Hi [[ session.user.profile.firstName ]]

Lessons Learned from Recent Data Breaches in the Banking Industry

They say that hindsight is 20/20 and in recent months, news of data breaches at several SWIFT (Society for Worldwide Interbank Financial Telecommunications) members has seen many reassessing their cybersecurity strategies.

Palo Alto Networks invites you to join a webinar where Lawrence Chin, Security Market Architect, will discuss:

● A review of these attacks and some of the commonalities
● The role of cyber security hygiene, and subsequent recommendations from SWIFT, FS-ISAC (Financial Services Information Sharing and Analysis Center), and US FFIEC (Federal Financial Institutions Examination Council).
● Best practices that may prevent similar cyberattacks on financial institutions from succeeding in the future.

Register today and learn how the confidence and trust can be protected in the increasingly complex digital world in which we live.
Recorded Oct 18 2016 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Lawrence Chin - Financial Services Security Market Architect - Palo Alto Networks
Presentation preview: Lessons Learned from Recent Data Breaches in the Banking Industry

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Ransomware's Next Steps Nov 16 2017 6:00 pm UTC 45 mins
    Joel Boyd, Sr. Product Manager, Endpoint
    Promising huge profits from tiny effort or investment, ransomware remains an exceptionally popular tool for both advanced and novice attackers alike.

    Register now for our webinar and learn how your organization can deploy Traps™ advanced endpoint protection to prevent ransomware attacks without sacrificing your teams’ productivity or resources.

    In this quick, focused webinar, you’ll learn the latest intel on:
    - Trends and predictions
    - New attack vectors and payment schemes
    - Breaking down attacks
  • Biggest Problem in Healthcare IT: Ransomware and Endpoint Protection Nov 15 2017 6:00 pm UTC 60 mins
    Dal Gemmell, Head of Traps Marketing and Matt Mellen Healthcare Security Architect, Palo Alto Networks
    It turns out ransomware and endpoint attacks are NOT going away any time soon …

    According to the 2017 HIMSS Healthcare IT Cybersecurity Study, nearly 90 percent of all U.S. respondents were targeted with a ransomware attack in the past year.

    Our experts will help you get ahead of ransomware and endpoint attacks. Register for the webinar and learn:
    •The current – and future – state of healthcare security.
    •What your healthcare security executives and IT peers are doing to lower risks.
    •How we can help improve your 2018 healthcare security strategy.
  • GlobalProtect Best Practices: Authentication Nov 9 2017 6:00 pm UTC 60 mins
    Siva Rajaskaran, Sr. Technical Marketing Engineer & Brian Tokuyoshi, Sr. Product Marketing Manager
    If you are planning to deploy GlobalProtect, attend this webinar and get an overview on important authentication use cases and integrations. This is an architect-level technical deep dive into GlobalProtect functionality, straight from the product experts. Join us and bring your technical questions for a Q&A session direct with the GlobalProtect product managers and technical engineers.

    In this session, learn about how to deploy GlobalProtect with:

    1.Two Factor Authentication (2FA) with RADIUS or SAML for On-Demand Remote Access VPN
    2.Two Factor Authentication (2FA) with RADIUS or SAML and client certificate for Always-On VPN
    3.MFA (Multi Factor Authentication) for privileged resource access
    4.Transparent authentication for user-id with Internal Gateway
    5.Group Mapping and User-ID for Security Policy and Visibility
  • Teaming Together to Prevent Attacks and Protect Your Data Nov 9 2017 11:00 am UTC 45 mins
    Wissam Ali-Ahmad Lead Solutions Architect, Technical Services for Global Strategic Alliances at Splunk
    Targeted attacks — including advanced persistent threats (APTs) — and today’s sophisticated malware threats are one of the biggest challenges facing customer’s as the threats multiply and create unique compromises within their networks. This creates challenges for traditional security technologies to reliably identify these new class of threats. Even when a threat is detected, there is still the issue of slow response times and extended periods of exposure, as administrators typically need to manually coordinate and configure the necessary changes to their security infrastructure.

    Please join Palo Alto Networks and Splunk as we work together to deliver an advanced visibility, reporting and monitoring solution for intelligent security analysis that addresses this challenge and delivers new tools to quickly identify and analyze this new class of threats. We will show you how this integration insures better threat response time, and how to automate the steps needed to block malicious sources and quarantine compromised devices you through how Palo Alto Networks and Splunk.

    Key Benefits:
    - Advanced security and visibility in the cloud, on premise, or hybrid model
    - Accelerated threat response and enhanced threat detection
    - Security visualization, monitoring and analysis
    - Demo to show you how to identify ransomware and correlate IOC data through the app and use adaptive response to take actions
  • Identify and Respond to Security Threats with Palo Alto Networks and ServiceNow Nov 8 2017 6:00 pm UTC 60 mins
    Tim Riley, Business Dev., Francesco Vigo, Partner Architect, Palo Alto Networks & John Ferguson, Product Manager, ServiceNow
    Security teams today commonly use a combination of email, spreadsheets, and phone calls to manage their incident response processes. This leads to average detection and containment times that are measured in days and weeks and can result in costly breaches.

    The key to reducing detection and response times lies in automating basic tasks, identifying when threats target the assets that are most critical to the business, and allowing actions to be initiated from a single platform instead of dealing with multiple consoles or teams.

    Join Tim Riley, Business Development and Francesco Vigo, Partner Architect from Palo Alto Networks and John Ferguson, Product Manager from ServiceNow to learn how to:

    •Accelerate threat identification by combining ServiceNow® Security Operations with automated enrichment from Palo Alto Networks WildFire and AutoFocus
    • Speed up decision-making with business context for security incidents
    • Reduce time to eradicate by initiating Palo Alto Networks Next-Generation Firewall changes from within ServiceNow
  • Introducing New Palo Alto Networks Cloud Services Nov 8 2017 4:00 pm UTC 45 mins
    Peter Riebli – Corporate Sales Representative | John Fisher – Sales Engineer
    The recent release of GlobalProtect Cloud Service and our Cloud-Based Logging Service marks the next step in Palo Alto Networks’ evolution towards a consumption model that complements the dynamic nature of today’s IT infrastructure.

    In this brief 30-minute webinar we will discuss how GlobalProtect can be used to provide Palo Alto Networks next-generation security infrastructure as a cloud-based service for remote offices and mobile users. In addition, we will touch on the how the Cloud-Based Logging service will help to offload CAPEX and operational overhead while also increasing data retention and intelligence.
  • Threat Prevention on your Terms Nov 8 2017 9:00 am UTC 45 mins
    Kamil Imtiaz, Sr Product Marketing Manager, Palo Alto Networks
    Palo Alto Networks® is proud to introduce the APAC WildFire™ cloud, based in Singapore. Recently announced, this newest enhancement to the world’s most powerful cloud-based threat analysis service allows customers in the region to benefit from WildFire prevention capabilities while meeting data privacy needs.

    Register for our webinar to learn about how the APAC WildFire cloud enables customers to:

    •Choose a desired cloud by offering regionalised data analysis options.
    •Leverage global threat intelligence from 17,000+ global customers in the world’s largest threat analysis tool.
    •Take advantage of groundbreaking threat analytics and correlation to accelerate threat hunting, analytics and response efforts.
  • Threat Prevention on your Terms Nov 8 2017 2:00 am UTC 60 mins
    Kamil Imtiaz, Sr Product Marketing Manager, Palo Alto Networks
    Palo Alto Networks® is proud to introduce the APAC WildFire™ cloud, based in Singapore. Recently announced, this newest enhancement to the world’s most powerful cloud-based threat analysis service allows customers in the region to benefit from WildFire prevention capabilities while meeting data privacy needs.

    Register for our webinar to learn about how the APAC WildFire cloud enables customers to:

    •Choose a desired cloud by offering regionalised data analysis options.
    •Leverage global threat intelligence from 17,000+ global customers in the world’s largest threat analysis tool.
    •Take advantage of groundbreaking threat analytics and correlation to accelerate threat hunting, analytics and response efforts.
  • Disrupting Credential-based Attacks Nov 3 2017 2:00 pm UTC 30 mins
    Brian Tokuyoshi, Product Marketing, and Martin Walter, Product Management, Palo Alto Networks
    Prevent Phishing and the Abuse of Stolen Credentials

    In this session, we will present the unique attack life-cycle for credential-based attacks. Using real-life examples from Unit 42, we will demonstrate what you can do today to stop credential theft and abuse
  • Build Secure Networks in Microsoft Azure with Palo Alto Networks Oct 25 2017 8:30 pm UTC 60 mins
    Tal Zehavi, Palo Alto Networks Cloud Specialist, Eric DeBord, Azure Specialist, Microsoft
    As organizations look to offload more and more applications to the public cloud, security posture needs to remain a chief concern for the IT teams protecting these workloads. The “Shared Responsibility Model” employed by Azure® dictates that while the host is responsible for the security OF the cloud, customers are responsible for the security of their data IN the cloud.

    Palo Alto Networks® helps customers achieve this security through a platform designed to safely enable widely distributed enterprise workloads.

    In this webinar, we will discuss:
    - The security issues to consider when developing a cloud strategy
    - How to use the Palo Alto Networks platform to achieve security policy parity across your on-premise, private and public cloud environments
    - Azure network security best practices and architecture diagrams
    - Steps on how to configure and manage Palo Alto in the cloud
  • Top 10 Public Cloud Security Recommendations Oct 25 2017 2:00 pm UTC 45 mins
    Matt Keil, Director of Product Marketing, Public Cloud
    Offering organizations of all sizes the benefits of agility and scalability, the adoption of public cloud continues at a pace rivalled only by that of the early days of the Internet era. As was the case then, the speed of adoption often means that “good enough” security is viewed as acceptable.

    With the underlying premise that the public cloud is someone else’s computer, and an extension of your network this session will cover public cloud security concerns, what the shared security responsibility model really means and recommendations for protecting your public cloud workloads and data.
  • Advance Your Career in Cybersecurity Recorded: Oct 20 2017 60 mins
    Paula Judge, Sr. Director of Talent Acquisition at Palo Alto Networks and Adam Mansour, CTO at IntelliGO
    Join Palo Alto Networks to learn our best tips on how to advance your career in cybersecurity.
  • Cybersecurity in the Workplace is Everyone’s Business Recorded: Oct 19 2017 50 mins
    Rinki Sethi, Senior Director, Information Security and Brian Tokuyoshi, Sr. Product Marketing Manager
    Creating a culture of cybersecurity is critical for all organizations. Join the conversation with our own security pros to learn how they keep employees ahead of phishing attacks, share best practices for phishing education and explain how to use innovative technologies to strengthen cyber resilience.
  • Essential Reading for the Security Professional Recorded: Oct 18 2017 18 mins
    Rick Howard, chief security officer at Palo Alto Networks
    Join Rick Howard, CSO at Palo Alto Networks to learn about must-read books for all cybersecurity practitioners – be they from industry, government or academia — where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional’s education that will make the practitioner incomplete.
  • Win the Cyberwar with Zero Trust Recorded: Oct 17 2017 47 mins
    John Kindervag, Field Chief Technology Officer at Palo Alto Networks
    Zero Trust is revolutionizing network security architecture: it is data-centric and designed to stop data breaches. Zero Trust also adds a layer of agility to modern networks that is impossible to do in traditional network designs. These 21st century networks have been adopted by government entities and large enterprises around the world.

    In this session, John will discuss the concept of Zero Trust and explain why Zero Trust is the world's only true cybersecurity strategy. He will show a Zero Trust Strategy will achieve tactical and operational goals. This session will demonstrate how Zero Trust will not only transform network security but function as a business enabler, by focusing on the businesses grand strategic objectives.
  • Start Benefiting from PAN-OS 8.0 with User-ID and Global Protect Recorded: Oct 17 2017 38 mins
    Wiley Richardson, Security Engineer, Trainer and Cloud Architect at Cloud Harmonics
    Join us for our follow-up webcast with a focus on Authentication, Global Protect, and User ID enhancements to get a quick overview of SAML Authentication, Global Protect Clientless VPN and other selected new features and enhancements that PAN-OS 8.0 adds to your Palo Alto Networks Security Platform. Attendees will:

    •Learn about the key capabilities introduced by 8.0
    •See the value of the update to security deployments
    •Receive a voucher for 8.0 training course - $500 value
  • Disrupting the Cybersecurity Status Quo Recorded: Oct 16 2017 59 mins
    Nir Zuk, Palo Alto Networks co-founder and CTO
    The signs that the security market is ready for disruption are here. Join in discussion with Nir Zuk, Palo Alto Networks co-founder and CTO, on how the security market is evolving and maturing and ultimately, ready for disruption.
  • The end of the world as we know it? How to tackle security risks in IoT Recorded: Oct 6 2017 41 mins
    Stefaan Hinderyckx, Director Europe - Security at Dimension Data
    The Internet of Things or IoT has been widely publicised by the media over recent years. The integration of IT, OT and IoT poses unique challenges to security leaders. Ranging from email spamming fridges to the end of the world as we know it. The reality is, we face a situation where some devices are becoming internet enabled just because they can. At the same time, we adopt internet devices with little thought of our data, because they offer accessing something in a way that makes it easier for us. So how will Dimension Data and Palo Alto networks deal with the "Internet of Threats"?
  • Teaming Together to Prevent Attacks and Protect Your Data Recorded: Oct 5 2017 32 mins
    Wissam Ali-Ahmad Lead Solutions Architect, Technical Services for Global Strategic Alliances at Splunk
    Targeted attacks — including advanced persistent threats (APTs) — and today’s sophisticated malware threats are one of the biggest challenges facing customer’s as the threats multiply and create unique compromises within their networks. This creates challenges for traditional security technologies to reliably identify these new class of threats. Even when a threat is detected, there is still the issue of slow response times and extended periods of exposure, as administrators typically need to manually coordinate and configure the necessary changes to their security infrastructure.

    Please join Palo Alto Networks and Splunk as we work together to deliver an advanced visibility, reporting and monitoring solution for intelligent security analysis that addresses this challenge and delivers new tools to quickly identify and analyze this new class of threats. We will show you how this integration insures better threat response time, and how to automate the steps needed to block malicious sources and quarantine compromised devices you through how Palo Alto Networks and Splunk.

    Key Benefits:
    - Advanced security and visibility in the cloud, on premise, or hybrid model
    - Accelerated threat response and enhanced threat detection
    - Security visualization, monitoring and analysis
    - Demo to show you how to identify ransomware and correlate IOC data through the app and use adaptive response to take actions
  • A Maturity Model for Healthcare Cybersecurity Recorded: Oct 4 2017 60 mins
    Matt Mellen, Healthcare Security Architect, Palo Alto Networks
    Palo Alto Networks security platform provides hundreds of capabilities for reducing the attack surface of healthcare organizations - But which ones should you focus on implementing first? Join us for this webinar presenting the Healthcare Maturity Model, by Matt Mellen, a former security operations lead at a hospital in California. The maturity model outlines critical security capabilities that every healthcare organization should have deployed. A variety of security capabilities will be discussed in the context of healthcare environments, like SSL-decryption, geo-based blocking, DNS sinkholing and many more.

    The security capabilities will be split into 4 levels of increasing ‘maturity’ in order to help healthcare orgs prioritize which should be implemented first (levels 1 and 2), and which are more appropriate in more mature security architectures (levels 3 and 4). In addition to helping you prioritize the security capabilities that should be enabled in your organization, you’ll get a better idea of the breadth of security functions that the security platform provides in a healthcare environment.

    Learning Objectives:
    •Understand the overview of the security capabilities the security platform provides
    •Prioritize enablement of security capabilities within your organization
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Lessons Learned from Recent Data Breaches in the Banking Industry
  • Live at: Oct 18 2016 4:00 pm
  • Presented by: Lawrence Chin - Financial Services Security Market Architect - Palo Alto Networks
  • From:
Your email has been sent.
or close