Hi [[ session.user.profile.firstName ]]

Secure the Force: Protect Your Network Like a Jedi Master

Today’s threat landscape is fraught with adversaries trying to infiltrate your network. Organizations need a team of crime fighters to help secure the enterprise network.

Join us for a cybersecurity webinar to learn the latest advances in breach prevention and how they are changing in the digital realm.
Recorded Dec 22 2015 23 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Davis Hake, Director of Cybersecurity Strategy
Presentation preview: Secure the Force: Protect Your Network Like a Jedi Master

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How to Prevent Breaches through Application Controls Jun 6 2017 6:00 pm UTC 60 mins
    Navneet Singh, Director, Product Marketing
    Employees are accessing any application they want, using work or personal devices, regardless of the business and security risks involved.

    What are you doing to protect your organization’s data?

    Join the webinar and discover:
    •How attackers use apps to infect and exfliltrate data
    •How to use app control the right way to prevent breaches
    •How to extend visibility and control to SaaS apps
  • WanaCrypt0r Ransomware – How Palo Alto Networks protects you Jun 6 2017 9:00 am UTC 45 mins
    Scott Simkin, Sr. Group Manager, Threat Intelligence Cloud and Bryan Lee, Threat Intelligence Analyst, Unit 42
    Hours after WanaCrypt0r first emerged last week, the global ransomware campaign hit hundreds of thousands of computer systems and impacted multiple high-profile organizations around the world.
    Since the initial wave of attacks, new variants of the ransomware have been discovered in the wild, ensuring that the threat is far from over.

    Join our cybersecurity experts for an educational Unit 42 webinar, where you’ll learn:

    • How WanaCrypt0r exploits vulnerabilities and spreads across networks

    • How our Next-Generation Security Platform protects your organization from WanaCrypt0r ransomware through multiple complementary prevention controls

    • Actionable steps to protect your organization against this and future ransomware campaigns
  • WanaCrypt0r Ransomware – How Palo Alto Networks protects you Jun 6 2017 2:00 am UTC 45 mins
    Scott Simkin, Sr. Group Manager, Threat Intelligence Cloud and Bryan Lee, Threat Intelligence Analyst, Unit 42
    Hours after WanaCrypt0r first emerged last week, the global ransomware campaign hit hundreds of thousands of computer systems and impacted multiple high-profile organizations around the world.
    Since the initial wave of attacks, new variants of the ransomware have been discovered in the wild, ensuring that the threat is far from over.

    Join our cybersecurity experts for an educational Unit 42 webinar, where you’ll learn:

    • How WanaCrypt0r exploits vulnerabilities and spreads across networks

    • How our Next-Generation Security Platform protects your organization from WanaCrypt0r ransomware through multiple complementary prevention controls

    • Actionable steps to protect your organization against this and future ransomware campaigns
  • Auto Scaling Next-Gen Firewalls on AWS Jun 5 2017 1:00 pm UTC 45 mins
    Matt Keil, Director of Product Marketing, Data Center and Warby Warburton, Manager, Technical Marketing Engineering
    Through integration with AWS services, like Auto Scaling and AWS Elastic Load Balancing (AWS ELB), you can now build a next-generation security infrastructure that will dynamically, yet independently, scale to protect your AWS workloads as their traffic patterns fluctuate. This architecture will allow you to reduce costs by utilizing the firewall capacities intelligently and efficiently based on user-defined metrics. By scaling the security separately from the application workloads, this solution allows each firewall to be identically configured and managed centrally, resulting in lower administrative costs.

    Join us for an educational webinar to learn how you can scale next-generation security using AWS Auto Scaling and ELB. Using native AWS Services and VM-Series automation features, you can now dynamically, yet independently scale the VM-Series next-generation firewalls on AWS.

    This webinar will cover
    • Auto Scaling the VM-Series architecture
    • Auto Scaling and ELB integration details
    • Alternative architectures for protecting many VPCs
  • The value of Next Generation Security Platform May 31 2017 12:00 pm UTC 45 mins
    Fred Streefland
    The combination of complex, modern IT environments and a rapidly evolving threat landscape has left many businesses challenged to control costs while effectively protecting the systems on which their operations depend. In many cases, the challenges are brought about by the combination of too many disparate security solutions that do not share context and insufficient time and/or expertise.

    To address these challenges, organisations of all shapes and sizes are looking at ways to consolidate their security infrastructure to improve their security posture and reduce their total cost of ownership.

    Please join us for a webinar where we’ll discuss how Palo Alto Networks’ Next-Generation Security Platform can enable your organization to:

    1.Reduce the threat footprint
    2.Prevent known and unknown attacks.
    3.Tie policies to users.
  • Securely Enabling a Hybrid Data Center with Microsoft Azure May 30 2017 12:00 pm UTC 45 mins
    Matt Keil, Director of Product Marketing at Palo Alto Networks
    Microsoft® Azure™ is enabling a data center transformation that results in a hybrid architecture that combines your on premises resources and the Azure cloud. From a security perspective, your challenge remains: how to protect your applications and data, regardless of their location.

    Join us for this live webinar to learn how the VM-Series can securely enable a hybrid data center. At the end of the webinar, you will learn:
    •Security considerations when moving to Azure
    •Top 3 VM-Series recommendations to protect your data
    •Tips and techniques to streamline your efforts
  • De waarde van Next Generation Security Platform May 29 2017 12:00 pm UTC 60 mins
    Fred Streefland
    De combinatie van complexe, moderne IT-omgevingen en een snel ontwikkelende bedreigingen maakt het voor veel bedrijven een uitdaging om kosten laag te houden en tegelijk de systemen te beschermen waarvan hun werk afhankelijk is.

    In veel gevallen zijn de uitdagingen het resultaat van te veel verschillende beveiligingsoplossingen die geen samenhang hebben in combinatie met een gebrek aan tijd en/of expertise.

    Organisaties in alle soorten en maten gaan deze uitdagingen aan door te zoeken naar manieren om hun beveiligingsinfrastructuur te bundelen, zodat ze hun beveiligingsbeleid kunnen verbeteren en de totale eigendomskosten (TCO) kunnen verlagen.

    Neem deel aan onze webinar waar we bespreken hoe het Next-Generation Security Platform van Palo Alto Networks uw organisatie in staat stelt om:

    - De bedreigings “footprint” te verkleinen
    - Bekende en onbekende aanvallen te voorkomen
    - Beleid aan gebruikers te verbinden
  • WanaCrypt0r Ransomware – How Palo Alto Networks protects you Recorded: May 26 2017 45 mins
    Scott Simkin, Sr. Group Manager, Threat Intelligence Cloud and Bryan Lee, Threat Intelligence Analyst, Unit 42
    Hours after WanaCrypt0r first emerged last week, the global ransomware campaign hit hundreds of thousands of computer systems and impacted multiple high-profile organizations around the world.
    Since the initial wave of attacks, new variants of the ransomware have been discovered in the wild, ensuring that the threat is far from over.

    Join our cybersecurity experts for an educational Unit 42 webinar, where you’ll learn:

    • How WanaCrypt0r exploits vulnerabilities and spreads across networks

    • How our Next-Generation Security Platform protects your organization from WanaCrypt0r ransomware through multiple complementary prevention controls

    • Actionable steps to protect your organization against this and future ransomware campaigns
  • Palo Alto Networks Next Generation Endpoint Solution Traps™ Recorded: May 26 2017 49 mins
    Paul Wilcox
    You are invited to join this live webinar for an overview of Palo Alto Networks® Traps™ advanced endpoint protection and learn about this market-leading solution that provides multi-method protection against known and unknown threats.

    Hosted by Paul Wilcox, APAC Sales Director for Palo Alto Networks Cybersecurity Solutions Group, you will learn why Traps is the most effective solution on the market today to address the current threat landscape, including:

    •How it effectively prevent attacks against exploits and malware – such as ransomware
    •An overview of the unique approach Traps takes to endpoint security
    •How legacy antivirus is no longer effective enough
    •How Traps can replace your existing legacy antivirus software
    Included in this live webinar will be a live demonstration of Traps in action.
  • SaaS Security: Adapt to the Changing Data Center Landscape [Breach Prevention] Recorded: May 26 2017 35 mins
    Charles Woo, Systems Engineer, Palo Alto Networks
    The first step for many organizations migrating to the cloud is the adoption of SaaS applications, such as Office 365, Box, Salesforce and many more. As an IT professional, this means you are giving permission to your users to store data in the cloud with corporate-approved services, such as OneDrive or SharePoint Online. The decision to move to the cloud is usually supported by a long list of cost and operational benefits. Infrastructure cost reduction? Check. Increased productivity? Check. License cost reduction? Check. But, have you thought about data governance and compliance, malware protection, and collaboration with external vendors? These are great questions to ask as you make this transition.

    Organizations look to reduce the threat surface exposed by SaaS applications as their data is now hosted in data centers that are not managed by them. Join this webinar to learn more about the evolution of the data center landscape and how to redefine your security strategy to cover the unique risks surfacing from the adoption of SaaS applications.
  • WanaCrypt0r Ransomware – How Palo Alto Networks protects you Recorded: May 26 2017 47 mins
    Scott Simkin, Sr. Group Manager, Threat Intelligence Cloud and Bryan Lee, Threat Intelligence Analyst, Unit 42
    Hours after WanaCrypt0r first emerged last week, the global ransomware campaign hit hundreds of thousands of computer systems and impacted multiple high-profile organizations around the world.
    Since the initial wave of attacks, new variants of the ransomware have been discovered in the wild, ensuring that the threat is far from over.

    Join our cybersecurity experts for an educational Unit 42 webinar, where you’ll learn:

    • How WanaCrypt0r exploits vulnerabilities and spreads across networks

    • How our Next-Generation Security Platform protects your organization from WanaCrypt0r ransomware through multiple complementary prevention controls

    • Actionable steps to protect your organization against this and future ransomware campaigns
  • New Traps v4.0: Advancing Endpoint Security, Again! Recorded: May 25 2017 51 mins
    Michael Moshiri, Director, Endpoint Protection, Palo Alto Networks
    We’re excited to announce the availability of the new release of Traps™ advanced endpoint protection, version 4.0. This release is packed with new features and expanded multi-method prevention capabilities that deliver unsurpassed protection against known and unknown threats.

    Join us for a webinar to learn about these new capabilities and improvements in Traps v4.0, including:

    • Support for macOS™ and Android™
    • Protection from malicious macros
    • Prevention of script-based attacks
    • Exploit kit fingerprinting protection
    • Kernel privilege escalation protection

    Plus much more...
  • Next-generation Security for the Public Cloud Recorded: May 25 2017 60 mins
    Matt Keil, Director of Product Marketing at Palo Alto Networks
    As more and more organizations move their workloads to the public cloud, security remains a top concern because cybercriminals do not care whether your applications and data reside in your datacenter or in the cloud. Their goal is to steal data or computing resources by gaining access to the network, then moving laterally, potentially to the cloud to execute their goal.

    Join us for this webinar to learn how the VM-Series protects your public cloud deployment with the same next-generation firewall and threat prevention features available in our physical appliances.

    The webinar will cover:
    • Overview of the VM-Series next-generation firewall
    • How the VM-Series prevents cyberattacks in the public cloud
    • Key differences between the VM-Series and other cloud security offerings
  • Protect Software-Defined Data Center From Advanced Attacks [Breach Prevention] Recorded: May 25 2017 48 mins
    Charles Woo, Systems Engineer, Palo Alto Networks
    The sophistication of attacks against corporate and government data centers continues to grow at an alarming pace. New security approaches, such as micro-segmentation and advanced security controls within the data center, are actively being embraced by security practitioners. In this webinar, learn about these advanced attacks within the data center through real examples and different approaches to both combating them and protecting your applications and data.
  • WanaCrypt0r Ransomware – How Palo Alto Networks protects you Recorded: May 24 2017 46 mins
    Scott Simkin, Sr. Group Manager, Threat Intelligence Cloud and Bryan Lee, Threat Intelligence Analyst, Unit 42
    Hours after WanaCrypt0r first emerged last week, the global ransomware campaign hit hundreds of thousands of computer systems and impacted multiple high-profile organizations around the world.
    Since the initial wave of attacks, new variants of the ransomware have been discovered in the wild, ensuring that the threat is far from over.

    Join our cybersecurity experts for an educational Unit 42 webinar, where you’ll learn:

    • How WanaCrypt0r exploits vulnerabilities and spreads across networks

    • How our Next-Generation Security Platform protects your organization from WanaCrypt0r ransomware through multiple complementary prevention controls

    • Actionable steps to protect your organization against this and future ransomware campaigns
  • Changing the Game in Public Cloud Security with AutoFocus [Breach Prevention] Recorded: May 24 2017 53 mins
    Michael Lam, Systems Engineer, Palo Alto Networks
    Security remains a top concern as you transition more workloads to the public cloud, with cyber attackers attempting to compromise sensitive data and resources wherever they reside. Providers will profess that your applications and data are more secure in the cloud, but how can you be sure? Join this Cloud Breach Prevention Week webcast spotlighting how the AutoFocus™ threat intelligence service can help you identify and take action on threats targeting the public cloud, including how VM-Series virtualized firewalls can protect your organization with next-generation security.
     
    You will see:
    •Breaking public cloud threats found by AutoFocus
    •How the VM-Series and AutoFocus automate targeted threat identification and prevention
    •Key differences between the VM-Series and other cloud security offerings
  • Credential Theft: A Perspective From the FBI & Unit 42 Threat Intel Team Recorded: May 23 2017 62 mins
    SSA John Caruthers, FBI & Jen Miller-Osborn Palo Alto Networks
    Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials.

    Join the FBI and our own Unit 42 threat intelligence team as they present their insightful perspective on the cyberthreat landscape in 2017, with an emphasis on credential-based attacks and phishing. In addition to presenting their unique attack lifecycle, they will:

    * Identify trends and techniques in methods used for credential theft and abuse.
    * Review how cybercriminals have changed their tactics to compromise networks.
    * Examine who is being targeted, and why.
    * Discuss techniques to stop credential leakage.
    * Review the FBI’s role in combating this destructive attack.

    Defending against cyberattacks is tough enough, especially when attackers pose as authenticated users on your network.

    Join the FBI and Palo Alto Networks® Unit 42 to learn what to do when you discover intruders on your network, and how to prevent their attacks from succeeding
  • Prevent Costly Data Leaks From SaaS Apps Recorded: May 23 2017 48 mins
    Anuj Sawani, Sr. Product Marketing Manager at Palo Alto Networks
    SaaS apps are now extensively adopted by organizations – some procured by IT, others adopted by the users themselves. You’re already likely witnessing large amounts of data being transferred between users and these apps. As corporate data moves to the cloud, the risk of a data leakage increases with users accessing enterprise apps on unmanaged devices or storing corporate data on risky, unsanctioned apps.

    Join this webinar to learn how to prevent data exposure and maintain compliance by protecting your data within enterprise SaaS apps and blocking unsanctioned apps. You’ll learn about:
    •A real-world customer journey for complete data security in SaaS.
    •Common threats leading to data leaks from popular SaaS apps.
    •Benefits of adopting a platform approach to SaaS security.
  • Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention] Recorded: May 23 2017 43 mins
    Charles Woo, Systems Engineer, Palo Alto Networks
    The demand for business to be more agile and stay competitive is driving a change in the way applications are developed, deployed and adopted. The challenge has become balancing the agility needs of the business with improving the security of the applications and, more importantly, securing the data as it moves between the various clouds. Gaining visibility and preventing attacks attempting to gain access to the data, whether from an external location or through a lateral attack, becomes imperative in all locations where the applications and data reside, without adding additional cost or complexity. Organizations require visibility, control and prevention capabilities across any cloud environment, enabling consistent security policies and protection no matter where it is deployed.

    This webinar will cover:

    • Visibility: Consistent visibility across clouds is one of the most common issues with multi-cloud deployments.
    • Threat prevention: Block known and unknown threats is a critical requirement to protect applications and data no matter where they reside.
    • Automation: The ability to natively integrate into a variety of environments to match the dynamic and on demand nature of cloud services.
    • Centralized management: Manage your virtualized and physical firewalls from a single management console, delivering consistent policy and features across all clouds.
  • [Video Interview] Understanding the Role of Stolen Credentials in Data Breaches Recorded: May 16 2017 21 mins
    Josh Downs, BrightTALK & Alexander Hinchliffe, Threat Intelligence Analyst at Unit 42, Palo Alto Networks
    Protecting user identities and preventing phishing attacks are key tactical priorities for today’s security professional. The majority of breaches involve password theft at some stage of the attack. Nearly two-thirds of the breaches analyzed by Verizon in the 2016 Data Breach Incident Report (DBIR) used stolen credentials. This is because the vast majority of organizations continue to use password-based credentials as the primary means of securing user access, and it is easier for an attacker to steal passwords than it is to find and hack a vulnerable system.

    As a result, password stealing techniques are used by a broad spectrum of attackers to breach organizations, compromise their networks and steal critical data from internal data centers and the cloud. Traditional approaches to stop credential phishing rely only on classifying the phishing site before the user encounters it. If the organization’s security products miss a new phishing site, their only recourse is hoping the user doesn’t proceed and enters his credentials.

    Tune into this BrightTALK - Palo Alto Networks video interview as Alexander Hinchliffe discusses the need to protect user credentials and advises how to improve your businesses security stature.
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Secure the Force: Protect Your Network Like a Jedi Master
  • Live at: Dec 22 2015 7:00 pm
  • Presented by: Davis Hake, Director of Cybersecurity Strategy
  • From:
Your email has been sent.
or close