Hi [[ session.user.profile.firstName ]]

[Breach Prevention] Disrupting Credential-based Attacks

Learn how to use the Palo Alto Networks next-generation security platform to disrupt the unique attack lifecycle used in credential-based attacks. In this session, get details about the strategies and key technologies for preventing both the theft and abuse of credentials.

In this session, get details on:
* Why the platform plays a critical role towards disrupting credential-based attacks
* Preventing the theft of credentials, using new PAN-OS 8.0 technologies
* Stopping the use of stolen credentials, through new multi-factor authentication capabilities in PAN-OS 8.0
Recorded Jul 26 2017 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Martin Walter, Product Line Manager, Palo Alto Networks
Presentation preview: [Breach Prevention] Disrupting Credential-based Attacks
  • Channel
  • Channel profile
  • Secure Your Branch Mar 5 2019 10:00 am UTC 60 mins
    Brian Tokuyoshi, Pradeep Singh, Ron Dodge
    There’s a shift underway in branch networking. Backhauling branch office traffic to HQ made sense when accessing data center application, but does this approach still make sense? SaaS and Cloud have fundamentally changed how we use applications and access data. With the high cost of maintaining MPLS and the need to access applications in the cloud, organizations are looking for options to use SD-WAN or access the internet directly from the branch. But how do you do that safely, without watering down the protection?

    Join our Palo Alto Networks experts and learn how you can safely route branch traffic directly to the internet while ensuring the same levels of security that you expect for all your users. You will:

    •Get details on the scenarios for branch security
    •Learn about what does and doesn’t work
    •Find out how to deploy a flexible set of security options to cover your requirements
    •Get your questions answered by the experts in our live Q&A
  • How to Build a Zero Trust Network Feb 26 2019 10:00 am UTC 60 mins
    John Kindervag, Field CTO, Palo Alto Networks
    “Trust is always a vulnerability in a digital system,” - John Kindervag, Founder of Zero Trust and Field CTO at Palo Alto Networks

    Much has been written about the topic of Zero Trust. Is it a security buzz word or a true effective security strategy?

    High-profile breaches involving “trusted” insiders have given industry-wide visibility to the fact that trust represents a vulnerability for digital systems. It’s something malicious actors can and do exploit for their advantage.

    Zero Trust was first introduced around the principles of “never trust, always verify” as a means for enterprises to implement effective network segmentation. As the model has been embraced, Zero Trust evolved to become a strategic Cybersecurity initiative that major enterprises align to in order to prevent successful cyberattacks.

    Watch as our Palo Alto Networks® expert John Kindervag discusses the “whys and hows” of building a Zero Trust architecture. In this webcast, you will:

    • Learn specific outcomes of implementing a Zero Trust architecture
    • Hear recommendations on where to start when planning and implementing a Zero Trust framework
    • See how Palo Alto Networks performed in an independent evaluation on Zero Trust Networks
    • Get your questions answered in our Live Q&A
  • 2019 Cloud Security Predictions (EMEA) Feb 12 2019 9:00 am UTC 60 mins
    Greg Day, Chief Security Officer EMEA at Palo Alto Networks; James Brown, Head of EMEA Public Cloud at Palo Alto Networks
    According to the Unit 42 cloud research team, on average, organizations fail 43% of CIS Foundations best practices, 36% of NIST CSF best practices, 32% of GDPR requirements and 24% of SOC 2 requirements. Still, for most organizations, the speed and agility the cloud provides is undeniable, despite new risks and the security and compliances challenges that come along with them.

    Sign up for “Key Cloud Security Predictions and Trends” to hear Palo Alto Networks EMEA’s Greg Day, regional CSO, and James Brown, head of public cloud, discuss the impact cloud has had on security and compliance, highlighting top cloud security predictions and technology trends in Europe, the Middle East and Africa. They will also provide some practical advice on how to secure your organization when moving to the AWS® cloud.

    Together, Greg Day and James Brown bring nearly 40 years of public cloud security knowledge and expertise to the table.

    Sponsored by AWS Marketplace
  • See a 360 view of YOUR threat landscape Feb 7 2019 3:00 pm UTC 60 mins
    Augustin Montano, Jamian Mason, and Pablo Armas; System Engineers for Palo Alto Networks
    Which threats are the ones affecting my industry and my organization? How am I proactively protecting the organization against them? Is there any evidence of malicious activity as it relates to these specific campaigns? We will show you how to get the answers to this common questions that any cybersecurity professional is asking himself.
  • Leveraging a Security Platform for the Apple Ecosystem Feb 6 2019 4:00 pm UTC 60 mins
    Jeff Gwathney, Marty Lee and Sharjeel Khan, Systems Engineers for Palo Alto Networks
    IT environments today are adopting BYOD initiatives and allowing employees to pick their own devices. How do you ensure your security posture is reaching all of your platforms? Join us to learn how Palo Alto Networks secures the Apple ecosystem and how we can help you enable your users.
  • AWS Security: Securing AWS Workloads with Palo Alto Networks Feb 6 2019 10:00 am UTC 52 mins
    Dinah Barrett, Specialist Solutions Architect, AWS Marketplace & David Maclean, Cloud Engineer, Palo Alto Networks
    Today, AWS provides a highly reliable, scalable, low-cost infrastructure platform in the cloud that powers hundreds of thousands of businesses in 190 countries around the world with customers across all industries are taking advantage of low cost, agile computing.

    In this webinar, Dinah Barrett, Specialist Solutions Architect | Management Tools, AWS
    and David Maclean, Special Cloud Engineer, Palo Alto Networks will dive into the need for additional security, over and above native security to protect AWS workloads and developer environments, examining the shared responsibility model for cloud security & diving into specific use cases.
  • Protecting against credential-based attacks Feb 5 2019 3:00 pm UTC 60 mins
    Brad Cochran, Systems Engineer; John Fults, System Engineer; and Jon Hayot, Systems Engineer
    Credential theft is one of the first steps in common attack chains. How can you prevent credential theft with the infrastructure you have today? If credentials have already been leaked out, how can you stop their abuse? We will show you how Palo Alto Networks can help you bring peace of mind when it comes to credential theft and abuse.
  • SSL Decryption - Why, Where and How Feb 5 2019 10:00 am UTC 45 mins
    Dave Shackleford, Ronald Dodge & Arun Kumar
    The growth in SSL/TLS encrypted traffic traversing the internet is on an explosive upturn. Given the primary benefits associated with encryption, the private and secure exchange of information over the internet, compliance with certain privacy and security regulations – such as the Health Insurance Portability and Accountability Act and Payment Card Industry Data Security Standard, or HIPAA and PCI DSS – the trend in SSL adoption is expected to continue to rise.
    Watch as our Palo Alto Networks® team of experts presents the “hows and whys” of SSL decryption. In this webcast, you will:

    -Learn why you need to enable decryption and the key metrics to support your case
    -Find out how to address internal logistics and legal considerations
    -Discover how to effectively plan and deploy decryption
  • Securing Public Cloud Workloads Jan 30 2019 6:00 pm UTC 60 mins
    Jack Farrell & Ruben Ruiz
    Palo Alto Networks® provides advanced protection for consistent security across all major clouds – Amazon®Web Services, Microsoft® Azure® and Google® Cloud Platform – and our automation features minimize the friction of app development and security. You can protect and segment applications, deliver, continuous security and compliance, and achieve zero-day prevention.

    Join us to learn how RedLock, now part of Palo Alto Networks, can help you solve:

    Visibility
    Compliance Assurance
    Security Governance
    Anomaly Detection and Remediation
  • Secure Your Branch Jan 24 2019 6:00 pm UTC 60 mins
    Brian Tokuyoshi, Pradeep Singh, Ron Dodge, with host Karin Shopen
    There’s a shift underway in branch networking. Backhauling branch office traffic to HQ made sense when accessing data center application, but does this approach still make sense? SaaS and Cloud have fundamentally changed how we use applications and access data. With the high cost of maintaining MPLS and the need to access applications in the cloud, organizations are looking for options to use SD-WAN or access the internet directly from the branch. But how do you do that safely, without watering down the protection?

    Join our Palo Alto Networks experts and learn how you can safely route branch traffic directly to the internet while ensuring the same levels of security that you expect for all your users. You will:

    •Get details on the scenarios for branch security
    •Learn about what does and doesn’t work
    •Find out how to deploy a flexible set of security options to cover your requirements
    •Get your questions answered by the experts in our live Q&A
  • How to Build a Zero Trust Network Recorded: Jan 17 2019 61 mins
    John Kindervag, Field CTO, Palo Alto Networks
    “Trust is always a vulnerability in a digital system,” - John Kindervag, Founder of Zero Trust and Field CTO at Palo Alto Networks

    Much has been written about the topic of Zero Trust. Is it a security buzz word or a true effective security strategy?

    High-profile breaches involving “trusted” insiders have given industry-wide visibility to the fact that trust represents a vulnerability for digital systems. It’s something malicious actors can and do exploit for their advantage.

    Zero Trust was first introduced around the principles of “never trust, always verify” as a means for enterprises to implement effective network segmentation. As the model has been embraced, Zero Trust evolved to become a strategic Cybersecurity initiative that major enterprises align to in order to prevent successful cyberattacks.

    Watch as our Palo Alto Networks® expert John Kindervag discusses the “whys and hows” of building a Zero Trust architecture. In this webcast, you will:

    • Learn specific outcomes of implementing a Zero Trust architecture
    • Hear recommendations on where to start when planning and implementing a Zero Trust framework
    • See how Palo Alto Networks performed in an independent evaluation on Zero Trust Networks
    • Get your questions answered in our Live Q&A
  • Bridging Security Gaps with Networks-to-Endpoint Integration Recorded: Dec 13 2018 37 mins
    Konstantin Rychkov, IDC, Senior Research Analyst
    The typical enterprise uses an average of 30 security products, most of which from variety of vendors and typically do not integrate well and offer little information sharing…if any. Using a portfolio of integrated products from fewer vendors means greater synergies and efficiencies. This is especially true of endpoint security software, where many organizations have long and established relationships with a favorite vendor. This can lead to a sense of complacency, and there may also exist a disincentive to replace software on all of an organization’s endpoint devices, leaving organizations potentially exposed to an evolving threat landscape.

    Join us for this informative webinar where IDC analyst Konstantin Rychkov will:

    • Introduce the concept of endpoint protection integrated with network security components
    • Demonstrate how the two together provide greater effectiveness and efficiency in security
    • Detail how an integrated security stack is instrumental to holistic enterprise-wide security
  • AWS Security: Securing AWS Workloads with Palo Alto Networks Recorded: Dec 12 2018 53 mins
    Dinah Barrett, Specialist Solutions Architect, AWS Marketplace & David Maclean, Cloud Engineer, Palo Alto Networks
    Today, AWS provides a highly reliable, scalable, low-cost infrastructure platform in the cloud that powers hundreds of thousands of businesses in 190 countries around the world with customers across all industries are taking advantage of low cost, agile computing.

    In this webinar, Dinah Barrett, Specialist Solutions Architect | Management Tools, AWS
    and David Maclean, Special Cloud Engineer, Palo Alto Networks will dive into the need for additional security, over and above native security to protect AWS workloads and developer environments, examining the shared responsibility model for cloud security & diving into specific use cases.
  • The Hacker You Don’t Know – Uncovering Active Cyberattacks Recorded: Dec 6 2018 26 mins
    Ahmed Hussein, Systems Engineer and Eric Kampling, Systems Engineer
    If an active attacker were operating inside your network right now, could you see them? IT security professionals today are challenged with detecting active attackers in addition to stopping malware & risky behavior. Learn how to leverage the power of machine learning to stop active cyberattacks before it’s too late.
  • Who Else is Viewing my One Drive? (Securing Public SaaS Applications) Recorded: Dec 5 2018 28 mins
    Steven Hansen, Systems Engineer and Aymen Khan, Systems Engineer
    The appeal of SaaS applications, such as Office 365®, Google G Suite, Box and Salesforce is growing, but so are the hidden threats in SaaS offerings: accidental data exposure, malicious outsiders, promiscuous sharing and so on. Even sanctioned SaaS adoption can increase the risk of breaches and non-compliance.

    Attend this webinar to learn how Aperture SaaS security service helps eliminate the risks.
  • Protection for Advanced Malware in the Wild Recorded: Dec 4 2018 50 mins
    Matt Elliott, Systems Engineer
    If an active sample of malware was executed in your environment right now, how would you block it? IT professionals today are challenged to sift through countless alerts and false positives to try to successfully prevent malware and risky behavior.

    Attend this webinar to learn how to leverage the power of machine learning to stop active cyberattacks.
  • Are your point of sale environments protected? Recorded: Nov 28 2018 41 mins
    Lawrence Chin
    Point of Sale (POS) systems are the lifeblood of any industry that conducts in-person transactions with its customers. Retail, hospitality, accommodation, etc. rely on their POS environments to process purchases, support customer loyalty programs, update inventory, and drive the supply chain. However, the processing of customer payment card and collection of personally identifiable information still makes POS systems a favorite target of cyberattackers. Media reports on data breaches stemming from compromised POS systems have become all too common. Although compliance with the PCI DSS is a expected, it’s only the bare minimum to conduct business.
    In this webinar you will:
    -Hear a customer case study on POS protection
    -Realize greater security controls over your CDE and customer PII
    -Exceed PCI DSS for greater cyber hygiene
    -Understand the capabilities of a security operating platform for POS
  • Securing Building Management Systems Recorded: Nov 27 2018 64 mins
    Del Rodillas, Director of Industrial and IoT Cybersecurity Product Marketing, Palo Alto Networks
    An often-forgotten area in the enterprise network which poses a significant risk to your organization if compromised are Building Management/Automation Systems (BMS/BAS). These IoT and industrial control systems which are integral to realizing "smart" and efficient buildings and facilities include Heating, Ventilation and Air-conditioning (HVAC), energy management, surveillance, fire safety, physical access controls, electric car charging systems, and other connected systems. As these systems undergo digital transformation and become more connected, the risk associated with cyberattacks also increases. Organizations need to act today to learn more about this growing risk and to include securing BMS/BAS in their enterprise cybersecurity strategy.

    Listen to this webinar to learn about:
    •The rising threat landscape associated with smart buildings and facilities
    •Strategic tenets for protecting BMS/BAS
    •A reference blueprint and case study for BMS cybersecurity
  • Bridging Security Gaps with Networks-to-Endpoint Integration Recorded: Nov 20 2018 37 mins
    Konstantin Rychkov, IDC, Senior Research Analyst
    The typical enterprise uses an average of 30 security products, most of which from variety of vendors and typically do not integrate well and offer little information sharing…if any. Using a portfolio of integrated products from fewer vendors means greater synergies and efficiencies. This is especially true of endpoint security software, where many organizations have long and established relationships with a favorite vendor. This can lead to a sense of complacency, and there may also exist a disincentive to replace software on all of an organization’s endpoint devices, leaving organizations potentially exposed to an evolving threat landscape.

    Join us for this informative webinar where IDC analyst Konstantin Rychkov will:

    • Introduce the concept of endpoint protection integrated with network security components
    • Demonstrate how the two together provide greater effectiveness and efficiency in security
    • Detail how an integrated security stack is instrumental to holistic enterprise-wide security
  • Securing connected vehicles Recorded: Oct 30 2018 36 mins
    Dharminder Debisarun : Cybersecurity strategist for automotive Moshe Shlisel : CEO GuardKnox
    The end-to-end cybersecurity strategy that protects connected vehicles.

    With the expected surge in connected vehicles, cloud security remains critically important to passenger safety and well-being.

    In fact, Gartner is predicting a quarter billion connected vehicles on the road by 2020.

    The average modern car now features over 100 computers, all communicating with one another – often through the cloud. These connections increase the chances of cyberattacks, which can lead to accidents and cause extensive recalls.

    We’ve joined forces with GuardKnox to provide an end-to-end cybersecurity strategy for the modern connected vehicle.

    In this webinar, you’ll learn:

    •How to protect connected cars against cyberattacks
    •Why encryption is so important for connected vehicles
    •How to eliminate challenges when implementing security

    Register/Join the webinar to learn how to prevent successful cyberattacks on connected vehicles.
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: [Breach Prevention] Disrupting Credential-based Attacks
  • Live at: Jul 26 2017 5:00 pm
  • Presented by: Martin Walter, Product Line Manager, Palo Alto Networks
  • From:
Your email has been sent.
or close