Breach Prevention Week

Join us for a week of intriguing webinars, interactive discussions, and exclusive content.
By participating you’ll learn:

  • What cybersecurity challenges most organizations face
  • How a Next-Generation Security Platform successfully prevents breaches
  • How you can implement effective breach prevention policies

Featured Breach Prevention Week Presentations

Join to hear Palo Alto Networks cybersecurity predictions for 2018 and get recommendations on how to mitigate against them to achieve a more resilient posture in the new year. Experts will dive into predictions on the threat landscape, cloud security, cyber hygiene, endpoint protection, IoT, machine learning and more.

DATE TIME EVENT NAME
Monday, January 22 10am PT 2018 Cybersecurity Predictions and RecommendationsRegister Now >>

Join to hear Palo Alto Networks cybersecurity predictions for 2018 and get recommendations on how to mitigate against them to achieve a more resilient posture in the new year. Experts will dive into predictions on the threat landscape, cloud security, cyber hygiene, endpoint protection, IoT, machine learning and more.

Register Now >>
Tuesday, January 23 10am PT Public Cloud Security ConsiderationsRegister Now >>

Offering organizations of all sizes the benefits of agility and scalability, the adoption of public cloud continues at a pace rivaled only by that of the early days of the Internet era. With the underlying premise that the public cloud is someone else’s computer, and an extension of your network this session will cover public cloud security concerns, what the shared security responsibility model really means and recommendations for protecting your public cloud workloads and data.

Register Now >>
Wednesday, January 24 9:30am PT The Year We Reject “Good Enough” Security in the CloudRegister Now >>

Join this webinar to hear 2018 predictions and recommendations on rejecting “good enough” security in the cloud and balancing the need for agility while improving the security of applications and securing the data as it moves the public cloud.

Register Now >>
Thursday, January 25 10am PST The Ransomware Epidemic ContinuesRegister Now >>

Let’s face it, ransomware is everywhere. Every few months it seems there’s another new variant ripping across the world’s networks – snarling business and leaving chaos in its wake.

Register Now >>
Friday, January 26 11am PST Advanced Endpoint ProtectionRegister Now >>

Join us for the advanced endpoint protection ultimate test drive, where you'll get hands-on experience with next-generation enterprise security platform.

Register Now >>
Friday, January 26 10am EST Amazon® Web ServicesRegister Now >>

Join us for the ultimate virtual test drive, where you’ll get hands-on experience with Palo Alto Networks Amazon® Web Services (AWS).

Register Now >>

We have great topics lined up for you, including how to prevent successful cyberattacks and achieve high performance across your network, endpoint, and cloud environments. Learn how to keep your users secure, wherever they are.

DATE TIME EVENT NAME
Tuesday, Aug 1st 10:00 AM SGT / 12:00 PM AEST Phishing & Credential Abuse 101: Exposing the Ecosystem and Motives BehindWatch Now >>

Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials.

Join our Unit 42 threat intelligence analyst for an insightful perspective on credential-based attacks and phishing. In addition to presenting its unique attack life-cycle, she will:

  • Identify trends and techniques in methods used for credential theft and abuse.
  • Review how cyber criminals have changed their tactics to compromise networks.
  • Examine who is being targeted, and why.
  • Discuss techniques to stop credential leakage.
Watch Now >>
Tuesday, Aug 1st 5:00 PM SGT / 2:30 PM IST Phishing & Credential Abuse 101: Exposing the Ecosystem and Motives BehindWatch Now >>

Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials.

Join our Unit 42 threat intelligence analyst for an insightful perspective on credential-based attacks and phishing. In addition to presenting its unique attack life-cycle, she will:

  • Identify trends and techniques in methods used for credential theft and abuse.
  • Review how cyber criminals have changed their tactics to compromise networks.
  • Examine who is being targeted, and why.
  • Discuss techniques to stop credential leakage.
Watch Now >>
Wednesday, Aug 2nd 10:00 AM SGT / 12:00 PM AEST How does Credential Theft Affect Your Organization?Watch Now >>

The effects of a credential-based attack differs by organization and by job function. In this session, we will cover a look at how these attacks affect different types of organizations, along with the analysis and demonstration of how an attack is done.

In this session, hear about:

  • Credential theft industry research coverage
  • Industry analysis of the problem space
  • Application of the credential theft lifecycle in light of recent attacks
Watch Now >>
Wednesday, Aug 2nd 5:00 PM SGT / 2:30 PM IST How does Credential Theft Affect Your Organization?Watch Now >>

The effects of a credential-based attack differs by organization and by job function. In this session, we will cover a look at how these attacks affect different types of organizations, along with the analysis and demonstration of how an attack is done.

In this session, hear about:

  • Credential theft industry research coverage
  • Industry analysis of the problem space
  • Application of the credential theft lifecycle in light of recent attacks
Watch Now >>
Thursday, Aug 3rd 10:00 AM SGT / 12:00 PM AEST Disrupting Credential-based AttacksWatch Now >>

Learn how to use the Palo Alto Networks next-generation security platform to disrupt the unique attack lifecycle used in credential-based attacks. In this session, get details about the strategies and key technologies for preventing both the theft and abuse of credentials.

In this session, get details on:

  • Why the platform plays a critical role towards disrupting credential-based attacks
  • Preventing the theft of credentials, using new PAN-OS 8.0 technologies
  • Stopping the use of stolen credentials, through new multi-factor authentication capabilities in PAN-OS 8.0
Watch Now >>
Thursday, Aug 3rd 5:00 PM SGT / 2:30 PM IST Disrupting Credential-based AttacksWatch Now >>

Learn how to use the Palo Alto Networks next-generation security platform to disrupt the unique attack lifecycle used in credential-based attacks. In this session, get details about the strategies and key technologies for preventing both the theft and abuse of credentials.

In this session, get details on:

  • Why the platform plays a critical role towards disrupting credential-based attacks
  • Preventing the theft of credentials, using new PAN-OS 8.0 technologies
  • Stopping the use of stolen credentials, through new multi-factor authentication capabilities in PAN-OS 8.0
Watch Now >>
Friday, Aug 4th 10:00 AM SGT / 12:00 PM AEST Phishing & Credential Abuse 201: Inside the AttackWatch Now >>

This 201 level course builds on the introductory material of Phishing & Credential Theft 101 and takes it deeper. After this course, you’ll understand better how phishers and credential theft attackers ply their trade and how attacks actually work. The course will go into detail on two selected, publicly known breaches which involved credential theft and abuse.

In this presentation, our Unit 42 Threat Intelligence team will show you:

  • How credential theft and abuse were used in real world attacks.
  • Demonstration of tools attackers use to capture credentials.
  • How attackers buy and sell credentials on the dark web to further their criminal operations.
Watch Now >>
Friday, Aug 4th 5:00 PM SGT / 2:30 PM IST Phishing & Credential Abuse 201: Inside the AttackWatch Now >>

This 201 level course builds on the introductory material of Phishing & Credential Theft 101 and takes it deeper. After this course, you’ll understand better how phishers and credential theft attackers ply their trade and how attacks actually work. The course will go into detail on two selected, publicly known breaches which involved credential theft and abuse.

In this presentation, our Unit 42 Threat Intelligence team will show you:

  • How credential theft and abuse were used in real world attacks.
  • Demonstration of tools attackers use to capture credentials.
  • How attackers buy and sell credentials on the dark web to further their criminal operations.
Watch Now >>

We have great topics lined up for you, including how to prevent successful cyberattacks and achieve high performance across your network, endpoint, and cloud environments. Learn how to keep your users secure, wherever they are.

DATE TIME EVENT NAME
Monday, October 2nd, 2017 11am CEST Securing your digital transformation
Register Now >>

The journey to the Cloud is gaining momentum with businesses embracing digital transformation. A large part of making this a success relies on providing the best security available to businesses that are looking to transform. Learn how Microsoft is helping businesses adopt the benefits of the cloud and is working hand in glove with its key security partner Palo Alto Networks to provide the most comprehensive security solution available globally. Chandu Cheeti, Microsoft Cloud Strategy for SAP on Azure & Key Partnerships – EMEA

Register Now >>
Tuesday, October 3rd, 2017 9am CEST Cybersecurity in the Digital, Mobile & Cloud Era Register Now >>

A Comprehensive Enterprise Security Strategy and Approach are needed in the digital, mobile and cloud era. This Strategy and Approach nowadays needs to face the following challenges:

  • EMBRACE HETEROGENEITY: Identity that transcends every application access across multiple devices.
  • TRUST & ASSURANCE: Establish a new, rock solid security model from the data center to the device.
  • CONSUMER-GRADE EXPERIENCE: Ensure ANY app can reach ANY device to best empower employees – beyond basic, individual productivity apps.
During this session we will be covering how VMware can help in this IT transition providing an End to End Intrinsic Security Solution to minimize risk while also reducing the potential impact in case of suffering an infection and helping to provide a much quicker response.

Don´t try to secure virtualization, it is really more about using virtualization to secure! Ghaleb Zekri, Security Architect at VMware

Register Now >>
Wednesday, October 4th, 2017 4pm CEST Combining threat intelligence and detection to prevent email based attacks Register Now >>

Palo Alto Networks and Proofpoint: Combining threat intelligence and detection to prevent email based attacks and increase insight into user behaviour

Securing sensitive data has never been more challenging. Email remains the leading attack vector due to evolving techniques combined with sophisticated social engineering tricks. Security teams struggle to prevent attackers from breaching their companies; once the bad guys are through, they move across the network with stealth and impunity.

The API integration of Palo Alto Networks WildFire and Proofpoint TAP (Targeted Attack Protection) delivers a perfect balance of protection from attackers and malware entering the perimeter and how it travels across the network. A key aspect of the strategic partnership is how simple it is for a customer to enable the dual layers of protection. Join us for a discussion on how two best-of-breed security technologies have been united, resulting in comprehensive protection without the usual complexity.

Speaker: Tim Ricketts, Senior Sales Engineer at Proofpoint

Register Now >>
Thursday, October 5th, 2017 10am CEST Teaming Together to Prevent Attacks and Protect Your Data Register Now >>

Targeted attacks — including advanced persistent threats (APTs) — and today’s sophisticated malware threats are one of the biggest challenges facing customer’s as the threats multiply and create unique compromises within their networks. This creates challenges for traditional security technologies to reliably identify these new class of threats. Even when a threat is detected, there is still the issue of slow response times and extended periods of exposure, as administrators typically need to manually coordinate and configure the necessary changes to their security infrastructure. Please join Palo Alto Networks and Splunk as we work together to deliver an advanced visibility, reporting and monitoring solution for intelligent security analysis that addresses this challenge and delivers new tools to quickly identify and analyze this new class of threats. We will show you how this integration insures better threat response time, and how to automate the steps needed to block malicious sources and quarantine compromised devices you through how Palo Alto Networks and Splunk. Key Benefits:

  • Advanced security and visibility in the cloud, on premise, or hybrid model
  • Accelerated threat response and enhanced threat detection
  • Security visualization, monitoring and analysis
  • Demo to show you how to identify ransomware and correlate IOC data through the app and use adaptive response to take actions
Presenter: Wissam Ali-Ahmad Lead Solutions Architect, Technical Services for Global Strategic Alliances at Splunk. Register Now >>

Register Now >>
Friday, October 6th, 2017 9am CEST The end of the world as we know it? How to tackle security risks in IoT Register Now >>

The Internet of Things or IoT has been widely publicised by the media over recent years. The integration of IT, OT and IoT poses unique challenges to security leaders. Ranging from email spamming fridges to the end of the world as we know it. The reality is, we face a situation where some devices are becoming internet enabled just because they can. At the same time, we adopt internet devices with little thought of our data, because they offer accessing something in a way that makes it easier for us. So how will Dimension Data and Palo Alto networks deal with the "Internet of Threats"? Stefaan Hinderyckx, Director Europe - Security at Dimension Data

Register Now >>