Hi [[ session.user.profile.firstName ]]

The Rise of Ransomware: Three Critical Steps to Prevent an Outbreak

Threat actors have discovered that targeting organizations with ransomware can be far more lucrative than extorting small sums from home users. Ransomware is on the rise. But your organization does not have to become a victim. Automated prevention is certainly achievable.

Join us for this live webinar where you will learn:

• Which three steps you must take to successfully prevent an outbreak in your organization
• Why existing endpoint security solutions often fail to prevent ransomware infections
• Which organizations threat actors target most intently with ransomware
• What endpoint protection technology capabilities are necessary to automate ransomware prevention
• Which three delivery vectors attackers use in nearly all ransomware infections
Recorded May 26 2016 42 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Michael Moshiri, Director, Endpoint Protection
Presentation preview: The Rise of Ransomware: Three Critical Steps to Prevent an Outbreak

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Attacks Happen—Breaches Don't Have To. Learn about the Security Lifecycle Review Apr 25 2017 12:00 pm UTC 60 mins
    tbd
    Excuses stop. Answers start.

    Strict policies and solid security measures can’t eliminate hidden threats in your systems. Learn how our Security Lifecycle Review (SLR) examines your network traffic and then generates a comprehensive report unique to your organization.

    In this webinar, you’ll discover some of the types of applications and threats exposing vulnerabilities in your security’s posture.

    There’s no need for excuses. Register now and see what’s really happening on your network.
  • Prevent Costly Data Leaks From SaaS Apps Apr 20 2017 6:00 pm UTC 60 mins
    Anuj Sawani, Sr. Product Marketing Manager at Palo Alto Networks
    SaaS apps are now extensively adopted by organizations – some procured by IT, others adopted by the users themselves. You’re already likely witnessing large amounts of data being transferred between users and these apps. As corporate data moves to the cloud, the risk of a data leakage increases with users accessing enterprise apps on unmanaged devices or storing corporate data on risky, unsanctioned apps. 
     
    Join this webinar to learn how to prevent data exposure and maintain compliance by protecting your data within enterprise SaaS apps and blocking unsanctioned apps. You’ll learn about: 
    •A real-world customer journey for complete data security in SaaS.
    •Common threats leading to data leaks from popular SaaS apps.
    •Benefits of adopting a platform approach to SaaS security.
  • Prevention Week Pt. 5: High-Performance, Intelligent, Centralized Management Apr 6 2017 8:00 am UTC 60 mins
    Navneet Singh from Palo alto Networks
    Greater Visibility, Faster Access, Workflow Automation

    The most innovative, advanced technology loses value if not managed effectively. We will discuss how to get access to the richest, most comprehensive set of actionable data from the network as well as from the endpoints or other third-party sources. Combined with complete network visibility and increased automation, organizations are able to streamline management workflows and focus on the issues that matter most.
  • Prevention Week Pt. 5: High-Performance, Intelligent, Centralized Management Apr 6 2017 2:00 am UTC 60 mins
    Navneet Singh from Palo alto Networks
    Greater Visibility, Faster Access, Workflow Automation

    The most innovative, advanced technology loses value if not managed effectively. We will discuss how to get access to the richest, most comprehensive set of actionable data from the network as well as from the endpoints or other third-party sources. Combined with complete network visibility and increased automation, organizations are able to streamline management workflows and focus on the issues that matter most.
  • Prevention Week Pt 4: Use Breakthrough Performance HW to Secure your Network Apr 5 2017 8:00 am UTC 60 mins
    Navneet Singh and Sai Balabhadrapatruni from Palo alto Networks
    Secure Increasingly Encrypted Traffic and Enable Cloud Adoption

    The increasing use of encrypted traffic and rapid consumption of cloud-based applications, coupled with ever-increasing data center consolidation, are driving new processing power, performance and capacity requirements. We will discuss how high-performance hardware appliances help deliver next-generation security capabilities anywhere in the network, including data center cores and enterprise perimeters, as well as branch and remote offices.
  • Prevention Week Pt 4: Use Breakthrough Performance HW to Secure your Network Apr 5 2017 2:00 am UTC 60 mins
    Navneet Singh and Sai Balabhadrapatruni from Palo alto Networks
    Secure Increasingly Encrypted Traffic and Enable Cloud Adoption

    The increasing use of encrypted traffic and rapid consumption of cloud-based applications, coupled with ever-increasing data center consolidation, are driving new processing power, performance and capacity requirements. We will discuss how high-performance hardware appliances help deliver next-generation security capabilities anywhere in the network, including data center cores and enterprise perimeters, as well as branch and remote offices.
  • 2017 Cybersecurity Predictions Leadership Webinar Mar 30 2017 6:30 pm UTC 60 mins
    Rick Howard, CSO, and Ryan Olson, Unit 42 Intelligence Director, Palo Alto Networks
    Cybersecurity is in a state of constant change and evolution. Executive leaders have an opportunity to get ahead of cybercriminals by understanding existing and potential threats and how to mitigate against them.

    In this leadership webinar designed specifically for CSO’s and technical security executives, Palo Alto Networks CSO, Rick Howard, and Unit 42 Intelligence Director, Ryan Olson, will review the cybersecurity predictions and share best practices for achieving a more resilient posture in 2017. Join us to learn about “Sure Things” (predictions that are almost guaranteed to happen) and “Long Shots” (predictions that are less likely to happen) in cybersecurity this year.

    Get the executive point of view on these top-of-mind CSO initiatives as we discuss:
    •Why automation and playbook models will take on key roles in threat intelligence sharing.
    •Why cybersecurity is extending beyond the IT department and what your can do about it.
    •Trends for ransomware and practical advice to protect your organization from attacks.
  • Prevention Week Pt 3: Use Automation to Prevent Evasive Threats and C2 Traffic Mar 30 2017 8:00 am UTC 60 mins
    Scott Simkin, Sr. Manager Threat Intelligence at Palo Alto Networks
    Turn Raw Threat Intelligence Into Context and Action

    Attackers don’t stand still; your defenses shouldn’t either. See how multi-method threat prevention can be used to detect and prevent the most evasive threats and command-and-control traffic, and open up any source of threat intelligence to be used for automated prevention. These capabilities drive up the cost of successful data breaches for attackers, making their efforts too expensive to consider.

    You will learn more about:

    •How an evasion-resistant analysis environment defeats whole classes of VM evasion techniques.
    •Threat prevention capabilities that automate the blocking of command-and-control traffic in a way that previously required teams of signature writers.
    •How to enable security teams to gain leverage from any source of threat intelligence and drive automated prevention.
  • Prevention Week Pt 3: Use Automation to Prevent Evasive Threats and C2 Traffic Mar 30 2017 2:00 am UTC 60 mins
    Scott Simkin, Sr. Manager Threat Intelligence at Palo Alto Networks
    Turn Raw Threat Intelligence Into Context and Action

    Attackers don’t stand still; your defenses shouldn’t either. See how multi-method threat prevention can be used to detect and prevent the most evasive threats and command-and-control traffic, and open up any source of threat intelligence to be used for automated prevention. These capabilities drive up the cost of successful data breaches for attackers, making their efforts too expensive to consider.

    You will learn more about:

    •How an evasion-resistant analysis environment defeats whole classes of VM evasion techniques.
    •Threat prevention capabilities that automate the blocking of command-and-control traffic in a way that previously required teams of signature writers.
    •How to enable security teams to gain leverage from any source of threat intelligence and drive automated prevention.
  • Prevention Week Pt 2: Accelerating Multi-Cloud Deployments Recorded: Mar 29 2017 39 mins
    Matt Keil, Director of Product Marketing, Public Cloud at Palo Alto Networks
    Organizations are rapidly embracing multi-cloud architectures that span software-defined data centers (private clouds) and public cloud environments. To help organizations protect their cloud-based applications and data from cyberattacks, PAN-OS® 8.0 expands the VM-Series with new models and optimized performance, making it the broadest, most powerful line of virtualized firewall appliances on the market. New scalability and resiliency features for Microsoft® Azure® and Amazon® Web Services enable organizations to build secure cloud-centric architectures. Workflow automation features for VMware® NSX® and KVM with OpenStack® help streamline VM-Series deployments.
  • Prevention Week Pt 2: Accelerating Multi-Cloud Deployments Recorded: Mar 29 2017 40 mins
    Matt Keil, Director of Product Marketing, Public Cloud at Palo Alto Networks
    Organizations are rapidly embracing multi-cloud architectures that span software-defined data centers (private clouds) and public cloud environments. To help organizations protect their cloud-based applications and data from cyberattacks, PAN-OS® 8.0 expands the VM-Series with new models and optimized performance, making it the broadest, most powerful line of virtualized firewall appliances on the market. New scalability and resiliency features for Microsoft® Azure® and Amazon® Web Services enable organizations to build secure cloud-centric architectures. Workflow automation features for VMware® NSX® and KVM with OpenStack® help streamline VM-Series deployments.
  • Attacks Happen—Breaches Don't Have To. Learn about the Security Lifecycle Review Recorded: Mar 28 2017 52 mins
    Jay Kane, VP Cyber Security & Mike Semaniuk, CISSP Systems Engineer, Palo Alto Networks
    Excuses stop. Answers start.

    Strict policies and solid security measures can’t eliminate hidden threats in your systems. Learn how our Security Lifecycle Review (SLR) examines your network traffic and then generates a comprehensive report unique to your organization.

    In this webinar, you’ll discover some of the types of applications and threats exposing vulnerabilities in your security’s posture.

    There’s no need for excuses. Register now and see what’s really happening on your network.
  • Prevention Week Pt 1: Stop Credential Theft and Abuse Recorded: Mar 28 2017 35 mins
    Brian Tokuyoshi, Senior Solutions Analyst at Palo Alto Networks
    Prevent Phishing and the Abuse of Stolen Credentials

    In this session, we will present the unique attack life-cycle for credential-based attacks. Using real-life examples from Unit 42, we will demonstrate what you can do today to stop credential theft and abuse.
  • Prevention Week Pt 1: Stop Credential Theft and Abuse Recorded: Mar 28 2017 35 mins
    Brian Tokuyoshi, Senior Solutions Analyst at Palo Alto Networks
    Prevent Phishing and the Abuse of Stolen Credentials

    In this session, we will present the unique attack life-cycle for credential-based attacks. Using real-life examples from Unit 42, we will demonstrate what you can do today to stop credential theft and abuse.
  • Prevent, Detect, and Respond – Securing Government and Education Onsite and in t Recorded: Mar 23 2017 72 mins
    Panel of 11 experts moderated by PSTE
    The Public Sector Technology Exchange (PSTE), an independent venue that hosts national thought leadership forums on the challenges of government, education, and technology, hosts a webinar entitled “Prevent, Detect, and Respond – Securing Government and Education Onsite and in the Cloud.”

    Hear this leadership forum on demand to gain insights on:
    •Security best practices for government and education
    •Strategies for rapid response to breaches
    •Reducing your departmental cyber attack surface
    •Preparing for the “powder keg” situation in your organization
    •What hackers love about the cloud
    •Threat research trends on the future of cyber warfare

    Webinar Panelists:

    Chris Hill - Acting Deputy Chief Information Security Officer
    State of Illinois

    John Matelski - Chief Innovation and Information Officer
    DeKalb County, Georgia

    Rick Howard - Chief Security Officer
    Palo Alto Networks

    Matt Morton - Chief Information Security Officer and Assistant Chief Information Officer
    University of Nebraska Omaha

    Elayne Starkey - Chief Security Officer
    State of Delaware

    Lars Schmekel - Chief Security Officer
    Miami Dade County, Florida

    Gary Hayslip - Chief Information Security Officer
    City of San Diego, California

    Walter Tong - Director, Cyber Intelligence
    State of Georgia

    Duane Kuroda - Sr. Manager, Advanced Technologies
    Proofpoint

    Bob Leek - Deputy Chief Information Officer
    Multnomah County, Oregon

    Palo Alto Networks and Proofpoint are the sponsors of this leadership forum.
  • Preventing Cyberattacks in Financial Services with Advanced Endpoint Protection Recorded: Mar 22 2017 60 mins
    Michael Moshiri, Director, Endpoint Protection & Lawrence Chin, Security Marketing Architect, Palo Alto Networks
    How effective are your legacy security solutions in protecting you from the latest cyberattacks targeting financial institutions? What are the most effective means for defending your organization from targeted attacks, ransomware, and unknown threats?

    In this event, we will discuss:
    - New cyberattacks in the financial sector that bypass your legacy security solutions
    - Why legacy antivirus and anti-malware solutions fail to protect your systems
    - How to predictably reduce the risks of cyberattacks in your organization
    - What capabilities you should require of any advanced endpoint protection product
    - How advanced endpoint protection prevents unknown threats from compromising your systems.
  • Software Defined Data Center starts at the perimeter Recorded: Mar 21 2017 42 mins
    Rob van der Wouw, Security Consultant at RedLogic
    Today’s enterprises are in to the Software Defined Data Centre (SDDC) for better way to utilize security, compute power, storage and networking. Security is not only about prevention, protection and defenses but also ensuring the enterprise that data and systems are safe.

    Where do you start? Learn from our partner Redlogic who supported several customers to accomplish this journey and started securing their SDDC at the perimeter.

    RedLogic is a young, professional IT infrastructure services company consisting of certified top professionals in security and ICT. Managing and deploying complex infrastructure and security.
  • Prevention Week Pt. 5: High-Performance, Intelligent, Centralized Management Recorded: Mar 17 2017 23 mins
    Navneet Singh from Palo alto Networks
    Greater Visibility, Faster Access, Workflow Automation

    The most innovative, advanced technology loses value if not managed effectively. We will discuss how to get access to the richest, most comprehensive set of actionable data from the network as well as from the endpoints or other third-party sources. Combined with complete network visibility and increased automation, organizations are able to streamline management workflows and focus on the issues that matter most.
  • Prevention Week Pt 4: Use Breakthrough Performance HW to Secure your Network Recorded: Mar 16 2017 29 mins
    Navneet Singh and Sai Balabhadrapatruni from Palo alto Networks
    Secure Increasingly Encrypted Traffic and Enable Cloud Adoption

    The increasing use of encrypted traffic and rapid consumption of cloud-based applications, coupled with ever-increasing data center consolidation, are driving new processing power, performance and capacity requirements. We will discuss how high-performance hardware appliances help deliver next-generation security capabilities anywhere in the network, including data center cores and enterprise perimeters, as well as branch and remote offices.
  • Prevention Week Pt 3: Use Automation to Prevent Evasive Threats and C2 Traffic Recorded: Mar 15 2017 45 mins
    Scott Simkin, Sr. Manager Threat Intelligence at Palo Alto Networks
    Turn Raw Threat Intelligence Into Context and Action

    Attackers don’t stand still; your defenses shouldn’t either. See how multi-method threat prevention can be used to detect and prevent the most evasive threats and command-and-control traffic, and open up any source of threat intelligence to be used for automated prevention. These capabilities drive up the cost of successful data breaches for attackers, making their efforts too expensive to consider.

    You will learn more about:

    •How an evasion-resistant analysis environment defeats whole classes of VM evasion techniques.
    •Threat prevention capabilities that automate the blocking of command-and-control traffic in a way that previously required teams of signature writers.
    •How to enable security teams to gain leverage from any source of threat intelligence and drive automated prevention.
Webcasts and Videos
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content — by user, not just by IP address. Based on patent-pending App-ID™ technology, Palo Alto Networks firewalls accurately identify and control threats and applications — regardless of port, protocol, evasive tactic, or SSL encryption — and scan content to stop threats and prevent data leakage. Palo Alto Networks delivers proven threat prevention combining IPS, anti-malware, URL, file and content filtering in a single integrated engine supported by one of the industry’s most prolific vulnerability research teams.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Rise of Ransomware: Three Critical Steps to Prevent an Outbreak
  • Live at: May 26 2016 5:00 pm
  • Presented by: Michael Moshiri, Director, Endpoint Protection
  • From:
Your email has been sent.
or close