Hi [[ session.user.profile.firstName ]]

The real cybersecurity risks for SCADA and ICS networks

It has been well known for some time now that cyber threats to critical national infrastructure has been escalating with many attacks making headline news.

Normal information assurance approaches used in the corporate environment may not be suitable for your critical infrastructure systems.

We understand the cybersecurity challenges you are facing today, and believe utilising a platform approach can effectively protect your key infrastructure by:

•Gaining granular visibility over operational network traffic
•Segmenting networks with access controls while meeting performance requirements
•Protecting unpatched commercial-off-the shelf (COTS) systems
•Preventing advanced cyber attacks which utilise ‘Zero Day’ methods
Recorded May 18 2016 44 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Palo Alto Network Senior Industry Expert in SCADA/ICS Networks
Presentation preview: The real cybersecurity risks for SCADA and ICS networks
  • Channel
  • Channel profile
  • Embedding Security Into DevOps With Terraform and Ansible Dec 14 2017 6:00 pm UTC 60 mins
    Vinay Venkataraghavan - Senior Solution Architect, Technical Business Development
    Join us for our new cloud webinar, in which cloud automation experts will show you how customers have successfully automated their VM-Series next-gen firewall deployments and effectively protected their DevOps environments in AWS®.

    You’ll learn how to:

    - Implement touchless deployment for your fully configured firewalls with native and third-party automation tools, such as Terraform® and Ansible®

    - Consume tags to execute your commitless policy updates

    - Automate VM-Series deployments across your multi-cloud environment
  • Logging Service Overview Dec 13 2017 5:00 pm UTC 45 mins
    Jayant Thakre, Sr. Product Marketing Manager
    The recent release of our Cloud-Based Logging Service marks the next step in Palo Alto Networks’ evolution towards a consumption model that complements the dynamic nature of today’s IT infrastructure. In this brief 30-minute webinar we will discuss how Logging Service provides an alternative for Palo Alto Networks next-generation security infrastructure and why it is a cornerstone of our strategy. We will show how the Cloud-Based Logging service will help to offload CAPEX and operational overhead while also increasing data retention and intelligence.
  • NGFW Health Checks, Services and Reports Dec 6 2017 5:00 pm UTC 60 mins
    Jesse Ebel, Systems Engineering Manager and Nate Bitting, Sr Mgr, Customer Success Automation & Analytics
    Join us to learn how you can shorten your time to productivity and ensure quick & proper adoption of the functionality in your Palo Alto Networks Next Generation firewalls.

    In this webinar, you will learn about our Next Generation Firewall Best Practice tools, including the automated Feature Adoption Heat Map, Prevention Posture Assessment (PPA) and Best Practice Assessment (BPA) tools. These tools provide you with insights into how you’re leveraging built-in features within your network, and suggest specific configuration recommendations for improving your security posture. We’ll also show you how to pull the data, review the reports, and will answer any questions you may have about these Health Check tools.
  • Secure SaaS Apps: Prevent Data Risk, Malware Insertion and Compliance Violations Dec 6 2017 3:00 pm UTC 60 mins
    Mike Haire, Channel Sales Manager, Palo Alto Networks
    The use of SaaS applications such as Office 365, Google Apps, Box and cloud-based student and donor management solutions create gaps in security visibility and control. These gaps introduce risks of data leakage, malware propagation and regulatory noncompliance.

    Please join DynTek & Palo Alto Networks for this online event for MHEC members where we will discuss strategies and solutions to help you securely enable SaaS applications by giving you unprecedented visibility and control into their use.

    Eliminating SaaS apps entirely at your organization is most likely not a viable option. But you can safely enable and get them under control.

    DynTek offers professional services and a broad range of technology solutions through MHEC Contract #F05.
  • Safely Enable SaaS Applications with Aperture Dec 5 2017 2:00 pm UTC 60 mins
    Omar Amarin, Systems Engineer
    The adoption of SaaS applications continues to grow at an exponential pace. You do not want to clamp down on these applications because they are valuable tools for many of your employees. However, because the data and usage of these SaaS applications is invisible to IT administrators, they do expose your organization to potentially disastrous security and data theft risks.

    Join us for a live webinar where you will learn how your organization can enable safe usage of SaaS applications and:

    •Gain visibility and granular, context-based control of SaaS applications.
    •Protect corporate data from malicious and inadvertent exposure after it has left the traditional corporate perimeter.
    •Protect against new insertion and distribution points for malware.
    •Satisfy compliance requirements while still maintaining the benefits of SaaS based application services.

    The challenges of SaaS applications are already here whether they are enabled by IT or end users themselves. Find out how to take back control and safely enable their use.
  • Proving the business value of Traps: Forrester webinar Nov 30 2017 6:00 pm UTC 60 mins
    Bob Cormier, VP and principal consultant, Forrester & Dal Gemmel, head of Traps product marketing, Palo Alto Networks
    Get a complete view of the value of Traps™ advanced endpoint protection with the new Forrester® Total Economic Impact™ report.

    Register for the webinar and find out Forrester’s full results. You’ll learn about:

    • The Total Economic Impact of Traps
    • The true ROI for Traps
    • How our breakthrough endpoint security approach effectively prevents malware
  • How Securing SaaS Applications Contributes to GDPR Compliance Nov 28 2017 2:00 pm UTC 45 mins
    Danielle Kriz and Anuj Sawani from Palo Alto Networks
    In less than a year (May 28, 2018) the General Data Protection Regulation (GDPR) becomes law in Europe. With the exponential rise in the use of SaaS applications, organizations that process the personal data of EU residents need to be able to maintain compliance with the GDPR while keeping data secure in the cloud.

    We invite you to join us for a live webinar on Monday, September 11 in which we zoom in on how our platform, with its SaaS Security service, Aperture, can help your organization meet the upcoming requirements.

    Our policy team expert, Danielle Kriz, and our product team expert, Anuj Sawani, team up to provide an overview of the GDPR—in particular its provisions related to securing personal data- and how Aperture can be used to address potential compliance issues. We will also provide a quick overview of how Aperture fits with EU compliance requirements when processing personal data. .

    After the presentation, we will have some time for questions and answers with our experts.
  • The Forrester Total Economic Impact of Palo Alto Networks Traps Nov 28 2017 12:00 pm UTC 45 mins
    Bob Cormier, VP, Principal Consultant at Forrester Consulting & Dal Gemmell, Head of Endpoint Marketing at Palo Alto Networks
    Guest Speaker Bob Cormier, VP & Principal Consultant of Forrester, will discuss the results of The Total Economic Impact™ of the Palo Alto Networks Traps solution, an October 2017 commissioned study conducted by Forrester Consulting on behalf of Palo Alto Networks. Watch this Webinar to see how companies:

    • Attained economic total benefits with Traps
    • Realized a ROI and the payback period.
    • Prevented malicious executables (malware) and prevented vulnerability exploits.

    Deep dive with Forrester to discover the findings of how Palo Alto Networks Traps achieved the above benefits, and how Traps advanced endpoint protection replaced antivirus solutions and secured endpoints with a multi-method approach.
  • Ransomware's Next Steps Recorded: Nov 16 2017 39 mins
    Joel Boyd, Sr. Product Marketing Manager, Endpoint
    Promising huge profits from tiny effort or investment, ransomware remains an exceptionally popular tool for both advanced and novice attackers alike.

    Register now for our webinar and learn how your organization can deploy Traps™ advanced endpoint protection to prevent ransomware attacks without sacrificing your teams’ productivity or resources.

    In this quick, focused webinar, you’ll learn the latest intel on:
    - Trends and predictions
    - New attack vectors and payment schemes
    - Breaking down attacks
  • Addressing the Biggest Problem in Healthcare IT: Protecting Endpoints Recorded: Nov 15 2017 52 mins
    Dal Gemmell, Head of Endpoint Marketing, and Matt Mellen Healthcare Security Architect, Palo Alto Networks
    Palo Alto Networks teamed up with HIMSS Analytics to bring you the latest cybersecurity trends in the healthcare industry.

    We surveyed IT executives from 101 US-based and 219 EU-based healthcare providers and identified the cybersecurity issues impacting your peers. For example, US healthcare providers felt least prepared to stop cyberattacks on unmanaged endpoints. And, in both EMEA and the US, email/phishing attacks are the greatest area of vulnerability.

    Healthcare is notorious for having many types of endpoints, and you can’t protect them all in the same way. Our experts will share the survey findings and highlight how to prevent cyberattacks on a variety of endpoints, including IT-managed endpoints and medical devices.

    Register for the webinar and learn how a prevention-based Next-Generation Security Platform:

    • Automatically protects legacy equipment and medical devices
    • Enables caregiver mobility with a lightweight footprint
    • Addresses the top concerns and trends of your peers
  • [Panel] Defending Against the Evolving Cyber Threat Landscape in 2018 Recorded: Nov 15 2017 60 mins
    Amar Singh, Cyber Management Alliance | Stuart Davis, Mandiant | Ed Tucker, DPG | Dharminder Debisarun, Palo Alto Networks
    2017 was the year of cyber attacks and high profile data breaches. Discover what cyber security professionals should be focusing on in order to secure their organizations in 2018.

    This interactive Q&A panel will discuss:
    - The trends shaping the cyber threat landscape in 2018
    - Lessons from the biggest cyber events of the year
    - Recommendations for CISOs on securing the enterprise in an age of frequent and persistent attacks
    - The technological advancements in the fight against cyber criminals and the processes organizations need to have in place to enable their security teams

    Speakers:
    - Amar Singh, Cyber Management Alliance
    - Stuart Davis, Director, Global Services & Intelligence Europe, Middle East & Africa at Mandiant
    - Edward Tucker, CIO, DP Governance
    - Dharminder Debisarun, Industry Security Architect, Palo Alto Networks
  • GlobalProtect Best Practices: Authentication Recorded: Nov 9 2017 62 mins
    Siva Rajaskaran, Sr. Technical Marketing Engineer & Brian Tokuyoshi, Sr. Product Marketing Manager
    If you are planning to deploy GlobalProtect, attend this webinar and get an overview on important authentication use cases and integrations. This is an architect-level technical deep dive into GlobalProtect functionality, straight from the product experts. Join us and bring your technical questions for a Q&A session direct with the GlobalProtect product managers and technical engineers.

    In this session, learn about how to deploy GlobalProtect with:

    1.Two Factor Authentication (2FA) with RADIUS or SAML for On-Demand Remote Access VPN
    2.Two Factor Authentication (2FA) with RADIUS or SAML and client certificate for Always-On VPN
    3.MFA (Multi Factor Authentication) for privileged resource access
    4.Transparent authentication for user-id with Internal Gateway
    5.Group Mapping and User-ID for Security Policy and Visibility
  • Teaming Together to Prevent Attacks and Protect Your Data Recorded: Nov 9 2017 32 mins
    Wissam Ali-Ahmad Lead Solutions Architect, Technical Services for Global Strategic Alliances at Splunk
    Targeted attacks — including advanced persistent threats (APTs) — and today’s sophisticated malware threats are one of the biggest challenges facing customer’s as the threats multiply and create unique compromises within their networks. This creates challenges for traditional security technologies to reliably identify these new class of threats. Even when a threat is detected, there is still the issue of slow response times and extended periods of exposure, as administrators typically need to manually coordinate and configure the necessary changes to their security infrastructure.

    Please join Palo Alto Networks and Splunk as we work together to deliver an advanced visibility, reporting and monitoring solution for intelligent security analysis that addresses this challenge and delivers new tools to quickly identify and analyze this new class of threats. We will show you how this integration insures better threat response time, and how to automate the steps needed to block malicious sources and quarantine compromised devices you through how Palo Alto Networks and Splunk.

    Key Benefits:
    - Advanced security and visibility in the cloud, on premise, or hybrid model
    - Accelerated threat response and enhanced threat detection
    - Security visualization, monitoring and analysis
    - Demo to show you how to identify ransomware and correlate IOC data through the app and use adaptive response to take actions
  • Blocking threats - How VakifBank strengthened their endpoint security Recorded: Nov 9 2017 3 mins
    Evrim Eroglu, Head of Security Infrastructure at VakifBank
    Evrim Eroglu, Head of Security Infrastructure at VakifBank discusses how traditional signature based systems are not enough to protect the bank’s endpoints. Traps with exploit techniques integrated with WildFire provides more secure endpoints.

    Learn how VakifBank strengthened their endpoint security for approximately 16,000 employees by implementing Palo Alto Networks Traps to block both known and unknown threats.
  • Identify and Respond to Security Threats with Palo Alto Networks and ServiceNow Recorded: Nov 8 2017 51 mins
    Tim Riley, Business Dev., Francesco Vigo, Partner Architect, Palo Alto Networks & John Ferguson, Product Manager, ServiceNow
    Security teams today commonly use a combination of email, spreadsheets, and phone calls to manage their incident response processes. This leads to average detection and containment times that are measured in days and weeks and can result in costly breaches.

    The key to reducing detection and response times lies in automating basic tasks, identifying when threats target the assets that are most critical to the business, and allowing actions to be initiated from a single platform instead of dealing with multiple consoles or teams.

    Join Tim Riley, Business Development and Francesco Vigo, Partner Architect from Palo Alto Networks and John Ferguson, Product Manager from ServiceNow to learn how to:

    •Accelerate threat identification by combining ServiceNow® Security Operations with automated enrichment from Palo Alto Networks WildFire and AutoFocus
    • Speed up decision-making with business context for security incidents
    • Reduce time to eradicate by initiating Palo Alto Networks Next-Generation Firewall changes from within ServiceNow
  • Introducing New Palo Alto Networks Cloud Services Recorded: Nov 8 2017 32 mins
    Peter Riebli – Corporate Sales Representative | John Fisher – Sales Engineer
    The recent release of GlobalProtect Cloud Service and our Cloud-Based Logging Service marks the next step in Palo Alto Networks’ evolution towards a consumption model that complements the dynamic nature of today’s IT infrastructure.

    In this brief 30-minute webinar we will discuss how GlobalProtect can be used to provide Palo Alto Networks next-generation security infrastructure as a cloud-based service for remote offices and mobile users. In addition, we will touch on the how the Cloud-Based Logging service will help to offload CAPEX and operational overhead while also increasing data retention and intelligence.
  • Threat Prevention on your Terms Recorded: Nov 8 2017 37 mins
    Kamil Imtiaz, Sr Product Marketing Manager, Palo Alto Networks
    Palo Alto Networks® is proud to introduce the APAC WildFire™ cloud, based in Singapore. Recently announced, this newest enhancement to the world’s most powerful cloud-based threat analysis service allows customers in the region to benefit from WildFire prevention capabilities while meeting data privacy needs.

    Register for our webinar to learn about how the APAC WildFire cloud enables customers to:

    •Choose a desired cloud by offering regionalised data analysis options.
    •Leverage global threat intelligence from 17,000+ global customers in the world’s largest threat analysis tool.
    •Take advantage of groundbreaking threat analytics and correlation to accelerate threat hunting, analytics and response efforts.
  • Threat Prevention on your Terms Recorded: Nov 8 2017 37 mins
    Kamil Imtiaz, Sr Product Marketing Manager, Palo Alto Networks
    Palo Alto Networks® is proud to introduce the APAC WildFire™ cloud, based in Singapore. Recently announced, this newest enhancement to the world’s most powerful cloud-based threat analysis service allows customers in the region to benefit from WildFire prevention capabilities while meeting data privacy needs.

    Register for our webinar to learn about how the APAC WildFire cloud enables customers to:

    •Choose a desired cloud by offering regionalised data analysis options.
    •Leverage global threat intelligence from 17,000+ global customers in the world’s largest threat analysis tool.
    •Take advantage of groundbreaking threat analytics and correlation to accelerate threat hunting, analytics and response efforts.
  • The Forrester Total Economic Impact of Palo Alto Networks Traps Recorded: Nov 6 2017 35 mins
    Bob Cormier, VP, Principal Consultant at Forrester Consulting & Dal Gemmell, Head of Endpoint Marketing at Palo Alto Networks
    Guest Speaker Bob Cormier, VP & Principal Consultant of Forrester, will discuss the results of The Total Economic Impact™ of the Palo Alto Networks Traps solution, an October 2017 commissioned study conducted by Forrester Consulting on behalf of Palo Alto Networks. Watch this Webinar to see how companies:

    • Attained economic total benefits with Traps
    • Realized a ROI and the payback period.
    • Prevented malicious executables (malware) and prevented vulnerability exploits.

    Deep dive with Forrester to discover the findings of how Palo Alto Networks Traps achieved the above benefits, and how Traps advanced endpoint protection replaced antivirus solutions and secured endpoints with a multi-method approach.
  • Disrupting Credential-based Attacks Recorded: Nov 3 2017 28 mins
    Brian Tokuyoshi, Product Marketing, and Martin Walter, Product Management, Palo Alto Networks
    Prevent Phishing and the Abuse of Stolen Credentials

    In this session, we will present the unique attack life-cycle for credential-based attacks. Using real-life examples from Unit 42, we will demonstrate what you can do today to stop credential theft and abuse
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The real cybersecurity risks for SCADA and ICS networks
  • Live at: May 18 2016 9:01 am
  • Presented by: Palo Alto Network Senior Industry Expert in SCADA/ICS Networks
  • From:
Your email has been sent.
or close