Hi [[ session.user.profile.firstName ]]

Build security into CI/CD pipelines for effective automation on Azure

Realizing “DevSecOps” and effectively implementing security into your CI/CD pipelines on Azure remains a challenging proposition for most organizations today.

In this session, we share the essential principles to achieve security automation in your CI/CD pipelines and across the build, deploy and run phases of your applications.

Finally, we conclude with a demonstration of security automation across all three phases of your applications deployed on Azure infrastructure - showing you how to bring security automation to your organization today.
Recorded Feb 6 2020 48 mins
Your place is confirmed,
we'll send you email reminders
Presented by
David MacLean
Presentation preview: Build security into CI/CD pipelines for effective automation on Azure
  • Channel
  • Channel profile
  • Securing the IoT Threat in Healthcare Recorded: Jun 24 2020 56 mins
    Mark Baik & May Wang
    Gartner predicts that the number of connected devices that the internet of things (IoT) will hit 25 billion by 2021. While IoT opens the door for innovative new approaches and services, it also presents new cybersecurity risks.

    This is particularly true in healthcare, where a vast array of connected devices and instruments are being deployed to deliver on the promise of improved patient care. From our analysis of 1.2 million IoT devices over two years, however, we discovered that 98% of IoT traffic is unencrypted and 83% of medical imaging systems are using out of support OS.

    IoT security in hospitals not only impacts data security but it also impacts patient safety and care operations.

    Join this webinar for a discussion around the current state of IoT security in Healthcare. We will explore the top threats from our recent publication of IoT Threat Report and best practices that you can adopt to secure your organization.
  • Webinar – Continuum cloud-native  les enjeux de sécurité Recorded: Jun 16 2020 57 mins
    Pierre Gagnon
    Machines virtuelles (VM), containers, PaaS, Kubernetes®, déploiements sans serveur… les entreprises disposent de plus d’options que jamais à travers le continuum cloud native. Il leur appartient donc de peser le pour et le contre de chaque offre pour le développement et l’exécution de leurs workloads et applications.

    Le cabinet Enterprise Strategy Group a récemment interrogé 371 acteurs de la sécurité du cloud en Amérique du Nord. Intitulé « Leveraging DevSecOps to Secure Cloud native Applications », le rapport résultant de cette étude couvre les derniers chiffres d’adoption, les tendances et les problématiques de sécurité spécifiques à chaque élément du continuum cloud-native.

    Ce webinar vous invite à découvrir les conclusions de l’étude et les success stories d’organisations qui ont su développer et sécuriser les technologies cloud-native.
  • Webinar: Top SOAR Use Cases Part 1 Recorded: Jun 16 2020 41 mins
    Patrick Bayle
    With endless security alerts, expanding product portfolios, understaffed SOCs and remote teams, the demands placed on security professionals are increasing every day.

    Watch this webinar for live demos of products, including Cortex™ XSOAR, that can help you overcome your current SOC challenges and minimize stress in your high-pressure job. These demos cover use cases for:

    -Phishing enrichment and response
    -Endpoint protection
    -Impossible travel
    -SSL security management
    -Whitelist administration with Threat Intel Management
  • Prisma Access ...Und Wieso Wir Alle Besseres Design Brauchen Recorded: Jun 16 2020 67 mins
    Dirk Thelen und Michael Weisgerber
    Flickwerk, Provisorien, Teillösungen,... was schon im Normalbetrieb aus gutem Grund ungeliebt ist, wird in herausfordernden Zeiten wie diesen schnell zur Katastrophe und existenzbedrohend. Gerade wenn Eile geboten ist und Hektik aufkommt, zahlt sich eine gute Planung und Architektur - ein gutes, funktionales Design - mehrfach aus.

    Lassen Sie sich von Dirk Thelen und Michael Weisgerber (auch) diesen Aspekt von Palo Alto Networks' Prisma Access erläutern. Wie immer wird die Stunde gespickt sein mit vielen Detailinformationen und natürlich auch mit Infos zur neuen Version 1.6 von Prisma Access.
  • Protecting Higher Ed Infrastructure from NetWalker Ransomware Attacks Recorded: Jun 12 2020 44 mins
    Theron Parry, Robert McIntosh, and Sanket Shah
    The NetWalker family of ransomware continues to strike higher education institutions across the U.S. Join us for a discussion on recent NetWalker attacks, and learn how Palo Alto Networks' Cortex XDR can protect your infrastructure against this attack.

    During our discussion we will:
    -Review the attack in a lab environment
    -Review the Events and Incidents of the attack in Cortex XDR
    -Engage in Q&A and review of the Cortex XDR technology
  • Découvrez qui, sous vos yeux, se cache dans votre réseau! Recorded: Jun 11 2020 47 mins
    Bertrand Le Bail
    Des attaquants, ou des employés indélicats, peuvent se cacher dans votre réseau, essayer de localiser vos données confidentielles, ou voler des informations d'identification afin de se faire passer pour vos utilisateurs légitimes. Comment pouvez-vous les détecter et les arrêter rapidement?

    En tirant parti des données de vos firewalls, vous obtiendrez la visibilité dont vous avez besoin pour identifier facilement les tactiques post-intrusion, telles que les mouvements latéraux ou les exfiltrations, dans le trafic de votre réseau.

    Pour mettre en évidence les avantages de l'utilisation des données du firewall dans le cadre de l'analyse du comportement du traffic réseau (NTA) , nous détaillerons, entre autre, dans ce webinaire:

    -Les tendances observées en cybersécurité.
    -Comment stopper les attaques ciblées sans décrypter le trafic
    -Détails sur les avantages de l'utilisation de Cortex XDR ™ pour l'analyse du comportement du traffic réseau

    Prêt à en savoir plus? Voyons comment Palo Alto Networks peut augmenter votre investissement actuel dans vos firewalls avec des analyses basées sur le machine learning afin de vous aider à traquer et à arrêter les attaquants cachés dans votre réseau.
  • Descubra quien se esconde en su red Recorded: Jun 11 2020 66 mins
    Cesar Solis
    Los atacantes pueden estar ocultos en su red, tratando de localizar sus datos confidenciales o robar credenciales para mezclarse con sus usuarios. ¿Cómo puede detectarlos y detenerlos rápidamente?

    Aprovechando los datos de su firewall, obtendrá la visibilidad que necesita para identificar fácilmente las tácticas posteriores a una intrusión, como el movimiento lateral y la exfiltración de datos a partir del tráfico de su red.

    Para resaltar los beneficios del uso de datos capturados por el firewall en el análisis de tráfico de red (NTA), hemos creado un kit práctico que ofrece:

    -Modelo con más de 451 atributos para proporcionar visibilidad en red
    -Formas de detener los ataques dirigidos sin descifrar el tráfico
    -Detalles sobre las ventajas de utilizar Cortex XDR ™ para NTA

    ¿Listo para aprender más? Hablemos sobre cómo Palo Alto Networks puede aumentar su inversión en el firewall existente mediante análisis basados en inteligencia artificial para ayudar a cazar y detener a los atacantes en su red.
  • Finden Sie heraus, wer sich in Ihrem Netzwerk versteckt Recorded: Jun 10 2020 59 mins
    Bastian Schwittay
    Angreifer sind möglicherweise schon in Ihrem Netzwerk präsent, und versuchen, vertrauliche Daten zu finden, oder sich Zugangsdaten legitimer Benutzer zu verschaffen, um unentdeckt zu bleiben. Wie können Sie sie schnell erkennen und stoppen?

    Durch intelligente Nutzung Ihrer Firewall-Daten können Sie die notwendige Sichtbarkeit bekommen, um Seitwärtsbewegungen, Exfiltration und ähnliche Angriffstechniken fortschrittlicher Angreifer im Netzwerkverkehr zu identifizieren.

    Hören und Sehen Sie in diesem Webinar:
    - Welche Tools und Techniken Angreifer aktuell verwenden, um Netzwerke zu unterwandern.
    - Wie Cortex XDR mittels cloud-basierter Analysen die Logs Ihrer Firewall zur Aufdeckung von Angriffen nutzt.
  • Running your SOC remotely Recorded: Jun 9 2020 60 mins
    Matt Mellen, Devin Johnstone and Nir Zuk
    As we all suddenly find ourselves working remote, we know this is a critical time for security operations teams to stay connected and overcome the shifting challenges of protecting their organizations.

    Watch this webinar to:

    Hear how the Palo Alto Networks Security Operations team is managing their SOC remotely without breaking a sweat.
    Step through a real remote investigation workflow leveraging Cortex XSOAR and Cortex XDR.

    Learn best practices that will help you maintain the security posture of your organization while effectively managing your SOC from home.

    Walk away with a clear plan to complete your transition to a well-functioning remote SOC!
  • Noções Avançadas de Desencriptação de SSL Recorded: May 29 2020 45 mins
    Alexandre Santos
    Nos últimos anos, temos assistido a um aumento acentuado do tráfego encriptado. Infelizmente, a encriptação não tem só vantagens óbvias; também se traduziu numa oportunidade para os atacantes ocultarem atividades mal-intencionadas, o que resultou numa necessidade ainda maior de uma desencriptação eficaz.

    Neste Webcast, poderá obter informações sobre:
    - Inovações do PAN-OS® 9.0 para simplificar a desencriptação de SSL
    - Boas práticas e como obter visibilidade total de protocolos como HTTP/2
    - A estratégia certa de implementação de desencriptação de SSL
  • See Who’s Hiding in Your Network Recorded: May 28 2020 42 mins
    Harri Ruuttila
    Adversaries may be lurking in your network, trying to locate your confidential data or steal credentials to blend in with your users. How can you quickly detect and stop them?

    If you've deployed firewalls in key network locations, you can zero in on malicious behavior by analyzing log data with machine learning to uncover active attacks anywhere in your network.

    Join us for an informative webinar to see:

    A live attack demo from Unit 42 data, featuring the latest techniques and tools
    How log data from your firewalls and behavioral analytics from Cortex XDR™ help detect attacks
    How to map security alerts in Cortex XDR to tactics in the MITRE ATT&CK™ framework
  • Machine Learning 101: Dinamiza la seguridad y mejora tu tiempo de respuesta Recorded: May 28 2020 61 mins
    Jesus Diaz Barrero
    El machine learning, como disciplina de la Inteligencia Artificial, está cambiando el modo en el que vivimos. Es capaz de reducir drásticamente los errores humanos y conseguir ejecutar con efectividad tareas que manualmente parecen imposibles.

    Sí, pero, ¿cómo cambia el panorama de la Ciberseguridad? Y, además y probablemente más importante, cómo impactará tu camino en la ciberseguridad?

    Únete a nuestro experto Jesus Diaz Barrero para comprender cómo aplicar el machine learning en las tareas de threat hunting y análisis de malware.

    Regresarás conociendo:

    -En dónde se aplica hoy día el machine learning
    -Cómo será aprovechado en el futuro
    -Cómo puedes simplificar tus operaciones de seguridad gracias al machine learning y el automatismo.
  • Machine Learning 101: comment la machine intervient en cybersécurité Recorded: May 27 2020 40 mins
    Bertrand Le Bail
    Machine Learning change la façon dont nous vivons nos vies. Il peut réduire les erreurs et même réaliser l'impossible en accomplissant des tâches qui ne peuvent pas être effectuées manuellement.

    Mais comment cela change-t-il le paysage de la cybersécurité? Et, peut-être plus important encore, comment cela affectera-t-il votre carrière dans la sécurité?

    Rejoignez notre expert Bertrand pour comprendre comment appliquer les techniques de Machine Learning dans le contexte de la chasse aux menaces et à l'analyse des logiciels malveillants.

    Vous repartirez en comprenant:

    -Où le Machine Learning est utilisé aujourd'hui dans la sécurité
    -Comment il sera exploité à l'avenir
    -Comment simplifier les opérations de sécurité avec l'automatisation et le Machine Learning
  • JOURNEY TO THE CENTER OF THE SOC Recorded: May 27 2020 80 mins
    Florian Schmidt, Bastian Schwittay, Oliver Rieke
    In diesem Virtual Event erfahren Sie, wie Unternehmen mit SOAR-Lösungen und Cortex XDR, Daten über Sicherheitsbedrohungen aus verschiedenen Quellen sammeln und auf Zwischenfälle mithilfe von standardisierten und automatisierten Playbooks ohne menschliche Hilfe reagieren können.

    Zudem befassen wir uns mit der Einführung in SOAR-Systeme (Security Orchestration, Automation and Response) und Cortex XDR, den Besonderheiten der marktführenden Lösung von Palo Alto Networks (DEMISTO) und wie diese durch Automatierung hilft und erleben Sie Cortex XSOAR (Demisto) als auch Cortex XDR in einer praktischen Live-Demo.
  • As best practises para detetar e bloquear ficheiros maliciosos Recorded: May 22 2020 51 mins
    Pedro Castro
    O número e complexidade dos ataques têm crescido exponencialmente. As organizações gastam milhões de euros todos os anos em soluções de cibersegurança, no entanto as empresas continuam a ter brechas de segurança.

    Neste webinar, os nossos experts vão falar sobre os métodos mais eficientes de detetar e bloquear ficheiros maliciosos, demonstrando as best practises para o fazer, assim como, exemplos de ataques que temos observado no mundo real e que devem ser precavidos. Irá aprender os detalhes por detrás destas ameaças, as suas estratégias para ultrapassar as soluções de segurança existentes e para se moverem lateralmente dentro das organizações. Por último, veremos como é possível simplificar a segurança das organizações com menos tools e menos alertas.

    Junte-se a esta sessão informativa focada na prevenção de ameaças
  • Funding Election Security for the 2020 Election Cycle Recorded: May 21 2020 60 mins
    Tom Williams
    The election season is here. Watch this webinar to discover emerging topics around technology solutions for IT Security in elections for 2020. This includes technology considerations and grant funding to support election initiatives.
  • Policy Optimizer: reforce o seu conjunto de regras de segurança e poupe tempo Recorded: May 14 2020 46 mins
    Alexandre Santos
    O App-ID aumenta o valor das nossas firewalls de próxima geração – nunca foi tão fácil e rápido determinar a identidade exata das aplicações que percorrem a rede, o que permite que as equipas definam e implementem as políticas certas.

    Junte-se aos especialistas da Palo Alto Networks e saiba como usar a nova funcionalidade Otimizador de Políticas para migrar o seu conjunto de regras herdadas para regras baseadas no App-ID.

    Nesta sessão, poderá:
    - Ficar a par das boas práticas de gestão de regras
    - Saber como o Otimizador de Políticas pode ajudar a obter um conjunto de regras de segurança mais seguro e mais fácil de gerir
    - Saber como o App-ID pode reduzir a complexidade e minimizar a principal causa de violação de dados – o erro humano.
    - Obter respostas para as suas perguntas no nosso espaço de P&R em direto
  • PANuggets - Episode 3 - Security in the Public Cloud Recorded: May 13 2020 27 mins
    Irteza Rana
    Understand the differences between the cloud provider security and VM-Series
    Learn about how Palo Alto Networks integrates with the various cloud providers
  • Running your SOC remotely Recorded: May 13 2020 60 mins
    Matt Mellen, Devin Johnstone and Nir Zuk
    As we all suddenly find ourselves working remote, we know this is a critical time for security operations teams to stay connected and overcome the shifting challenges of protecting their organizations.

    Watch this webinar to:

    Hear how the Palo Alto Networks Security Operations team is managing their SOC remotely without breaking a sweat.
    Step through a real remote investigation workflow leveraging Cortex XSOAR and Cortex XDR.

    Learn best practices that will help you maintain the security posture of your organization while effectively managing your SOC from home.

    Walk away with a clear plan to complete your transition to a well-functioning remote SOC!
  • Policy Optimizer: Fortalezca su conjunto de reglas de seguridad y ahorre tiempo Recorded: May 13 2020 44 mins
    Pablo Ibañez
    App-ID aumenta el valor de nuestros Next-Generation Firewalls al facilitar y agilizar la determinación de la identidad exacta de las aplicaciones que atraviesan la red, lo que permite a los equipos establecer y aplicar las políticas adecuadas.

    Únase a los expertos de Palo Alto Networks y aprenda cómo puede usar la capacidad del nuevo optimizador de políticas para migrar su conjunto de reglas heredado a reglas basadas en ID de aplicación.

    En esta sesión, usted tendra la oportunidad de:
    - Aprender las mejores prácticas para la gestión de reglas.
    - Descubrir cómo Policy Optimizer puede ayudarlo a alcanzar un conjunto de reglas de seguridad más seguro y más fácil de administrar.
    - Aprenda cómo App-ID puede reducir la complejidad y minimizar el error humano, la principal causa de las brechas de datos.
    - Obtenga respuestas a sus preguntas en nuestro Q&A en vivo.
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Build security into CI/CD pipelines for effective automation on Azure
  • Live at: Feb 6 2020 11:00 am
  • Presented by: David MacLean
  • From:
Your email has been sent.
or close