Hi [[ session.user.profile.firstName ]]

Security Cyberspace - A National Priority

Congressman John Ratcliffe, Chairman, House Homeland Security Subcommittee on Cybersecurity & Infrastructure Protection as presented during Palo Alto Networks inaugural Federal Ignite 2017.
Recorded Jan 3 2018 21 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Congressman John Ratcliffe, Chairman, House Homeland Security Subcommittee
Presentation preview: Security Cyberspace - A National Priority
  • Channel
  • Channel profile
  • Compliance is a Team Sport Dec 6 2018 9:00 am UTC 60 mins
    Tighe Schlottog, Security Architect - Cross Industries at Palo Alto Networks and Aaron Wilson, Founder, ScaleSec
    oo often, organizations make the move to the cloud without considerations for how it will be in compliance. Whether you need to maintain compliance for regulatory or business obligations it is best to go into the cloud with those requirements in mind.

    In this webinar, our experts will discuss some of the common misconceptions and mistakes that are made in working toward cloud compliance. They will provide practical advice about how to get your cloud compliance program in the best shape possible.

    -Where to start, whether you’re starting from scratch or modifying your existing program
    -Who to involve and when
    -How to manage reporting, audits, and communication

    Given the maturity of the cloud platforms, it isn’t hard to be compliant in the cloud --you just need to prepare appropriately and share the work across the organization to ensure you maintain compliance.
  • Compliance is a Team Sport Dec 6 2018 2:00 am UTC 60 mins
    Tighe Schlottog, Security Architect - Cross Industries at Palo Alto Networks and Aaron Wilson, Founder, ScaleSec
    Too often, organizations make the move to the cloud without considerations for how it will be in compliance. Whether you need to maintain compliance for regulatory or business obligations it is best to go into the cloud with those requirements in mind.

    In this webinar, our experts will discuss some of the common misconceptions and mistakes that are made in working toward cloud compliance. They will provide practical advice about how to get your cloud compliance program in the best shape possible.

    -Where to start, whether you’re starting from scratch or modifying your existing program
    -Who to involve and when
    -How to manage reporting, audits, and communication

    Given the maturity of the cloud platforms, it isn’t hard to be compliant in the cloud --you just need to prepare appropriately and share the work across the organization to ensure you maintain compliance.
  • Securing Building Management Systems Nov 7 2018 6:00 pm UTC 60 mins
    Del Rodillas, Director of Industrial and IoT Cybersecurity Product Marketing, Palo Alto Networks
    An often-forgotten area in the enterprise network which poses a significant risk to your organization if compromised are Building Management/Automation Systems (BMS/BAS). These IoT and industrial control systems which are integral to realizing "smart" and efficient buildings and facilities include Heating, Ventilation and Air-conditioning (HVAC), energy management, surveillance, fire safety, physical access controls, electric car charging systems, and other connected systems. As these systems undergo digital transformation and become more connected, the risk associated with cyberattacks also increases. Organizations need to act today to learn more about this growing risk and to include securing BMS/BAS in their enterprise cybersecurity strategy.

    Listen to this webinar to learn about:
    •The rising threat landscape associated with smart buildings and facilities
    •Strategic tenets for protecting BMS/BAS
    •A reference blueprint and case study for BMS cybersecurity
  • Machine Learning 101: Streamline Security and Speed Up Response Time Nov 6 2018 9:00 am UTC 60 mins
    Join Yinnon Meshi, Sr. Data Scientist and Kasey Cross, Senior Product Manager
    Machine learning is changing the way we live our lives. It can reduce errors and even achieve the impossible by accomplishing tasks that cannot be performed manually.

    But how does it change the cybersecurity landscape? And, perhaps more importantly, how will it impact your career in security?

    Join Yinnon Meshi, Sr. Data Scientist and Kasey Cross, Senior Product Marketing Manager to understand how to apply machine learning to threat hunting and malware analysis.

    You will come away understanding:

    •Where machine learning is used today in security
    •How it will be leveraged in the future
    •How you can simplify security operations with automation and machine learning
  • Securing connected vehicles Oct 30 2018 6:00 pm UTC 60 mins
    Dharminder Debisarun : Cybersecurity strategist for automotive Moshe Shlisel : CEO GuardKnox
    The end-to-end cybersecurity strategy that protects connected vehicles.

    With the expected surge in connected vehicles, cloud security remains critically important to passenger safety and well-being.

    In fact, Gartner is predicting a quarter billion connected vehicles on the road by 2020.

    The average modern car now features over 100 computers, all communicating with one another – often through the cloud. These connections increase the chances of cyberattacks, which can lead to accidents and cause extensive recalls.

    We’ve joined forces with GuardKnox to provide an end-to-end cybersecurity strategy for the modern connected vehicle.

    In this webinar, you’ll learn:

    •How to protect connected cars against cyberattacks
    •Why encryption is so important for connected vehicles
    •How to eliminate challenges when implementing security

    Register/Join the webinar to learn how to prevent successful cyberattacks on connected vehicles.
  • Machine Learning 101: Streamline Security and Speed Up Response Time Oct 30 2018 4:00 pm UTC 60 mins
    Join Yinnon Meshi, Sr. Data Scientist and Kasey Cross, Senior Product Manager
    Machine learning is changing the way we live our lives. It can reduce errors and even achieve the impossible by accomplishing tasks that cannot be performed manually.

    But how does it change the cybersecurity landscape? And, perhaps more importantly, how will it impact your career in security?

    Join Yinnon Meshi, Sr. Data Scientist and Kasey Cross, Senior Product Marketing Manager to understand how to apply machine learning to threat hunting and malware analysis.

    You will come away understanding:

    •Where machine learning is used today in security
    •How it will be leveraged in the future
    •How you can simplify security operations with automation and machine learning
  • Securing Connected Vehicles Oct 30 2018 1:00 pm UTC 60 mins
    Dharminder Debisarun : Cybersecurity strategist for automotive Moshe Shlisel : CEO GuardKnox
    The end-to-end cybersecurity strategy that protects connected vehicles.

    With the expected surge in connected vehicles, cloud security remains critically important to passenger safety and well-being.

    In fact, Gartner is predicting a quarter billion connected vehicles on the road by 2020.

    The average modern car now features over 100 computers, all communicating with one another – often through the cloud. These connections increase the chances of cyberattacks, which can lead to accidents and cause extensive recalls.

    We’ve joined forces with GuardKnox to provide an end-to-end cybersecurity strategy for the modern connected vehicle.

    In this webinar, you’ll learn:

    •How to protect connected cars against cyberattacks
    •Why encryption is so important for connected vehicles
    •How to eliminate challenges when implementing security

    Register/Join the webinar to learn how to prevent successful cyberattacks on connected vehicles.
  • Compliance is a Team Sport Oct 25 2018 9:00 am UTC 60 mins
    Tighe Schlottog, Security Architect - Cross Industries at Palo Alto Networks and Aaron Wilson, Founder, ScaleSec
    Too often, organizations make the move to the cloud without considerations for how it will be in compliance. Whether you need to maintain compliance for regulatory or business obligations it is best to go into the cloud with those requirements in mind.

    In this webinar, our experts will discuss some of the common misconceptions and mistakes that are made in working toward cloud compliance. They will provide practical advice about how to get your cloud compliance program in the best shape possible.

    -Where to start, whether you’re starting from scratch or modifying your existing program
    -Who to involve and when
    -How to manage reporting, audits, and communication

    Given the maturity of the cloud platforms, it isn’t hard to be compliant in the cloud --you just need to prepare appropriately and share the work across the organization to ensure you maintain compliance.
  • Extending Zero Trust to the Endpoint Oct 24 2018 9:00 am UTC 61 mins
    John Kindervag, Field CTO, Palo Alto Networks & Lieuwe Jan Koning, CTO, ON2IT B.V.
    Zero Trust is a familiar concept when speaking about network architecture. The terms "never trust, always verify" rings a familiar tune to those focused on securing the network. However, as security technologies have advanced to cross-communicate between network and endpoints, Zero Trust principles should also extend from the network to the endpoints.

    Join John Kindervag, the creator of the Zero Trust model, former Forrester analyst and current Field CTO at Palo Alto Networks, as he:

    - Discusses why endpoints need to talk to and integrate with other security technologies
    - Maps Zero Trust to the five critical points of the security architecture
    - Provides a framework as to why and how to extend Zero Trust to the endpoint

    We'll also be hearing from, Lieuwe Jan Koning, CTO and Co-Founder of ON2IT, for an actual use case on endpoint Zero Trust adoption. Lieuwe will discuss:

    - Why ON2IT chose to focus on the endpoint
    - How they adopted Zero Trust
    - And, the reason why they chose Palo Alto Networks Traps advanced endpoint protection to secure their endpoints
  • Extending Zero Trust to the Endpoint Oct 24 2018 2:00 am UTC 61 mins
    John Kindervag, Field CTO, Palo Alto Networks & Lieuwe Jan Koning, CTO, ON2IT B.V.
    Zero Trust is a familiar concept when speaking about network architecture. The terms "never trust, always verify" rings a familiar tune to those focused on securing the network. However, as security technologies have advanced to cross-communicate between network and endpoints, Zero Trust principles should also extend from the network to the endpoints.

    Join John Kindervag, the creator of the Zero Trust model, former Forrester analyst and current Field CTO at Palo Alto Networks, as he:

    - Discusses why endpoints need to talk to and integrate with other security technologies
    - Maps Zero Trust to the five critical points of the security architecture
    - Provides a framework as to why and how to extend Zero Trust to the endpoint

    We'll also be hearing from, Lieuwe Jan Koning, CTO and Co-Founder of ON2IT, for an actual use case on endpoint Zero Trust adoption. Lieuwe will discuss:

    - Why ON2IT chose to focus on the endpoint
    - How they adopted Zero Trust
    - And, the reason why they chose Palo Alto Networks Traps advanced endpoint protection to secure their endpoints
  • Cloud Security Trends and Best Practices for 2019 Oct 23 2018 3:00 pm UTC 60 mins
    Dave Klein (GuardiCore) | Prof Avishai Wool (Algosec) | Fred Streefland (Palo Alto Networks)
    As more corporate data moves to the cloud, the new challenge is to efficiently manage security in both the cloud and on premises. How are organizations coping and what are the solutions they should be employing?

    Join this keynote panel of security and cloud experts as they discuss:
    - Cloud security challenges today
    - Extending network security to the cloud
    - Security policy management in the cloud
    - Security automation
    - Best practices and recommendations for improving your enterprise security posture
    - Future trends in cloud security

    Speakers:
    - Dave Klein, Sr. Director Engineering & Architecture, GuardiCore
    - Prof Avishai Wool, CTO & Co-founder, Algosec
    - Fred Streefland, Chief Security Officer North & East-Europe (NEEUR), Palo Alto Networks
  • Top 10 Security Recommendations for Public Cloud Migration Oct 23 2018 10:00 am UTC 45 mins
    Dejan Stanic - Consulting Engineer Cloud EMEA at Palo Alto Networks
    Offering organizations of all sizes the benefits of agility and scalability, the adoption of public cloud continues at a pace rivalled only by that of the early days of the Internet era. As was the case then, the speed of adoption often means that “good enough” security is viewed as acceptable.

    With the underlying premise that the public cloud is someone else’s computer, and an extension of your network, this session will cover public Cloud security concerns, what the shared security responsibility model really means and recommendations for protecting your public Cloud workloads and data.
  • SSL Decryption - the pro’s, the con’s and best practices Oct 23 2018 9:00 am UTC 45 mins
    Fred Streefland, Chief Security Officer Northern and Eastern Europe and Marco Vadrucci, Systems Engineer
    Join Fred Streefland, Chief Security Officer and Marco Vadrucci, Systems Engineer from Palo Alto Networks for this exclusive Cybersecurity Webinar focusing on ‘The Pros and Cons of SSL Decryption.’

    During the webinar Fred and Marco will discuss how Secure Sockets Layer Decryption (SSL) (and its successor Transport Layer Security (TLS)) is designed to protect the privacy and security of sensitive communications across an internal or external network.

    During this webinar you'll learn:

    •SSL, its benefits and growth
    •Challenges of encryption
    •How Palo Alto Networks can provide visibility and control across encrypted SSL channels

    Register Now and join us on Wednesday October 10th at 10:00am. We’re looking forward to seeing you there.
  • Enabling and Deploying Your SSL Decryption Oct 23 2018 8:00 am UTC 64 mins
    Arun Kumar and Ron Dodge, with host Karin Shopen
    The growth in SSL/TLS encrypted traffic traversing the internet is on an explosive upturn. Given the primary benefits associated with encryption, the private and secure exchange of information over the internet, compliance with certain privacy and security regulations – such as the Health Insurance Portability and Accountability Act and Payment Card Industry Data Security Standard, or HIPAA and PCI DSS – the trend in SSL adoption is expected to continue to rise.

    Watch as our Palo Alto Networks® team of experts presents the “hows and whys” of SSL decryption. In this webcast, you will:
    •Learn why you need to enable decryption and the key metrics to support your case
    •Find out how to address internal logistics and legal considerations
    •Discover how to effectively plan and deploy decryption
  • Enabling and Deploying Your SSL Decryption Oct 23 2018 2:00 am UTC 64 mins
    Arun Kumar and Ron Dodge, with host Karin Shopen
    The growth in SSL/TLS encrypted traffic traversing the internet is on an explosive upturn. Given the primary benefits associated with encryption, the private and secure exchange of information over the internet, compliance with certain privacy and security regulations – such as the Health Insurance Portability and Accountability Act and Payment Card Industry Data Security Standard, or HIPAA and PCI DSS – the trend in SSL adoption is expected to continue to rise.

    Watch as our Palo Alto Networks® team of experts presents the “hows and whys” of SSL decryption. In this webcast, you will:
    •Learn why you need to enable decryption and the key metrics to support your case
    •Find out how to address internal logistics and legal considerations
    •Discover how to effectively plan and deploy decryption
  • Worry-Free Security on Azure Oct 19 2018 9:00 am UTC 60 mins
    Robert Smith & Hubert Ng
    Presenter

    Robert Smith - Higher Education & Research Specialist – APAC - Microsoft

    Hubert Ng – Cloud Engagement Manager – Asia Pacific - Palo Alto Networks

    An exclusive webinar for the education sector

    Businesses are not the only organisations looking to take advantage of the innovation and disruption that moving to the cloud can provide. Schools, colleges and universities across the Asia-Pacific region are moving their data and applications to the cloud.

    Join our webinar on October 19, and learn how to secure your data and apps in Microsoft® Azure®.

    We will be joined by Robert Smith, higher education and research specialist – APAC from Microsoft, and Hubert Ng, cloud engagement manager for Palo Alto Networks, who will share their experience in bringing the advantages of the cloud specifically to organisations like yours.
  • Worry-Free Security on Azure Recorded: Oct 19 2018 54 mins
    Robert Smith & Hubert Ng
    Presenter

    Robert Smith - Higher Education & Research Specialist – APAC - Microsoft

    Hubert Ng – Cloud Engagement Manager – Asia Pacific - Palo Alto Networks

    An exclusive webinar for the education sector

    Businesses are not the only organisations looking to take advantage of the innovation and disruption that moving to the cloud can provide. Schools, colleges and universities across the Asia-Pacific region are moving their data and applications to the cloud.

    Join our webinar on October 19, and learn how to secure your data and apps in Microsoft® Azure®.

    We will be joined by Robert Smith, higher education and research specialist – APAC from Microsoft, and Hubert Ng, cloud engagement manager for Palo Alto Networks, who will share their experience in bringing the advantages of the cloud specifically to organisations like yours.
  • Compliance is a Team Sport Recorded: Oct 18 2018 55 mins
    Tighe Schlottog, Security Architect - Cross Industries at Palo Alto Networks and Aaron Wilson, Founder, ScaleSec
    Too often, organizations make the move to the cloud without considerations for how it will be in compliance. Whether you need to maintain compliance for regulatory or business obligations it is best to go into the cloud with those requirements in mind.

    In this webinar, our experts will discuss some of the common misconceptions and mistakes that are made in working toward cloud compliance. They will provide practical advice about how to get your cloud compliance program in the best shape possible.

    -Where to start, whether you’re starting from scratch or modifying your existing program
    -Who to involve and when
    -How to manage reporting, audits, and communication

    Given the maturity of the cloud platforms, it isn’t hard to be compliant in the cloud --you just need to prepare appropriately and share the work across the organization to ensure you maintain compliance.
  • Securing remote ICS/SCADA systems just got easier Recorded: Oct 17 2018 55 mins
    Lionel Jacobs, senior security architect, ICS, Palo Alto Networks with host Karin Shopen
    Operational technology teams responsible for ICS and SCADA networks – like their IT counterparts – are being tasked with reducing costs while aiming for 100 percent uptime with minimal staffing resources. This is becoming one of the most important driving factors in the push to supply remote access to vendors and support staff.

    Join us as we look at ways that IT and OT teams can overcome the security challenges remote access often presents to process control networks. In this webinar, we’ll look at ways you can:

    •Apply Zero Trust principles to improve secure remote access
    •Create remote access that is flexible, scalable and secure
    •Protect against threats from third party systems.
  • IDC led Journey to Automation Recording Recorded: Oct 8 2018 44 mins
    Konstantin Rychkov, Senior Research Analyst, Software, Western Europe
    IDC led Journey to Automation
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Security Cyberspace - A National Priority
  • Live at: Jan 3 2018 6:05 pm
  • Presented by: Congressman John Ratcliffe, Chairman, House Homeland Security Subcommittee
  • From:
Your email has been sent.
or close