Hi [[ session.user.profile.firstName ]]

Breaking the Status Quo: Designing for Breach Prevention

Recent years have seen massive shifts in the way businesses across all industries use technology. Innovations in the way we do business, interact with customers and develop new markets now make up our digital way of life.

With those innovations come risks in the form of cyber attacks which are increasingly getting attention in boardrooms around the world. One form of attack that has become increasingly sophisticated and lucrative has been ransomware. Anyone in your organisation is at risk, but increasingly it is executives that are being targeted.

Join us for a webinar that will show executives across industries and government:

•Key trends in technology
•Simple steps to protect your business
•How to shape your prevention strategy
•How to develop cyber expertise in the boardroom
Recorded Jul 5 2016 33 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sean Duca VP & Regional CSO, Asia Pacific, Palo Alto Networks and Edward Stroz Executive Chairman, New York, Stroz Friedberg
Presentation preview: Breaking the Status Quo: Designing for Breach Prevention
  • Channel
  • Channel profile
  • A Cloud Native Approach Demands Cloud Native Security Dec 12 2019 10:00 am UTC 60 mins
    Ashley Ward
    The Cloud Native Computing Foundation's charter describes how cloud native technologies empower organisations for modern and dynamic environments. Cloud Native security has to operate in the same way.

    In this talk we'll go through what this means, what you need to look out for, and how to achieve democratised cloud native security.
  • See the Unveiling: Cortex XDR 2.0 Dec 10 2019 6:00 pm UTC 30 mins
    Nir Zuk Founder and CTO; Lee Klarich Chief Product Officer
    Join visionary Nir Zuk, Palo Alto Networks founder and chief technical officer, and Lee Klarich, chief product officer, as they introduce Cortex XDR™ 2.0, the bold evolution of the category-defining platform that put enterprise-scale detection and response on the map.

    Join this fast-paced livestream event to get up to speed on:

    How to supercharge detection and investigation with the groundbreaking integration of good data across endpoints, networks, clouds and third-party sources.
    Updates to the most comprehensive platform for prevention, detection, investigation and response.
    Our industry-leading endpoint protection innovations, including a new ML-driven local analysis engine.

    We’ve booked 30 minutes for this event, but you’ll only need 18. Just think: now, you’ll have time to binge one more Netflix show.
  • SSL decryption: Stronger security, better visibility Dec 3 2019 11:00 am UTC 60 mins
    John Harrison
    Over the last few years, we’ve seen a marked increase in the amount of encrypted traffic. Unfortunately, along with the obvious benefits of encryption, this also provides an opportunity for attackers to hide malicious activity, which has created an even more pressing need for effective decryption.

    In this webcast, you’ll learn about:

    -PAN-OS® 9.0 innovations to streamline SSL decryption
    -Best practices and getting full visibility into protocols like HTTP/2
    -The right SSL decryption implementation strategy
  • Threat Hunting für Anfänger Nov 27 2019 12:00 pm UTC 60 mins
    Bastian Schwittay
    In diesem exklusiven Webinar lernen Sie, wie Sie verborgene Bedrohungen aufdecken und Warnmeldungen schneller nachgehen können.
  • Déchiffrement SSL : Meilleure visibilité, Sécurité renforcée Nov 27 2019 10:00 am UTC 60 mins
    Jean-Baptiste Guglielmine
    Ces dernières années, une forte croissance du trafic chiffré a été constaté.
    Malheureusement, malgré les bénéfices certains du chiffrement, c'est également une opportunité pour les attaquants de masquer leurs activités malicieuses.
    Plus que jamais, une stratégie de déchiffrement du trafic doit être mise en place.

    Dans ce webcast, vous allez découvrir :

    -Les innovations de PAN-OS 9.0 pour améliorer le déchiffrement SSL.
    -Les bonnes pratiques pour obtenir une visibilité complète sur des protocoles tels que HTTP/2
    -Notre stratégie d'implémentation
  • Securing Your Serverless Journey Nov 26 2019 11:00 am UTC 60 mins
    Ron Harnik
    With serverless, the cloud provider is responsible for securing the underlying infrastructure, from the data centers all the way up to the container and runtime environment. This relieves much of the security burden from the application owner, however, it also poses many unique challenges when it comes to securing the application layer. In this presentation, we will discuss the most critical challenges related to securing serverless applications - from development to deployment. We will also walk through a live demo of a realistic serverless application that contains several common vulnerabilities, and see how they can be exploited by attackers, and how to secure them. We’ll then go over how Prisma Cloud can be used to secure serverless workloads.
  • Network Security for the Modern Data Center-- Deep Dive With Arista Nov 21 2019 6:00 pm UTC 60 mins
    Christer Swartz and Shyam Kota, with Host Karin Shopen
    Arista Networks Macro-Segmentation Service (MSS), a capability within Arista CloudVision and Arista Data Center Switches, addresses a growing gap in security deployment for modern data centers. Arista MSS extends the concept of fine-grained security for VMs to the rest of the data center by enabling dynamic firewall services insertion by integrating with leading Palo Alto Networks Next-Generation Firewalls (NGFW) in the data center.

    Join our security experts and learn how you can deploy Arista MSS together with Palo Alto Networks NGFWs to inspect traffic and deliver robust security across a secure, resilient, and high-performance Arista data center fabric.

    In this webinar you will:

    · See a demo on how best to deploy Palo Alto Networks firewalls across Arista MSS enabled next-generation data center
    · Learn about design considerations for firewall insertion
    · Hear real world deployment use cases and best practices
    · Get your questions answered in our live Q&A

    Learn how to protect your applications workloads across an Arista MSS enabled modern data center.
  • 3 Ways to Speed Up Response with Threat Intel Nov 20 2019 6:00 pm UTC 60 mins
    Bryan Lee, Unit 42 Principal Researcher, AJ Shipley, VP Product Management, Vidya Gopalakrishnan, SOC Engineer
    Threat intel needs to change. Current approaches force security analysts to manually integrate and work across too many low-value feeds, often slowing down investigations.

    The benefit of added clarity and context is clear. Yet, there has to be a better way to use intel to boost investigations and response efforts without complicating your existing processes.

    Join a candid discussion led by Palo Alto Networks Unit 42 threat researchers, SOC experts, and product leaders as they break down the reality of today’s threat intelligence offerings, and what needs to change.

    Leave with:
    Three tricks every practitioner should know when considering how to use threat intelligence to protect their enterprise
    Why threat intel should be embedded into the tools you’re already using, and how to make that possible.
    The future of threat intelligence, including bold new innovations from Palo Alto Networks
  • Debunking the Myth Around Implementing Zero Trust Recorded: Nov 5 2019 45 mins
    Trevor Dearing
    One of the mythologies surrounding Zero Trust is that it is difficult and expensive to implement. Not true! In this webcast we will debunk this myth once and for all.

    Join us for this webcast and learn:

    -How Zero Trust is easy to implement using an iterative approach designed to mitigate disruption or downtime
    -The five key steps to implementation
    -Why Zero Trust is easy to measure, including maturity metrics for Zero Trust
  • Best Practices For Stopping Theft and Abuse of Employee Credentials Recorded: Oct 31 2019 62 mins
    Nithin Varam, Lior Kolnik, Stan Lee, with Host Karin Shopen
    The theft and use of stolen passwords is a common attack for adversaries, mostly because passwords are the weakest link in security. Plus, stealing credentials is much faster, cheaper and easier than having to find and exploit a vulnerability in a system.

    Once done, an adversary can bypass the entire attack lifecycle – impersonating a valid user – and move freely through the network. With inside access, an attacker can quickly move laterally to set up a broader footprint, compromise additional systems and steal other credentials along the way.

    In our new webcast, Best Practices for Stopping Theft and Abuse of Employee Credentials, our experts will:
    *Outline the common techniques attackers use
    *Provide best practices to prevent further credential attacks
    *Showcase Palo Alto Networks features you can enable now to protect your organization

    Get your questions answered, and learn how to stop credential theft and abuse in your organization today.
  • [Cloud Security Alliance] Don’t Let Your Security Slow Your Cloud Journey Recorded: Oct 30 2019 60 mins
    Jason Georgi, Field Chief Technology Officer for Prisma Access and SaaS at Palo Alto Networks
    Cloud adoption for some services is no longer optional, however security is what is overwhelmingly holding organizations back from doing more. Cloud and SaaS themselves are also evolving, which is changing the approach for securing access to them. The right security capabilities will allow you to address risk while having you ready for tomorrow.
  • Securing the 5G-Ready Telco Cloud Recorded: Oct 29 2019 48 mins
    Lakshmi Kandadai and Scott Stevens, with Host Karin Shopen
    While the technological shift from a closed and proprietary model to dynamic and scalable architectures brings agility and flexibility through network modernization, it also introduces a new security paradigm. Mobile network operators are not only responsible for hardening and securing the platform, underlying OS and the software stack, but must secure the applications (virtual network functions), as well, making it much more cumbersome and time-consuming to manage. 

    Manual security operations are not keeping pace with the migration to public, private, hybrid clouds and SDN/NFV environments. Workloads are becoming much more dynamic, so making sure that security is in lockstep towards these dynamic workloads is critical. As mobile network operators prepare for their network transformation by building 5G-ready telco clouds, you will need a resilient network with robust security mechanisms in place to support the diverse requirements of 5G-enabled applications and services. 

    In this webcast, you will: 

    * Find out about security implications of cloud adoption in telco environments
    * Learn about cloud-agnostic security enforcement at scale across distributed cloud architectures
    * Hear how to build a proactive defense around your telco cloud environments

    Bring your questions for our experts and join us for an interactive and informative session!
  • Schützen Sie die geschäftskritischen Daten in Ihren SaaS-Anwendungen Recorded: Oct 25 2019 40 mins
    Markus Willmann und Michael Weisgerber
    Die Attraktivität von SaaS-Anwendungen wie Office 365®️, G Suite™️, Box und Salesforce®️ nimmt immer weiter zu, mit ihr aber auch die verborgenen Bedrohungen in SaaS-Angeboten: teure Datenverluste, Compliance-Probleme, Verbreitung von Malware usw. Der SaaS-Sicherheitsdienst Prisma™️ SaaS ergänzt Ihre bestehenden Sicherheitstools durch Datenklassifizierung, Prävention von Datenverlust und Bedrohungserkennung – sodass Ihre SaaS-Anwendungen optimal geschützt sind.

    In diesem Webcast zeigen unsere Spezialisten Markus Willmann und Michael Weisgerber wie Sie eine vollständige Transparenz über sämtliche Aktivitäten von Benutzern, Ordnern und Dateien erhalten. Durch die umfassende Auswertung des täglichen Nutzungsverhaltens erkennen Sie schnell, ob Datenrisiken oder rechtlich relevante Verstöße vorliegen.

    Der interaktive Webcast beinhaltet:

    -Eine Einführung in CASB Thematik
    -Die Erklärung der Besonderheiten der marktführenden Lösung Prisma SaaS
    -Einen praktischer Demo-Teil
    -Fragen und Antworten
  • Walking The Walk: Deploying Cortex in Our SOC Recorded: Oct 24 2019 52 mins
    Matt Mellen, Sr Manager, Security Operations
    Join this live webinar where practitioners at Palo Alto Networks Security Operations Center (SOC) share how they have deployed Cortex to solve some of the pressing problems in Cyber security. You will walk away with practical tips and recommendations to reduce the number of alerts, streamline vendor technologies and improve mean time to response. Using Cortex XDR and Demisto, Palo Alto Networks has deployed innovative technology to detect sophisticated threats, accelerate investigations and improve the response.
  • Cloud Native Cybersecurity: Trends, Requirements, and Best Practices with ESG Recorded: Oct 15 2019 59 mins
    ESG, Senior Analyst and Group Practice Director Doug Cahill & Palo Alto Networks Product Marketing Manager, Keith Mokris
    Join ESG and Palo Alto Networks to discuss how organizations can secure their cloud native applications.
  • Datacenter Design, Mikrosegmentierung und relevante Hardware/Software Updates Recorded: Oct 11 2019 61 mins
    Dirk Thelen und Nicholas Ackroyd
    Klassische Datacenter Designs werden immer mehr durch neue Technologien abgelöst, die auch die Grundlage aller großen Cloudanbieter darstellen. Die Rede ist natürlich von SDN, Underlay- und Overlay-Netzwerken, Mikrosegmentierung, Cisco ACI und Vmware NSX-T.

    In diesem Webinar verschaffen Ihnen unsere Spezialisten Dirk Thelen und Nicholas Ackroyd einen Überblick über aktuelle Technologien und wie Palo Alto Networks Ihnen als integrierte Sicherheitslösung dabei hilft, diese bestmöglich abzusichern.
  • Live webinar: Security walk-in clinic! Recorded: Oct 11 2019 29 mins
    Lindseigh Strickland
    A day in the life of a SecOps analyst typically starts with receiving multiple alerts or seeing a breaking threat on the news, which then sets a reactive process in motion. The following questions probably seem familiar:

    -Is everything you do complex and manual ?
    -Does it require working across multiple teams and tools?
    -Do you find your time filled with reactive, mundane and repetitive tasks, rather than being proactive?

    There has to be a better way!

    Join our live webinar to hear our customers' best practices when addressing these pain points.
  • Detecting Attacks with Machine Learning Recorded: Oct 10 2019 62 mins
    Yariv Shivek
    Noise is the enemy of detection and response. After data breaches, forensic investigators have often found warning signs left behind by adversaries, but these signs were buried amongst thousands of other security alerts, including countless false positives.

    Machine learning and behavioral analytics can provide security teams the edge they need to reduce noise and accurately pinpoint attacks. Machine learning models can classify devices and compare current behavior to past behavior and peer behavior to isolate real attacks. Unlike static rules, machine learning models can dynamically adjust to ignore unusual but benign activity, drastically reducing false positives.

    Attend this informative session to understand:
    - Real-world examples of machine learning models used to detect attacks
    - The key shortcomings with today’s approaches to machine learning and how security best practices and the right tools can overcome them
  • [Cloud Security Alliance] Don’t Let Your Security Slow Your Cloud Journey Recorded: Oct 1 2019 61 mins
    Jason Georgi, Field Chief Technology Officer for Prisma Access and SaaS at Palo Alto Networks
    Cloud adoption for some services is no longer optional, however security is what is overwhelmingly holding organizations back from doing more. Cloud and SaaS themselves are also evolving, which is changing the approach for securing access to them. The right security capabilities will allow you to address risk while having you ready for tomorrow.
  • URL Filtering Best Practices-- Making Your Web Security Policies Work for You Recorded: Sep 30 2019 52 mins
    John Harrison
    As attackers evolve and progress, organizations require increased flexibility that goes beyond the traditional binary categorization and policies for URLs. With the recent release of PanOS 9.0 we’ve added powerful new capabilities to our URL Filtering service to help keep your users safe without complicating your security policies.

    Join our experts as they provide best practice recommendations pertaining to risk, multi-category, and policy actions. We’ll show how you can prevent successful attacks when you:

    •turn on selective SSL decryption

    •enable credential theft protection

    •utilize automated actions

    Take your web security policy beyond categorizing web sites and turn it into a critical component of your security strategy. Join us for insights and answers to your web security questions.
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Breaking the Status Quo: Designing for Breach Prevention
  • Live at: Jul 5 2016 2:00 am
  • Presented by: Sean Duca VP & Regional CSO, Asia Pacific, Palo Alto Networks and Edward Stroz Executive Chairman, New York, Stroz Friedberg
  • From:
Your email has been sent.
or close