Hi [[ session.user.profile.firstName ]]

10 Things Your Next Cybersecurity Solution Must Do

Protecting your organization from cyberthreats can be a challenging task, but choosing the right solution doesn’t have to be.

In this live webinar, you’ll find out the 10 Things Your Next Cybersecurity Solution Must Do to block cyberattacks and protect allowed traffic from threats. Then learn how to effectively evaluate cybersecurity solutions through the Request for Proposal (RFP) process.

Specifically, we’ll take a look at how to:

•Overcome the gaps in visibility caused by the overwhelming volume of alerts and manual processes.
•Efficiently correlate information to identify infected systems and weaknesses throughout the network, and then execute protections.
•Bridge the gaps between different security products for cohesive and rapid detection, analysis, and protection.
Recorded Dec 29 2015 38 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Kate Taylor, Manager, Advanced Threat Prev
Presentation preview: 10 Things Your Next Cybersecurity Solution Must Do

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Outcome-Driven Threat Intelligence with AutoFocus Dec 16 2016 6:00 pm UTC 60 mins
    Palo Alto Networks: Ryan Olson, Intelligence Director of Unit 42 & Scott Simkin, Sr. Group Manager, Threat Intelligence Cloud
    More data doesn’t always equal better prevention. It often feels like there is an arms race underway, with security operations and response professionals in the sights of an escalating amount of alerts and threat data, which can sometimes do more harm than good. You need a new outcome-driven approach to threat intelligence, with a focus on prevention and operationalizing action, versus simply adding more data.

    Unit 42, the Palo Alto Networks® threat research team, is putting this new mindset into practice, discovering new malware families, campaigns and adversaries with the AutoFocus threat intelligence service. Join Ryan Olson, Intelligence Director for Unit 42, to see how his team uses AutoFocus to help automate research, hunting and security operations workflows. You will see real applications of threat intelligence, by one of the best teams in the industry, including:

    --- How AutoFocus can help you scale detection and prevention efforts without additional, specialized security staff.
    --- How to automate security analysis and response workflows with AutoFocus.
    --- Real world use-cases from Unit 42’s research efforts.
  • Cómo protegerse cuando el AV sigue fallando Dec 16 2016 9:00 am UTC 60 mins
    Xavier Homs, Palo Alto Networks
    Cómo protegerse cuando el AV sigue fallando
  • Silver Terrier: That Nigerian Prince has evolved his game Dec 15 2016 1:00 pm UTC 60 mins
    Alexander Hinchliffe, Threat Intelligence Analyst, Unit 42, EMEA
    Correctly assess and protect yourself against modern Nigerian threat actors.

    Join threat intelligence analysts Peter Renals and Simon Conant from Unit 42 for a discussion about malware attacks from Nigerian threat actors, dubbed “SilverTerrier.” This group has grown significantly since 2014, from fewer than 100 attacks to a current rate of 5,000–8,000 per month. These attacks are largely victim-agnostic, spanning all major industry verticals and focusing more on businesses than individuals.

    You’ll learn about:

    - How Nigerian threat actors have successfully employed commodity malware tools with precision, to target many organizations at scale.
    - The financial impact of these attacks.
    - Techniques utilized to disguise commodity malware, including business email compromise and spoofing, and how to prevent them.
  • Come proteggerti quando l’antivirus continua a fallire Dec 15 2016 10:00 am UTC 60 mins
    Domenico Stranieri, System Engineer di Palo Alto Networks
    Come proteggerti quando l’antivirus continua a fallire
  • SilverTerrier: That Nigerian Prince Has Evolved His Game Dec 15 2016 9:00 am UTC 45 mins
    Peter Renals, Unit 42
    Correctly assess and protect yourself against modern Nigerian threat actors.

    Join threat intelligence analysts Peter Renals and Simon Conant from Unit 42 for a discussion about malware attacks from Nigerian threat actors, dubbed “SilverTerrier.” This group has grown significantly since 2014, from fewer than 100 attacks to a current rate of 5,000–8,000 per month. These attacks are largely victim-agnostic, spanning all major industry verticals and focusing more on businesses than individuals.

    You’ll learn about:

    - How Nigerian threat actors have successfully employed commodity malware tools with precision, to target many organizations at scale.
    - The financial impact of these attacks.
    - Techniques utilized to disguise commodity malware, including business email compromise and spoofing, and how to prevent them.
  • SilverTerrier: That Nigerian Prince Has Evolved His Game Dec 15 2016 2:00 am UTC 45 mins
    Peter Renals, Unit 42
    Correctly assess and protect yourself against modern Nigerian threat actors.

    Join threat intelligence analysts Peter Renals and Simon Conant from Unit 42 for a discussion about malware attacks from Nigerian threat actors, dubbed “SilverTerrier.” This group has grown significantly since 2014, from fewer than 100 attacks to a current rate of 5,000–8,000 per month. These attacks are largely victim-agnostic, spanning all major industry verticals and focusing more on businesses than individuals.

    You’ll learn about:

    - How Nigerian threat actors have successfully employed commodity malware tools with precision, to target many organizations at scale.
    - The financial impact of these attacks.
    - Techniques utilized to disguise commodity malware, including business email compromise and spoofing, and how to prevent them.
  • Teaming Together to Prevent Attacks and Protect Your Data Dec 14 2016 6:00 pm UTC 60 mins
    Brian Torres-Gil, Solutions Architect, Palo Alto Networks
    Targeted attacks — including advanced persistent threats (APTs) — and today’s sophisticated malware threats are one of the biggest challenges facing customer’s as the threats multiply and create unique compromises within their networks. This creates challenges for traditional security technologies to reliably identify these new class of threats. Even when a threat is detected, there is still the issue of slow response times and extended periods of exposure, as administrators typically need to manually coordinate and configure the necessary changes to their security infrastructure.

    Please join us as we work together to deliver an advanced visibility, reporting and monitoring solution for intelligent security analysis that addresses this challenge and delivers new tools to quickly identify and analyze this new class of threats. We will show you how this integration insures better threat response time, and how to automate the steps needed to block malicious sources and quarantine compromised devicesyou through how Palo Alto Networks and Splunk.

    Key Benefits:
    - Advanced security and visibility in the cloud, on premise, or hybrid model
    - Accelerated threat response and enhanced threat detection
    - Security visualization, monitoring and analysis
    - Demo to show you how to identify ransomware and correlate IOC data through the app and use adaptive response to take actions
  • Que faire lorsque votre Antivirus ne cesse de vous faire faux bond Dec 14 2016 2:00 pm UTC 60 mins
    Thomas Benoit, Ingénieur Systèmes chez Palo Alto Networks France
    Que faire lorsque votre Antivirus ne cesse de vous faire faux bond
  • Design considerations for implementing Zero Trust Data Center Architectures Dec 13 2016 6:00 pm UTC 60 mins
    John Kindervag, Vice President and Principal Analyst at Forrester
    The rising tide of successful cyberattacks against organizations has made it clear that traditional approaches for defining trust levels, stopping lateral movement and enforcing advanced security controls within a data center are no longer effective. The Zero Trust approach advocated by Forrester provides guiding principles for achieving a robust and secure data center security architectures. However, choice of the security platform, design considerations and effective use of advanced security capabilities play a crucial role in implementing a successful Zero Trust enabled data center.

    In this webinar, guest speaker John Kindervag, Vice President and Principal Analyst at Forrester will talk about the steps to achieving a Zero Trust data center.

    Topics covered in this webinar will include:

    - 5 Steps to achieving Zero Trust enabled data centers.
    - Extending Zero Trust design principles across hybrid cloud deployments
    - Security policy considerations and guidelines for implementing Zero Trust enabled data centers.
  • Exploit kits: getting in by any means necessary Dec 9 2016 9:00 am UTC 60 mins
    Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity (hint: it’s a big business!)
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits
  • Exploit kits: getting in by any means necessary Dec 9 2016 2:00 am UTC 60 mins
    Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity (hint: it’s a big business!)
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits
  • Exploit kits: getting in by any means necessary Dec 7 2016 6:00 pm UTC 60 mins
    Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity (hint: it’s a big business!)
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits
  • Live Demo: Advanced Endpoint Protection Recorded: Dec 2 2016 53 mins
    Christiaan Groenhof, Inside Systems Engineer at Palo Alto Networks
    Attackers are getting more targeted and advanced, deploying unknown exploits and unique malware that current day endpoint security is not equipped to prevent or even detect. Existing approaches simply can’t protect against these attacks because they don’t have known signatures, known strings –and in many cases, no previously known behavior-so they go straight through, resulting in compromised endpoints waiting for detection and remediation to step in, which is too little too late.

    Palo Alto Networks Advanced Endpoint Protection is a complete paradigm shift from detection remediation to pure prevention, designed to close the door on these threats, which manage to evade detection by network-based security or take advantage of blind spots, well before any damage can be done.

    Join Palo Alto Networks® for a Live Webinar to learn about the breakthrough advanced endpoint technology that redefines endpoint security as we know it
  • Live Demo: AutoFocus Recorded: Dec 2 2016 45 mins
    Ronald den Braven, Consulting Engineer at Palo Alto Networks
    Join us for a live demo and learn how AutoFocus threat intelligence service helps security teams identify and prevent targeted attacks. We will explain the key concepts of AutoFocus and benefits the service provides.
  • Live Demo: VM-Series for AWS Recorded: Dec 2 2016 37 mins
    Tom Welling, Systems Engineer at Palo Alto Networks
    Securing public cloud environments has never been more challenging. Cyberattacks are on the rise, targeting your business-critical data using applications commonly found on every network. Compounding your data security challenge is the lack of application visibility and control features available in existing cloud security offerings.

    The VM-Series for AWS addresses these challenges with a complete set of next-generation firewall and advanced threat prevention features that allow you to identify and control your AWS-based applications and protect your data from known and unknown threats.
  • Live Demo: Safely Enable SaaS Applications with Aperture Recorded: Dec 2 2016 45 mins
    Omar Amarin, Inside Sales Engineer at Palo Alto Networks
    The adoption of SaaS applications continues to grow at an exponential pace. You do not want to clamp down on these applications because they are valuable tools for many of your employees. However, because the data and usage of these SaaS applications is invisible to IT administrators, they do expose your organization to potentially disastrous security and data theft risks.

    Join us for a live webinar where you will learn how your organization can enable safe usage of SaaS applications and:

    •Gain visibility and granular, context-based control of SaaS applications.
    •Protect corporate data from malicious and inadvertent exposure after it has left the traditional corporate perimeter.
    •Protect against new insertion and distribution points for malware.
    •Satisfy compliance requirements while still maintaining the benefits of SaaS based application services.

    The challenges of SaaS applications are already here whether they are enabled by IT or end users themselves. Find out how to take back control and safely enable their use.
  • SilverTerrier: That Nigerian Prince Has Evolved His Game Recorded: Nov 30 2016 45 mins
    Peter Renals, Unit 42
    Correctly assess and protect yourself against modern Nigerian threat actors.

    Join threat intelligence analysts Peter Renals and Simon Conant from Unit 42 for a discussion about malware attacks from Nigerian threat actors, dubbed “SilverTerrier.” This group has grown significantly since 2014, from fewer than 100 attacks to a current rate of 5,000–8,000 per month. These attacks are largely victim-agnostic, spanning all major industry verticals and focusing more on businesses than individuals.

    You’ll learn about:

    - How Nigerian threat actors have successfully employed commodity malware tools with precision, to target many organizations at scale.
    - The financial impact of these attacks.
    - Techniques utilized to disguise commodity malware, including business email compromise and spoofing, and how to prevent them.
  • An Analysis of Recent Data Breaches in the Banking Industry Recorded: Nov 30 2016 42 mins
    Lawrence Chin - Financial Services Security Market Architect - Palo Alto Networks
    They say that hindsight is 20/20 and in recent months, news of data breaches at several SWIFT (Society for Worldwide Interbank Financial Telecommunications) members has seen many reassessing their cybersecurity strategies.

    Palo Alto Networks invites you to join a webinar where Lawrence Chin, Security Market Architect, will discuss:

    ● A review of these attacks and some of the commonalities
    ● The role of cyber security hygiene, and subsequent recommendations from SWIFT, FS-ISAC (Financial Services Information Sharing and Analysis Center), and US FFIEC (Federal Financial Institutions Examination Council).
    ● Best practices that may prevent similar cyberattacks on financial institutions from succeeding in the future.

    Register today and learn how the confidence and trust can be protected in the increasingly complex digital world in which we live.
  • Cybersecurity for Financial Services Industry Recorded: Nov 30 2016 64 mins
    Ben Allchin and Nirmal Dave from Palo Alto Networks
    The security and network teams at financial services institutions must address demands to rapidly adopt new technology, protect intellectual property, and comply with regulations. Additionally, they must also enable secure access to personal and commercial financial data from a variety of access points ­(e.g., retail branches, mobile devices, third-party business partners) while combating an increasing volume and sophistication of threats. This presentation will offer a reference blueprint for addressing all of these concerns with the Palo Alto Networks security platform, and share some use cases from the financial services industry.
  • Secure your enterprise to maintain quality of care Recorded: Nov 29 2016 45 mins
    Matt Mellen - Security Architect & Healthcare Solution Lead - Palo Alto Networks
    The business model behind cybercrime has changed and cyber attackers are looking for new sources of income. Ransomware is on the rise and is of great risk to healthcare organisations as they impact the quality of care clinical facilities can provide, costs organisations money in remediation efforts, and damages their reputation as competent providers of care. There are, however,straight forward steps organisations can take to prevent this threat.

    Palo Alto Networks invites you to a webinar where Matt Mellen, a former Information Security Lead at a hospital, will discuss practical steps healthcare organisations can take to stop ransomware. Drawing from his first-hand experience responding to ransomware, combined with recommendations from the FBI, Matt will discuss:

    • Practical steps healthcare organisations can take on systems and network devices to prevent exposure to this rampant attack.
    • How the most current variants of ransomware work
    • How to prevent successful ransomware attacks in Healthcare
Webcasts and Videos
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content — by user, not just by IP address. Based on patent-pending App-ID™ technology, Palo Alto Networks firewalls accurately identify and control threats and applications — regardless of port, protocol, evasive tactic, or SSL encryption — and scan content to stop threats and prevent data leakage. Palo Alto Networks delivers proven threat prevention combining IPS, anti-malware, URL, file and content filtering in a single integrated engine supported by one of the industry’s most prolific vulnerability research teams.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 10 Things Your Next Cybersecurity Solution Must Do
  • Live at: Dec 29 2015 9:00 am
  • Presented by: Kate Taylor, Manager, Advanced Threat Prev
  • From:
Your email has been sent.
or close