Hi [[ session.user.profile.firstName ]]

Prevention Week: Knowledge is Power. What we know powers better prevention.

Join Vicky Ray, Threat Intelligence Senior Consultant as he covers the latest findings from Unit 42. Working with members of the Cyber Threat Alliance, Unit 42 is Palo Alto Networks research arm and is constantly working to identify new threats before they can impact your organisation. In this webinar, Vicky will share the latest research and how it is helping organisations prevent attacks
Recorded Feb 19 2016 40 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Vicky Ray, Threat Intelligence Senior Consultant
Presentation preview: Prevention Week: Knowledge is Power. What we know powers better prevention.

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • [Breach Prevention] Protect Software-Defined Data Center From Advanced Attacks Mar 8 2017 9:00 am UTC 60 mins
    Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks
    The sophistication of attacks against corporate and government data centers continues to grow at an alarming pace. New security approaches, such as micro-segmentation and advanced security controls within the data center, are actively being embraced by security practitioners. In this webinar, learn about these advanced attacks within the data center through real examples and different approaches to both combating them and protecting your applications and data.
  • [Breach Prevention] Public, Private, Hybrid: Embrace Any Cloud, Securely Mar 6 2017 9:00 am UTC 60 mins
    Matt Keil, Product Marketing Manager, Palo Alto Networks
    The demand for business to be more agile and stay competitive is driving a change in the way applications are developed, deployed and adopted. The challenge has become balancing the agility needs of the business with improving the security of the applications and, more importantly, securing the data as it moves between the various clouds. Gaining visibility and preventing attacks attempting to gain access to the data, whether from an external location or through a lateral attack, becomes imperative in all locations where the applications and data reside, without adding additional cost or complexity. Organizations require visibility, control and prevention capabilities across any cloud environment, enabling consistent security policies and protection no matter where it is deployed.

    This webinar will cover:

    • Visibility: Consistent visibility across clouds is one of the most common issues with multi-cloud deployments.
    • Threat prevention: Block known and unknown threats is a critical requirement to protect applications and data no matter where they reside.
    • Automation: The ability to natively integrate into a variety of environments to match the dynamic and on demand nature of cloud services.
    • Centralized management: Manage your virtualized and physical firewalls from a single management console, delivering consistent policy and features across all clouds.
  • How to Enable Zero Trust Security for Your Data Center Mar 2 2017 2:00 pm UTC 60 mins
    John Kindervag, Vice President and Principal Analyst at Forrester
    The rising tide of successful cyberattacks against organizations has made it clear that traditional approaches for defining trust levels, stopping lateral movement and enforcing advanced security controls within a data center are no longer effective. The Zero Trust approach advocated by Forrester provides guiding principles for achieving a robust and secure data center security architectures. However, choice of the security platform, design considerations and effective use of advanced security capabilities play a crucial role in implementing a successful Zero Trust enabled data center.

    In this webinar, guest speaker John Kindervag, Vice President and Principal Analyst at Forrester will talk about the steps to achieving a Zero Trust data center.

    Topics covered in this webinar will include:

    - 5 Steps to achieving Zero Trust enabled data centers.
    - Extending Zero Trust design principles across hybrid cloud deployments
    - Security policy considerations and guidelines for implementing Zero Trust enabled data centers.
  • Live chat - Ransomware Survey findings Jan 31 2017 9:00 am UTC 30 mins
    Alex Hinchliffe, EMEA Threat Intelligence Analyst, Unit 42, & Ramon de Boer, Sales Lead, EMEA, Palo Alto Networks
    A 30 minute interactive discussion based on the findings and outcome of the EMEA Ransomware Survey run by Palo Alto Networks in December 2016.
  • C yberDefence Today- January ediion Jan 30 2017 1:00 pm UTC 15 mins
    Georgie Barrat
    Monthly insights from Palo Alto Networks EMEA. Watch our video monthly broadcast and get the latest news when it comes to threat prevention!
  • SaaS Security: Adapt to the Changing Data Center Landscape [Breach Prevention] Jan 26 2017 6:00 pm UTC 60 mins
    Anuj Sawani, Product Marketing Manager, Palo Alto Networks
    The first step for many organizations migrating to the cloud is the adoption of SaaS applications, such as Office 365, Box, Salesforce and many more. As an IT professional, this means you are giving permission to your users to store data in the cloud with corporate-approved services, such as OneDrive or SharePoint Online. The decision to move to the cloud is usually supported by a long list of cost and operational benefits. Infrastructure cost reduction? Check. Increased productivity? Check. License cost reduction? Check. But, have you thought about data governance and compliance, malware protection, and collaboration with external vendors? These are great questions to ask as you make this transition.
     
    Organizations look to reduce the threat surface exposed by SaaS applications as their data is now hosted in data centers that are not managed by them. Join this webinar to learn more about the evolution of the data center landscape and how to redefine your security strategy to cover the unique risks surfacing from the adoption of SaaS applications. 
  • Protect Software-Defined Data Center From Advanced Attacks [Breach Prevention] Jan 25 2017 6:00 pm UTC 60 mins
    Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks
    The sophistication of attacks against corporate and government data centers continues to grow at an alarming pace. New security approaches, such as micro-segmentation and advanced security controls within the data center, are actively being embraced by security practitioners. In this webinar, learn about these advanced attacks within the data center through real examples and different approaches to both combating them and protecting your applications and data.
  • Exploit kits: getting in by any means necessary Jan 25 2017 9:00 am UTC 60 mins
    Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits
  • Exploit kits: getting in by any means necessary Jan 25 2017 1:00 am UTC 60 mins
    Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits
  • Changing the Game in Public Cloud Security with AutoFocus [Breach Prevention] Jan 24 2017 6:00 pm UTC 60 mins
    Scott Simkin, Sr. Group Manager for Threat Intelligence Cloud, Palo Alto Networks
    Security remains a top concern as you transition more workloads to the public cloud, with cyber attackers attempting to compromise sensitive data and resources wherever they reside. Providers will profess that your applications and data are more secure in the cloud, but how can you be sure? Join this Cloud Breach Prevention Week webcast spotlighting how the AutoFocus™ threat intelligence service can help you identify and take action on threats targeting the public cloud, including how VM-Series virtualized firewalls can protect your organization with next-generation security.
     
    You will see:
    •Breaking public cloud threats found by AutoFocus
    •How the VM-Series and AutoFocus automate targeted threat identification and prevention
    •Key differences between the VM-Series and other cloud security offerings
  • Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention] Recorded: Jan 23 2017 61 mins
    Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks
    The demand for business to be more agile and stay competitive is driving a change in the way applications are developed, deployed and adopted. The challenge has become balancing the agility needs of the business with improving the security of the applications and, more importantly, securing the data as it moves between the various clouds. Gaining visibility and preventing attacks attempting to gain access to the data, whether from an external location or through a lateral attack, becomes imperative in all locations where the applications and data reside, without adding additional cost or complexity. Organizations require visibility, control and prevention capabilities across any cloud environment, enabling consistent security policies and protection no matter where it is deployed.
     
    This webinar will cover:
     
    • Visibility:  Consistent visibility across clouds is one of the most common issues with multi-cloud deployments.
    • Threat prevention: Block known and unknown threats is a critical requirement to protect applications and data no matter where they reside.
    • Automation: The ability to natively integrate into a variety of environments to match the dynamic and on demand nature of cloud services.
    • Centralized management:  Manage your virtualized and physical firewalls from a single management console, delivering consistent policy and features across all clouds.
  • Preventing Threats in Modern Government Networks -Replacing Proxy Technology Recorded: Jan 19 2017 53 mins
    Pamela Warren, Director, Government & Industry Initiatives & Scott Brunstrom, Sr. Fed. Systems Engineer, Palo Alto Networks
    Proxy deployments today have outlived their usefulness and practicality with limited security functionality against today’s advanced threats. Today's security must consider new applications, access options and capabilities within our networks. This webinar provides insights on a next generation security approach to today's networks that considers the changing nature of our networks without compromising the protection of our data and the integrity of our networks.
  • How to Implement User-based Controls for Cybersecurity Recorded: Jan 18 2017 39 mins
    Navneet Singh, Product Marketing Director, Next-Generation Firewall
    Visibility and policy control based on users is critical for cybersecurity. User-based policies readily show their business relevance, are more secure, easier to manage, and allow better forensics. In this webinar you will:

    •Learn the value of user-based controls using real-life data breach examples
    •Discover a step-by-step approach for implementing User-IDTM on your Palo Alto Networks Next-Generation Firewall
  • 2017 Cybersecurity Predictions Recorded: Jan 18 2017 27 mins
    Sean Duca, Sean Duca, VP and Regional CSO, Asia Pacific, Palo Alto Networks
    Cybersecurity is in a state of constant change and evolution and 2016 was no different. In 2017 you have an opportunity to get ahead of cybercriminals by understanding existing and potential threats and how to mitigate against them.

    •Why cybersecurity is extending beyond the IT department and what you can do about it.
    •How to enable customer and employee innovation and efficiency securely
    •Trends for ransomware and practical advice to protect your organisation and deal with attacks.
    •Identifying the weak links in your organisation and steps you can take to strengthen them.
  • 2017 Cybersecurity Predictions Recorded: Jan 18 2017 27 mins
    Sean Duca, Sean Duca, VP and Regional CSO, Asia Pacific, Palo Alto Networks
    Cybersecurity is in a state of constant change and evolution and 2016 was no different. In 2017 you have an opportunity to get ahead of cybercriminals by understanding existing and potential threats and how to mitigate against them.

    •Why cybersecurity is extending beyond the IT department and what you can do about it.
    •How to enable customer and employee innovation and efficiency securely
    •Trends for ransomware and practical advice to protect your organisation and deal with attacks.
    •Identifying the weak links in your organisation and steps you can take to strengthen them.
  • Cómo protegerse cuando el AV sigue fallando Recorded: Jan 11 2017 62 mins
    Xavier Homs, Palo Alto Networks
    Cómo protegerse cuando el AV sigue fallando
  • Outcome-Driven Threat Intelligence with AutoFocus Recorded: Dec 16 2016 58 mins
    Palo Alto Networks: Ryan Olson, Intelligence Director of Unit 42 & Scott Simkin, Sr. Group Manager, Threat Intelligence Cloud
    More data doesn’t always equal better prevention. It often feels like there is an arms race underway, with security operations and response professionals in the sights of an escalating amount of alerts and threat data, which can sometimes do more harm than good. You need a new outcome-driven approach to threat intelligence, with a focus on prevention and operationalizing action, versus simply adding more data.

    Unit 42, the Palo Alto Networks® threat research team, is putting this new mindset into practice, discovering new malware families, campaigns and adversaries with the AutoFocus threat intelligence service. Join Ryan Olson, Intelligence Director for Unit 42, to see how his team uses AutoFocus to help automate research, hunting and security operations workflows. You will see real applications of threat intelligence, by one of the best teams in the industry, including:

    --- How AutoFocus can help you scale detection and prevention efforts without additional, specialized security staff.
    --- How to automate security analysis and response workflows with AutoFocus.
    --- Real world use-cases from Unit 42’s research efforts.
  • Cyber Defence Today: 2016 in Review & 2017 Threat Horizon Recorded: Dec 15 2016 12 mins
    Palo Alto Networks: Georgie Barrat, Greg Day, Christian Doolmann, Marion Gauthier
    Cyber Defence Today - Episode 2

    Welcome to the Decembers episode of our Cyber Defence Today series, finishing off 2016 with a high!

    The session will look back at the year in review and the lessons that should be learned, as well analysing what's coming up in 2017; the key threats and vulnerabilities to watch out for!

    The session will be hosted by leading technology journalist Georgie Barrat, who will be speaking with IT Security Experts from all over Europe, discussing recent Cyber Security events and what they can mean for your organisation. The episode will also feature panel discussions where our top-class selection of thought leaders will break down the challenges facing the security community, both today and on the horizon in the new year.

    December’s episode will feature:

    - Greg Day’s Cyber Security Predictions for 2017

    - How ‘Aperture’ will revolutionise the way companies approach their internet security

    - Silver Terrier: That Nigerian Prince has evolved his game

    - November Breach Prevention Week Highlights

    - Ignite 2017: why you should attend!

    Join us for the last Cyber Defence Today of 2016!
  • Silver Terrier: That Nigerian Prince has evolved his game Recorded: Dec 15 2016 49 mins
    Alexander Hinchliffe, Threat Intelligence Analyst, Unit 42, EMEA
    Correctly assess and protect yourself against modern Nigerian threat actors.

    Join threat intelligence analysts Peter Renals and Simon Conant from Unit 42 for a discussion about malware attacks from Nigerian threat actors, dubbed “SilverTerrier.” This group has grown significantly since 2014, from fewer than 100 attacks to a current rate of 5,000–8,000 per month. These attacks are largely victim-agnostic, spanning all major industry verticals and focusing more on businesses than individuals.

    You’ll learn about:

    - How Nigerian threat actors have successfully employed commodity malware tools with precision, to target many organizations at scale.
    - The financial impact of these attacks.
    - Techniques utilized to disguise commodity malware, including business email compromise and spoofing, and how to prevent them.
  • Come proteggerti quando l’antivirus continua a fallire Recorded: Dec 15 2016 60 mins
    Domenico Stranieri, System Engineer di Palo Alto Networks
    Come proteggerti quando l’antivirus continua a fallire
Webcasts and Videos
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content — by user, not just by IP address. Based on patent-pending App-ID™ technology, Palo Alto Networks firewalls accurately identify and control threats and applications — regardless of port, protocol, evasive tactic, or SSL encryption — and scan content to stop threats and prevent data leakage. Palo Alto Networks delivers proven threat prevention combining IPS, anti-malware, URL, file and content filtering in a single integrated engine supported by one of the industry’s most prolific vulnerability research teams.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Prevention Week: Knowledge is Power. What we know powers better prevention.
  • Live at: Feb 19 2016 2:00 am
  • Presented by: Vicky Ray, Threat Intelligence Senior Consultant
  • From:
Your email has been sent.
or close