Hi [[ session.user.profile.firstName ]]

Defeating Advanced Threats Across Your Network and Applications with Splunk

Palo Alto Networks + Splunk - Defeat Advanced Threats While Maximizing Visibility, Control and Security of the Network and Applications in the Public Sector.

As cyber attacks become more sophisticated, it becomes increasingly hard for legacy systems to detect threats early enough to prevent loss or damage to sensitive data. With valuable data at risk, organizations need a security platform that correlates data and automatically implements protections. Learn how by combining next-generation solutions, Palo Alto Networks and Splunk can provide the visibility and insight necessary to prevent attacks and keep your organization from becoming the next victim.
Recorded Mar 7 2017 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jennifer Zientek, Federal Systems Engineer, Palo Alto Networks & David Page, Sr. Sales Engineer, Splunk
Presentation preview: Defeating Advanced Threats Across Your Network and Applications with Splunk

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Privacy in the age of big data and algorithms May 20 2019 12:00 pm UTC 60 mins
    Ivana Bartoletti, Head of Privacy & Data Protection, Gemserv
    One year after GDPR, the presentation will explore whether the provisions introduced are sufficient to deal with the challenges of big data and algorithms. Ivana will present a clear roadmap for organisations deploying AI covering governance, privacy and ethics harms and algorithmic impact assessments.
  • GDPR Starts With Your Data, Not With Lawyers May 20 2019 10:00 am UTC 60 mins
    David Froud, Founder & Director, Core Concept Security Ltd.
    In the panic leading up to May 25th 2018, many organisations did one of three things:

    1. Hired a lawyer first;
    2. Hired a data security expert first, or
    3. Absolutely nothing.

    All of these approaches are wrong, and regardless of the size/type of your organisation, the first steps were exactly the same; Go find your data.

    In this presentation we will simplify the process of achieving GDPR compliance so that anyone can get started.
  • [Earn 1 CPE] Key Steps to Identify Risk and Master Vendor Risk Management Apr 25 2019 5:00 pm UTC 75 mins
    Colin Whittaker, IRD; Jake Olcott, BitSight; Blake Brannon, OneTrust; Kelly White, RiskRecon; and Todd Boehler, ProcessUnity.
    In today’s interconnected technology ecosystem, companies increasingly rely on third party vendors to meet their operational needs. However, the current state of vendor risk management (VRM) is bleak. More than half of all information security breaches are caused by third-party vendors, and according to Deloitte 83% of today’s business leaders lack confidence in third party VRM processes.

    Understanding and managing cyber risk posed by vendors, suppliers, and third parties has proven to be a difficult task. The right mix of people, processes, and technology result in the most effective and comprehensive program. Join this CPE accredited panel webinar as our expert panel address some key steps to master VRM, including:

    - Implementing a scalable VRM program from the ground up,
    - Tips on managing vendor data and mapping the digital supply chain,
    - Assessing third, fourth, and fifth-party risk,
    - Performing quantifiable vendor security analyses,
    - Establishing pre-procurement standards.
  • IT Security Community Update Apr 24 2019 5:00 pm UTC 63 mins
    Wesley Simpson, (ISC)²; Christopher Pierson, BLACKCLOAK & Marija Atanasova, BrightTALK
    Find out what's trending in BrightTALK's IT Security community and the challenges keeping security professionals up at night.

    Join Wesley Simpson, COO of (ISC)², Dr. Christopher Pierson, Founder & CEO of BLACKCLOAK and Marija Atanasova, Sr. Content Strategist from BrightTALK for an interactive Q&A session to learn more about:
    - Topic trends & key insights
    - What security professionals care about
    - Events in the community
    - What to expect in Q2 2019 and beyond
  • ESG Research: The Hybrid Cloud Tipping Point Apr 23 2019 5:00 pm UTC 75 mins
    Scott Sinclair, ESG; Michelle Tidwell, IBM, Mike Jochimsen, Kaminario; Eric Lakin, Univ. of Michigan; Alex McDonald, NetApp
    Has hybrid cloud reached a tipping point? According to research from the Enterprise Strategy Group (ESG), IT organizations today are struggling to strike the right balance between public cloud and their on-premises infrastructure. In this SNIA webcast, ESG senior analyst, Scott Sinclair, will share research on current cloud trends, covering:

    •Key drivers behind IT complexity
    •IT spending priorities
    •Multi-cloud & hybrid cloud adoption drivers
    •When businesses are moving workloads from the cloud back on-premises
    •Top security and cost challenges
    •Future cloud projections

    The research will be followed by a panel discussion with Scott Sinclair and SNIA cloud experts Alex McDonald, Michelle Tidwell, Mike Jochimsen and Eric Lakin.
  • PCI Dream Team: Ask Us Your Toughest Questions [Part 6] Apr 23 2019 5:00 pm UTC 60 mins
    Ben Rothke | David Mundhenk | Jeff Hall | Arthur Cooper "Coop"
    With hundreds of different requirements, the various Payment Card Industry (PCI) standards can be overwhelming. While the PCI Security Standards Council has provided lots of answers, the devil is often in the details. Our panelists are some of the top PCI QSA’s in the country, with decades of combined PCI and card processing experiences. They’ve seen it all: the good, bad and ugly; and lived to tell the tale.

    Join Ben Rothke, David Mundhenk, Arthur Cooper, and Jeff Hall for an interactive Q&A session, and get answers to your most vexing PCI questions. No PCI question is out of bounds.

    Speakers:
    - Ben Rothke, Senior Security Consultant at Nettitude
    - David Mundhenk, Senior Security Consultant at Herjavec Group
    - Jeff Hall, Senior Consultant at Wesbey Associates
    - Arthur Cooper "Coop", Senior Security Consultant at NuArx
  • How to Keep Your Cyber Defenders Sharp: Do You have the right people? Apr 23 2019 5:00 pm UTC 75 mins
    David Morris and Brian Markus
    Tune into this session to learn how to determine if you have the right people with the sharpest skills defending your organization through the use of a Cyber Training Range.

    Learn what are Persistent Cyber Training Range Environments, the benefits and value of a Cyber Training Range and how they help you answer the question ARE WE READY TO DEFEND AGAINST THE NEXT ATTACK?".
  • Your Adversary Within - The Need to Trust, but Verify Recorded: Apr 18 2019 30 mins
    Adam Mashinchi, VP of Product Management SCYTHE
    In this presentation we will give an overview of the current state of the power of an endpoint in the modern enterprise; and how modern advancements make the need for adversarial testing even more critical.

    Other topics to be covered:
    - New/modern consumer products
    - Increases in privacy & increased exfiltration options
    - Employee Trust & BYOD
    - State of endpoint monitoring
    - Controls Validation vs. Adversarial Testing
  • 5 Key Elements of an Effective Endpoint Security Strategy Recorded: Apr 18 2019 37 mins
    UJ Desai, Director of Product Management, Bitdefender
    While cyber attacks come from all directions, the majority of them originate on endpoints. In this webinar UJ Desai, Director of Product Management at Bitdefender will discuss why organizations are still struggling with endpoint security, and will explore the five critical elements of endpoint security that will allow organizations to effectively defend endpoints from both common and advanced cyber attacks.
  • Social Engineering, Phishing and Protecting the Enterprise Recorded: Apr 18 2019 55 mins
    John Bambenek (ThreatSTOP) | Jan Liband (SlashNext) | JP Bourget (Syncurity)
    Join security experts and practitioners for an interactive discussion on how to better secure the enterprise in 2019:
    - Top threats on the horizon and what's at risk
    - Cyber defenses and your employees
    - Basic cyber safety recommendations to protect against social engineering, phishing and email cyber attacks
    - Use cases and examples
    - Actions to take today to protect your employees and enterprise from cyber criminals
    - What to expect in 2019

    Speakers:
    - John Bambenek, VP Security Research & Intelligence, ThreatSTOP
    - JP Bourget, Founder & Chief Security Officer, Syncurity
    - Jan Liband, CMO, SlashNext
  • Top Threats To Endpoints And How To Stay Protected Recorded: Apr 18 2019 45 mins
    Kelvin Murray, Sr. Threat Research Analyst, Webroot
    The largest threat of organisational breach occurs at the Endpoint level. Hacks, phishing, malware and untrained end users are a constant risk that need safeguards and monitoring to protect individuals and businesses with strong IT security. Small changes to your endpoints can drastically improve your protection. However, when you manage one or more businesses and need to implement and maintain these changes across multiple machines or environments, different complications will arise.

    Join Webroot’s Threat expert as he discusses topics such as:

    · Malware
    Miners
    Information Stealers
    Ransomware
    · End user education
    · Best policies and settings for your Endpoints
    · Endpoint monitoring
  • Emerging Areas in Third Party Management Practices Recorded: Apr 17 2019 39 mins
    Max Aulakh, CEO, Ignyte Assurnace Platform
    Globalization and division of labor has allowed multi-national corporations and businesses to focus on their core capabilities while outsourcing all various ranges activities form legal services, IT services, marketing, etc... these trends will continue to gain speed as global markets become much more efficient.

    Proliferation of suppliers has also rapidly increased emerging threats such as privacy, data sharing and cyber risks. The key takeaway for audience in this presentation will be over all discussion of dimensions of supplier risks and how to holistically develop a proper comprehensive supplier report card that includes financial and cyber data.
  • Actionable Threat Intelligence out of Your Vulnerability Management Program Recorded: Apr 16 2019 49 mins
    Nathan Wenzler, Senior Director of Cybersecurity, Moss Adams
    Measuring the effectiveness of a security program can be a challenge for most organizations. After all, when you do everything right, nothing happens. No email outages, no denial of services impacts and no data breaches. Measuring nothing doesn’t really tell you much, and it certainly doesn’t give you insight into where you’re still vulnerable and could be attacked by a malicious actor. Vulnerability Management (VM) tools have been a mainstay tool for any security program, and they generate a wealth of information about what assets are most at risk from outside threats, but the information isn’t always put to best use by most organizations.

    In this session, we’ll look at the common metrics mistakes most organizations make with their VM efforts, as well as more relevant and actionable metrics that will help you get a better understanding of your security posture against today’s threat landscape.

    · Learn how vulnerability information is critical to boosting good threat intelligence against common attack chains
    · Identify metrics that are commonly used by nearly every organization, but don’t deliver any real value to your organization
    · Discover ways to frame vulnerability data into meaningful, actionable metrics that give a more true sense of the risks to your assets
    · Understand ways to improve your VM program to build more relevance into your threat intelligence efforts
  • Best Practices for Deploying and Utilizing UEBA Recorded: Apr 16 2019 47 mins
    Stephan Jou, Chief Technology Officer, Interset
    User and Entity Behavioral Analytics (UEBA), when properly implemented, can be incredibly valuable: it can provide security teams with a new lens through which to detect, investigate, and respond to evolving security threats. However, there is a lot of hype in the world of AI, and not enough real use cases or concrete recommendations. This webinar aims to help correct this, with real world use cases and learnings from the past five years of deployments at Interset.

    In this presentation, attendees will:

    - View real-world case studies showcasing objectives and results from deploying UEBA
    - Understand the role of human expertise and use cases to drive and quantify model development
    - Review the most effective data sets for UEBA
    - Learn about the analytical approach that helps effectively produce results and reduce noise in your UEBA system
  • Sight Unseen: How Can Companies Minimize the Risk of a Data Breach Recorded: Apr 16 2019 31 mins
    Liviu Arsene, Global Cybersecurity Analyst, Bitdefender
    Global cybersecurity analyst Liviu Arsene will discuss how advanced threat detection and visibility into the overall cybersecurity posture of an organization can help prevent data breaches, by placing under the scope some of the most recent and notorious data breaches and cyberattacks.
  • Trends in Advanced Threat Detection & Vulnerability Management Recorded: Apr 16 2019 61 mins
    Wade Woolwine, Rapid7, Ajay Uggirala, Juniper Networks & O'Shea Bowens, Null Hat Security & Paul Crichard, BT Global Services
    As cyber attacks become increasingly common, it is vital for organisations to be armed with the most effective tools and knowledge to prevent, detect and respond to cyber threats.

    Join this interactive Q&A panel with top security experts across the ecosystem to learn more about:

    - Trends in Advanced Threat Detection & Vulnerability Management
    - How to use analytics to fight against cyber attacks – patching, detection and response
    - What are the common mistakes made when it comes to Advanced Threat Detection implementation
    - Best practices and recommendations for improving your security posture

    Panel moderated by:
    Michele Drolet, CEO, Towerwall

    Panelists:
    Wade Woolwine, Director of Managed Services, Rapid7
    Ajay Uggirala, Sr. Manager, Product Marketing, Juniper Networks
    O'Shea Bowens, CEO & Founder, Null Hat Security
    Paul Crichard, Security CTO, BT Global Services
  • Data Breaches – How to secure your private information Recorded: Apr 16 2019 60 mins
    Luis Lubeck, Security Researcher
    This webinar will introduce the latest and larger security breaches around the world, and will show the attendees several ways and tips to stay safe and keep the most piece of information secure, their private information.

    Also they will find what to do in case of been victim from a security or data breach.
  • Building Blocks for CTI (on a budget) Recorded: Apr 16 2019 45 mins
    Swetha Balla, Threat Management, GrabTaxi Holdings
    Often the building blocks for a CTI program can be laid without the need for teams to spend a lot of money. In this session, we'll look at how Free and Open Source Software (FOSS) technologies and OSINT (Open Source Intelligence) can be leveraged to bootstrap a CTI program.

    The primary benefits of leveraging FOSS tools are (a) Agility - rapidly test tools to identify what works best for the organisation, (b) Identification of potential process gaps, (c) Implementation of "interactions" between key teams and (d) Being part of the broader FOSS/CTI community.
  • How Organizations Use Threat Intelligence To Boost Security Recorded: Apr 15 2019 60 mins
    Griff James, Damrod Analysis Ltd. | Michelle Drolet, Towerwall | Nathan Wenzler, Moss Adams | Chris Morales, Vectra Networks
    What is cyber threat intelligence, and how can organizations leverage it to identify threats and potential malicious activity in advance? Discover the best ways organizations can arm themselves with actionable threat intelligence to block cyber attacks or mitigate their impact.

    Join this panel of experts to learn more about:
    - Cyber threat intelligence: What it is and how you can use it
    - What's new in phishing, banking trojans, Mirai, ransomware
    - Emerging threats and what to do about them
    - Best practices for a more secure enterprise

    Panel moderated by:
    Griff James, Director, Damrod Analysis Ltd.
    Panelists:
    Michelle Drolet, CEO, Towerwall
    Nathan Wenzler, Snr. Director, Moss Adams
    Chris Morales, Head of Security Analytics, Vectra Networks
  • What I learned from RSAC 2019 Recorded: Apr 10 2019 59 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    Cloud application development is accelerating and diversifying where many organizations have virtual machines, containers, and now serverless applications running in the cloud, transforming code into infrastructure. Microservices make a lot of sense for scale and development agility, but if everything is talking to everything else via APIs, it’s likely that there are many (and I mean many) application vulnerabilities. Additionally, API security is new, so processes are likely immature, and API security sits somewhere between application developers, DevOps, and cybersecurity, leading to organizational and skills challenges. We will organize this chaos from RSAC 2019 and discuss Security in the new API Ecosystem.

    Join this interactive webinar to learn more about:
    - What security people should talk about instead
    - The Human Factor
    - Advancements in Machine Learning and AI
    - Security in app development and the API economy
    - News in quantum computing and multiparty computing
    - Trends in innovation and cloud security
    - New standards and regulations

    We will also discuss:
    - How IT Audit can be automated to meet new requirements from for Agile Development and cloud
    - How IT Audit can learn more about new controls and technologies
    - How IT Audit can be involved early in the DevOps planning phase
    - How Artificial Intelligence can be used in IT audits to expand beyond sampling
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Defeating Advanced Threats Across Your Network and Applications with Splunk
  • Live at: Mar 7 2017 6:00 pm
  • Presented by: Jennifer Zientek, Federal Systems Engineer, Palo Alto Networks & David Page, Sr. Sales Engineer, Splunk
  • From:
Your email has been sent.
or close