Hi [[ session.user.profile.firstName ]]

Turn the Tables on Adversaries with Proactive Defense

As security professionals, defending our organizations can often times seem like a monumental, almost impossible task. Yet, there has never been as much focus, data, or development available to the security industry as there is today. The sharing of tactics, techniques, and procedures, as well as threat intelligence in an open and free manner throughout the security community is becoming standard practice, and is key to building a proactive defense posture against today’s adversaries.

Join us for a live webinar, where the Palo Alto Networks threat intelligence team will examine the latest security trends, including:

- Trends across application usage and the threat landscape, including regional and industry-specific variances
- Ways to reduce the attack surface available to an adversary
- Potential effects of non-standard network activity
- Reuse of legacy attack tactics
- Benefits of open threat intelligence sharing
Recorded Oct 29 2015 36 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Scott Simkin, Cybersecurity Team & Bryan Lee, Unit 42 Threat Intelligence
Presentation preview: Turn the Tables on Adversaries with Proactive Defense

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Biggest Problem in Healthcare IT: Ransomware and Endpoint Protection Nov 15 2017 6:00 pm UTC 60 mins
    Dal Gemmell, Head of Traps Marketing and Matt Mellen Healthcare Security Architect, Palo Alto Networks
    It turns out ransomware and endpoint attacks are NOT going away any time soon …

    According to the 2017 HIMSS Healthcare IT Cybersecurity Study, nearly 90 percent of all U.S. respondents were targeted with a ransomware attack in the past year.

    Our experts will help you get ahead of ransomware and endpoint attacks. Register for the webinar and learn:
    •The current – and future – state of healthcare security.
    •What your healthcare security executives and IT peers are doing to lower risks.
    •How we can help improve your 2018 healthcare security strategy.
  • Identify and Respond to Security Threats with Palo Alto Networks and ServiceNow Nov 8 2017 6:00 pm UTC 60 mins
    Tim Riley, Business Dev., Francesco Vigo, Partner Architect, Palo Alto Networks & John Ferguson, Product Manager, ServiceNow
    Security teams today commonly use a combination of email, spreadsheets, and phone calls to manage their incident response processes. This leads to average detection and containment times that are measured in days and weeks and can result in costly breaches.

    The key to reducing detection and response times lies in automating basic tasks, identifying when threats target the assets that are most critical to the business, and allowing actions to be initiated from a single platform instead of dealing with multiple consoles or teams.

    Join NAME from Palo Alto Networks and NAME from ServiceNow to learn how to:

    •Accelerate threat identification by combining ServiceNow® Security Operations with automated enrichment from Palo Alto Networks WildFire and AutoFocus
    • Speed up decision-making with business context for security incidents
    • Reduce time to eradicate by initiating Palo Alto Networks Next-Generation Firewall changes from within ServiceNow
  • Build Secure Networks in Microsoft Azure with Palo Alto Networks Oct 25 2017 8:30 pm UTC 60 mins
    Tal Zehavi, Palo Alto Networks Cloud Specialist, Eric DeBord, Azure Specialist, Microsoft
    As organizations look to offload more and more applications to the public cloud, security posture needs to remain a chief concern for the IT teams protecting these workloads. The “Shared Responsibility Model” employed by Azure® dictates that while the host is responsible for the security OF the cloud, customers are responsible for the security of their data IN the cloud.

    Palo Alto Networks® helps customers achieve this security through a platform designed to safely enable widely distributed enterprise workloads.

    In this webinar, we will discuss:
    - The security issues to consider when developing a cloud strategy
    - How to use the Palo Alto Networks platform to achieve security policy parity across your on-premise, private and public cloud environments
    - Azure network security best practices and architecture diagrams
    - Steps on how to configure and manage Palo Alto in the cloud
  • Top 10 Public Cloud Security Recommendations Oct 25 2017 2:00 pm UTC 45 mins
    Matt Keil, Director of Product Marketing, Public Cloud
    Offering organizations of all sizes the benefits of agility and scalability, the adoption of public cloud continues at a pace rivalled only by that of the early days of the Internet era. As was the case then, the speed of adoption often means that “good enough” security is viewed as acceptable.

    With the underlying premise that the public cloud is someone else’s computer, and an extension of your network this session will cover public cloud security concerns, what the shared security responsibility model really means and recommendations for protecting your public cloud workloads and data.
  • Advance Your Career in Cybersecurity Oct 20 2017 5:00 pm UTC 60 mins
    Paula Judge, Sr. Director of Talent Acquisition at Palo Alto Networks and Adam Mansour, CTO at IntelliGO
    Join Palo Alto Networks to learn our best tips on how to advance your career in cybersecurity.
  • Cybersecurity in the Workplace is Everyone’s Business Oct 19 2017 5:00 pm UTC 60 mins
    Rinki Sethi, Senior Director, Information Security and Brian Tokuyoshi, Sr. Product Marketing Manager
    Creating a culture of cybersecurity is critical for all organizations. Join the conversation with our own security pros to learn how they keep employees ahead of phishing attacks, share best practices for phishing education and explain how to use innovative technologies to strengthen cyber resilience.
  • Essential Reading for the Security Professional Oct 18 2017 5:00 pm UTC 30 mins
    Rick Howard, chief security officer at Palo Alto Networks
    Join Rick Howard, CSO at Palo Alto Networks to learn about must-read books for all cybersecurity practitioners – be they from industry, government or academia — where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional’s education that will make the practitioner incomplete.
  • Win the Cyberwar with Zero Trust Oct 17 2017 5:00 pm UTC 60 mins
    John Kindervag, Field Chief Technology Officer at Palo Alto Networks
    Zero Trust is revolutionizing network security architecture: it is data-centric and designed to stop data breaches. Zero Trust also adds a layer of agility to modern networks that is impossible to do in traditional network designs. These 21st century networks have been adopted by government entities and large enterprises around the world.

    In this session, John will discuss the concept of Zero Trust and explain why Zero Trust is the world's only true cybersecurity strategy. He will show a Zero Trust Strategy will achieve tactical and operational goals. This session will demonstrate how Zero Trust will not only transform network security but function as a business enabler, by focusing on the businesses grand strategic objectives.
  • Start Benefiting from PAN-OS 8.0 with User-ID and Global Protect Oct 17 2017 4:00 pm UTC 45 mins
    Wiley Richardson, Security Engineer, Trainer and Cloud Architect at Cloud Harmonics
    Join us for our follow-up webcast with a focus on Authentication, Global Protect, and User ID enhancements to get a quick overview of SAML Authentication, Global Protect Clientless VPN and other selected new features and enhancements that PAN-OS 8.0 adds to your Palo Alto Networks Security Platform. Attendees will:

    •Learn about the key capabilities introduced by 8.0
    •See the value of the update to security deployments
    •Receive a voucher for 8.0 training course - $500 value
  • Disrupting the Cybersecurity Status Quo Recorded: Oct 16 2017 59 mins
    Nir Zuk, Palo Alto Networks co-founder and CTO
    The signs that the security market is ready for disruption are here. Join in discussion with Nir Zuk, Palo Alto Networks co-founder and CTO, on how the security market is evolving and maturing and ultimately, ready for disruption.
  • The end of the world as we know it? How to tackle security risks in IoT Recorded: Oct 6 2017 41 mins
    Stefaan Hinderyckx, Director Europe - Security at Dimension Data
    The Internet of Things or IoT has been widely publicised by the media over recent years. The integration of IT, OT and IoT poses unique challenges to security leaders. Ranging from email spamming fridges to the end of the world as we know it. The reality is, we face a situation where some devices are becoming internet enabled just because they can. At the same time, we adopt internet devices with little thought of our data, because they offer accessing something in a way that makes it easier for us. So how will Dimension Data and Palo Alto networks deal with the "Internet of Threats"?
  • Teaming Together to Prevent Attacks and Protect Your Data Recorded: Oct 5 2017 32 mins
    Wissam Ali-Ahmad Lead Solutions Architect, Technical Services for Global Strategic Alliances at Splunk
    Targeted attacks — including advanced persistent threats (APTs) — and today’s sophisticated malware threats are one of the biggest challenges facing customer’s as the threats multiply and create unique compromises within their networks. This creates challenges for traditional security technologies to reliably identify these new class of threats. Even when a threat is detected, there is still the issue of slow response times and extended periods of exposure, as administrators typically need to manually coordinate and configure the necessary changes to their security infrastructure.

    Please join Palo Alto Networks and Splunk as we work together to deliver an advanced visibility, reporting and monitoring solution for intelligent security analysis that addresses this challenge and delivers new tools to quickly identify and analyze this new class of threats. We will show you how this integration insures better threat response time, and how to automate the steps needed to block malicious sources and quarantine compromised devices you through how Palo Alto Networks and Splunk.

    Key Benefits:
    - Advanced security and visibility in the cloud, on premise, or hybrid model
    - Accelerated threat response and enhanced threat detection
    - Security visualization, monitoring and analysis
    - Demo to show you how to identify ransomware and correlate IOC data through the app and use adaptive response to take actions
  • A Maturity Model for Healthcare Cybersecurity Recorded: Oct 4 2017 60 mins
    Matt Mellen, Healthcare Security Architect, Palo Alto Networks
    Palo Alto Networks security platform provides hundreds of capabilities for reducing the attack surface of healthcare organizations - But which ones should you focus on implementing first? Join us for this webinar presenting the Healthcare Maturity Model, by Matt Mellen, a former security operations lead at a hospital in California. The maturity model outlines critical security capabilities that every healthcare organization should have deployed. A variety of security capabilities will be discussed in the context of healthcare environments, like SSL-decryption, geo-based blocking, DNS sinkholing and many more.

    The security capabilities will be split into 4 levels of increasing ‘maturity’ in order to help healthcare orgs prioritize which should be implemented first (levels 1 and 2), and which are more appropriate in more mature security architectures (levels 3 and 4). In addition to helping you prioritize the security capabilities that should be enabled in your organization, you’ll get a better idea of the breadth of security functions that the security platform provides in a healthcare environment.

    Learning Objectives:
    •Understand the overview of the security capabilities the security platform provides
    •Prioritize enablement of security capabilities within your organization
  • Combining threat intelligence and detection to prevent email based attacks Recorded: Oct 4 2017 37 mins
    Christopher Montgomery – Principal Systems Engineer at Proofpoint
    Palo Alto Networks and Proofpoint: Combining threat intelligence and detection to prevent email based attacks and increase insight into user behaviour

    Securing sensitive data has never been more challenging. Email remains the leading attack vector due to evolving techniques combined with sophisticated social engineering tricks. Security teams struggle to prevent attackers from breaching their companies; once the bad guys are through, they move across the network with stealth and impunity.

    The API integration of Palo Alto Networks WildFire and Proofpoint TAP (Targeted Attack Protection) delivers a perfect balance of protection from attackers and malware entering the perimeter and how it travels across the network. A key aspect of the strategic partnership is how simple it is for a customer to enable the dual layers of protection. Join us for a discussion on how two best-of-breed security technologies have been united, resulting in comprehensive protection without the usual complexity.
  • Cybersecurity in the Digital, Mobile & Cloud Era Recorded: Oct 3 2017 32 mins
    Ghaleb Zekri, Security Architect at VMware
    A Comprehensive Enterprise Security Strategy and Approach are needed in the digital, mobile and cloud era. This Strategy and Approach nowadays needs to face the following challenges:

    -EMBRACE HETEROGENEITY: Identity that transcends every application access across multiple devices.
    -TRUST & ASSURANCE: Establish a new, rock solid security model from the data center to the device.
    -CONSUMER-GRADE EXPERIENCE: Ensure ANY app can reach ANY device to best empower employees – beyond basic, individual productivity apps.

    During this session we will be covering how VMware can help in this IT transition providing an End to End Intrinsic Security Solution to minimize risk while also reducing the potential impact in case of suffering an inffection and helping to provide a much quicker response.

    Don´t try to secure virtualization, it is really more about using virtualization to secure!
  • Securing your digital transformation Recorded: Oct 2 2017 28 mins
    Chandu Cheeti, Microsoft Cloud Strategy for SAP on Azure & Key Partnerships - EMEA
    The journey to the Cloud is gaining momentum with businesses embracing digital transformation. A large part of making this a success relies on providing the best security available to businesses that are looking to transform. Learn how Microsoft is helping businesses adopt the benefits of the cloud and is working hand in glove with its key security partner Palo Alto Networks to provide the most comprehensive security solution available globally.
  • Securing Your Global Workforce With GlobalProtect Cloud Service Recorded: Sep 27 2017 41 mins
    Brian Tokuyoshi, Product Marketing Manager
    Global expansion, mobile workforces, and cloud computing are shifting the location of your users, applications and data. As these changes ripple through your organization, two questions arise:

    1.Can you secure your remote offices and mobile workforce with the same security you use to protect your corporate location?
    2.Can you do so in an more operationally efficient manner than the traditional device per location methodology?

    GlobalProtect Cloud Service allows you to answer yes to both questions. GlobalProtect Cloud Service operationalizes the delivery of next-generation security across widely distributed organizations through a cloud-based security infrastructure that is based on our market leading next-generation firewall.

    Join us for a heart pound, chest thumping, head spinning webinar on our wickedly cool cloud service.
  • Next-Generation (SOC) Security Operation Center Recorded: Sep 26 2017 41 mins
    Rinki Sethi, Sr. Director, Information Security and Matt Mellen, Security Architect, Palo Alto Networks
    Security Operations Centers, or SOCs, were invented to enable ease of collaboration among security personnel across different technologies and location, providing a full view of an attack. Most traditional SOC practices and tools, where established in a time when cyberattacks were primarily manual in nature. Nowadays, machine-based automated cyberattacks, with multi-steps approach leveraging variety of entry points are the norm and are challenging enterprises to ‘re-think’ their SOC and InfoSec team’s strategy.

    Join Matt Mellen from our PMM team, and Rinki Sethi, who leads our InfoSec team, for an educational webinar on defining and building your Next-Generation SOC, sharing insights and providing best practice from our own experiences.

    Join this information session to understand:

    •Why traditional SOCs fail.
    •What defines a Next-Gen SOC.
    •How to shift in focus from detection to prevention
    •The business value of building a Next-Gen SOC in your organization.
  • Start Benefiting from PAN-OS 8.0 with Panorama and Networking Enhancements Recorded: Sep 19 2017 40 mins
    Wiley Richardson, Security Engineer, Trainer and Cloud Architect at Cloud Harmonics
    Join us for our follow-up webcast with a focus on Panorama and Networking enhancements to get a quick overview of software deployment, integration architecture and other selected new features and enhancements that PAN-OS 8.0 adds to your Palo Alto Networks Security Platform. Registrants will:

    •Learn about the key capabilities introduced by 8.0
    •See the value of the update to security deployments
    •Receive a voucher for 8.0 training course - $500 value.
  • How Securing SaaS Applications Contributes to GDPR Compliance Recorded: Sep 11 2017 42 mins
    Danielle Kriz and Anuj Sawani from Palo Alto Networks
    In less than a year (May 28, 2018) the General Data Protection Regulation (GDPR) becomes law in Europe. With the exponential rise in the use of SaaS applications, organizations that process the personal data of EU residents need to be able to maintain compliance with the GDPR while keeping data secure in the cloud.

    We invite you to join us for a live webinar on Monday, September 11 in which we zoom in on how our platform, with its SaaS Security service, Aperture, can help your organization meet the upcoming requirements.

    Our policy team expert, Danielle Kriz, and our product team expert, Anuj Sawani, team up to provide an overview of the GDPR—in particular its provisions related to securing personal data- and how Aperture can be used to address potential compliance issues. We will also provide a quick overview of how Aperture fits with EU compliance requirements when processing personal data. .

    After the presentation, we will have some time for questions and answers with our experts.
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Turn the Tables on Adversaries with Proactive Defense
  • Live at: Oct 29 2015 6:00 pm
  • Presented by: Scott Simkin, Cybersecurity Team & Bryan Lee, Unit 42 Threat Intelligence
  • From:
Your email has been sent.
or close