Hi [[ session.user.profile.firstName ]]

Preventing Cyberattacks on Endpoints in Healthcare Organizations

Healthcare organizations have become highly targeted by cyber attackers as the value of stolen protected health information has become greater than the value of stolen credit cards. In fact, 100% of sophisticated cyberattacks at organizations impact the endpoint and antivirus alone is insufficient.

Join this informative webinar workshop led by a former Information Security Lead at a large hospital network and a Traps expert to learn about threats facing Healthcare organizations and how a different approach to endpoint security is necessary to combat the sophisticated malware and exploits currently used to target healthcare organizations.

Register today to learn more about:
• The latest threats facing the Healthcare industry
• A more effective method to stop malware and exploits at the endpoint, compared to the traditional antivirus approach
• Why it’s equally important to protect the endpoint, as it is to protect the network perimeter
Recorded Jun 9 2016 54 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Matt Mellen, Healthcare Security Architect and Damien Lim, Senior Manager Product Marketing at Palo Alto Networks
Presentation preview: Preventing Cyberattacks on Endpoints in Healthcare Organizations
  • Channel
  • Channel profile
  • Your Office 365 data & apps secured Jul 24 2018 8:30 am UTC 60 mins
    Jason Montgomery, SaaS Security Expert
    SaaS applications like Microsoft® Office 365® are wildly popular, and adoption across enterprises continues to grow, but so do the hidden threats lying within these offerings, such as:

    • Accidental data exposure with SharePoint®
    • Uncontrolled use of personal OneDrive® accounts
    • Data security violations in Exchange

    Yes, even trusted SaaS applications like Office 365 can increase your risk of breaches and noncompliance.

    Our Security Operating Platform can help. Sign up for our webinar and learn what you need to meet your CASB needs as well as secure your cloud-based data against malware and accidental exposure.

    You’ll also find out how to achieve complete visibility and reporting, data classification, and fine-grained enforcement across users, folders and file activities to protect your business-critical data in Office 365.
  • Interpreting the 2018 NSS Labs AEP 2.0 Test Jul 24 2018 2:00 am UTC 90 mins
    Mike Spanbauer, Vice President of Research Strategy, NSS Labs & Danny Milrad, Dir. of Product Marketing, Palo Alto Networks
    NSS Labs® recently published the results of its 2018 Advanced Endpoint Protection (AEP) 2.0 Group Test, which examines vendors’ ability to protect endpoints from malware, ransomware and exploits.

    In the test, Palo Alto Networks® Traps™ advanced endpoint protection achieved both high Security Effectiveness and low Total Cost of Ownership, earning a Recommended rating.

    Join this webinar to hear vice president of Research Strategy at NSS Labs, Mike Spanbauer, and director of Product Marketing at Palo Alto Networks, Danny Milrad, discuss:

    - Advanced endpoint protection must-haves
    - Understanding the AEP 2.0 test results
    - What a Recommended rating means to you
    - How Palo Alto Networks performed on the test
  • Watch & Learn: Advanced Next-Generation Firewall Deployment Jul 23 2018 7:00 pm UTC 60 mins
    Diego Fontes & Michael Favinsky
    This is the “Best of Ignite” Week. Day 1 will be the NGFW HOW presented by Diego & Michael.

    Designed for security and network engineers, this session dives deep into Palo Alto Networks security policies and network configuration. It is designed to enhance your understanding of how to configure and manage some of the more advanced features of Palo Alto Networks next-generation firewalls.

    This session will focus on firewall and Panorama features useful for deployments in large and complex networks.
  • I tuoi dati su Office 365 sono protetti? Jul 20 2018 8:30 am UTC 60 mins
    Tristano Ermini, Systems Engineer
    Applicazioni SaaS come Microsoft® Office 365® sono molto apprezzate e sempre più diffuse nelle aziende, ma lo stesso può dirsi delle minacce che si nascondono in queste offerte:

    • Esposizione accidentale dei dati con SharePoint®
    • Uso non controllato di account personali di OneDrive®
    • Violazioni alla sicurezza dei dati in Exchange

    Sì, anche applicazioni SaaS affidabili come Office 365 possono far crescere il rischio di violazioni e problemi di conformità.

    La nostra Security Operating Platform può offrirti supporto. Registrati al webinar e scopri come soddisfare le tue esigenze CASB e proteggere i dati sul cloud da malware ed esposizione accidentale.

    Scopri anche come ottenere visibilità completa e reporting, classificazione dei dati e controllo granulare delle attività per utente, cartella e file, per una protezione efficace dei dati business-critical su Office 365.
  • Protecting and enabling 21st century industrial networks at scale Jul 18 2018 12:00 pm UTC 60 mins
    Del Rodillas, Head of Industrial Cybersecurity Solutions & Lionel Jacobs, Senior ICS Security Architect, Palo Alto Networks
    Modernization initiatives such as "Industry 4.0" and "Industrial IoT" are pushing industrial networks to be more connected as well as more complex and challenging to protect. In this session we will demonstrate how you can establish granular visibility and consistent security policy to your SCADA deployment, IIoT and remote sites in even the harsh environments. In other words, we can show you how to protect all of your IT AND OT infrastructure.

    Join this webinar to learn about:

    - Consistent and integrated deployment securing traffic across the SCADA core, remote sites, controlled/harsh environments, IIoT and industrial cloud
    - Zero-trust segmentation using the PA-220R ruggedized Next-Gen Firewall across IT and OT environments
    - Leveraging central management to increase administrative efficiency and provide cybersecurity and ICS network traffic intelligence to OT and IT
  • Is your Office 365 data protected? Recorded: Jul 18 2018 50 mins
    Anuj Sawani, Sr. Product Marketing Manager
    SaaS applications like Microsoft® Office 365® are wildly popular, and adoption across enterprises continues to grow, but so do the hidden threats lying within these offerings, such as:

    • Accidental data exposure with SharePoint®
    • Uncontrolled use of personal OneDrive® accounts
    • Data security violations in Exchange

    Yes, even trusted SaaS applications like Office 365 can increase your risk of breaches and noncompliance.

    Our Security Operating Platform can help. Sign up for our webinar and learn what you need to meet your CASB needs as well as secure your cloud-based data against malware and accidental exposure.

    You’ll also find out how to achieve complete visibility and reporting, data classification, and fine-grained enforcement across users, folders and file activities to protect your business-critical data in Office 365.
  • Is your Office 365 data protected? Recorded: Jul 18 2018 50 mins
    Anuj Sawani, Sr. Product Marketing Manager
    SaaS applications like Microsoft® Office 365® are wildly popular, and adoption across enterprises continues to grow, but so do the hidden threats lying within these offerings, such as:

    • Accidental data exposure with SharePoint®
    • Uncontrolled use of personal OneDrive® accounts
    • Data security violations in Exchange

    Yes, even trusted SaaS applications like Office 365 can increase your risk of breaches and noncompliance.

    Our Security Operating Platform can help. Sign up for our webinar and learn what you need to meet your CASB needs as well as secure your cloud-based data against malware and accidental exposure.

    You’ll also find out how to achieve complete visibility and reporting, data classification, and fine-grained enforcement across users, folders and file activities to protect your business-critical data in Office 365.
  • Advanced & Frictionless Security in a Multi-Cloud Environment Recorded: Jul 17 2018 62 mins
    Anuj Sawani, Product Marketing Manager
    Today, organizations need higher performance and faster access to the latest innovative technologies in order to grab whatever competitive edge they can. This almost always means going to the cloud.

    Unfortunately, in the rush to get there, enterprises can find themselves with data and applications scattered across private and public clouds – often multiple public clouds – spanning IaaS, PaaS and SaaS.

    Without the appropriate security and compliance strategy in place, this often results in poor visibility and increased risk. The simple truth is that multi-cloud security isn’t intuitive.

    We can make it easier. This webinar will cover:

    •Common speed bumps your security and DevOps teams face
    •Innovative security strategies to tackle a wide range of cloud risks
    •Security automation and integration within the development lifecycle
    •Achieving consistent and advanced multi-cloud protections

    Register now and learn how to secure your multi-cloud environment with advanced, frictionless protection.
  • [Hebrew session] Is your Office 365 data protected? Recorded: Jul 17 2018 58 mins
    Guy Noy, Systems Engineer
    SaaS applications like Microsoft® Office 365® are wildly popular, and adoption across enterprises continues to grow, but so do the hidden threats lying within these offerings, such as:

    • Accidental data exposure with SharePoint®
    • Uncontrolled use of personal OneDrive® accounts
    • Data security violations in Exchange

    Yes, even trusted SaaS applications like Office 365 can increase your risk of breaches and noncompliance.

    Our Security Operating Platform can help. Sign up for our webinar and learn what you need to meet your CASB needs as well as secure your cloud-based data against malware and accidental exposure.

    You’ll also find out how to achieve complete visibility and reporting, data classification, and fine-grained enforcement across users, folders and file activities to protect your business-critical data in Office 365.
  • Vos données Office 365 sont-elles sécurisées ? Recorded: Jul 10 2018 43 mins
    Jean-Paul Tavares, Saas Specialist & Systems Engineer
    Les applications SaaS comme Microsoft® Office 365® sont de plus en plus répandues dans les entreprises. Le problème, c’est que les menaces ont suivi la même courbe ascendante :

    • Exposition accidentelle des données dans SharePoint®
    • Utilisation non contrôlée de comptes personnels sur OneDrive®
    • Compromissions de sécurité dans Exchange

    Bref, même des applications SaaS fiables comme Office 365 peuvent augmenter le risque d’intrusions et de non-conformité.

    Et c’est là qu’intervient la Security Operating Platform de Palo Alto Networks. Notre webinar en direct vous invite à découvrir comment cette solution vous permet de répondre aux besoins de votre CASB et de protéger vos données cloud contre les malwares et expositions accidentelles.

    Visibilité et reporting complets, classification des données, régulation granulaire des activités au niveau des utilisateurs, des dossiers et des fichiers... vous aurez toutes les cartes en main pour assurer une protection efficace de vos données Office 365 critiques.
  • Crossing the IT/OT chasm Recorded: Jun 29 2018 43 mins
    Alexander Hinchliffe, Threat Intelligence Analyst, Unit 42, Palo Alto Networks
    IT meets OT.

    In modern asset-based businesses, data is key to making smart, real-time decisions and creating a foundation for the innovative new products and services that will allow you to greater serve customers in the future. As a result, Information Technology (IT) and Operational Technology (OT) systems must be converged to truly enable data driven businesses.

    This direction of travel directly challenges the traditional ‘Air Gap’ security models that have existed between IT and OT systems for decades. Not only does this approach hinder the required flow of telemetry data between sensory networks, data lakes and machine learning environments, but as a trusted construct it also introduces new and unknown risks from insider threat.

    This presentation provides an example of the types of threats targeting such environments together with examples of how they are delivered and spread through compromised networks as well as how they perform their actions on objective against the targets. Building upon the information and indicators shared by the US CERT in their TA18-074A alert, Unit 42 shares insights into how this attack operated.
  • Interpreting the 2018 NSS Labs AEP 2.0 Test Recorded: Jun 26 2018 56 mins
    Mike Spanbauer, Vice President of Research Strategy, NSS Labs & Danny Milrad, Dir. of Product Marketing, Palo Alto Networks
    *Registration information will be shared with both presenting parties (Palo Alto Networks and NSS Labs)

    NSS Labs® recently published the results of its 2018 Advanced Endpoint Protection (AEP) 2.0 Group Test, which examines vendors’ ability to protect endpoints from malware, ransomware and exploits.

    In the test, Palo Alto Networks® Traps™ advanced endpoint protection achieved both high Security Effectiveness and low Total Cost of Ownership, earning a Recommended rating.

    Join this webinar to hear vice president of Research Strategy at NSS Labs, Mike Spanbauer, and director of Product Marketing at Palo Alto Networks, Danny Milrad, discuss:

    - Advanced endpoint protection must-haves
    - Understanding the AEP 2.0 test results
    - What a Recommended rating means to you
    - How Palo Alto Networks performed on the test
  • Deploying applications in a more secured and automated environment Recorded: Jun 15 2018 8 mins
    Trevor Dearing, Product Marketing Manager, EMEA, Palo Alto Networks, with Amar Singh, CEO, CMA
    Interview with Palo Alto Network's Trevor Dearing on deploying applications in a more secure environment.
  • Palo Alto Networks and BrightTALK Recorded: Jun 15 2018 1 min
    Greg Day, VP & CSO, EMEA, Palo Alto Networks
    Live from Infosecurity Europe 2018
  • How to enable a secured operating platform Recorded: Jun 15 2018 5 mins
    Greg Day, VP & CSO EMEA, Palo Alto Networks
    Interview with Palo Alto Network's Greg Day on enabling a secured operating platform.
  • Is your Office 365 data protected? Recorded: Jun 14 2018 50 mins
    Anuj Sawani, Sr. Product Marketing Manager
    SaaS applications like Microsoft® Office 365® are wildly popular, and adoption across enterprises continues to grow, but so do the hidden threats lying within these offerings, such as:

    • Accidental data exposure with SharePoint®
    • Uncontrolled use of personal OneDrive® accounts
    • Data security violations in Exchange

    Yes, even trusted SaaS applications like Office 365 can increase your risk of breaches and noncompliance.

    Our Security Operating Platform can help. Sign up for our webinar and learn what you need to meet your CASB needs as well as secure your cloud-based data against malware and accidental exposure.

    You’ll also find out how to achieve complete visibility and reporting, data classification, and fine-grained enforcement across users, folders and file activities to protect your business-critical data in Office 365.
  • Realize the Promise of the SWIFT Customer Security Controls Recorded: Jun 13 2018 54 mins
    Lawrence Chin, Financial Services Security Architect, Palo Alto Networks
    Improve Your Cyber Hygiene

    Members of the Society for Worldwide Interbank Financial Telecommunications (SWIFT) cooperative had to self-attest to new mandatory security controls at the end of 2017. The next self-attestation will be required by year end 2018. After that point, SWIFT reserves the right to report non-compliance to counterparties and appropriate local regulators.

    How did your institution fare in its initial self-attestation to SWIFT’s security controls? If there was room for improvement,

    •Join this webinar to learn how to meet and/or exceed SWIFT mandatory and advisory security controls with Palo Alto Networks products
    •Hear about additional best practices that can further improve your cybersecurity posture.

    In the big picture, the SWIFT security controls and further best practices from Palo Alto Networks contribute to overall cyber hygiene, and should prove to be beneficial to all financial institutions - regardless of whether they are SWIFT members or not.
  • Network Security Consolidation In the Federal Government Recorded: Jun 12 2018 42 mins
    Joe Kim, Squadra Solutions, and Tighe Schlottog, Palo Alto Networks
    As organizations have grown so have their security requirements. Where basic firewalling and URL filtering were fine before, now organizations have added in IPS and Sandboxing technologies. This product sprawl has led to fragmentation in management and security coverage.

    Attackers are employing more advanced techniques to infiltrate networks and systems. In order to prevent these attacks, an agency's security must operate in a tightly knit and automated fashion. One in which building new protections against these attacks must occur automatically while ensuring continuous operations of services.

    Join Tighe Schlottog, Security Architect for Palo Alto Networks, and Joe Kim, VP of Engineering at Squadra Solutions, as they discuss how to increase security and efficacy of Network Security by consolidating point products into the Palo Alto Networks Security Operating Platform.

    Register for the webinar and learn:
    •The security gaps and risks posed by security point products.
    •How Network Security Consolidation can simplify management and increase responsiveness of Security Operations teams.
    •Best Practices for Network Security Consolidation.

    Speakers:
    -Joe Kim, VP of Engineering, Squadra Solutions
    -Tighe Schlottog, Security Architect, Palo Alto Networks
  • Securing the Internet of Things Recorded: Jun 5 2018 53 mins
    Joseph Carson (Thycotic) | Chris Morales (Vectra Networks) | Simon Crocker (Palo Alto Networks) | Matt Butler (ForeScout)
    The Internet of Things is everywhere - and it's an easy and frequent target of cyber attackers, as evidenced by the recent attacks on cities, industrial control systems, transportation systems, utilities and other infrastructure.

    IoT devices are built for convenience, efficiency and cost, and are riddled with vulnerabilities attackers are eager to exploit. So, who is in charge of securing the IoT? Does the responsibility lie with the manufacturer, seller, app developer, security team, or end user?

    Join the industry experts for this interactive Q&A discussion on:
    - The top IoT trends in 2018
    - Threats targeting the IoT
    - What's needed to secure connected devices
    - How to better defend our critical infrastructure from cyber warfare

    Speakers:
    - Joseph Carson, Chief Security Scientist, Thycotic
    - Matt Buller, CTO – Financial Services, ForeScout Technologies
    - Simon Crocker, Systems Engineering Director, Palo Alto Networks
    - Christopher Morales, Head of Security Analytics, Vectra Networks

    The session will be streamed LIVE from London from the Infosecurity Europe conference.
  • Accelerate your move to Microsoft® Azure® Recorded: May 31 2018 50 mins
    Matt Keil, Director of Product Marketing, Public Cloud
    Microsoft® Azure® can change the way your organization does business by increasing agility, scalability and storage. Although the benefits of Azure – and the public cloud – are well-documented, questions about security, potential data loss and business interruption remain, potentially slowing cloud adoption.

    Join us for a webinar focused on accelerating your move to Azure and securing your data, apps and DevOps environments once there by delivering consistent, automated security across all your environments.

    You’ll learn:

    - Common public cloud security challenges
    - How the Palo Alto Networks® cloud security portfolio protects you
    - How automation enables app developers to operate at cloud speed
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Preventing Cyberattacks on Endpoints in Healthcare Organizations
  • Live at: Jun 9 2016 12:00 pm
  • Presented by: Matt Mellen, Healthcare Security Architect and Damien Lim, Senior Manager Product Marketing at Palo Alto Networks
  • From:
Your email has been sent.
or close