Hi [[ session.user.profile.firstName ]]

Prevention Week: Actionable Threat Intelligence – The Power to Act Fast!

Today’s security deployments overwhelm security organizations with vast amounts of data. Presenting this data in a meaningful way and making it actionable is crucial in preventing successful cyber attacks.

Join Joerg Sieber, Sr. Product Marketing Manager, as he showcases how Palo Alto Networks makes sense of all the application and threat data surrounding you and presents it in an actionable format that is easy to understand. Specifically, you will learn:

• How a visual, interactive, and highly customizable user interface results in shorter response times to threats.
• How automatic correlation of network data across a distributed architecture surfaces critical events for a fast response.
• How visual displays of log data improve the user experience and add value to any security deployment.
Recorded Feb 18 2016 34 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Joerg Sieber, Sr Product Marketing Manager
Presentation preview: Prevention Week: Actionable Threat Intelligence – The Power to Act Fast!
  • Channel
  • Channel profile
  • Realize the Promise of the SWIFT Customer Security Controls Jun 13 2018 4:00 pm UTC 60 mins
    Lawrence Chin, Financial Services Security Architect, Palo Alto Networks
    Improve Your Cyber Hygiene

    Members of the Society for Worldwide Interbank Financial Telecommunications (SWIFT) cooperative had to self-attest to new mandatory security controls at the end of 2017. The next self-attestation will be required by year end 2018. After that point, SWIFT reserves the right to report non-compliance to counterparties and appropriate local regulators.

    How did your institution fare in its initial self-attestation to SWIFT’s security controls? If there was room for improvement,

    •Join this webinar to learn how to meet and/or exceed SWIFT mandatory and advisory security controls with Palo Alto Networks products
    •Hear about additional best practices that can further improve your cybersecurity posture.

    In the big picture, the SWIFT security controls and further best practices from Palo Alto Networks contribute to overall cyber hygiene, and should prove to be beneficial to all financial institutions - regardless of whether they are SWIFT members or not.
  • Network Security Consolidation In the Federal Government Jun 12 2018 4:00 pm UTC 45 mins
    Joe Kim, Squadra Solutions, and Tighe Schlottog, Palo Alto Networks
    As organizations have grown so have their security requirements. Where basic firewalling and URL filtering were fine before, now organizations have added in IPS and Sandboxing technologies. This product sprawl has led to fragmentation in management and security coverage.

    Attackers are employing more advanced techniques to infiltrate networks and systems. In order to prevent these attacks, an agency's security must operate in a tightly knit and automated fashion. One in which building new protections against these attacks must occur automatically while ensuring continuous operations of services.

    Join Tighe Schlottog, Security Architect for Palo Alto Networks, and Joe Kim, VP of Engineering at Squadra Solutions, as they discuss how to increase security and efficacy of Network Security by consolidating point products into the Palo Alto Networks Security Operating Platform.

    Register for the webinar and learn:
    •The security gaps and risks posed by security point products.
    •How Network Security Consolidation can simplify management and increase responsiveness of Security Operations teams.
    •Best Practices for Network Security Consolidation.

    Speakers:
    -Joe Kim, VP of Engineering, Squadra Solutions
    -Tighe Schlottog, Security Architect, Palo Alto Networks
  • Accelerate your move to Microsoft® Azure® May 31 2018 5:00 pm UTC 60 mins
    Matt Keil, Director of Product Marketing, Public Cloud
    Microsoft® Azure® can change the way your organization does business by increasing agility, scalability and storage. Although the benefits of Azure – and the public cloud – are well-documented, questions about security, potential data loss and business interruption remain, potentially slowing cloud adoption.

    Join us for a webinar focused on accelerating your move to Azure and securing your data, apps and DevOps environments once there by delivering consistent, automated security across all your environments.

    You’ll learn:

    - Common public cloud security challenges
    - How the Palo Alto Networks® cloud security portfolio protects you
    - How automation enables app developers to operate at cloud speed
  • Medical Grade Security for your Unpatchable Medical Devices May 30 2018 9:00 am UTC 60 mins
    Mick Coady, PwC, and Matt Mellen, Palo Alto Networks
    Because security is often an afterthought when medical devices are designed and maintained by the manufacturer, they are the most vulnerable devices in a hospital’s network.

    The medical device community is beginning to improve the security of their products, but it will take years for legacy devices to be upgraded or replaced. Until then, healthcare organizations need to develop strategies for mitigating the cybersecurity risks these unpatchable devices pose to their patients and the organizations themselves.

    Join Matt Mellen, a healthcare security architect and former security lead for a hospital network, and Mick Coady, a partner in the Health Information Privacy and Security Practice at PricewaterhouseCoopers, as they discuss how to approach and mitigate the challenges associated with securing medical devices in hospital environments.

    In this webinar, you will discover:
    •The cybersecurity risks posed by unpatchable and hard-to-patch medical devices
    •How to successfully mitigate medical device security risks
    •Strategies you can implement today to secure medical devices
  • Medical Grade Security for your Unpatchable Medical Devices May 30 2018 2:00 am UTC 60 mins
    Mick Coady, PwC, and Matt Mellen, Palo Alto Networks
    Because security is often an afterthought when medical devices are designed and maintained by the manufacturer, they are the most vulnerable devices in a hospital’s network.

    The medical device community is beginning to improve the security of their products, but it will take years for legacy devices to be upgraded or replaced. Until then, healthcare organizations need to develop strategies for mitigating the cybersecurity risks these unpatchable devices pose to their patients and the organizations themselves.

    Join Matt Mellen, a healthcare security architect and former security lead for a hospital network, and Mick Coady, a partner in the Health Information Privacy and Security Practice at PricewaterhouseCoopers, as they discuss how to approach and mitigate the challenges associated with securing medical devices in hospital environments.

    In this webinar, you will discover:
    •The cybersecurity risks posed by unpatchable and hard-to-patch medical devices
    •How to successfully mitigate medical device security risks
    •Strategies you can implement today to secure medical devices
  • Automating VM-Series deployments on AWS and Azure with Terraform and Ansible May 29 2018 9:00 am UTC 60 mins
    Vinay Venkataraghavan - Senior Solution Architect, Technical Business Development
    Join us for our new cloud webinar, in which cloud automation experts will show you how customers have successfully automated their VM-Series next-gen firewall deployments and effectively protected their DevOps environments in AWS®.

    You’ll learn how to:

    - Implement touchless deployment for your fully configured firewalls with native and third-party automation tools, such as Terraform® and Ansible®

    - Consume tags to execute your commitless policy updates

    - Automate VM-Series deployments across your multi-cloud environment
  • Automating VM-Series deployments on AWS and Azure with Terraform and Ansible May 29 2018 2:00 am UTC 60 mins
    Vinay Venkataraghavan - Senior Solution Architect, Technical Business Development
    Join us for our new cloud webinar, in which cloud automation experts will show you how customers have successfully automated their VM-Series next-gen firewall deployments and effectively protected their DevOps environments in AWS®.

    You’ll learn how to:

    - Implement touchless deployment for your fully configured firewalls with native and third-party automation tools, such as Terraform® and Ansible®

    - Consume tags to execute your commitless policy updates

    - Automate VM-Series deployments across your multi-cloud environment
  • [APAC BPW] Stopping the Unstoppable: How to Detect and Prevent Fileless Attacks Recorded: May 25 2018 48 mins
    Kasey Cross, Senior Product Marketing Manager and Yoni Allon, Manager, Behavioral Research
    Fileless attacks are estimated to account for 35 percent of all attacks in 2018, according to Ponemon Institute. Threat actors can use a combination of exploits, scripts, and “living off the land” to stay under the radar. They can even carry out sophisticated attacks without ever installing malware on compromised endpoints. They can also use common networking and admin tools together with traditional malware to maintain persistence while locating and stealing valuable data.

    By monitoring user and device behavior, organizations can detect anomalies that indicate an attack is under way. Because most fileless attacks start with a vulnerability exploit, advanced endpoint protection can block the initial step of an attack from succeeding in the first place. Join us as we discuss how organizations can detect and stop all stages of fileless attacks.

    Attend this webinar to:
    •Find out how fileless attacks occur with a demo of an attack
    •Learn how Magnifier behavioral analytics, the first app of the Palo Alto Networks Application Framework, can detect the network behaviors associated with fileless attacks.
    •Understand how Traps advanced endpoint protection can block the exploits that lead to endpoint compromise.
  • [APAC BPW] Stopping the Unstoppable: How to Detect and Prevent Fileless Attacks Recorded: May 25 2018 47 mins
    Kasey Cross, Senior Product Marketing Manager and Yoni Allon, Manager, Behavioral Research
    Fileless attacks are estimated to account for 35 percent of all attacks in 2018, according to Ponemon Institute. Threat actors can use a combination of exploits, scripts, and “living off the land” to stay under the radar. They can even carry out sophisticated attacks without ever installing malware on compromised endpoints. They can also use common networking and admin tools together with traditional malware to maintain persistence while locating and stealing valuable data.

    By monitoring user and device behavior, organizations can detect anomalies that indicate an attack is under way. Because most fileless attacks start with a vulnerability exploit, advanced endpoint protection can block the initial step of an attack from succeeding in the first place. Join us as we discuss how organizations can detect and stop all stages of fileless attacks.

    Attend this webinar to:
    •Find out how fileless attacks occur with a demo of an attack
    •Learn how Magnifier behavioral analytics, the first app of the Palo Alto Networks Application Framework, can detect the network behaviors associated with fileless attacks.
    •Understand how Traps advanced endpoint protection can block the exploits that lead to endpoint compromise.
  • Cybersecurty Webinar – Solving the challenges of SSL decryption in Education Recorded: May 24 2018 32 mins
    Jamie Jennrich Regional Manager for Education and Jon Wood, Systems Engineer at Palo Alto Networks
    Secure Sockets Layer (SSL) (and its successor Transport Layer Security (TLS)) is an encryption protocol that is designed to protect the privacy and security of sensitive communications across a network, such as the Internet.

    The use of SSL encryption is rapidly increasing. In 2017, approximately 50% of web traffic was secured by the protocol and this is expected to rise to 80% by 2019 according to Gartner. Currently most major websites including Google, Facebook and Wikipedia, enforce encryption and are using SSL across their sites (HTTPS sites).

    Join Jamie Jennrich, Regional Manager for Education and Jon Wood, Systems Engineer at Palo Alto Networks for an exclusive Cybersecurity Webinar ‘Solving the challenges of SSL decryption in Education’ on May 24th at 3.30 p.m. (BST) During this event they will discuss the difficult tension in education today between allowing students and staff easy and open access to information while ensuring their working environment is secure and safe, protected from growing cyber threats.

    Attend this webinar to understand:

    - SSL, its benefits and growth
    - Challenges of encryption in Education
    - How Palo Alto Networks can provide visibility and control across encrypted SSL channels
  • [APAC Breach Prevention Week] Best Practices for Effective Endpoint Security Recorded: May 24 2018 63 mins
    Joel Boyd, Sr. Product Marketing Manager
    There’s a sequence of events attackers must go through to successfully deploy ransomware or steal information. And although most organizations have some form of endpoint protection in place, infections are still common.

    Palo Alto Networks® and Cloud Harmonics will show you how to secure your endpoints against increasingly sophisticated cyberattacks.

    In this webinar, you’ll learn:
    •Why so many attacks succeed and how to stop them
    •Effective techniques to protect against malware, exploits and ransomware
    •Next steps for successful endpoint protection
  • [APAC Breach Prevention Week] Best Practices for Effective Endpoint Security Recorded: May 24 2018 63 mins
    Joel Boyd, Sr. Product Marketing Manager
    There’s a sequence of events attackers must go through to successfully deploy ransomware or steal information. And although most organizations have some form of endpoint protection in place, infections are still common.

    Palo Alto Networks® and Cloud Harmonics will show you how to secure your endpoints against increasingly sophisticated cyberattacks.

    In this webinar, you’ll learn:
    •Why so many attacks succeed and how to stop them
    •Effective techniques to protect against malware, exploits and ransomware
    •Next steps for successful endpoint protection
  • [APAC Breach Prevention Week] Driving Innovations in Securing the Public Cloud Recorded: May 23 2018 48 mins
    Anuj Sawani, Product Marketing Manager
    Organizations are rapidly adopting the public cloud to keep pace with growing business demands. Risk management is a top concern, as legacy security tools and techniques designed for the traditional datacenter cannot adapt to the continuous deployment model in the cloud. The tools for securing public cloud services infrastructure are manual and fragmented, making operations time-consuming and error-prone. Security, DevOps, and compliance teams need a frictionless approach to securing public cloud workloads.

    In this session, learn about recent Palo Alto Networks innovations that are changing how organizations secure the public cloud. We will cover:

    •Understand the several options available today to secure the public cloud
    •Build a strategy to manage and reduce your public cloud risks
    •Deploy security with a frictionless approach in a multi-cloud environment
  • [APAC Breach Prevention Week] Driving Innovations in Securing the Public Cloud Recorded: May 23 2018 47 mins
    Anuj Sawani, Product Marketing Manager
    Organizations are rapidly adopting the public cloud to keep pace with growing business demands. Risk management is a top concern, as legacy security tools and techniques designed for the traditional datacenter cannot adapt to the continuous deployment model in the cloud. The tools for securing public cloud services infrastructure are manual and fragmented, making operations time-consuming and error-prone. Security, DevOps, and compliance teams need a frictionless approach to securing public cloud workloads.

    In this session, learn about recent Palo Alto Networks innovations that are changing how organizations secure the public cloud. We will cover:

    •Understand the several options available today to secure the public cloud
    •Build a strategy to manage and reduce your public cloud risks
    •Deploy security with a frictionless approach in a multi-cloud environment
  • [APAC Breach Prevention Week] Beyond Layered Approach Recorded: May 22 2018 51 mins
    Navneet Singh, Product Marketing Director, Palo Alto Networks
    Maintaining and troubleshooting disparate, layered security technologies is complex and time-consuming. What’s even more troubling is that these technologies don’t work together effectively to protect you against sophisticated cyberattacks.

    It’s time to rethink IT security with a strategic, architectural approach – preventing successful cyberattacks from getting to your data, apps and users.

    In this webinar, you’ll learn:
    •Why a layered security approach doesn’t work.
    •Why a strategic approach to evaluating security technologies is the way to go.
    •How the security architecture of our next-gen firewalls prevents successful cyber breaches.
  • [APAC Breach Prevention Week] Beyond Layered Approach Recorded: May 22 2018 51 mins
    Navneet Singh, Product Marketing Director, Palo Alto Networks
    Maintaining and troubleshooting disparate, layered security technologies is complex and time-consuming. What’s even more troubling is that these technologies don’t work together effectively to protect you against sophisticated cyberattacks.

    It’s time to rethink IT security with a strategic, architectural approach – preventing successful cyberattacks from getting to your data, apps and users.

    In this webinar, you’ll learn:
    •Why a layered security approach doesn’t work.
    •Why a strategic approach to evaluating security technologies is the way to go.
    •How the security architecture of our next-gen firewalls prevents successful cyber breaches.
  • Shaping the Future of Cloud Security Recorded: May 9 2018 56 mins
    Amar Singh | Raef Meeuwisse | Paul Dignan | Chris Munday
    Tune in for an interactive discussion with cloud and security experts on the key trends shaping enterprise cloud strategy, explore the latest technological advancements, and discover how to better secure your critical data and workflows in the cloud.

    Join top cloud and security experts for this interactive Q&A discussion on:
    - The top cloud trends in 2018
    - Advanced security reporting & analysis
    - Minimizing your risk and reducing your attack surface
    - Recommendations for improved security
    - The future of cloud

    Speakers:
    - Amar Singh, CEO & Founder, Wisdom of Crowds, Cyber Management Alliance
    - Raef Meeuwisse, CISM, CISA, Author of "Cybersecurity for Beginners"
    - Paul Dignan, Application Delivery, Networking and Security Expert, F5 Networks
    - Chris Munday, Senior Systems Engineer and cloud expert, Palo Alto Networks

    The session will be broadcast LIVE from the AWS Summit in London.
  • Strengthening Your Security Posture With a Transit VPC Recorded: May 3 2018 55 mins
    Matt Keil, Director of Product Marketing, Palo Alto Networks & John Plishker, Solution Architect, REAN Cloud
    As your AWS deployment scales, the web of connectivity to VPCs, the web, or resources on the corporate network can create a complex sprawl and an expanded threat footprint. Managing the many individual connections while ensuring your workloads and data are secure can become cumbersome and costly, slowing deployments and increasing risk.

    Please join Palo Alto Networks and REAN Cloud to learn how a Transit VPC coupled with the VM-Series firewall can solve these challenges using a shared services approach that centralizes security and connectivity, resulting in an improved security posture by simplified management and lowering costs.

    This webinar will discuss how the Transit VPC solution jointly built with REAN Cloud was implemented using AWS capabilities and the Palo Alto Networks VM-Series next generation firewall.
  • Stopping the Unstoppable: How to Detect and Prevent Fileless Attacks Recorded: Apr 26 2018 47 mins
    Kasey Cross, Senior Product Marketing Manager and Yoni Allon, Manager, Behavioral Research
    Fileless attacks are estimated to account for 35 percent of all attacks in 2018, according to Ponemon Institute. Threat actors can use a combination of exploits, scripts, and “living off the land” to stay under the radar. They can even carry out sophisticated attacks without ever installing malware on compromised endpoints. They can also use common networking and admin tools together with traditional malware to maintain persistence while locating and stealing valuable data.

    By monitoring user and device behavior, organizations can detect anomalies that indicate an attack is under way. Because most fileless attacks start with a vulnerability exploit, advanced endpoint protection can block the initial step of an attack from succeeding in the first place. Join us on April 26 as we discuss how organizations can detect and stop all stages of fileless attacks.

    Attend this webinar to:
    •Find out how fileless attacks occur with a demo of an attack
    •Learn how Magnifier behavioral analytics, the first app of the Palo Alto Networks Application Framework, can detect the network behaviors associated with fileless attacks.
    •Understand how Traps advanced endpoint protection can block the exploits that lead to endpoint compromise.
  • [Breach Prevention Week] Best Practices for Effective Endpoint Security Recorded: Apr 25 2018 63 mins
    Joel Boyd, Sr. Product Marketing Manager
    There’s a sequence of events attackers must go through to successfully deploy ransomware or steal information. And although most organizations have some form of endpoint protection in place, infections are still common.

    Palo Alto Networks® and Cloud Harmonics will show you how to secure your endpoints against increasingly sophisticated cyberattacks.

    In this webinar, you’ll learn:
    •Why so many attacks succeed and how to stop them
    •Effective techniques to protect against malware, exploits and ransomware
    •Next steps for successful endpoint protection
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Prevention Week: Actionable Threat Intelligence – The Power to Act Fast!
  • Live at: Feb 18 2016 2:00 am
  • Presented by: Joerg Sieber, Sr Product Marketing Manager
  • From:
Your email has been sent.
or close