Date

By Type

  • Event (142)

By Event Type

By Language

Displaying 1 to 30 of 142

Virtual Ultimate Test Drive - Amazon Web Services - Apr 21st, 2018

JOIN US FOR THE ULTIMATE VIRTUAL TEST DRIVE, WHERE YOU'LL GET HANDS-ON EXPERIENCE WITH PALO ALTO NETWORKS AMAZON® WEB SERVICES (AWS). In this free, two-hour virtual workshop, you'll see how easy it is to securely extend your corporate data center into AWS using our next-generation firewall to protect your valuable applications and data from known and unknown threats. During this workshop you will: Discuss common VM-Series for AWS customer use cases Implement security policies to enable applications in your VPC Protect your AWS deployment by proactively blocking a brute-force attack *Please note: If the class is full, we have plenty of other dates to choose from. Click here to view other times

Online Event
  • 0
  • 661

ICS Hands-On Workshop in Aberdeen

Join us for our upcoming hands-on workshop for industrial control systems security. It’s a free, interactive event where you’ll learn practical skills to protect your ICS environments with Palo Alto Networks® Next-Generation Security Platform. Register now to participate in lab exercises in a fully virtualised ICS environment and learn about the latest ICS security best practices from your peers and Palo Alto Networks experts. Agenda: 09:00-09:30 Arrival & coffee 09:30-10:00 Presentation (ICS/IIOT solution – PA-220R- industrial Firewall) 10:00-10:30 Overview of the lab   10:30-10:45 Break 10:45-12:45 Hands on Workshop 12:45-14:00 Lunch Here are some of the workshop activities: ICS/SCADA security basics and Palo Alto Networks platform overview Virtualized ICS infrastructure setup (HMI, PLC, Firewall, Kali) ICS protocol visibility with App-ID™ technology ICS protocol access control using policy and segmentation Integrated threat prevention (IPS/IDS) Role-based access control with User-ID™ technology   Here’s what past participants have to say about the ICS hands-on workshop: “The hands-on workshop provided me with a real-world scenario and [showed me] how Palo Alto Networks firewalls can provide the visibility and control to stop attacks on the ICS network.” – Security coordinator lead for energy IT operations at a large gas and electric utility company “Great hands-on experience! The lab helps cement the theory of protecting ICS environments, turning it into an active defense strategy.” – Sr. security analyst at a major natural gas utility company “The lab was an excellent proof of concept.” – Security administrator at a multinational oil and gas company

In Person Event
Aberdeen
  • 0
  • 137

[Breach Prevention Week] Beyond Layered Approach

Maintaining and troubleshooting disparate, layered security technologies is complex and time-consuming. What’s even more troubling is that these technologies don’t work together effectively to protect you against sophisticated cyberattacks. It’s time to rethink IT security with a strategic, architectural approach – preventing successful cyberattacks from getting to your data, apps and users. In this webinar, you’ll learn: •Why a layered security approach doesn’t work. •Why a strategic approach to evaluating security technologies is the way to go. •How the security architecture of our next-gen firewalls prevents successful cyber breaches.

Webinar
  • 0
  • 339

Best Practices for Effective Endpoint Security

There’s a sequence of events attackers must go through to successfully deploy ransomware or steal information. And although most organizations have some form of endpoint protection in place, infections are still common. Palo Alto Networks® and Cloud Harmonics will show you how to secure your endpoints against increasingly sophisticated cyberattacks. In this webinar, you’ll learn: •Why so many attacks succeed and how to stop them •Effective techniques to protect against malware, exploits and ransomware •Next steps for successful endpoint protection

Webinar
  • 0
  • 323

Best Practices for Effective Endpoint Security

There’s a sequence of events attackers must go through to successfully deploy ransomware or steal information. And although most organizations have some form of endpoint protection in place, infections are still common. Palo Alto Networks® and Cloud Harmonics will show you how to secure your endpoints against increasingly sophisticated cyberattacks. In this webinar, you’ll learn: •Why so many attacks succeed and how to stop them •Effective techniques to protect against malware, exploits and ransomware •Next steps for successful endpoint protection

Webinar
  • 0
  • 311

ICS Hands-On Workshop in Glasgow

Join us for our upcoming hands-on workshop for industrial control systems security. It’s a free, interactive event where you’ll learn practical skills to protect your ICS environments with Palo Alto Networks® Next-Generation Security Platform. Register now to participate in lab exercises in a fully virtualised ICS environment and learn about the latest ICS security best practices from your peers and Palo Alto Networks experts. Agenda: 09:00-09:30 Arrival & coffee 09:30-10:00 Presentation (ICS/IIOT solution – PA-220R- industrial Firewall) 10:00-10:30 Overview of the lab   10:30-10:45 Break 10:45-12:45 Hands on Workshop 12:45-14:00 Lunch Here are some of the workshop activities: ICS/SCADA security basics and Palo Alto Networks platform overview Virtualized ICS infrastructure setup (HMI, PLC, Firewall, Kali) ICS protocol visibility with App-ID™ technology ICS protocol access control using policy and segmentation Integrated threat prevention (IPS/IDS) Role-based access control with User-ID™ technology   Here’s what past participants have to say about the ICS hands-on workshop: “The hands-on workshop provided me with a real-world scenario and [showed me] how Palo Alto Networks firewalls can provide the visibility and control to stop attacks on the ICS network.” – Security coordinator lead for energy IT operations at a large gas and electric utility company “Great hands-on experience! The lab helps cement the theory of protecting ICS environments, turning it into an active defense strategy.” – Sr. security analyst at a major natural gas utility company “The lab was an excellent proof of concept.” – Security administrator at a multinational oil and gas company

In Person Event
Glasgow
  • 0
  • 132

Ransomware Roundtable and Workshop

Don’t let your organisation be held to ransom It’s painfully clear that ransomware attacks aren’t going away anytime soon. In fact, attack techniques and delivery methods have become more sophisticated, prolific, speedy and costly (think Petya and WanaCrypt0r). Increasingly popular tactics include spear phishing campaigns tailored to a specific person or group of people using personal data, and whaling, which impersonates the email account of a CEO or other executive to infiltrate a network. These methods let ransomware move across networks and organizations at lightning speeds, causing costly downtime (and annoying headaches!) and potentially expensive damage to bottom lines and reputations. Join Palo Alto Networks for an exclusive roundtable to understand:  The newest trends and developments in ransomware from Palo Alto Networks Unit 42 Threat Intelligence Why traditional antivirus comes up short in ransomware detection How Palo Alto Networks Traps Advanced Endpoint Protection prevents ransomware and improves your network security Strategies to break down attacks In the afternoon, for the more technically inclined we’ll also provide a hands-on workshop focusing on ransomware. During this work shop you will experience the breakdown of a ransomware attack and how Palo Alto Networks Traps Advanced Endpoint Protection provides an effortless approach to managing these attacks.   A Full Agenda for the day is below: 09:30 a.m. - 10:00 a.m. Welcome and Introductions, Lindseigh Strickland, Regional Sales Manager at Palo Alto Networks

 10:00 a.m. – 10:45 a.m. Palo Alto Networks Unit 42 Threat Intelligence Update, Alex Hinchliffe, Unit 42 10:45 a.m. – 11:00 a.m. Coffee Break  11:00 a.m. – 11:30 a.m. A modernised cyber-attack in action, Chris Sidwell-Smith, Channel Systems Engineer at Palo Alto Networks 11:30 a.m. – 12:00 p.m. Discussion, Q&A, Lindseigh Strickland, Regional Sales Manager at Palo Alto Networks

 12:00 p.m. – 01.00 p.m. Lunch  01:00 p.m. – 04:00 p.m. Hands-on workshop for ransomware, Nick Dorling, Systems Engineer, Westcon During the afternoon session, you will be given a server login, and so we do ask that attendees bring their own laptops. Who should attend: Anyone wanting to prevent a ransomware attack on their organisation.  

In Person Event
London
  • 0
  • 565

Selling Palo Alto Networks - a Monthly Update

A short, impactful webinar with the latest info  to help you close more Palo Alto Networks® business. Presented by your Palo Alto Networks® Nor Cal team. Join us for a brief webinar to learn the latest news from Palo Alto Networks® - success stories, latest product positioning, tools update, upcoming events, current promotions and more! Prizes for your participation! Register Now! $20 Amazon Gift Card for all partners who stick around to take the post-webinar survey!

Online Event
  • 0
  • 210

Medical Grade Security for your Unpatchable Medical Devices

Because security is often an afterthought when medical devices are designed and maintained by the manufacturer, they are the most vulnerable devices in a hospital’s network. The medical device community is beginning to improve the security of their products, but it will take years for legacy devices to be upgraded or replaced. Until then, healthcare organizations need to develop strategies for mitigating the cybersecurity risks these unpatchable devices pose to their patients and the organizations themselves. Join Matt Mellen, a healthcare security architect and former security lead for a hospital network, and Mick Coady, a partner in the Health Information Privacy and Security Practice at PricewaterhouseCoopers, as they discuss how to approach and mitigate the challenges associated with securing medical devices in hospital environments. In this webinar, you will discover: •The cybersecurity risks posed by unpatchable and hard-to-patch medical devices •How to successfully mitigate medical device security risks •Strategies you can implement today to secure medical devices

Webinar
  • 0
  • 468

[Breach Prevention Week] Driving Innovations in Securing the Public Cloud

Organizations are rapidly adopting the public cloud to keep pace with growing business demands. Risk management is a top concern, as legacy security tools and techniques designed for the traditional datacenter cannot adapt to the continuous deployment model in the cloud. The tools for securing public cloud services infrastructure are manual and fragmented, making operations time-consuming and error-prone. Security, DevOps, and compliance teams need a frictionless approach to securing public cloud workloads. In this session, learn about recent Palo Alto Networks innovations that are changing how organizations secure the public cloud. We will cover: •Understand the several options available today to secure the public cloud •Build a strategy to manage and reduce your public cloud risks •Deploy security with a frictionless approach in a multi-cloud environment

Webinar
  • 0
  • 244

SE2SE Training

We're excited to invite you and others from your company to be our guest at our upcoming SE2SE session on April 24th from 11:00 a.m. - 3:30 p.m. at Cutwater Spirits in San Diego. At this event, our own systems engineers and their managers will be discussing a range of topics covered at our recent SE Summit and range of recent product launches. The following topics will be covered at varying degrees based on time & interest. Join us to hear more about: 11:00 a.m. - 11:15 a.m. Registration 11:15 a.m. - 12:00 p.m. Logging Service/Global Protect Cloud Service 12:00 p.m. - 12:45 p.m. PAN OS 8.1 Lunch to be served at 12:30 p.m. 12:45 p.m. -   1:15 p.m. Break/Lunch   1:15 p.m. -   2:00 p.m. How to access/deliver a BPA   2:00 p.m. -   2:45 p.m. Traps 5.0   2:45 p.m. -   3:30 p.m. Magnifier  

In Person Event
San Diego, CA
  • 0
  • 106

CROSSING THE IT/OT CHASM - workshop at the MTC in Coventry

You are invited to join experts from Palo Alto Networks and Accenture at the Manufacturing Technology Centre (MTC) in Coventry on Wednesday, 25th April 2018 to learn more about best practice approaches to the safe unification of ICS/OT and IT systems and how to ensure critical operational infrastructure is properly secured against known and unknown threats both now, and in the future.  Who should attend: Operational Technology / ICS / SCADA Practitioners and Security Operations IOT and IIOT Practitioners Network Security, Information Security & SOC Teams Governance, Risk and Compliance (GRC) stakeholders Why attend:  In modern asset-based businesses, data is key to making smart, real-time decisions and creating a foundation for the innovative new products and services that will allow you to greater serve customers in the future. As a result, Information Technology (IT) and Operational Technology (OT) systems must be converged to truly enable data driven businesses.  This direction of travel directly challenges the traditional ‘Air Gap’ security models that have existed between IT and OT systems for decades. Not only does this approach hinder the required flow of telemetry data between sensory networks, data lakes and machine learning environments, but as a trusted construct it also introduces new and unknown risks from insider threat.  Topics covered during this workshop (kick-off at 9 a.m.):  The latest cyber-threat vectors associated with IT and OT transformation and how other users are addressing them  The zero-trust approach to cyber-safely modernising your OT and securing access to and from adjacent networks  Best practice security architectures for improved ICS application visibility and access control while dynamically responding to the rapidly changing threat landscape  There will also be an opportunity for plenty of networking with industry peers, open access to our panel of experts and an optional hands-on test drive of our ICS/SCADA solution. We will conclude the day with a guided tour of the MTC. Speakers: Alex Hinchcliffe, Senior Threat researcher at Palo Alto Networks  Sean Sutton, Managing Director of Security at Accenture  Lionel Jacobs, Sr. Security Architect, SCADA & ICS at Palo Alto Networks  Chris Munday, Sr. Security Architect, SCADA & ICS at Palo Alto Networks  About the Venue  The Manufacturing Technology Centre (MTC) develops and improves innovative manufacturing processes and technologies in an agile, low risk environment, in partnership with industry, academia and other institutions. The centre focuses on delivering bespoke manufacturing system solutions for customers, a list of which can be found here.  The MTC operates some of the most advanced manufacturing equipment in the world, and employ a team of highly skilled engineers, many of whom are leading experts in their field. This creates a high-quality environment for the development and demonstration of new processes and technologies on an industrial scale.  Members include global manufacturing companies from multiple sectors. Research partners include the University of Birmingham, University of Nottingham, Loughborough University and TWI Ltd. The MTC’s areas of expertise are directly relevant to both large and small companies and are applicable across a wide range of industry sectors.  Space is limited, so sign up now to reserve your spot.

In Person Event
Coventry
  • 0
  • 211

Cybersecurity Webinar: Behavioural Analytics with Magnifier

Join Palo Alto Networks for an exclusive Cybersecurity Webinar ‘Behavioural Analytics with Magnifier’ on April 25that 10.30 a.m. (BST) During this event Bertrand Le Bail, Cybersecurity Systems Engineer for Palo Alto Networks Magnifier, Logging Service and Application Framework will introduce behavioural analytics and show how to rapidly hunt down and stop targeted attacks with cloud-delivered analytics and machine learning. Attend this webinar to find out: - How to gain back control of your security events using unique machine learning technologies - Discover how Magnifier from Palo Alto Networks can help you to expose the stealthiest attacker during advanced cyberattacks. We do hope you can join us for this invitation-only Palo Alto Networks Cybersecurity Webinar: Behavioural Analytics with Magnifier.

Webinar
  • 0
  • 205

Cybersecurity Webinar: Behavioural Analytics with Magnifier

Join Palo Alto Networks for an exclusive Cybersecurity Webinar ‘Behavioural Analytics with Magnifier’ on April 25th at 10.30 a.m. (BST) During this event Bertrand Le Bail, Cybersecurity Systems Engineer for Palo Alto Networks Magnifier, Logging Service and Application Framework will introduce the concept of behavioural analytics and show how to rapidly identify and defeat targeted attacks with cloud-delivered analytics and machine learning. Attend this webinar to find out: - How to win back control of your security events using unique machine learning functionality - Discover how Magnifier from Palo Alto Networks can help you expose the stealthiest attacker during advanced cyberattacks

Webinar
  • 0
  • 395

Cyber Threat Workshop

Join us live on April 25th for a Hands-On Workshop with CDW-G and experience our superior platform, and enhance your knowledge of how to prevent against advanced threats at all points of the network. You will learn how to: Provide advanced threat protection by enabling sandbox threat analysis using WildFire™ to control unknown malware. Confront threats at each phase of the attack with multilayered security and complete traffic visibility. Enable policies to prevent known and unknown attacks and exploits from compromising the endpoint with Traps™ advanced endpoint protection. AGENDA:   8:30 a.m. -   9:30 a.m. Registration, Breakfast, Networking   9:30 a.m. -   9:45 a.m. Introductions   9:45 a.m. - 11:00 a.m. Presentation 11:00 a.m. -   1:30 p.m. Hands-On Lab with Working Lunch PLEASE NOTE: This workshop requires attendees to provide their own laptops that can connect to a modern modem.

In Person Event
Cherry Hill, NJ
  • 0
  • 442

Ransomware's Next Steps

THIS TRAPS SEMINAR WILL MAKE SURE YOU’RE UP-TO-DATE Promising huge profits from tiny effort or investment, ransomware remains an exceptionally popular tool for both advanced and novice attackers alike. In this seminar, you will learn how your organization can deploy Traps™ advanced endpoint protection to prevent ransomware attacks without sacrificing your teams’ productivity or resources. You’ll also get the latest intel on: Trends and predictions New attack vectors and payment schemes Breaking down attacks

In Person Event
Pittsburgh, PA
  • 0
  • 395

Next Generation Firewall Live Demo

The live demo is a fast and easy way to see the Palo Alto Networks next-generation firewalls in action. Our next-generation firewalls are architected to safely enable applications and prevent modern threats. Our approach identifies all network traffic based on applications, users, content and devices, and lets you express your business policies in the form of easy-to-understand security rules. Join this live demo with a next-generation firewall expert and see how Palo Alto Networks can help protect your business. Register today.

Online Event
  • 0
  • 324

[Breach Prevention Week] Best Practices for Effective Endpoint Security

There’s a sequence of events attackers must go through to successfully deploy ransomware or steal information. And although most organizations have some form of endpoint protection in place, infections are still common. Palo Alto Networks® and Cloud Harmonics will show you how to secure your endpoints against increasingly sophisticated cyberattacks. In this webinar, you’ll learn: •Why so many attacks succeed and how to stop them •Effective techniques to protect against malware, exploits and ransomware •Next steps for successful endpoint protection

Webinar
  • 0
  • 169

SE2SE Training

We're excited to invite you and others from your company to be our guest at our upcoming SE2SE session on April 25th from 11:00 a.m. - 3:30 p.m. at Lake Forest in Orange County. At this event, our own systems engineers and their managers will be discussing a range of topics covered at our recent SE Summit and range of recent product launches. The following topics will be covered in varying degrees based on time & interest. Join us to hear more about: 11:00 a.m. - 11:15 a.m. Registration 11:15 a.m. - 12:00 p.m. Logging Service/Global Protect Cloud Service 12:00 p.m. - 12:45 p.m. PAN OS 8.1 Lunch to be served at 12:30 p.m. 12:45 p.m. -   1:15 p.m. Break/Lunch   1:15 p.m. -   2:00 p.m. How to access/deliver a BPA   2:00 p.m. -   2:45 p.m. Traps 5.0   2:45 p.m. -   3:30 p.m. Magnifier  

In Person Event
Foothill Ranch, CA
  • 0
  • 124

Secure Your Apps, Data and People Wherever They Are

How will you ensure your existing security policy is extended to the public cloud? How will you protect your data with the rapid adoption of SaaS apps? Join us for an interactive event where our security experts will cover: Common security obstacles faced when moving to the cloud Where the cloud provider’s security respondibility ends and yours begins Using automation to quickly secure your cloud infrastructure The benefits of adopting a platform approach to SaaS security Agenda 09:30 Registration 10:00 Introduction to Palo Alto Networks Security Platform 10:30 Customer Challenges in Public Cloud and SaaS 10:45 Palo Alto Networks Cloud Security Platform IaaS Security – VM-Series, Traps PaaS Security – Evident.io SaaS Security – Aperture, GPCS 12:15 Live Demonstration IaaS Architecture Lab Showcase Aperture GUI Showcase 12:45 Q&A followed by lunch

In Person Event
Pune, Maharashtra
  • 0
  • 27

Ultimate Test Drive

Szanowni Państwo Z ogromną przyjemnością chcielibyśmy zaprosić Państwa do  udziału w technicznych warsztatach bezpieczeństwa sieciowego „Ultimate Test Drive” dedykowanych dla sektora publicznego w województwie zachodniopomorskim. Podczas warsztatów uczestnicy będą mogli poznać funkcjonalności platformy bezpieczeństwa Palo Alto Networks. Dominującą część warsztatów będą stanowić zajęcia laboratoryjne. W pierwszej części praktycznej uczestnicy będą mogli skonfigurować polityki bezpieczeństwa NGFW w sposób pozwalający na pełną kontrolę nad aplikacjami, użytkownikami i  treściami pochodzącymi z sieci. W drugiej uczestnicy będą mogli poznać bliżej rozwiązania ochrony stacji końcowej lub kontynuować ćwiczenia NGFW mierząc się z bardziej zaawansowanymi scenariuszami.  AGENDA SPOTKANIA 09:00-09:15 - Rejestracja i rozpoczęcie warsztatów 09:15-10:15 - Wprowadzenie do platformy Palo Alto Networks 10:15:10:30 - Przerwa kawowa 10:30-13:00 - Warsztaty cz.1 - NGFW 13:00-13:45 - Przerwa obiadowa 13:45-16:00 - Warsztaty  cz.2 (NGFW część rozszerzona lub Traps) 16:00 - Oficjalne zakończenie Udział w spotkaniu jest bezpłatny. UWAGA: Do udziału w warsztatach wymagane jest posiadanie własnego komputera przenośnego z zainstalowanym klientem RDP. Serdecznie zapraszamy do udziału.

In Person Event
Białystok
  • 0
  • 229

ICS Hands-On Workshop in Dublin

Join us for our upcoming hands-on workshop for industrial control systems security. It’s a free, interactive event where you’ll learn practical skills to protect your ICS environments with Palo Alto Networks® Next-Generation Security Platform. Register now to participate in lab exercises in a fully virtualised ICS environment and learn about the latest ICS security best practices from your peers and Palo Alto Networks experts. Agenda: 09:00-09:30 Arrival & coffee 09:30-10:00 Presentation (ICS/IIOT solution – PA-220R- industrial Firewall) 10:00-10:30 Overview of the lab   10:30-10:45 Break 10:45-12:45 Hands on Workshop 12:45-14:00 Lunch Here are some of the workshop activities: ICS/SCADA security basics and Palo Alto Networks platform overview Virtualized ICS infrastructure setup (HMI, PLC, Firewall, Kali) ICS protocol visibility with App-ID™ technology ICS protocol access control using policy and segmentation Integrated threat prevention (IPS/IDS) Role-based access control with User-ID™ technology   Here’s what past participants have to say about the ICS hands-on workshop: “The hands-on workshop provided me with a real-world scenario and [showed me] how Palo Alto Networks firewalls can provide the visibility and control to stop attacks on the ICS network.” – Security coordinator lead for energy IT operations at a large gas and electric utility company “Great hands-on experience! The lab helps cement the theory of protecting ICS environments, turning it into an active defense strategy.” – Sr. security analyst at a major natural gas utility company “The lab was an excellent proof of concept.” – Security administrator at a multinational oil and gas company

In Person Event
Dublin 18
  • 0
  • 127

Disrupt Cybersecurity Status Quo Boston MA

Join us for a cybersecurity summit with technology leaders and Palo Alto Networks executives. Break out of the cybersecurity status quo.  Meet subject matter experts and industry leaders in a half-day cybersecurity summit to learn about the evolution of cybersecurity.  Featured speakers include Enterprise Strategy Group and Microsoft. Join us. You can’t afford to miss this interactive discussion on the evolution of cybersecurity and why the model is ready for disruption.  AGENDA  8:30 a.m.  Registration and Coffee 9:00 a.m.  Welcome & Opening Remarks - Rich Wenning, Palo Alto Networks, SVP 9:15 a.m.   Disrupting The Cybersecurity Status Quo - Paul Calatayud, Palo Alto Networks, Field CSO 10:15 a.m.  Break 10:30 a.m.  The Evolution of Cybersecurity: From Manual Processes & Point Technologies To Effective Automation & Orchestration - Jon Oltsik, ESG 11:30 a.m.  Azure and the Digital Transformation Security - Microsoft, Sean Dastouri 12:00 p.m.  Networking Lunch & Executive Discussion 1:00 p.m.  Event Concludes ENTERPRISE STRATEGY GROUP (ESG) Senior Principal Analyst, Cybersecurity Jon Oltsik is an ESG senior principal analyst and founder of the firm's cybersecurity service.  During his presentation, Jon will describe the requirements, challenges, objectives, and progress associated with cybersecurity's transition from manual processes and point tools to effective automation and orchestration of security technologies.   With almost 30 years of technology industry experience, Jon is widely recognized as an expert in all aspects of cybersecurity and is often called upon to help customers understand a CISO's perspective and strategies. Jon was named one of the top 100 cybersecurity influencers for 2015 by Onalytica, and is active as a committee member of the Cybersecurity Canon, a project dedicated to identifying a list of must-read books for all cybersecurity practitioners.      

In Person Event
Boston, MA
  • 0
  • 378

Ransomware's Next Steps

THIS TRAPS SEMINAR WILL MAKE SURE YOU’RE UP-TO-DATE Promising huge profits from tiny effort or investment, ransomware remains an exceptionally popular tool for both advanced and novice attackers alike. In this seminar, you will learn how your organization can deploy Traps™ advanced endpoint protection to prevent ransomware attacks without sacrificing your teams’ productivity or resources. You’ll also get the latest intel on: Trends and predictions New attack vectors and payment schemes Breaking down attacks

In Person Event
Westlake, Ohio
  • 0
  • 283

Stopping the Unstoppable: How to Detect and Prevent Fileless Attacks

Fileless attacks are estimated to account for 35 percent of all attacks in 2018, according to Ponemon Institute. Threat actors can use a combination of exploits, scripts, and “living off the land” to stay under the radar. They can even carry out sophisticated attacks without ever installing malware on compromised endpoints. They can also use common networking and admin tools together with traditional malware to maintain persistence while locating and stealing valuable data. By monitoring user and device behavior, organizations can detect anomalies that indicate an attack is under way. Because most fileless attacks start with a vulnerability exploit, advanced endpoint protection can block the initial step of an attack from succeeding in the first place. Join us on April 26 as we discuss how organizations can detect and stop all stages of fileless attacks. Attend this webinar to: •Find out how fileless attacks occur with a demo of an attack •Learn how Magnifier behavioral analytics, the first app of the Palo Alto Networks Application Framework, can detect the network behaviors associated with fileless attacks. •Understand how Traps advanced endpoint protection can block the exploits that lead to endpoint compromise.

Webinar
  • 0
  • 237

Palo Alto Networks® & Proofpoint Luncheon

Better Together: Delivering Extended Threat Prevention Capabilities Defending against cyber attacks is a tough business, especially when attackers pose as authenticated users on your network. We can help with that. Palo Alto Networks® and Proofpoint have integrated their best-of-breed cybersecurity solutions to provide customers with unprecedented protection and intelligence against attacks. Experience our superior platform, and enhance your knowledge of how to prevent against advanced threats at all points of the network. You will learn how to: Provide advanced threat protection by enabling sandbox threat analysis using WIldFireTM to control unknown malware. Confront threats at each phase of the attack with multilayered security and complete traffic visibility. Find out how Proofpoint's targeted Attack Protection (TAP) stays ahead of today's attackers with an innovative approach that detects, analyzes, and blocks advanced threats before they reach the inbox. * Coffee and Lunch will be provided*  

In Person Event
Phoenix, AZ
  • 0
  • 366

Virtual Ultimate Test Drive - Advanced Endpoint Protection - Apr 28th, 2018

JOIN US FOR THE ADVANCED ENDPOINT PROTECTION ULTIMATE TEST DRIVE, WHERE YOU'LL GET HANDS-ON EXPERIENCE WITH NEXT-GENERATION ENTERPRISE SECURITY PLATFORM. In this free half-day technical workshop you will learn how to defeat the adversary at the endpoint. During this workshop you will: Effortless approach to managing attacks Break down the sophisticated threat lifecycle Prevent successful execution of advanced attacks originating from executables, data files or network-based exploits Take on the roles of the targeted individual,attacker and security professional Understand the chain-like nature of exploits Experience the power of advanced execution control and cloud intelligence *Please note: If the class is full, we have plenty of other dates to choose from. Click here to view other times

Online Event
  • 0
  • 390

Virtual Ultimate Test Drive - Next Generation Firewall - May 1st, 2018

JOIN US FOR THE ULTIMATE VIRTUAL TEST DRIVE, WHERE YOU'LL GET HANDS-ON EXPERIENCE WITH PALO ALTO NETWORKS NEXT-GENERATION FIREWALL. In this free, two-hour virtual workshop, you will configure security policies that will ultimately restore visibility and control over the applications, users and content traversing your network. During this workshop you will: Established policies to safely enable applications while restricting the others Enable sandbox threat analysis using WildFire to prevent unknown malware Configured policy that decrypts and inspects SSL Traffic Safely enable mobile devices using GlobalProtect *Please note: If the class is full, we have plenty of other dates to choose from. Click here to view other times

Online Event
  • 0
  • 167

Ransomware's Next Steps

THIS TRAPS SEMINAR WILL MAKE SURE YOU’RE UP-TO-DATE Promising huge profits from tiny effort or investment, ransomware remains an exceptionally popular tool for both advanced and novice attackers alike. In this seminar, you will learn how your organization can deploy Traps™ advanced endpoint protection to prevent ransomware attacks without sacrificing your teams’ productivity or resources. You’ll also get the latest intel on: Trends and predictions New attack vectors and payment schemes Breaking down attacks

In Person Event
Louisville, Kentucky
  • 0
  • 243

Cyber Threat Workshop

Join us live on May 2nd, for a Hands-On Workshop with CDW-G and experience our superior platform, and enhance your knowledge of how to prevent against advanced threats at all points of the network. You will learn how to: Provide advanced threat protection by enabling sandbox threat analysis using WildFire™ to control unknown malware. Confront threats at each phase of the attack with multilayered security and complete traffic visibility. Enable policies to prevent known and unknown attacks and exploits from compromising the endpoint with Traps™ advanced endpoint protection. AGENDA:   8:30 a.m. -   9:30 a.m. Registration, Breakfast, Networking   9:30 a.m. -   9:45 a.m. Introductions   9:45 a.m. - 11:00 a.m. Presentation 11:00 a.m. -   1:30 p.m. Hands-On Lab with Working Lunch PLEASE NOTE: This workshop requires attendees to provide their own laptops that can connect to a modern modem.

In Person Event
Reston, VA
  • 0
  • 290
Displaying 1 to 30 of 142