Hi [[ session.user.profile.firstName ]]

Cybersecurity for Financial Services Industry

IT security and network teams at financial services institutions must address demands to rapidly adopt new technology, protect intellectual property, and comply with regulations. Additionally, they must also enable secure access to personal and commercial financial data from a variety of access points ­(e.g., retail branches, mobile devices, third-party business partners) while combating an increasing volume and sophistication of threats. This presentation will offer a reference blueprint for addressing all of these concerns with the Palo Alto Networks security platform, and share some use cases from the financial services industry.
Recorded Mar 15 2016 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Lawrence Chin, Security Architect
Presentation preview: Cybersecurity for Financial Services Industry

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Live chat - Ransomware Survey findings Jan 17 2017 9:00 am UTC 30 mins
    Alex Hinchliffe, EMEA Threat Intelligence Analyst, Unit 42, & Ramon de Boer, Sales Lead, EMEA, Palo Alto Networks
    A 30 minute interactive discussion based on the findings and outcome of the EMEA Ransomware Survey run by Palo Alto Networks in December 2016.
  • Outcome-Driven Threat Intelligence with AutoFocus Dec 16 2016 6:00 pm UTC 60 mins
    Palo Alto Networks: Ryan Olson, Intelligence Director of Unit 42 & Scott Simkin, Sr. Group Manager, Threat Intelligence Cloud
    More data doesn’t always equal better prevention. It often feels like there is an arms race underway, with security operations and response professionals in the sights of an escalating amount of alerts and threat data, which can sometimes do more harm than good. You need a new outcome-driven approach to threat intelligence, with a focus on prevention and operationalizing action, versus simply adding more data.

    Unit 42, the Palo Alto Networks® threat research team, is putting this new mindset into practice, discovering new malware families, campaigns and adversaries with the AutoFocus threat intelligence service. Join Ryan Olson, Intelligence Director for Unit 42, to see how his team uses AutoFocus to help automate research, hunting and security operations workflows. You will see real applications of threat intelligence, by one of the best teams in the industry, including:

    --- How AutoFocus can help you scale detection and prevention efforts without additional, specialized security staff.
    --- How to automate security analysis and response workflows with AutoFocus.
    --- Real world use-cases from Unit 42’s research efforts.
  • Cómo protegerse cuando el AV sigue fallando Dec 16 2016 9:00 am UTC 60 mins
    Xavier Homs, Palo Alto Networks
    Cómo protegerse cuando el AV sigue fallando
  • Cyber Defence Today: December Edition Dec 15 2016 2:30 pm UTC 15 mins
    Palo Alto Networks
    We continue with our Series of Cyber Defence Today, finishing off the year with a high!

    Hosted by leading technology journalist Georgie Barrat, we will be speaking with It Security Experts from all over Europe, showcasing recent Cyber Security events and panel discussions, learning the most up to date information about the current challenges facing the security community.

    Topics covered in Decembers Edition:

    - Greg Day’s Cyber Security Predictions for 2017
    - How ‘Aperature’ will revolutionise the way companies approach their internet security
    - Silver Terrier: That Nigerian Prince has evolved his game
    - November Breach Prevention Week Highlights
    - Ignite 2017, why you should attend!
    - Troela Oerting, CSO at Barclays Reviews 2016
  • Silver Terrier: That Nigerian Prince has evolved his game Dec 15 2016 1:00 pm UTC 60 mins
    Alexander Hinchliffe, Threat Intelligence Analyst, Unit 42, EMEA
    Correctly assess and protect yourself against modern Nigerian threat actors.

    Join threat intelligence analysts Peter Renals and Simon Conant from Unit 42 for a discussion about malware attacks from Nigerian threat actors, dubbed “SilverTerrier.” This group has grown significantly since 2014, from fewer than 100 attacks to a current rate of 5,000–8,000 per month. These attacks are largely victim-agnostic, spanning all major industry verticals and focusing more on businesses than individuals.

    You’ll learn about:

    - How Nigerian threat actors have successfully employed commodity malware tools with precision, to target many organizations at scale.
    - The financial impact of these attacks.
    - Techniques utilized to disguise commodity malware, including business email compromise and spoofing, and how to prevent them.
  • Come proteggerti quando l’antivirus continua a fallire Dec 15 2016 10:00 am UTC 60 mins
    Domenico Stranieri, System Engineer di Palo Alto Networks
    Come proteggerti quando l’antivirus continua a fallire
  • SilverTerrier: That Nigerian Prince Has Evolved His Game Dec 15 2016 9:00 am UTC 45 mins
    Peter Renals, Unit 42
    Correctly assess and protect yourself against modern Nigerian threat actors.

    Join threat intelligence analysts Peter Renals and Simon Conant from Unit 42 for a discussion about malware attacks from Nigerian threat actors, dubbed “SilverTerrier.” This group has grown significantly since 2014, from fewer than 100 attacks to a current rate of 5,000–8,000 per month. These attacks are largely victim-agnostic, spanning all major industry verticals and focusing more on businesses than individuals.

    You’ll learn about:

    - How Nigerian threat actors have successfully employed commodity malware tools with precision, to target many organizations at scale.
    - The financial impact of these attacks.
    - Techniques utilized to disguise commodity malware, including business email compromise and spoofing, and how to prevent them.
  • SilverTerrier: That Nigerian Prince Has Evolved His Game Dec 15 2016 2:00 am UTC 45 mins
    Peter Renals, Unit 42
    Correctly assess and protect yourself against modern Nigerian threat actors.

    Join threat intelligence analysts Peter Renals and Simon Conant from Unit 42 for a discussion about malware attacks from Nigerian threat actors, dubbed “SilverTerrier.” This group has grown significantly since 2014, from fewer than 100 attacks to a current rate of 5,000–8,000 per month. These attacks are largely victim-agnostic, spanning all major industry verticals and focusing more on businesses than individuals.

    You’ll learn about:

    - How Nigerian threat actors have successfully employed commodity malware tools with precision, to target many organizations at scale.
    - The financial impact of these attacks.
    - Techniques utilized to disguise commodity malware, including business email compromise and spoofing, and how to prevent them.
  • Teaming Together to Prevent Attacks and Protect Your Data Dec 14 2016 6:00 pm UTC 60 mins
    Brian Torres-Gil, Solutions Architect, Palo Alto Networks
    Targeted attacks — including advanced persistent threats (APTs) — and today’s sophisticated malware threats are one of the biggest challenges facing customer’s as the threats multiply and create unique compromises within their networks. This creates challenges for traditional security technologies to reliably identify these new class of threats. Even when a threat is detected, there is still the issue of slow response times and extended periods of exposure, as administrators typically need to manually coordinate and configure the necessary changes to their security infrastructure.

    Please join us as we work together to deliver an advanced visibility, reporting and monitoring solution for intelligent security analysis that addresses this challenge and delivers new tools to quickly identify and analyze this new class of threats. We will show you how this integration insures better threat response time, and how to automate the steps needed to block malicious sources and quarantine compromised devicesyou through how Palo Alto Networks and Splunk.

    Key Benefits:
    - Advanced security and visibility in the cloud, on premise, or hybrid model
    - Accelerated threat response and enhanced threat detection
    - Security visualization, monitoring and analysis
    - Demo to show you how to identify ransomware and correlate IOC data through the app and use adaptive response to take actions
  • Que faire lorsque votre Antivirus ne cesse de vous faire faux bond Dec 14 2016 2:00 pm UTC 60 mins
    Thomas Benoit, Ingénieur Systèmes chez Palo Alto Networks France
    Que faire lorsque votre Antivirus ne cesse de vous faire faux bond
  • How to Enable Zero Trust Security for Your Data Center Dec 13 2016 6:00 pm UTC 60 mins
    John Kindervag, Vice President and Principal Analyst at Forrester
    The rising tide of successful cyberattacks against organizations has made it clear that traditional approaches for defining trust levels, stopping lateral movement and enforcing advanced security controls within a data center are no longer effective. The Zero Trust approach advocated by Forrester provides guiding principles for achieving a robust and secure data center security architectures. However, choice of the security platform, design considerations and effective use of advanced security capabilities play a crucial role in implementing a successful Zero Trust enabled data center.

    In this webinar, guest speaker John Kindervag, Vice President and Principal Analyst at Forrester will talk about the steps to achieving a Zero Trust data center.

    Topics covered in this webinar will include:

    - 5 Steps to achieving Zero Trust enabled data centers.
    - Extending Zero Trust design principles across hybrid cloud deployments
    - Security policy considerations and guidelines for implementing Zero Trust enabled data centers.
  • Exploit kits: getting in by any means necessary Recorded: Dec 9 2016 50 mins
    Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity (hint: it’s a big business!)
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits
  • Exploit kits: getting in by any means necessary Recorded: Dec 9 2016 50 mins
    Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity (hint: it’s a big business!)
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits
  • Exploit kits: getting in by any means necessary Recorded: Dec 7 2016 50 mins
    Scott Simkin, Sr. Group Manager for Threat Intelligence Cloud, Palo Alto Networks
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity (hint: it’s a big business!)
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits
  • Live Demo: Advanced Endpoint Protection Recorded: Dec 2 2016 53 mins
    Christiaan Groenhof, Inside Systems Engineer at Palo Alto Networks
    Attackers are getting more targeted and advanced, deploying unknown exploits and unique malware that current day endpoint security is not equipped to prevent or even detect. Existing approaches simply can’t protect against these attacks because they don’t have known signatures, known strings –and in many cases, no previously known behavior-so they go straight through, resulting in compromised endpoints waiting for detection and remediation to step in, which is too little too late.

    Palo Alto Networks Advanced Endpoint Protection is a complete paradigm shift from detection remediation to pure prevention, designed to close the door on these threats, which manage to evade detection by network-based security or take advantage of blind spots, well before any damage can be done.

    Join Palo Alto Networks® for a Live Webinar to learn about the breakthrough advanced endpoint technology that redefines endpoint security as we know it
  • Live Demo: AutoFocus Recorded: Dec 2 2016 45 mins
    Ronald den Braven, Consulting Engineer at Palo Alto Networks
    Join us for a live demo and learn how AutoFocus threat intelligence service helps security teams identify and prevent targeted attacks. We will explain the key concepts of AutoFocus and benefits the service provides.
  • Live Demo: VM-Series for AWS Recorded: Dec 2 2016 37 mins
    Tom Welling, Systems Engineer at Palo Alto Networks
    Securing public cloud environments has never been more challenging. Cyberattacks are on the rise, targeting your business-critical data using applications commonly found on every network. Compounding your data security challenge is the lack of application visibility and control features available in existing cloud security offerings.

    The VM-Series for AWS addresses these challenges with a complete set of next-generation firewall and advanced threat prevention features that allow you to identify and control your AWS-based applications and protect your data from known and unknown threats.
  • Live Demo: Safely Enable SaaS Applications with Aperture Recorded: Dec 2 2016 45 mins
    Omar Amarin, Inside Sales Engineer at Palo Alto Networks
    The adoption of SaaS applications continues to grow at an exponential pace. You do not want to clamp down on these applications because they are valuable tools for many of your employees. However, because the data and usage of these SaaS applications is invisible to IT administrators, they do expose your organization to potentially disastrous security and data theft risks.

    Join us for a live webinar where you will learn how your organization can enable safe usage of SaaS applications and:

    •Gain visibility and granular, context-based control of SaaS applications.
    •Protect corporate data from malicious and inadvertent exposure after it has left the traditional corporate perimeter.
    •Protect against new insertion and distribution points for malware.
    •Satisfy compliance requirements while still maintaining the benefits of SaaS based application services.

    The challenges of SaaS applications are already here whether they are enabled by IT or end users themselves. Find out how to take back control and safely enable their use.
  • SilverTerrier: That Nigerian Prince Has Evolved His Game Recorded: Nov 30 2016 45 mins
    Peter Renals, Unit 42
    Correctly assess and protect yourself against modern Nigerian threat actors.

    Join threat intelligence analysts Peter Renals and Simon Conant from Unit 42 for a discussion about malware attacks from Nigerian threat actors, dubbed “SilverTerrier.” This group has grown significantly since 2014, from fewer than 100 attacks to a current rate of 5,000–8,000 per month. These attacks are largely victim-agnostic, spanning all major industry verticals and focusing more on businesses than individuals.

    You’ll learn about:

    - How Nigerian threat actors have successfully employed commodity malware tools with precision, to target many organizations at scale.
    - The financial impact of these attacks.
    - Techniques utilized to disguise commodity malware, including business email compromise and spoofing, and how to prevent them.
  • An Analysis of Recent Data Breaches in the Banking Industry Recorded: Nov 30 2016 42 mins
    Lawrence Chin - Financial Services Security Market Architect - Palo Alto Networks
    They say that hindsight is 20/20 and in recent months, news of data breaches at several SWIFT (Society for Worldwide Interbank Financial Telecommunications) members has seen many reassessing their cybersecurity strategies.

    Palo Alto Networks invites you to join a webinar where Lawrence Chin, Security Market Architect, will discuss:

    ● A review of these attacks and some of the commonalities
    ● The role of cyber security hygiene, and subsequent recommendations from SWIFT, FS-ISAC (Financial Services Information Sharing and Analysis Center), and US FFIEC (Federal Financial Institutions Examination Council).
    ● Best practices that may prevent similar cyberattacks on financial institutions from succeeding in the future.

    Register today and learn how the confidence and trust can be protected in the increasingly complex digital world in which we live.
Webcasts and Videos
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content — by user, not just by IP address. Based on patent-pending App-ID™ technology, Palo Alto Networks firewalls accurately identify and control threats and applications — regardless of port, protocol, evasive tactic, or SSL encryption — and scan content to stop threats and prevent data leakage. Palo Alto Networks delivers proven threat prevention combining IPS, anti-malware, URL, file and content filtering in a single integrated engine supported by one of the industry’s most prolific vulnerability research teams.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cybersecurity for Financial Services Industry
  • Live at: Mar 15 2016 2:00 am
  • Presented by: Lawrence Chin, Security Architect
  • From:
Your email has been sent.
or close