Hi [[ session.user.profile.firstName ]]

Zero Trust Security for Healthcare

Recent and ongoing events have caused the healthcare industry, and public health in general, to be in a state of high-alert. As most medical administration is digitized, this situation has put added demands on an already stressed IT infrastructure to securely deliver care.

At this time of heightened demands on delivery of care, we must be considerate of our roles to securely enable access to healthcare and answer these questions:

How do we maintain security, while not impacting patient care?
How can we deal with patient privacy issues if infrastructure becomes overwhelmed?
How will the cyber criminal community use this looming crisis to disrupt healthcare and take advantage of a frightened populace?

Given these challenges, it is incumbent upon cybersecurity professionals to work to get ahead of the stress. A Zero Trust strategy provides the simplest and most secure opportunity to secure important patient data, healthcare applications, and clinical systems.

Join Palo Alto Networks Field CTO John Kindervag, the creator of Zero Trust, as he discusses how you can leverage Zero Trust principles to add granular security to your health care systems.
Recorded Mar 17 2020 57 mins
Your place is confirmed,
we'll send you email reminders
Presented by
John Kindervag
  • Channel
  • Channel profile
  • No More Alert Fatigue: How Good Data Drives A Sophisticated Cyber Strategy Recorded: Sep 3 2020 62 mins
    Peter Havens
    Learn how good data drives a sophisticated cyber strategy
    - Concerns/challenges organizations face
    - City of Gainesville's Proactive Prevention Strategies
    - Why organizations are still getting hit with ransomware
    - Advanced Detection & Response, Managed Security/Threat Hunting
    - Approaches to justify security funding
  • PANuggets - Episode 10 - IOT Recorded: Aug 19 2020 29 mins
    Shane Bates
    Do you have the required visibility into your IoT devices? Can you manage the security of those devices using a common platform? Come and learn more about Palo Alto Networks’ industry-leading IoT capabilities and how we can transform your environment
  • PANuggets - Episode 9 - Navigating Support - Finding the Best Path Recorded: Aug 5 2020 32 mins
    Jon Taylor
    Learn about all of the support resources available to customers
    Understand the best way to get your problem solved quickly
  • PANuggets - Episode 8 - Wildfire - Automation in Threat Protection Recorded: Jul 22 2020 35 mins
    Shane Bates
    Learn how Palo Alto Networks uses AI, ML. and automation to help prevent catastrophe
    Understand the value of Wildfire within the Palo Alto Networks Security Operating Platform.
  • PANuggets - Episode 7 - BPA - Plastics or Best Practices? Recorded: Jul 8 2020 29 mins
    John Taylor and Damien DeVille
    Learn how to run and analyze Best Practice Assessments
    Understand the value of running BPAs on a regular basis
  • Securing the IoT Threat in Healthcare Recorded: Jun 24 2020 56 mins
    Mark Baik & May Wang
    Gartner predicts that the number of connected devices that the internet of things (IoT) will hit 25 billion by 2021. While IoT opens the door for innovative new approaches and services, it also presents new cybersecurity risks.

    This is particularly true in healthcare, where a vast array of connected devices and instruments are being deployed to deliver on the promise of improved patient care. From our analysis of 1.2 million IoT devices over two years, however, we discovered that 98% of IoT traffic is unencrypted and 83% of medical imaging systems are using out of support OS.

    IoT security in hospitals not only impacts data security but it also impacts patient safety and care operations.

    Join this webinar for a discussion around the current state of IoT security in Healthcare. We will explore the top threats from our recent publication of IoT Threat Report and best practices that you can adopt to secure your organization.
  • PANuggets - Episode 6 - PanHandler/Skillets Recorded: Jun 24 2020 25 mins
    Damien DeVille
    Learn about security automation and template configurations
    Understand how to deploy and use Skillets with PanHandler
  • Webinar – Continuum cloud-native  les enjeux de sécurité Recorded: Jun 16 2020 57 mins
    Pierre Gagnon
    Machines virtuelles (VM), containers, PaaS, Kubernetes®, déploiements sans serveur… les entreprises disposent de plus d’options que jamais à travers le continuum cloud native. Il leur appartient donc de peser le pour et le contre de chaque offre pour le développement et l’exécution de leurs workloads et applications.

    Le cabinet Enterprise Strategy Group a récemment interrogé 371 acteurs de la sécurité du cloud en Amérique du Nord. Intitulé « Leveraging DevSecOps to Secure Cloud native Applications », le rapport résultant de cette étude couvre les derniers chiffres d’adoption, les tendances et les problématiques de sécurité spécifiques à chaque élément du continuum cloud-native.

    Ce webinar vous invite à découvrir les conclusions de l’étude et les success stories d’organisations qui ont su développer et sécuriser les technologies cloud-native.
  • Webinar: Top SOAR Use Cases Part 1 Recorded: Jun 16 2020 41 mins
    Patrick Bayle
    With endless security alerts, expanding product portfolios, understaffed SOCs and remote teams, the demands placed on security professionals are increasing every day.

    Watch this webinar for live demos of products, including Cortex™ XSOAR, that can help you overcome your current SOC challenges and minimize stress in your high-pressure job. These demos cover use cases for:

    -Phishing enrichment and response
    -Endpoint protection
    -Impossible travel
    -SSL security management
    -Whitelist administration with Threat Intel Management
  • Prisma Access ...Und Wieso Wir Alle Besseres Design Brauchen Recorded: Jun 16 2020 67 mins
    Dirk Thelen und Michael Weisgerber
    Flickwerk, Provisorien, Teillösungen,... was schon im Normalbetrieb aus gutem Grund ungeliebt ist, wird in herausfordernden Zeiten wie diesen schnell zur Katastrophe und existenzbedrohend. Gerade wenn Eile geboten ist und Hektik aufkommt, zahlt sich eine gute Planung und Architektur - ein gutes, funktionales Design - mehrfach aus.

    Lassen Sie sich von Dirk Thelen und Michael Weisgerber (auch) diesen Aspekt von Palo Alto Networks' Prisma Access erläutern. Wie immer wird die Stunde gespickt sein mit vielen Detailinformationen und natürlich auch mit Infos zur neuen Version 1.6 von Prisma Access.
  • Protecting Higher Ed Infrastructure from NetWalker Ransomware Attacks Recorded: Jun 12 2020 44 mins
    Theron Parry, Robert McIntosh, and Sanket Shah
    The NetWalker family of ransomware continues to strike higher education institutions across the U.S. Join us for a discussion on recent NetWalker attacks, and learn how Palo Alto Networks' Cortex XDR can protect your infrastructure against this attack.

    During our discussion we will:
    -Review the attack in a lab environment
    -Review the Events and Incidents of the attack in Cortex XDR
    -Engage in Q&A and review of the Cortex XDR technology
  • Découvrez qui, sous vos yeux, se cache dans votre réseau! Recorded: Jun 11 2020 47 mins
    Bertrand Le Bail
    Des attaquants, ou des employés indélicats, peuvent se cacher dans votre réseau, essayer de localiser vos données confidentielles, ou voler des informations d'identification afin de se faire passer pour vos utilisateurs légitimes. Comment pouvez-vous les détecter et les arrêter rapidement?

    En tirant parti des données de vos firewalls, vous obtiendrez la visibilité dont vous avez besoin pour identifier facilement les tactiques post-intrusion, telles que les mouvements latéraux ou les exfiltrations, dans le trafic de votre réseau.

    Pour mettre en évidence les avantages de l'utilisation des données du firewall dans le cadre de l'analyse du comportement du traffic réseau (NTA) , nous détaillerons, entre autre, dans ce webinaire:

    -Les tendances observées en cybersécurité.
    -Comment stopper les attaques ciblées sans décrypter le trafic
    -Détails sur les avantages de l'utilisation de Cortex XDR ™ pour l'analyse du comportement du traffic réseau

    Prêt à en savoir plus? Voyons comment Palo Alto Networks peut augmenter votre investissement actuel dans vos firewalls avec des analyses basées sur le machine learning afin de vous aider à traquer et à arrêter les attaquants cachés dans votre réseau.
  • Descubra quien se esconde en su red Recorded: Jun 11 2020 66 mins
    Cesar Solis
    Los atacantes pueden estar ocultos en su red, tratando de localizar sus datos confidenciales o robar credenciales para mezclarse con sus usuarios. ¿Cómo puede detectarlos y detenerlos rápidamente?

    Aprovechando los datos de su firewall, obtendrá la visibilidad que necesita para identificar fácilmente las tácticas posteriores a una intrusión, como el movimiento lateral y la exfiltración de datos a partir del tráfico de su red.

    Para resaltar los beneficios del uso de datos capturados por el firewall en el análisis de tráfico de red (NTA), hemos creado un kit práctico que ofrece:

    -Modelo con más de 451 atributos para proporcionar visibilidad en red
    -Formas de detener los ataques dirigidos sin descifrar el tráfico
    -Detalles sobre las ventajas de utilizar Cortex XDR ™ para NTA

    ¿Listo para aprender más? Hablemos sobre cómo Palo Alto Networks puede aumentar su inversión en el firewall existente mediante análisis basados en inteligencia artificial para ayudar a cazar y detener a los atacantes en su red.
  • PANuggets - Episode 5 - Cortex XSOAR Recorded: Jun 10 2020 40 mins
    Michael Wood
    Learn about the value of Cortex XSOAR
    See a brief demo and understand the ease of use
  • Finden Sie heraus, wer sich in Ihrem Netzwerk versteckt Recorded: Jun 10 2020 59 mins
    Bastian Schwittay
    Angreifer sind möglicherweise schon in Ihrem Netzwerk präsent, und versuchen, vertrauliche Daten zu finden, oder sich Zugangsdaten legitimer Benutzer zu verschaffen, um unentdeckt zu bleiben. Wie können Sie sie schnell erkennen und stoppen?

    Durch intelligente Nutzung Ihrer Firewall-Daten können Sie die notwendige Sichtbarkeit bekommen, um Seitwärtsbewegungen, Exfiltration und ähnliche Angriffstechniken fortschrittlicher Angreifer im Netzwerkverkehr zu identifizieren.

    Hören und Sehen Sie in diesem Webinar:
    - Welche Tools und Techniken Angreifer aktuell verwenden, um Netzwerke zu unterwandern.
    - Wie Cortex XDR mittels cloud-basierter Analysen die Logs Ihrer Firewall zur Aufdeckung von Angriffen nutzt.
  • Running your SOC remotely Recorded: Jun 9 2020 60 mins
    Matt Mellen, Devin Johnstone and Nir Zuk
    As we all suddenly find ourselves working remote, we know this is a critical time for security operations teams to stay connected and overcome the shifting challenges of protecting their organizations.

    Watch this webinar to:

    Hear how the Palo Alto Networks Security Operations team is managing their SOC remotely without breaking a sweat.
    Step through a real remote investigation workflow leveraging Cortex XSOAR and Cortex XDR.

    Learn best practices that will help you maintain the security posture of your organization while effectively managing your SOC from home.

    Walk away with a clear plan to complete your transition to a well-functioning remote SOC!
  • Noções Avançadas de Desencriptação de SSL Recorded: May 29 2020 45 mins
    Alexandre Santos
    Nos últimos anos, temos assistido a um aumento acentuado do tráfego encriptado. Infelizmente, a encriptação não tem só vantagens óbvias; também se traduziu numa oportunidade para os atacantes ocultarem atividades mal-intencionadas, o que resultou numa necessidade ainda maior de uma desencriptação eficaz.

    Neste Webcast, poderá obter informações sobre:
    - Inovações do PAN-OS® 9.0 para simplificar a desencriptação de SSL
    - Boas práticas e como obter visibilidade total de protocolos como HTTP/2
    - A estratégia certa de implementação de desencriptação de SSL
  • See Who’s Hiding in Your Network Recorded: May 28 2020 42 mins
    Harri Ruuttila
    Adversaries may be lurking in your network, trying to locate your confidential data or steal credentials to blend in with your users. How can you quickly detect and stop them?

    If you've deployed firewalls in key network locations, you can zero in on malicious behavior by analyzing log data with machine learning to uncover active attacks anywhere in your network.

    Join us for an informative webinar to see:

    A live attack demo from Unit 42 data, featuring the latest techniques and tools
    How log data from your firewalls and behavioral analytics from Cortex XDR™ help detect attacks
    How to map security alerts in Cortex XDR to tactics in the MITRE ATT&CK™ framework
  • Machine Learning 101: Dinamiza la seguridad y mejora tu tiempo de respuesta Recorded: May 28 2020 61 mins
    Jesus Diaz Barrero
    El machine learning, como disciplina de la Inteligencia Artificial, está cambiando el modo en el que vivimos. Es capaz de reducir drásticamente los errores humanos y conseguir ejecutar con efectividad tareas que manualmente parecen imposibles.

    Sí, pero, ¿cómo cambia el panorama de la Ciberseguridad? Y, además y probablemente más importante, cómo impactará tu camino en la ciberseguridad?

    Únete a nuestro experto Jesus Diaz Barrero para comprender cómo aplicar el machine learning en las tareas de threat hunting y análisis de malware.

    Regresarás conociendo:

    -En dónde se aplica hoy día el machine learning
    -Cómo será aprovechado en el futuro
    -Cómo puedes simplificar tus operaciones de seguridad gracias al machine learning y el automatismo.
  • PANuggets - Episode 4 - Panorama Recorded: May 27 2020 35 mins
    Eugene DeCarprio
    Understand the concepts behind Stacks, Templates, and other things
    Learn best practices associated with the use of Panorama
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Zero Trust Security for Healthcare
  • Live at: Mar 17 2020 10:30 pm
  • Presented by: John Kindervag
  • From:
Your email has been sent.
or close