Hi [[ session.user.profile.firstName ]]

Preventing Ransomware in Healthcare

The business model behind crimeware has changed. In recent years, the price of stolen records has plummeted, compelling cyber attackers to look for new sources of income. Many attackers have turned to ransomware due to recent advances in attack distribution, anonymous payments, and the ability to reliably encrypt and decrypt data. Now, barely a week passes without another healthcare organization experiencing a ransomware event. These events impact the quality of care clinical facilities can provide, costs organizations money in remediation efforts, and hurts their reputation as competent providers of care. But while as scary as ransomware can be, with new variations coming out all the time, there are straightforward steps organizations can take to prevent this threat.

In this presentation, Matt Mellen, a former Information Security Lead at a hospital, will discuss practical steps healthcare organizations can take to stop ransomware. Drawing from his first-hand experience responding to ransomware, combined with recommendations from the FBI, Matt will cover practical steps healthcare organizations can take on systems and network devices to prevent exposure to this rampant attack.

Palo Alto Networks invite you to attend a webinar where you can learn how to protect your healthcare organization from ransomware attacks. We will cover:
- How the most current variants of ransomware work
- How to prevent successful ransomware attacks in Healthcare

Ransomware Prevention Recommendations:
https://www.paloaltonetworks.com/content/dam/adobe-campaign/Email-Assets/APJ/DG%20Hub/industries/ransomware-prevention-recommendations.pdf
Recorded Aug 24 2016 36 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Matt Mellen, Security Market Architect, Palo Alto Networks
Presentation preview: Preventing Ransomware in Healthcare

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Securing your apps and data outside of your perimeter Jun 13 2017 12:00 pm UTC 60 mins
    Rob van der Wouw, Security Consultant at RedLogic
    We have had overwhelming feedback on our previous session about starting to secure the software defined datacenter at the perimeter. We have decided to move to the next level and talk about securing your data and applications outside of your perimeter.

    Want to know more? Learn from our partner Redlogic who supported several customers to accomplish this journey.

    RedLogic is a young, professional IT infrastructure services company consisting of certified top professionals in security and ICT. Managing and deploying complex infrastructure and security.
  • The value of Next Generation Security Platform May 24 2017 9:00 am UTC 45 mins
    Fred Streefland
    The combination of complex, modern IT environments and a rapidly evolving threat landscape has left many businesses challenged to control costs while effectively protecting the systems on which their operations depend. In many cases, the challenges are brought about by the combination of too many disparate security solutions that do not share context and insufficient time and/or expertise.

    To address these challenges, organisations of all shapes and sizes are looking at ways to consolidate their security infrastructure to improve their security posture and reduce their total cost of ownership.

    Please join us for a webinar where we’ll discuss how Palo Alto Networks’ Next-Generation Security Platform can enable your organization to:

    1.Reduce the threat footprint
    2.Prevent known and unknown attacks.
    3.Tie policies to users.
  • Prevent Costly Data Leaks From SaaS Apps May 23 2017 8:00 am UTC 60 mins
    Anuj Sawani, Sr. Product Marketing Manager at Palo Alto Networks
    SaaS apps are now extensively adopted by organizations – some procured by IT, others adopted by the users themselves. You’re already likely witnessing large amounts of data being transferred between users and these apps. As corporate data moves to the cloud, the risk of a data leakage increases with users accessing enterprise apps on unmanaged devices or storing corporate data on risky, unsanctioned apps.

    Join this webinar to learn how to prevent data exposure and maintain compliance by protecting your data within enterprise SaaS apps and blocking unsanctioned apps. You’ll learn about:
    •A real-world customer journey for complete data security in SaaS.
    •Common threats leading to data leaks from popular SaaS apps.
    •Benefits of adopting a platform approach to SaaS security.
  • SaaS Security: Adapt to the Changing Data Center Landscape [Breach Prevention] May 19 2017 2:00 am UTC 45 mins
    Charles Woo, Systems Engineer, Palo Alto Networks
    The first step for many organizations migrating to the cloud is the adoption of SaaS applications, such as Office 365, Box, Salesforce and many more. As an IT professional, this means you are giving permission to your users to store data in the cloud with corporate-approved services, such as OneDrive or SharePoint Online. The decision to move to the cloud is usually supported by a long list of cost and operational benefits. Infrastructure cost reduction? Check. Increased productivity? Check. License cost reduction? Check. But, have you thought about data governance and compliance, malware protection, and collaboration with external vendors? These are great questions to ask as you make this transition.

    Organizations look to reduce the threat surface exposed by SaaS applications as their data is now hosted in data centers that are not managed by them. Join this webinar to learn more about the evolution of the data center landscape and how to redefine your security strategy to cover the unique risks surfacing from the adoption of SaaS applications.
  • Protect Software-Defined Data Center From Advanced Attacks [Breach Prevention] May 18 2017 2:00 am UTC 60 mins
    Charles Woo, Systems Engineer, Palo Alto Networks
    The sophistication of attacks against corporate and government data centers continues to grow at an alarming pace. New security approaches, such as micro-segmentation and advanced security controls within the data center, are actively being embraced by security practitioners. In this webinar, learn about these advanced attacks within the data center through real examples and different approaches to both combating them and protecting your applications and data.
  • Changing the Game in Public Cloud Security with AutoFocus [Breach Prevention] May 17 2017 2:00 am UTC 60 mins
    Michael Lam, Systems Engineer, Palo Alto Networks
    Security remains a top concern as you transition more workloads to the public cloud, with cyber attackers attempting to compromise sensitive data and resources wherever they reside. Providers will profess that your applications and data are more secure in the cloud, but how can you be sure? Join this Cloud Breach Prevention Week webcast spotlighting how the AutoFocus™ threat intelligence service can help you identify and take action on threats targeting the public cloud, including how VM-Series virtualized firewalls can protect your organization with next-generation security.
     
    You will see:
    •Breaking public cloud threats found by AutoFocus
    •How the VM-Series and AutoFocus automate targeted threat identification and prevention
    •Key differences between the VM-Series and other cloud security offerings
  • Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention] May 16 2017 2:00 am UTC 45 mins
    Charles Woo, Systems Engineer, Palo Alto Networks
    The demand for business to be more agile and stay competitive is driving a change in the way applications are developed, deployed and adopted. The challenge has become balancing the agility needs of the business with improving the security of the applications and, more importantly, securing the data as it moves between the various clouds. Gaining visibility and preventing attacks attempting to gain access to the data, whether from an external location or through a lateral attack, becomes imperative in all locations where the applications and data reside, without adding additional cost or complexity. Organizations require visibility, control and prevention capabilities across any cloud environment, enabling consistent security policies and protection no matter where it is deployed.

    This webinar will cover:

    • Visibility: Consistent visibility across clouds is one of the most common issues with multi-cloud deployments.
    • Threat prevention: Block known and unknown threats is a critical requirement to protect applications and data no matter where they reside.
    • Automation: The ability to natively integrate into a variety of environments to match the dynamic and on demand nature of cloud services.
    • Centralized management: Manage your virtualized and physical firewalls from a single management console, delivering consistent policy and features across all clouds.
  • Securely Enabling a Hybrid Data Center with Microsoft Azure May 15 2017 12:00 pm UTC 45 mins
    Matt Keil, Director of Product Marketing at Palo Alto Networks
    Microsoft® Azure™ is enabling a data center transformation that results in a hybrid architecture that combines your on premises resources and the Azure cloud. From a security perspective, your challenge remains: how to protect your applications and data, regardless of their location.

    Join us for this live webinar to learn how the VM-Series can securely enable a hybrid data center. At the end of the webinar, you will learn:
    •Security considerations when moving to Azure
    •Top 3 VM-Series recommendations to protect your data
    •Tips and techniques to streamline your efforts
  • Cyberattacken passieren - Gehackt werden muss nicht sein. May 12 2017 9:00 am UTC 60 mins
    Tobias Frigger, System Engineer at Palo Alto Networks
    Keine Ausreden mehr. Endlich antworten.

    Strenge Regeln und traditionelle Security-Ansätze können versteckte Bedrohungen in Ihrem Netzwerk nicht verhindern.

    Lernen Sie, wie unserer Security Lifecycle Review (SLR) Ihren Netzwerkverkehr analysiert und dann einen detaillierten Lagebericht einzig für Ihre Organisation generiert.

    In diesem Webinar werden Sie mehr über einige Applikationen und Bedrohungen erfahren, denen Sie ausgesetzt sind.
  • Cloudticity Secures Healthcare Systems on AWS with a Next-Gen Security Platform May 9 2017 4:00 pm UTC 60 mins
    Gerry Miller, CTO at Cloudticity & Matt Mellen, Heatlhcare Security Architect at Palo Alto Networks
    Securing healthcare applications and data on AWS requires extra diligence, focus and a strong(er) architecture, due to the sensitive nature of protected health information and regulatory requirements. Join us for a deep-dive into the robust AWS-based security architecture developed by Cloudticity specifically designed to cater to the needs of healthcare organizations using Palo Alto Networks Next-Generation Security Platform.

    Healthcare applications store, process, and transmit highly sensitive data and require 24x7 uptime. Cloudticity's security architecture takes advantage of some of the high-availability capabilities that AWS and Palo Alto Networks security platform have to offer for highly scalable mission-critical cloud-hosted environments. For example, we will cover multi-availability zones using Lambda, Auto Scaling and PAN-OS/VM-Series automation features.

    You will walk away with specific, actionable architectural patterns resulting in a usable model for deploying Palo Alto Networks devices on AWS to protect healthcare workloads for stronger security, higher availability, and limitless scalability.
  • Auto Scaling Next-Gen Firewalls on AWS May 9 2017 11:00 am UTC 45 mins
    Matt Keil, Director of Product Marketing, Data Center and Warby Warburton, Manager, Technical Marketing Engineering
    Through integration with AWS services, like Auto Scaling and AWS Elastic Load Balancing (AWS ELB), you can now build a next-generation security infrastructure that will dynamically, yet independently, scale to protect your AWS workloads as their traffic patterns fluctuate. This architecture will allow you to reduce costs by utilizing the firewall capacities intelligently and efficiently based on user-defined metrics. By scaling the security separately from the application workloads, this solution allows each firewall to be identically configured and managed centrally, resulting in lower administrative costs.

    Join us for an educational webinar to learn how you can scale next-generation security using AWS Auto Scaling and ELB. Using native AWS Services and VM-Series automation features, you can now dynamically, yet independently scale the VM-Series next-generation firewalls on AWS.

    This webinar will cover
    • Auto Scaling the VM-Series architecture
    • Auto Scaling and ELB integration details
    • Alternative architectures for protecting many VPCs
  • Prepare for the Imminent Shifts in Endpoint Attacks May 4 2017 9:00 am UTC 60 mins
    Michael Moshiri, Director, Endpoint Protection, Palo Alto Networks
    The shifts in attackers’ tactics are easy to miss and will catch many organizations off-guard. Attackers have discovered new ways to re-engineer older tactics that are easier to execute and are perceived to be less risky by targeted users. Combined with targeting platforms that organizations falsely consider more secure, these new attacks are proving very damaging to unprepared organizations.

    Join this webcast to learn:
    - Vulnerabilities threat actors are now targeting most intensely
    - New tactics and techniques hackers are using against endpoints
    - Best practices Palo Alto Networks uses to secure its own endpoints
  • Prepare for the Imminent Shifts in Endpoint Attacks May 4 2017 2:00 am UTC 60 mins
    Michael Moshiri, Director, Endpoint Protection, Palo Alto Networks
    The shifts in attackers’ tactics are easy to miss and will catch many organizations off-guard. Attackers have discovered new ways to re-engineer older tactics that are easier to execute and are perceived to be less risky by targeted users. Combined with targeting platforms that organizations falsely consider more secure, these new attacks are proving very damaging to unprepared organizations.

    Join this webcast to learn:
    - Vulnerabilities threat actors are now targeting most intensely
    - New tactics and techniques hackers are using against endpoints
    - Best practices Palo Alto Networks uses to secure its own endpoints
  • The State of Security for CIOs and CSOs May 2 2017 6:30 pm UTC 60 mins
    Rick Howard, Chief Security Officer, Palo Alto Networks
    Kick-Start a Radical Change in the Evolution of Cybersecurity

    Senior government and education officials are prime for the next evolution in cybersecurity. Although network defenders remain lockstep in outdated best practices, CIOs and CSOs are moving away from the coveted defense-in-depth strategies of the past and looking forward to more effective measures to implement the Cyber Kill Chain™ model.

    In this C-level webinar, the CSO of Palo Alto Networks®, Rick Howard, will discuss how CIOs and CSOs can more effectively orchestrate their enterprise security posture. Rick will review the state of enterprise cyber defense and provide insight for executives on:

    • Why the defense-in-depth model failed.
    • Why its replacement, the Cyber Kill Chain, hasn’t realized its full potential.
    • How to shift focus to automatic enterprise security orchestration.
    • How to influence the board and radically change thinking from the top down.

    Join us to learn more about this new and necessary direction in the evolution of cybersecurity.
  • Prepare for the Imminent Shifts in Endpoint Attacks May 2 2017 5:00 pm UTC 60 mins
    Michael Moshiri, Director, Endpoint Protection; Rinki Sethi, Sr. Director of Info Security; Bryan Lee, Unit 42 Threat Analyst
    The shifts in attackers’ tactics are easy to miss and will catch many organizations off-guard. Attackers have discovered new ways to re-engineer older tactics that are easier to execute and are perceived to be less risky by targeted users. Combined with targeting platforms that organizations falsely consider more secure, these new attacks are proving very damaging to unprepared organizations.

    Palo Alto Networks Michael Moshiri hosts colleagues Rinki Sethi, Senior Director of Information Security, and Bryan Lee, Unit 42 Threat Intelligence Analyst, in an exclusive webinar focusing on:

    - Vulnerabilities threat actors are now targeting most intensely
    - New tactics and techniques hackers are using against endpoints
    - Best practices Palo Alto Networks uses to secure its own endpoints
  • Next-generation Security for the Public Cloud May 2 2017 8:00 am UTC 60 mins
    Matt Keil, Director of Product Marketing at Palo Alto Networks
    As more and more organizations move their workloads to the public cloud, security remains a top concern because cybercriminals do not care whether your applications and data reside in your datacenter or in the cloud. Their goal is to steal data or computing resources by gaining access to the network, then moving laterally, potentially to the cloud to execute their goal.

    Join us for this webinar to learn how the VM-Series protects your public cloud deployment with the same next-generation firewall and threat prevention features available in our physical appliances.

    The webinar will cover:
    • Overview of the VM-Series next-generation firewall
    • How the VM-Series prevents cyberattacks in the public cloud
    • Key differences between the VM-Series and other cloud security offerings
  • Prevent Costly Data Leaks From SaaS Apps Apr 27 2017 9:00 am UTC 60 mins
    Anuj Sawani, Sr. Product Marketing Manager at Palo Alto Networks
    SaaS apps are now extensively adopted by organizations – some procured by IT, others adopted by the users themselves. You’re already likely witnessing large amounts of data being transferred between users and these apps. As corporate data moves to the cloud, the risk of a data leakage increases with users accessing enterprise apps on unmanaged devices or storing corporate data on risky, unsanctioned apps. 
     
    Join this webinar to learn how to prevent data exposure and maintain compliance by protecting your data within enterprise SaaS apps and blocking unsanctioned apps. You’ll learn about: 
    •A real-world customer journey for complete data security in SaaS.
    •Common threats leading to data leaks from popular SaaS apps.
    •Benefits of adopting a platform approach to SaaS security.
  • Prevent Costly Data Leaks From SaaS Apps Recorded: Apr 27 2017 48 mins
    Anuj Sawani, Sr. Product Marketing Manager at Palo Alto Networks
    SaaS apps are now extensively adopted by organizations – some procured by IT, others adopted by the users themselves. You’re already likely witnessing large amounts of data being transferred between users and these apps. As corporate data moves to the cloud, the risk of a data leakage increases with users accessing enterprise apps on unmanaged devices or storing corporate data on risky, unsanctioned apps. 
     
    Join this webinar to learn how to prevent data exposure and maintain compliance by protecting your data within enterprise SaaS apps and blocking unsanctioned apps. You’ll learn about: 
    •A real-world customer journey for complete data security in SaaS.
    •Common threats leading to data leaks from popular SaaS apps.
    •Benefits of adopting a platform approach to SaaS security.
  • Tackle Your Toughest Security Challenges at Ignite 2017 Recorded: Apr 25 2017 34 mins
    Joerg Sieber, Director, Product Marketing, Palo Alto Networks
    Join this webinar for a sneak preview of the content you can expect at Ignite 2017 in Vancouver, BC, Canada, June 12-15, 2017. This year will be the biggest and most advanced Ignite yet! We are expecting over 4,000 security experts gathering in beautiful Vancouver to tackle their toughest security challenges through a four-day program of hands-on educational sessions, peer-to-peer networking and multiple opportunities to explore all the capabilities and technologies of the Palo Alto Networks Next-Generation Security Platform, which is designed to put an end to the era of breaches by safely enabling applications and providing cyberthreat prevention measures at all steps in the cyberattack lifecycle. Space is limited, and you won’t want to miss this unique event, so sign up today at www.paloaltonetworksignite.com
  • Attacks Happen—Breaches Don't Have To. Learn about the Security Lifecycle Review Recorded: Apr 25 2017 52 mins
    Jay Kane, VP Cyber Security & Mike Semaniuk, CISSP Systems Engineer, Palo Alto Networks
    Excuses stop. Answers start.

    Strict policies and solid security measures can’t eliminate hidden threats in your systems. Learn how our Security Lifecycle Review (SLR) examines your network traffic and then generates a comprehensive report unique to your organization.

    In this webinar, you’ll discover some of the types of applications and threats exposing vulnerabilities in your security’s posture.

    There’s no need for excuses. Register now and see what’s really happening on your network.
Webcasts and Videos
Palo Alto Networks™ is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content — by user, not just by IP address. Based on patent-pending App-ID™ technology, Palo Alto Networks firewalls accurately identify and control threats and applications — regardless of port, protocol, evasive tactic, or SSL encryption — and scan content to stop threats and prevent data leakage. Palo Alto Networks delivers proven threat prevention combining IPS, anti-malware, URL, file and content filtering in a single integrated engine supported by one of the industry’s most prolific vulnerability research teams.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Preventing Ransomware in Healthcare
  • Live at: Aug 24 2016 9:00 am
  • Presented by: Matt Mellen, Security Market Architect, Palo Alto Networks
  • From:
Your email has been sent.
or close