Holden, Founder and CISO of Hold Security, LLC Recorded: Oct 4 2016 6:00 pm UTC 45 mins
    • Review of threat landscape of this year's major breach revelations. Why are they all out now? Who are the bad guys? What drives them? Navigating a web of lies and deception to measure current threat landscape. What do you need to know about current ramifications of Yahoo's disclosure?

      Presenter Info:
      Alex Holden is the founder and CISO of Hold Security. Holden is credited with the discovery of many high profile breaches including Adobe Systems, initial vendor breach that led to the discovery of the JPMorgan Chase breach, and the independent discovery of the Target breach. Considered one of the leading security experts, he regularly voices his professional opinion in mainstream media.

      Read more >
    • Lessons Learned from Recent Data Breaches in the Banking Industry
      Lessons Learned from Recent Data Breaches in the Banking Industry Lawrence Chin - Financial Services Security Market Architect - Palo Alto Networks Recorded: Oct 18 2016 4:00 pm UTC 49 mins
    • They say that hindsight is 20/20 and in recent months, news of data breaches at several SWIFT (Society for Worldwide Interbank Financial Telecommunications) members has seen many reassessing their cybersecurity strategies.

      Palo Alto Networks invites you to join a webinar where Lawrence Chin, Security Market Architect, will discuss:

      ● A review of these attacks and some of the commonalities
      ● The role of cyber security hygiene, and subsequent recommendations from SWIFT, FS-ISAC (Financial Services Information Sharing and Analysis Center), and US FFIEC (Federal Financial Institutions Examination Council).
      ● Best practices that may prevent similar cyberattacks on financial institutions from succeeding in the future.

      Register today and learn how the confidence and trust can be protected in the increasingly complex digital world in which we live.

      Read more >
    • Turning the Table on Hackers and Breaches
      Turning the Table on Hackers and Breaches Jason Hart, CTO of Data Protection at Gemalto Upcoming: Jun 6 2017 3:00 pm UTC 60 mins
    • Data breaches in 2016 got even more personal with big hacks of adult entertainment sites and social media databases. Hackers mined these for gold, in other words, valuable data to create social engineering attacks, ransom operations and identity theft. According to Gemalto’s Breach Level Index, the number of stolen, compromised or lost records increase by 86% in 2016, while the number of breaches decreased by 4%. Hackers are going after more data than ever before, and they are finding it in large databases that are left relatively insecure.

      Whether consciously or not, hackers have grasped the idea of situational awareness. They have figured out how to exploit these golden opportunities by keeping a pulse on what is going on. It seems too simple to be true, but it goes back to the age-old principle of information is power. Getting the information comes from being aware of one’s surroundings. To become situationally aware, companies need to change their mindset- building a walled garden isn’t an option anymore. During the webinar, we will look at the major data breach trends and findings from 2016 and discuss how this information can help develop your situational awareness. Join us as we cover topics like:

      -What we can learn from Jason Bourne about knowing one’s surroundings
      -What we can learn from hackers to better protect valuable data
      -What we as security professionals can do by going back to the basics of accountability, integrity, auditability, availability and confidentiality
      -How to change our mindset in a new era of a hacker driven gold rush

      Read more >
    • The Role of DevOps in Reducing the Likelihood of a Data Breach
      The Role of DevOps in Reducing the Likelihood of a Data Breach Amy DeMartine, Principal Analyst, Security & Risk, Forrester & Bhavna Sarathy, Principal Product Manager, Veracode Upcoming: May 30 2017 3:00 pm UTC 60 mins
    • Security breaches continue to make headlines and negatively impact the reputation and bottom line for many businesses. According to Cybersecurity Ventures, global annual cybercrime costs will double between now and 2021. More than 50% of all cyberattacks target the software application layer* and the number of these attacks grows at a rate of about 25% per year**.

      Enter DevOps- a delivery approach that focuses on continuous software delivery and gives organizations an opportunity to reduce overall security risks in applications. It offers development teams the ability to introduce security earlier in the development lifecycle so they can identify and address vulnerabilities faster.

      While traditional methodologies typically introduce security during later phases of development, DevOps enables security visibility across the lifecycle to decrease discovery and remediation time.

      In this webinar, guest speaker Amy DeMartine, Principal Analyst at Forrester Research and Bhavna Sarathy, Principal Product Manager at Veracode will provide an overview of the current state of cybersecurity and the DevOps movement, how security is changing the way that software is being built and deployed, and the technologies and best practices organizations should consider in order to reduce the likelihood of a data breach. Specific topics addressing the threat of data breaches to be discussed include:

      • The organizational gaps that both security and development teams are currently tackling with regards to data breach prevention

      • Practical steps both teams can take to transition to a secure DevOps environment

      • Leveraging technologies such as Web Application Scanning which enable teams to discover and address vulnerabilities during the production and pre-production phases of the software development lifecycle

      Read more >
    • Preventing a “Data Breach Unicorn” in the Financial Space
      Preventing a “Data Breach Unicorn” in the Financial Space Dr. Christopher Pierson, EVP, Chief Security Officer & General Counsel, Viewpost Recorded: May 16 2017 3:00 pm UTC 56 mins
    • 2016 saw the first Data Breach Unicorn with the loss of over 1 Billion records from Yahoo. How do we move forward in 2017 when the risks continue to increase, cybersecurity controls continue to under-perform, and cybersecurity professionals continue to be thrust into purely defensive positions in most financial organizations? This keynote we will explore the new normal for cybersecurity at financial institutions and FinTech companies, the latest attacks and trends & controls, and how to enable business through cybersecurity.

      About the Presenter:
      Dr. Chris Pierson is the EVP, Chief Security Officer & General Counsel for Viewpost - a Fintech payments company. He is a globally recognized cybersecurity expert and entrepreneur who holds several cybersecurity and technology patents. Dr. Pierson serves on the Department of Homeland Security’s Data Privacy and Integrity Advisory Committee and Cybersecurity Subcommittee and is a Distinguished Fellow of the Ponemon Institute. Previously, Chris was the first Chief Privacy Officer, SVP for the Royal Bank of Scotland’s U.S. banking operations leading its privacy and data protection program. Chris was also a corporate attorney for Lewis and Roca where he established its Cybersecurity Practice representing companies on security and data breach matters.

      Read more >
    • Protecting Against a Panama Papers Breach
      Protecting Against a Panama Papers Breach Mark Diamond, Contoural CEO Recorded: May 2 2017 9:00 pm UTC 57 mins
    • A Panama law firm suffered a massive data leak exposing offshore holdings of government officials across the world and companies should take notice. While the media has focused on the politicians involved, this breach also points to a more insidious trend: A new normal has come into place whereby it’s seemingly OK to breach information and the media’s “right to know” appears to trump companies and law firms’ rights to keep their confidential, sensitive and even privileged documents and data private. Traditional privacy and cybersecurity efforts are often ineffective against these types of attacks, and new, smarter approaches are needed.
      In this webinar we will discuss:
       How the “Panama Papers” and other similar attacks represent a new type of risk
       Where traditional information security approaches often fall short
       Key steps companies can take to protect themselves

      Read more >
    • Breach Prevention Week
      Breach Prevention Week Palo Alto Networks Recorded: Aug 31 2016 6:00 pm UTC 1 min
    • As cyber threats increasingly impact society and economies, government regulation is evolving to reflect this risk and drive confidence in digital space.

      Join Palo Alto Networks for Breach Prevention Week kicking off on September 19. During this week we have a number of sessions lined up for you where you’ll learn what preventive steps you need to take to effectively implement the state-of-the-art cybersecurity necessary to protect your business.

      View the full week's schedule and register on: http://p.brighttalk.com/paloaltonetworks/prevention-week/

      Read more >