Hi [[ session.user.profile.firstName ]]

Prevention Week Part 4: Prevent Ransomware with the Right Architecture

Thanks to advances in attack distribution, anonymous payments, and the ability to reliably encrypt and decrypt data, ransomware is on a tear. To protect your organization from having to pay attackers to free your data, you need to evolve beyond a layered security approach to a prevention-oriented architecture – or face threats of Jurassic proportions.
Learn more about the right architectural approach for effectively preventing ransomware infections and other sophisticated threats, even across distributed IT environments.
Recorded Jul 21 2016 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Scott Simkin, Palo Alto Networks Cybersecurity Team
Presentation preview: Prevention Week Part 4: Prevent Ransomware with the Right Architecture
  • Channel
  • Channel profile
  • Secure Your Branches Jan 24 2019 6:00 pm UTC 60 mins
    Brian Tokuyoshi, Product Marketing Manager and Ron Dodge, Senior Director, IT Security, with Host Karin Shopen
    There’s a shift underway in branch networking. Backhauling branch office traffic to HQ made sense when accessing data center application, but does this approach still make sense? SaaS and Cloud have fundamentally changed how we use applications and access data. With the high cost of maintaining MPLS and the need to access applications in the cloud, organizations are looking for options to use SD-WAN or access the internet directly from the branch. But how do you do that safely, without watering down the protection?

    Join our Palo Alto Networks experts and learn how you can safely route branch traffic directly to the internet while ensuring the same levels of security that you expect for all your users. You will:

    •Get details on the scenarios for branch security
    •Learn about what does and doesn’t work
    •Find out how to deploy a flexible set of security options to cover your requirements
    •Get your questions answered by the experts in our live Q&A
  • How to Build a Zero Trust Network Jan 17 2019 6:00 pm UTC 60 mins
    Scott Simkin, Director of Threat Intelligence and John Kindervag, Field CTO, with Host Karin Shopen
    “Trust is always a vulnerability in a digital system,” - John Kindervag, Founder of Zero Trust and Field CTO at Palo Alto Networks

    Much has been written about the topic of Zero Trust. Is it a security buzz word or a true effective security strategy?

    High-profile breaches involving “trusted” insiders have given industry-wide visibility to the fact that trust represents a vulnerability for digital systems. It’s something malicious actors can and do exploit for their advantage.

    Zero Trust was first introduced around the principles of “never trust, always verify” as a means for enterprises to implement effective network segmentation. As the model has been embraced, Zero Trust evolved to become a strategic Cybersecurity initiative that major enterprises align to in order to prevent successful cyberattacks.

    Watch as our Palo Alto Networks® team of experts, including John Kindervag, discuss the “whys and hows” of building a Zero Trust architecture. In this webcast, you will:

    •Learn specific outcomes of implementing a Zero Trust architecture
    •Hear recommendations on where to start when planning and implementing a Zero Trust framework
    •Get your questions answered in our Live Q&A
  • Bridging Security Gaps with Networks-to-Endpoint Integration Recorded: Dec 13 2018 37 mins
    Konstantin Rychkov, IDC, Senior Research Analyst
    The typical enterprise uses an average of 30 security products, most of which from variety of vendors and typically do not integrate well and offer little information sharing…if any. Using a portfolio of integrated products from fewer vendors means greater synergies and efficiencies. This is especially true of endpoint security software, where many organizations have long and established relationships with a favorite vendor. This can lead to a sense of complacency, and there may also exist a disincentive to replace software on all of an organization’s endpoint devices, leaving organizations potentially exposed to an evolving threat landscape.

    Join us for this informative webinar where IDC analyst Konstantin Rychkov will:

    • Introduce the concept of endpoint protection integrated with network security components
    • Demonstrate how the two together provide greater effectiveness and efficiency in security
    • Detail how an integrated security stack is instrumental to holistic enterprise-wide security
  • AWS Security: Securing AWS Workloads with Palo Alto Networks Recorded: Dec 12 2018 53 mins
    Dinah Barrett, Specialist Solutions Architect, AWS Marketplace & David Maclean, Cloud Engineer, Palo Alto Networks
    Today, AWS provides a highly reliable, scalable, low-cost infrastructure platform in the cloud that powers hundreds of thousands of businesses in 190 countries around the world with customers across all industries are taking advantage of low cost, agile computing.

    In this webinar, Dinah Barrett, Specialist Solutions Architect | Management Tools, AWS
    and David Maclean, Special Cloud Engineer, Palo Alto Networks will dive into the need for additional security, over and above native security to protect AWS workloads and developer environments, examining the shared responsibility model for cloud security & diving into specific use cases.
  • The Hacker You Don’t Know – Uncovering Active Cyberattacks Recorded: Dec 6 2018 26 mins
    Ahmed Hussein, Systems Engineer and Eric Kampling, Systems Engineer
    If an active attacker were operating inside your network right now, could you see them? IT security professionals today are challenged with detecting active attackers in addition to stopping malware & risky behavior. Learn how to leverage the power of machine learning to stop active cyberattacks before it’s too late.
  • Who Else is Viewing my One Drive? (Securing Public SaaS Applications) Recorded: Dec 5 2018 28 mins
    Steven Hansen, Systems Engineer and Aymen Khan, Systems Engineer
    The appeal of SaaS applications, such as Office 365®, Google G Suite, Box and Salesforce is growing, but so are the hidden threats in SaaS offerings: accidental data exposure, malicious outsiders, promiscuous sharing and so on. Even sanctioned SaaS adoption can increase the risk of breaches and non-compliance.

    Attend this webinar to learn how Aperture SaaS security service helps eliminate the risks.
  • Protection for Advanced Malware in the Wild Recorded: Dec 4 2018 50 mins
    Matt Elliott, Systems Engineer
    If an active sample of malware was executed in your environment right now, how would you block it? IT professionals today are challenged to sift through countless alerts and false positives to try to successfully prevent malware and risky behavior.

    Attend this webinar to learn how to leverage the power of machine learning to stop active cyberattacks.
  • Are your point of sale environments protected? Recorded: Nov 28 2018 41 mins
    Lawrence Chin
    Point of Sale (POS) systems are the lifeblood of any industry that conducts in-person transactions with its customers. Retail, hospitality, accommodation, etc. rely on their POS environments to process purchases, support customer loyalty programs, update inventory, and drive the supply chain. However, the processing of customer payment card and collection of personally identifiable information still makes POS systems a favorite target of cyberattackers. Media reports on data breaches stemming from compromised POS systems have become all too common. Although compliance with the PCI DSS is a expected, it’s only the bare minimum to conduct business.
    In this webinar you will:
    -Hear a customer case study on POS protection
    -Realize greater security controls over your CDE and customer PII
    -Exceed PCI DSS for greater cyber hygiene
    -Understand the capabilities of a security operating platform for POS
  • Securing Building Management Systems Recorded: Nov 27 2018 64 mins
    Del Rodillas, Director of Industrial and IoT Cybersecurity Product Marketing, Palo Alto Networks
    An often-forgotten area in the enterprise network which poses a significant risk to your organization if compromised are Building Management/Automation Systems (BMS/BAS). These IoT and industrial control systems which are integral to realizing "smart" and efficient buildings and facilities include Heating, Ventilation and Air-conditioning (HVAC), energy management, surveillance, fire safety, physical access controls, electric car charging systems, and other connected systems. As these systems undergo digital transformation and become more connected, the risk associated with cyberattacks also increases. Organizations need to act today to learn more about this growing risk and to include securing BMS/BAS in their enterprise cybersecurity strategy.

    Listen to this webinar to learn about:
    •The rising threat landscape associated with smart buildings and facilities
    •Strategic tenets for protecting BMS/BAS
    •A reference blueprint and case study for BMS cybersecurity
  • Bridging Security Gaps with Networks-to-Endpoint Integration Recorded: Nov 20 2018 37 mins
    Konstantin Rychkov, IDC, Senior Research Analyst
    The typical enterprise uses an average of 30 security products, most of which from variety of vendors and typically do not integrate well and offer little information sharing…if any. Using a portfolio of integrated products from fewer vendors means greater synergies and efficiencies. This is especially true of endpoint security software, where many organizations have long and established relationships with a favorite vendor. This can lead to a sense of complacency, and there may also exist a disincentive to replace software on all of an organization’s endpoint devices, leaving organizations potentially exposed to an evolving threat landscape.

    Join us for this informative webinar where IDC analyst Konstantin Rychkov will:

    • Introduce the concept of endpoint protection integrated with network security components
    • Demonstrate how the two together provide greater effectiveness and efficiency in security
    • Detail how an integrated security stack is instrumental to holistic enterprise-wide security
  • Securing connected vehicles Recorded: Oct 30 2018 36 mins
    Dharminder Debisarun : Cybersecurity strategist for automotive Moshe Shlisel : CEO GuardKnox
    The end-to-end cybersecurity strategy that protects connected vehicles.

    With the expected surge in connected vehicles, cloud security remains critically important to passenger safety and well-being.

    In fact, Gartner is predicting a quarter billion connected vehicles on the road by 2020.

    The average modern car now features over 100 computers, all communicating with one another – often through the cloud. These connections increase the chances of cyberattacks, which can lead to accidents and cause extensive recalls.

    We’ve joined forces with GuardKnox to provide an end-to-end cybersecurity strategy for the modern connected vehicle.

    In this webinar, you’ll learn:

    •How to protect connected cars against cyberattacks
    •Why encryption is so important for connected vehicles
    •How to eliminate challenges when implementing security

    Register/Join the webinar to learn how to prevent successful cyberattacks on connected vehicles.
  • Machine Learning 101: Streamline Security and Speed Up Response Time Recorded: Oct 30 2018 48 mins
    Join Yinnon Meshi, Sr. Data Scientist and Kasey Cross, Senior Product Manager
    Machine learning is changing the way we live our lives. It can reduce errors and even achieve the impossible by accomplishing tasks that cannot be performed manually.

    But how does it change the cybersecurity landscape? And, perhaps more importantly, how will it impact your career in security?

    Join Yinnon Meshi, Sr. Data Scientist and Kasey Cross, Senior Product Marketing Manager to understand how to apply machine learning to threat hunting and malware analysis.

    You will come away understanding:

    •Where machine learning is used today in security
    •How it will be leveraged in the future
    •How you can simplify security operations with automation and machine learning
  • Securing Connected Vehicles Recorded: Oct 30 2018 42 mins
    Dharminder Debisarun : Cybersecurity strategist for automotive Moshe Shlisel : CEO GuardKnox
    The end-to-end cybersecurity strategy that protects connected vehicles.

    With the expected surge in connected vehicles, cloud security remains critically important to passenger safety and well-being.

    In fact, Gartner is predicting a quarter billion connected vehicles on the road by 2020.

    The average modern car now features over 100 computers, all communicating with one another – often through the cloud. These connections increase the chances of cyberattacks, which can lead to accidents and cause extensive recalls.

    We’ve joined forces with GuardKnox to provide an end-to-end cybersecurity strategy for the modern connected vehicle.

    In this webinar, you’ll learn:

    •How to protect connected cars against cyberattacks
    •Why encryption is so important for connected vehicles
    •How to eliminate challenges when implementing security

    Register/Join the webinar to learn how to prevent successful cyberattacks on connected vehicles.
  • Cloud Security Trends and Best Practices for 2019 Recorded: Oct 23 2018 59 mins
    Dave Klein (GuardiCore) | Prof Avishai Wool (Algosec) | Fred Streefland (Palo Alto Networks)
    As more corporate data moves to the cloud, the new challenge is to efficiently manage security in both the cloud and on premises. How are organizations coping and what are the solutions they should be employing?

    Join this keynote panel of security and cloud experts as they discuss:
    - Cloud security challenges today
    - Extending network security to the cloud
    - Security policy management in the cloud
    - Security automation
    - Best practices and recommendations for improving your enterprise security posture
    - Future trends in cloud security

    Speakers:
    - Dave Klein, Sr. Director Engineering & Architecture, GuardiCore
    - Prof Avishai Wool, CTO & Co-founder, Algosec
    - Fred Streefland, Chief Security Officer North & East-Europe (NEEUR), Palo Alto Networks
  • Top 10 Security Recommendations for Public Cloud Migration Recorded: Oct 23 2018 47 mins
    Dejan Stanic - Consulting Engineer Cloud EMEA at Palo Alto Networks
    Offering organizations of all sizes the benefits of agility and scalability, the adoption of public cloud continues at a pace rivalled only by that of the early days of the Internet era. As was the case then, the speed of adoption often means that “good enough” security is viewed as acceptable.

    With the underlying premise that the public cloud is someone else’s computer, and an extension of your network, this session will cover:

    - Public Cloud security concerns
    - What the shared security responsibility model really means
    - Recommendations for protecting your public cloud workloads and data
  • SSL Decryption - the pro’s, the con’s and best practices Recorded: Oct 23 2018 35 mins
    Fred Streefland, Chief Security Officer Northern and Eastern Europe and Marco Vadrucci, Systems Engineer
    Join Fred Streefland, Chief Security Officer and Marco Vadrucci, Systems Engineer from Palo Alto Networks for this exclusive Cybersecurity Webinar focusing on ‘The Pros and Cons of SSL Decryption.’

    During the webinar Fred and Marco will discuss how Secure Sockets Layer Decryption (SSL) (and its successor Transport Layer Security (TLS)) is designed to protect the privacy and security of sensitive communications across an internal or external network.

    During this webinar you'll learn:

    •SSL, its benefits and growth
    •Challenges of encryption
    •How Palo Alto Networks can provide visibility and control across encrypted SSL channels

    Register Now and join us on Wednesday October 10th at 10:00am. We’re looking forward to seeing you there.
  • Worry-Free Security on Azure Recorded: Oct 19 2018 55 mins
    Robert Smith & Hubert Ng
    Presenter

    Robert Smith - Higher Education & Research Specialist – APAC - Microsoft

    Hubert Ng – Cloud Engagement Manager – Asia Pacific - Palo Alto Networks

    An exclusive webinar for the education sector

    Businesses are not the only organisations looking to take advantage of the innovation and disruption that moving to the cloud can provide. Schools, colleges and universities across the Asia-Pacific region are moving their data and applications to the cloud.

    Join our webinar on October 19, and learn how to secure your data and apps in Microsoft® Azure®.

    We will be joined by Robert Smith, higher education and research specialist – APAC from Microsoft, and Hubert Ng, cloud engagement manager for Palo Alto Networks, who will share their experience in bringing the advantages of the cloud specifically to organisations like yours.
  • Worry-Free Security on Azure Recorded: Oct 19 2018 54 mins
    Robert Smith & Hubert Ng
    Presenter

    Robert Smith - Higher Education & Research Specialist – APAC - Microsoft

    Hubert Ng – Cloud Engagement Manager – Asia Pacific - Palo Alto Networks

    An exclusive webinar for the education sector

    Businesses are not the only organisations looking to take advantage of the innovation and disruption that moving to the cloud can provide. Schools, colleges and universities across the Asia-Pacific region are moving their data and applications to the cloud.

    Join our webinar on October 19, and learn how to secure your data and apps in Microsoft® Azure®.

    We will be joined by Robert Smith, higher education and research specialist – APAC from Microsoft, and Hubert Ng, cloud engagement manager for Palo Alto Networks, who will share their experience in bringing the advantages of the cloud specifically to organisations like yours.
  • Compliance is a Team Sport Recorded: Oct 18 2018 55 mins
    Tighe Schlottog, Security Architect - Cross Industries at Palo Alto Networks and Aaron Wilson, Founder, ScaleSec
    Too often, organizations make the move to the cloud without considerations for how it will be in compliance. Whether you need to maintain compliance for regulatory or business obligations it is best to go into the cloud with those requirements in mind.

    In this webinar, our experts will discuss some of the common misconceptions and mistakes that are made in working toward cloud compliance. They will provide practical advice about how to get your cloud compliance program in the best shape possible.

    -Where to start, whether you’re starting from scratch or modifying your existing program
    -Who to involve and when
    -How to manage reporting, audits, and communication

    Given the maturity of the cloud platforms, it isn’t hard to be compliant in the cloud --you just need to prepare appropriately and share the work across the organization to ensure you maintain compliance.
  • Securing remote ICS/SCADA systems just got easier Recorded: Oct 17 2018 55 mins
    Lionel Jacobs, senior security architect, ICS, Palo Alto Networks with host Karin Shopen
    Operational technology teams responsible for ICS and SCADA networks – like their IT counterparts – are being tasked with reducing costs while aiming for 100 percent uptime with minimal staffing resources. This is becoming one of the most important driving factors in the push to supply remote access to vendors and support staff.

    Join us as we look at ways that IT and OT teams can overcome the security challenges remote access often presents to process control networks. In this webinar, we’ll look at ways you can:

    •Apply Zero Trust principles to improve secure remote access
    •Create remote access that is flexible, scalable and secure
    •Protect against threats from third party systems.
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Prevention Week Part 4: Prevent Ransomware with the Right Architecture
  • Live at: Jul 21 2016 5:00 pm
  • Presented by: Scott Simkin, Palo Alto Networks Cybersecurity Team
  • From:
Your email has been sent.
or close