Hi [[ session.user.profile.firstName ]]

Securing the Unpatchable

Software vendors rely on patches to eliminate the vulnerabilities that exist in their software applications and systems – the same vulnerabilities that attackers exploit to compromise those systems. So how can organizations secure those applications and systems when they cannot – or will not – apply the vendor-issued patches?

Join us for this live webinar where you will discover:
• Which three types of risks your organization is exposed to when patching is not an option
• How attackers leverage exploits to subvert authorized applications
• Why traditional endpoint security solutions fail to prevent exploitation of unpatched systems and applications
• Which applications were targeted by the top 10 zero-day exploits in 2015
How to obviate the need to patch while preventing exploitation of unpatched systems and applications at the same time
Recorded Jun 15 2016 57 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Michael Moshiri, Director, Endpoint Protection
Presentation preview: Securing the Unpatchable

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Outcome-Driven Threat Intelligence with AutoFocus Dec 16 2016 6:00 pm UTC 60 mins
    Palo Alto Networks: Ryan Olson, Intelligence Director of Unit 42 & Scott Simkin, Sr. Group Manager, Threat Intelligence Cloud
    More data doesn’t always equal better prevention. It often feels like there is an arms race underway, with security operations and response professionals in the sights of an escalating amount of alerts and threat data, which can sometimes do more harm than good. You need a new outcome-driven approach to threat intelligence, with a focus on prevention and operationalizing action, versus simply adding more data.

    Unit 42, the Palo Alto Networks® threat research team, is putting this new mindset into practice, discovering new malware families, campaigns and adversaries with the AutoFocus threat intelligence service. Join Ryan Olson, Intelligence Director for Unit 42, to see how his team uses AutoFocus to help automate research, hunting and security operations workflows. You will see real applications of threat intelligence, by one of the best teams in the industry, including:

    --- How AutoFocus can help you scale detection and prevention efforts without additional, specialized security staff.
    --- How to automate security analysis and response workflows with AutoFocus.
    --- Real world use-cases from Unit 42’s research efforts.
  • Silver Terrier: That Nigerian Prince has evolved his game Dec 15 2016 1:00 pm UTC 60 mins
    Alexander Hinchliffe, Threat Intelligence Analyst, Unit 42, EMEA
    Correctly assess and protect yourself against modern Nigerian threat actors.

    Join threat intelligence analysts Peter Renals and Simon Conant from Unit 42 for a discussion about malware attacks from Nigerian threat actors, dubbed “SilverTerrier.” This group has grown significantly since 2014, from fewer than 100 attacks to a current rate of 5,000–8,000 per month. These attacks are largely victim-agnostic, spanning all major industry verticals and focusing more on businesses than individuals.

    You’ll learn about:

    - How Nigerian threat actors have successfully employed commodity malware tools with precision, to target many organizations at scale.
    - The financial impact of these attacks.
    - Techniques utilized to disguise commodity malware, including business email compromise and spoofing, and how to prevent them.
  • SilverTerrier: That Nigerian Prince Has Evolved His Game Dec 15 2016 9:00 am UTC 45 mins
    Peter Renals, Unit 42
    Correctly assess and protect yourself against modern Nigerian threat actors.

    Join threat intelligence analysts Peter Renals and Simon Conant from Unit 42 for a discussion about malware attacks from Nigerian threat actors, dubbed “SilverTerrier.” This group has grown significantly since 2014, from fewer than 100 attacks to a current rate of 5,000–8,000 per month. These attacks are largely victim-agnostic, spanning all major industry verticals and focusing more on businesses than individuals.

    You’ll learn about:

    - How Nigerian threat actors have successfully employed commodity malware tools with precision, to target many organizations at scale.
    - The financial impact of these attacks.
    - Techniques utilized to disguise commodity malware, including business email compromise and spoofing, and how to prevent them.
  • SilverTerrier: That Nigerian Prince Has Evolved His Game Dec 15 2016 2:00 am UTC 45 mins
    Peter Renals, Unit 42
    Correctly assess and protect yourself against modern Nigerian threat actors.

    Join threat intelligence analysts Peter Renals and Simon Conant from Unit 42 for a discussion about malware attacks from Nigerian threat actors, dubbed “SilverTerrier.” This group has grown significantly since 2014, from fewer than 100 attacks to a current rate of 5,000–8,000 per month. These attacks are largely victim-agnostic, spanning all major industry verticals and focusing more on businesses than individuals.

    You’ll learn about:

    - How Nigerian threat actors have successfully employed commodity malware tools with precision, to target many organizations at scale.
    - The financial impact of these attacks.
    - Techniques utilized to disguise commodity malware, including business email compromise and spoofing, and how to prevent them.
  • Teaming Together to Prevent Attacks and Protect Your Data Dec 14 2016 6:00 pm UTC 60 mins
    Brian Torres-Gil, Solutions Architect, Palo Alto Networks
    Targeted attacks — including advanced persistent threats (APTs) — and today’s sophisticated malware threats are one of the biggest challenges facing customer’s as the threats multiply and create unique compromises within their networks. This creates challenges for traditional security technologies to reliably identify these new class of threats. Even when a threat is detected, there is still the issue of slow response times and extended periods of exposure, as administrators typically need to manually coordinate and configure the necessary changes to their security infrastructure.

    Please join us as we work together to deliver an advanced visibility, reporting and monitoring solution for intelligent security analysis that addresses this challenge and delivers new tools to quickly identify and analyze this new class of threats. We will show you how this integration insures better threat response time, and how to automate the steps needed to block malicious sources and quarantine compromised devicesyou through how Palo Alto Networks and Splunk.

    Key Benefits:
    - Advanced security and visibility in the cloud, on premise, or hybrid model
    - Accelerated threat response and enhanced threat detection
    - Security visualization, monitoring and analysis
    - Demo to show you how to identify ransomware and correlate IOC data through the app and use adaptive response to take actions
  • Design considerations for implementing Zero Trust Data Center Architectures Dec 13 2016 6:00 pm UTC 60 mins
    John Kindervag, Vice President and Principal Analyst at Forrester
    The rising tide of successful cyberattacks against organizations has made it clear that traditional approaches for defining trust levels, stopping lateral movement and enforcing advanced security controls within a data center are no longer effective. The Zero Trust approach advocated by Forrester provides guiding principles for achieving a robust and secure data center security architectures. However, choice of the security platform, design considerations and effective use of advanced security capabilities play a crucial role in implementing a successful Zero Trust enabled data center.

    In this webinar, guest speaker John Kindervag, Vice President and Principal Analyst at Forrester will talk about the steps to achieving a Zero Trust data center.

    Topics covered in this webinar will include:

    - 5 Steps to achieving Zero Trust enabled data centers.
    - Extending Zero Trust design principles across hybrid cloud deployments
    - Security policy considerations and guidelines for implementing Zero Trust enabled data centers.
  • Exploit kits: getting in by any means necessary Dec 9 2016 9:00 am UTC 60 mins
    Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity (hint: it’s a big business!)
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits
  • Exploit kits: getting in by any means necessary Dec 9 2016 2:00 am UTC 60 mins
    Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity (hint: it’s a big business!)
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits
  • Exploit kits: getting in by any means necessary Dec 7 2016 6:00 pm UTC 60 mins
    Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity (hint: it’s a big business!)
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits
  • Live Demo: Advanced Endpoint Protection Recorded: Dec 2 2016 53 mins
    Christiaan Groenhof, Inside Systems Engineer at Palo Alto Networks
    Attackers are getting more targeted and advanced, deploying unknown exploits and unique malware that current day endpoint security is not equipped to prevent or even detect. Existing approaches simply can’t protect against these attacks because they don’t have known signatures, known strings –and in many cases, no previously known behavior-so they go straight through, resulting in compromised endpoints waiting for detection and remediation to step in, which is too little too late.

    Palo Alto Networks Advanced Endpoint Protection is a complete paradigm shift from detection remediation to pure prevention, designed to close the door on these threats, which manage to evade detection by network-based security or take advantage of blind spots, well before any damage can be done.

    Join Palo Alto Networks® for a Live Webinar to learn about the breakthrough advanced endpoint technology that redefines endpoint security as we know it
  • Live Demo: AutoFocus Recorded: Dec 2 2016 45 mins
    Ronald den Braven, Consulting Engineer at Palo Alto Networks
    Join us for a live demo and learn how AutoFocus threat intelligence service helps security teams identify and prevent targeted attacks. We will explain the key concepts of AutoFocus and benefits the service provides.
  • Live Demo: VM-Series for AWS Recorded: Dec 2 2016 37 mins
    Tom Welling, Systems Engineer at Palo Alto Networks
    Securing public cloud environments has never been more challenging. Cyberattacks are on the rise, targeting your business-critical data using applications commonly found on every network. Compounding your data security challenge is the lack of application visibility and control features available in existing cloud security offerings.

    The VM-Series for AWS addresses these challenges with a complete set of next-generation firewall and advanced threat prevention features that allow you to identify and control your AWS-based applications and protect your data from known and unknown threats.
  • Live Demo: Safely Enable SaaS Applications with Aperture Recorded: Dec 2 2016 45 mins
    Omar Amarin, Inside Sales Engineer at Palo Alto Networks
    The adoption of SaaS applications continues to grow at an exponential pace. You do not want to clamp down on these applications because they are valuable tools for many of your employees. However, because the data and usage of these SaaS applications is invisible to IT administrators, they do expose your organization to potentially disastrous security and data theft risks.

    Join us for a live webinar where you will learn how your organization can enable safe usage of SaaS applications and:

    •Gain visibility and granular, context-based control of SaaS applications.
    •Protect corporate data from malicious and inadvertent exposure after it has left the traditional corporate perimeter.
    •Protect against new insertion and distribution points for malware.
    •Satisfy compliance requirements while still maintaining the benefits of SaaS based application services.

    The challenges of SaaS applications are already here whether they are enabled by IT or end users themselves. Find out how to take back control and safely enable their use.
  • SilverTerrier: That Nigerian Prince Has Evolved His Game Recorded: Nov 30 2016 45 mins
    Peter Renals, Unit 42
    Correctly assess and protect yourself against modern Nigerian threat actors.

    Join threat intelligence analysts Peter Renals and Simon Conant from Unit 42 for a discussion about malware attacks from Nigerian threat actors, dubbed “SilverTerrier.” This group has grown significantly since 2014, from fewer than 100 attacks to a current rate of 5,000–8,000 per month. These attacks are largely victim-agnostic, spanning all major industry verticals and focusing more on businesses than individuals.

    You’ll learn about:

    - How Nigerian threat actors have successfully employed commodity malware tools with precision, to target many organizations at scale.
    - The financial impact of these attacks.
    - Techniques utilized to disguise commodity malware, including business email compromise and spoofing, and how to prevent them.
  • An Analysis of Recent Data Breaches in the Banking Industry Recorded: Nov 30 2016 42 mins
    Lawrence Chin - Financial Services Security Market Architect - Palo Alto Networks
    They say that hindsight is 20/20 and in recent months, news of data breaches at several SWIFT (Society for Worldwide Interbank Financial Telecommunications) members has seen many reassessing their cybersecurity strategies.

    Palo Alto Networks invites you to join a webinar where Lawrence Chin, Security Market Architect, will discuss:

    ● A review of these attacks and some of the commonalities
    ● The role of cyber security hygiene, and subsequent recommendations from SWIFT, FS-ISAC (Financial Services Information Sharing and Analysis Center), and US FFIEC (Federal Financial Institutions Examination Council).
    ● Best practices that may prevent similar cyberattacks on financial institutions from succeeding in the future.

    Register today and learn how the confidence and trust can be protected in the increasingly complex digital world in which we live.
  • Cybersecurity for Financial Services Industry Recorded: Nov 30 2016 64 mins
    Ben Allchin and Nirmal Dave from Palo Alto Networks
    The security and network teams at financial services institutions must address demands to rapidly adopt new technology, protect intellectual property, and comply with regulations. Additionally, they must also enable secure access to personal and commercial financial data from a variety of access points ­(e.g., retail branches, mobile devices, third-party business partners) while combating an increasing volume and sophistication of threats. This presentation will offer a reference blueprint for addressing all of these concerns with the Palo Alto Networks security platform, and share some use cases from the financial services industry.
  • Secure your enterprise to maintain quality of care Recorded: Nov 29 2016 45 mins
    Matt Mellen - Security Architect & Healthcare Solution Lead - Palo Alto Networks
    The business model behind cybercrime has changed and cyber attackers are looking for new sources of income. Ransomware is on the rise and is of great risk to healthcare organisations as they impact the quality of care clinical facilities can provide, costs organisations money in remediation efforts, and damages their reputation as competent providers of care. There are, however,straight forward steps organisations can take to prevent this threat.

    Palo Alto Networks invites you to a webinar where Matt Mellen, a former Information Security Lead at a hospital, will discuss practical steps healthcare organisations can take to stop ransomware. Drawing from his first-hand experience responding to ransomware, combined with recommendations from the FBI, Matt will discuss:

    • Practical steps healthcare organisations can take on systems and network devices to prevent exposure to this rampant attack.
    • How the most current variants of ransomware work
    • How to prevent successful ransomware attacks in Healthcare
  • Keeping the lights on | a live panel on the real cyber security risks for ICS Recorded: Nov 28 2016 49 mins
    Panel with industry experts moderated by Dharminder Debisarun
    Stopping cyberthreats to Industrial Control Systems (ICS) has become top of mind for many asset owners due to the severe consequences to uptime and safety with cyber incidents.

    Join us for this live panel where with industry experts with discuss current ICS security challenges.
  • Cyber Defence Today: November Edition Recorded: Nov 24 2016 11 mins
    Georgie Barrat, Technology Journalist, Alexander Hinchliffe, Ramon De Boer, Steve Gerrard, Palo Alto Networks
    Palo Alto Networks brings you Cyber Defence Today!

    This is the first in a monthly series of broadcasts, offering you the opportunity to learn about the cyber-threat as it is now.

    Hosted by leading technology journalist Georgie Barrat, we will be speaking with It Security Experts from all over Europe, showcasing recent Cyber Security events and panel discussions, learning the most up to date information about the current challenges facing the security community.

    Topics covered in Novembers Episode:
    - Evolution of Ransomware and Exploit Kits
    - Anti Virus and its effectiveness in the modern landscape
    - ‘What makes you a target?’ Panel Discussion
    - EU Cloud Wildfire and its current impact on the sector
    - The Rise of Ransomware
    - September Breach Prevention Week Highlights
    - Whats upcoming: Ignite 2017
  • Next-generation Security for the Public Cloud Recorded: Nov 17 2016 60 mins
    Matt Keil, Director of Product Marketing at Palo Alto Networks
    As more and more organizations move their workloads to the public cloud, security remains a top concern because cybercriminals do not care whether your applications and data reside in your datacenter or in the cloud. Their goal is to steal data or computing resources by gaining access to the network, then moving laterally, potentially to the cloud to execute their goal.

    Join us for this webinar to learn how the VM-Series protects your public cloud deployment with the same next-generation firewall and threat prevention features available in our physical appliances.

    The webinar will cover:
    • Overview of the VM-Series next-generation firewall
    • How the VM-Series prevents cyberattacks in the public cloud
    • Key differences between the VM-Series and other cloud security offerings
Webcasts and Videos
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content — by user, not just by IP address. Based on patent-pending App-ID™ technology, Palo Alto Networks firewalls accurately identify and control threats and applications — regardless of port, protocol, evasive tactic, or SSL encryption — and scan content to stop threats and prevent data leakage. Palo Alto Networks delivers proven threat prevention combining IPS, anti-malware, URL, file and content filtering in a single integrated engine supported by one of the industry’s most prolific vulnerability research teams.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Securing the Unpatchable
  • Live at: Jun 15 2016 5:00 pm
  • Presented by: Michael Moshiri, Director, Endpoint Protection
  • From:
Your email has been sent.
or close