Hi [[ session.user.profile.firstName ]]

Why Layered Security Strategies Don’t Work

Every year, enterprises spend record levels of money on new IT security technology – yet major breaches and compromises are more prevalent than ever. The concept of “layered security” – in which enterprises support a wide variety of security technologies in order to discourage attackers – doesn’t seem to be working.

It’s time to rethink IT security – not just the technology, but the way enterprises approach it from a strategic, architectural perspective. There are ways for organizations to build a comprehensive set of defenses – a security architecture – that can not only discourage attackers, but actually prevent them from penetrating your IT environment.

In this webcast, you will learn some of the basics of building a next-generation IT security architecture, including:

- How the foundational architecture of a next-gen firewall and security platform “matters” in enabling the business, and protecting it against a wide variety of attacks.
- How the architecture enables unique and specific security scenarios.
- How the architecture supports a prevention-oriented approach.
Recorded Mar 16 2016 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Glenn Dasmalchi, Director at Palo Alto Networks
Presentation preview: Why Layered Security Strategies Don’t Work

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Phishing & Credential Abuse 201 – Inside the Attack Aug 4 2017 9:00 am UTC 60 mins
    Brad Duncan, Unit 42 Threat Intelligence Analyst, Palo Alto Networks
    This 201 level course builds on the introductory material of Phishing & Credential Theft 101 and takes it deeper. After this course, you’ll understand better how phishers and credential theft attackers ply their trade and how attacks actually work. The course will go into detail on two selected, publicly known breaches which involved credential theft and abuse.

    In this presentation, our Unit 42 Threat Intelligence team will show you:
    • How credential theft and abuse were used in real world attacks
    • Demonstration of tools attackers use to capture credentials.
    • How attackers buy and sell credentials on the dark web to further their criminal operations.
  • Phishing & Credential Abuse 201 – Inside the Attack Aug 4 2017 2:00 am UTC 60 mins
    Brad Duncan, Unit 42 Threat Intelligence Analyst, Palo Alto Networks
    This 201 level course builds on the introductory material of Phishing & Credential Theft 101 and takes it deeper. After this course, you’ll understand better how phishers and credential theft attackers ply their trade and how attacks actually work. The course will go into detail on two selected, publicly known breaches which involved credential theft and abuse.

    In this presentation, our Unit 42 Threat Intelligence team will show you:
    • How credential theft and abuse were used in real world attacks
    • Demonstration of tools attackers use to capture credentials.
    • How attackers buy and sell credentials on the dark web to further their criminal operations.
  • Disrupting Credential-based Attacks Aug 3 2017 9:00 am UTC 60 mins
    Martin Walter, Product Line Manager, Palo Alto Networks
    Learn how to use the Palo Alto Networks next-generation security platform to disrupt the unique attack lifecycle used in credential-based attacks. In this session, get details about the strategies and key technologies for preventing both the theft and abuse of credentials.

    In this session, get details on:
    * Why the platform plays a critical role towards disrupting credential-based attacks
    * Preventing the theft of credentials, using new PAN-OS 8.0 technologies
    * Stopping the use of stolen credentials, through new multi-factor authentication capabilities in PAN-OS 8.0
  • Disrupting Credential-based Attacks Aug 3 2017 2:00 am UTC 60 mins
    Martin Walter, Product Line Manager, Palo Alto Networks
    Learn how to use the Palo Alto Networks next-generation security platform to disrupt the unique attack lifecycle used in credential-based attacks. In this session, get details about the strategies and key technologies for preventing both the theft and abuse of credentials.

    In this session, get details on:
    * Why the platform plays a critical role towards disrupting credential-based attacks
    * Preventing the theft of credentials, using new PAN-OS 8.0 technologies
    * Stopping the use of stolen credentials, through new multi-factor authentication capabilities in PAN-OS 8.0
  • How does Credential Theft Affect Your Organization? Aug 2 2017 9:00 am UTC 60 mins
    Brian Tokuyoshi, Sr Product Marketing Manager, Palo Alto Networks
    The effects of a credential-based attack differs by organization and by job function. In this session, we will cover a look at how these attacks affect different types of organizations, along with the analysis and demonstration of how an attack is done.

    In this session, hear about:
    * Credential theft industry research coverage
    * Industry analysis of the problem space
    * Application of the credential theft lifecycle in light of recent attacks
  • How does Credential Theft Affect Your Organization? Aug 2 2017 2:00 am UTC 60 mins
    Brian Tokuyoshi, Sr Product Marketing Manager, Palo Alto Networks
    The effects of a credential-based attack differs by organization and by job function. In this session, we will cover a look at how these attacks affect different types of organizations, along with the analysis and demonstration of how an attack is done.

    In this session, hear about:
    * Credential theft industry research coverage
    * Industry analysis of the problem space
    * Application of the credential theft lifecycle in light of recent attacks
  • Phishing & Credential Abuse 101: Exposing the Ecosystem and Motives Behind Aug 1 2017 9:00 am UTC 60 mins
    Jen Miller-Osborn, Unit 42 Threat Intelligence Analyst, Palo Alto Networks
    Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials.

    Join our Unit 42 threat intelligence analyst for an insightful perspective on credential-based attacks and phishing. In addition to presenting its unique attack life-cycle, she will:

    • Identify trends and techniques in methods used for credential theft and abuse.
    • Review how cyber criminals have changed their tactics to compromise networks.
    • Examine who is being targeted, and why.
    • Discuss techniques to stop credential leakage.
  • Phishing & Credential Abuse 101: Exposing the Ecosystem and Motives Behind Aug 1 2017 2:00 am UTC 60 mins
    Jen Miller-Osborn, Unit 42 Threat Intelligence Analyst, Palo Alto Networks
    Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials.

    Join our Unit 42 threat intelligence analyst for an insightful perspective on credential-based attacks and phishing. In addition to presenting its unique attack life-cycle, she will:

    • Identify trends and techniques in methods used for credential theft and abuse.
    • Review how cyber criminals have changed their tactics to compromise networks.
    • Examine who is being targeted, and why.
    • Discuss techniques to stop credential leakage.
  • [Breach Prevention] Phishing & Credential Abuse 201 – Inside the Attack Jul 27 2017 5:00 pm UTC 60 mins
    Brad Duncan, Unit 42 Threat Intelligence Analyst, Palo Alto Networks
    This 201 level course builds on the introductory material of Phishing & Credential Theft 101 and takes it deeper. After this course, you’ll understand better how phishers and credential theft attackers ply their trade and how attacks actually work. The course will go into detail on two selected, publicly known breaches which involved credential theft and abuse.

    In this presentation, our Unit 42 Threat Intelligence team will show you:
    • How credential theft and abuse were used in real world attacks
    • Demonstration of tools attackers use to capture credentials.
    • How attackers buy and sell credentials on the dark web to further their criminal operations.
  • [Breach Prevention] Disrupting Credential-based Attacks Jul 26 2017 5:00 pm UTC 60 mins
    Martin Walter, Product Line Manager, Palo Alto Networks
    Learn how to use the Palo Alto Networks next-generation security platform to disrupt the unique attack lifecycle used in credential-based attacks. In this session, get details about the strategies and key technologies for preventing both the theft and abuse of credentials.

    In this session, get details on:
    * Why the platform plays a critical role towards disrupting credential-based attacks
    * Preventing the theft of credentials, using new PAN-OS 8.0 technologies
    * Stopping the use of stolen credentials, through new multi-factor authentication capabilities in PAN-OS 8.0
  • [Breach Prevention] How does Credential Theft Affect Your Organization? Jul 25 2017 5:00 pm UTC 60 mins
    Brian Tokuyoshi, Sr Product Marketing Manager, Palo Alto Networks
    The effects of a credential-based attack differs by organization and by job function. In this session, we will cover a look at how these attacks affect different types of organizations, along with the analysis and demonstration of how an attack is done.

    In this session, hear about:
    * Credential theft industry research coverage
    * Industry analysis of the problem space
    * Application of the credential theft lifecycle in light of recent attacks
  • [Breach Prevention] Phishing & Credential Abuse 101: Exposing the Ecosystem Jul 24 2017 5:00 pm UTC 60 mins
    Jen Miller-Osborn, Unit 42 Threat Intelligence Analyst, Palo Alto Networks
    Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials.

    Join our Unit 42 threat intelligence analyst for an insightful perspective on credential-based attacks and phishing. In addition to presenting its unique attack life-cycle, she will:

    • Identify trends and techniques in methods used for credential theft and abuse.
    • Review how cyber criminals have changed their tactics to compromise networks.
    • Examine who is being targeted, and why.
    • Discuss techniques to stop credential leakage.
  • Strike back at endless security alerts with Wildfire Jul 13 2017 8:00 am UTC 60 mins
    Ronald Den Braven, CSE, EMEA, Palo Alto Networks
    Are you being overwhelmed by waves of security alerts, logs and reports?

    If so, it's time to strike back!
    During this interactive webinar, you'll discover how to:

    Avoid spending a lifetime reacting to alerts and digging through logs
    Enforce protection that'll help stop you from being swamped by reports
    Save protection that'll help stop you from being swamped by reports
  • How to Prevent Breaches through Application Controls Jul 6 2017 8:00 am UTC 60 mins
    Navneet Singh, Director, Product Marketing
    Employees are accessing any application they want, using work or personal devices, regardless of the business and security risks involved.

    What are you doing to protect your organization’s data?

    Join the webinar and discover:
    • How attackers use apps to infect and exfiltrate data
    • How to use app control the right way to prevent breaches
    • How to extend visibility and control to SaaS apps
  • Palo Alto Networks Capture the Flag: Can you Escape the LabyREnth? Jun 29 2017 5:00 pm UTC 30 mins
    Samantha Pierre, Product Marketing Manager & the GSRT Team
    It’s only been a few weeks since Unit 42’s LabyREnth Capture the Flag (CTF) competition went live, but things are already getting interesting. Malware reverse engineers and threat experts across the world are testing their technical skills in binaries, threat intelligence, programming, and more. Amour has been acquired, tears have been shed, cows have been spotted... Plus, puppies!

    Have you escaped the LabyREnth yet?

    Whether you’ve solved a few security challenges or you’re still lost in the maze, be sure to join CTF creators on Tuesday, June 27 at 10am PT for a live webinar where you’ll:

    - Learn about our LabyREnth Capture the Flag competition
    - Hear why we launched the CTF
    - Get clues to help you solve challenges and escape the LabyREnth
  • How to Safely & Reliably Enable Office 365 Jun 28 2017 4:00 pm UTC 45 mins
    Keith Steller, System Engineer at Palo Alto Networks
    As enterprises continue adopting Microsoft® Office 365™, there is continued focus on safely and reliably enabling it. Join this webinar to learn how you can leverage Palo Alto Networks Next-Generation Security Platform to transform your security stack and achieve the following goals:
     
    1.Enhanced network traffic visibility and context.
    2.Address security concerns around dynamic nature of O365 changing IPs, ports, and URLs.
    3.Allow granular control within an application including controlling enterprise vs consumer access.
     
    We will discuss how you can use Palo Alto Networks App-ID in combination with application signatures and URL filtering to achieve all of the above-mentioned objectives.
  • Breach Prevention Week: High-Performance, Intelligent, Centralized Management Recorded: Jun 23 2017 23 mins
    Navneet Singh from Palo alto Networks
    Greater Visibility, Faster Access, Workflow Automation

    The most innovative, advanced technology loses value if not managed effectively. We will discuss how to get access to the richest, most comprehensive set of actionable data from the network as well as from the endpoints or other third-party sources. Combined with complete network visibility and increased automation, organizations are able to streamline management workflows and focus on the issues that matter most.
  • Breach Prevention Week: Use Breakthrough Performance HW to Secure your Network Recorded: Jun 22 2017 29 mins
    Navneet Singh and Sai Balabhadrapatruni from Palo alto Networks
    Secure Increasingly Encrypted Traffic and Enable Cloud Adoption

    The increasing use of encrypted traffic and rapid consumption of cloud-based applications, coupled with ever-increasing data center consolidation, are driving new processing power, performance and capacity requirements. We will discuss how high-performance hardware appliances help deliver next-generation security capabilities anywhere in the network, including data center cores and enterprise perimeters, as well as branch and remote offices.
  • Breach Prevention Week: Use Automation to Prevent Evasive Threats and C2 Traffic Recorded: Jun 21 2017 45 mins
    Scott Simkin, Sr. Manager Threat Intelligence at Palo Alto Networks
    Turn Raw Threat Intelligence Into Context and Action

    Attackers don’t stand still; your defenses shouldn’t either. See how multi-method threat prevention can be used to detect and prevent the most evasive threats and command-and-control traffic, and open up any source of threat intelligence to be used for automated prevention. These capabilities drive up the cost of successful data breaches for attackers, making their efforts too expensive to consider.

    You will learn more about:

    •How an evasion-resistant analysis environment defeats whole classes of VM evasion techniques.
    •Threat prevention capabilities that automate the blocking of command-and-control traffic in a way that previously required teams of signature writers.
    •How to enable security teams to gain leverage from any source of threat intelligence and drive automated prevention.
  • Breach Prevention Week: Accelerating Multi-Cloud Deployments Recorded: Jun 20 2017 39 mins
    Matt Keil, Director of Product Marketing, Public Cloud at Palo Alto Networks
    Organizations are rapidly embracing multi-cloud architectures that span software-defined data centers (private clouds) and public cloud environments. To help organizations protect their cloud-based applications and data from cyberattacks, PAN-OS® 8.0 expands the VM-Series with new models and optimized performance, making it the broadest, most powerful line of virtualized firewall appliances on the market. New scalability and resiliency features for Microsoft® Azure® and Amazon® Web Services enable organizations to build secure cloud-centric architectures. Workflow automation features for VMware® NSX® and KVM with OpenStack® help streamline VM-Series deployments.
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Why Layered Security Strategies Don’t Work
  • Live at: Mar 16 2016 9:00 am
  • Presented by: Glenn Dasmalchi, Director at Palo Alto Networks
  • From:
Your email has been sent.
or close