Breach Prevention Week

Join us for a week of intriguing webinars, interactive discussions, and exclusive content.
By participating you’ll learn:

  • What cybersecurity challenges most organizations face
  • How a Next-Generation Security Platform successfully prevents breaches
  • How you can implement effective breach prevention policies

Featured Breach Prevention Week Presentations

Palo Alto Networks® continues to take an innovative approach to solving our customers' toughest security challenges. Our commitment to innovation means we can protect your data whether it resides on the network, at the endpoint or in the cloud and deliver a consistent outcome. No point product technology can solve all security challenges – only an integrated platform can achieve the automation necessary to prevent successful attacks.

Join us during Breach Prevention week to learn more about our innovations in: network security, cloud security, endpoint protection, and behavioral analytics.

DATE TIME EVENT NAME
Monday, April 23 11:00am PT Beyond Layered ApproachRegister Now >>
Tuesday, April 24 10:30am PT Driving Innovations in Securing the Public CloudRegister Now >>
Wednesday, April 25 10:00am PT Best Practices for Effective Endpoint SecurityRegister Now >>
Thursday, April 26 9:00am PT Stopping the Unstoppable: How to Detect and Prevent Fileless Malware AttacksRegister Now >>

We have great topics lined up for you, including how to prevent successful cyberattacks and achieve high performance across your network, endpoint, and cloud environments. Learn how to keep your users secure, wherever they are.

DATE TIME EVENT NAME
Tuesday, March 20th 5:00 PM SGT / 2:30 PM IST PREVENT SOPHISTICATED THREATS TO FINANCIAL SERVICESWatch Now >>

According to a 2017 analysis of financial services attacks by our threat research team Unit 42, 96% of cyberattacks were delivered by email in the financial services industry. Learn how to reduce the risk of attacks in this webinar.

Watch Now >>
Tuesday, March 20th 10:00 PM SGT / 1:00 PM AEDT PREVENT SOPHISTICATED THREATS TO FINANCIAL SERVICESWatch Now >>

According to a 2017 analysis of financial services attacks by our threat research team Unit 42, 96% of cyberattacks were delivered by email in the financial services industry. Learn how to reduce the risk of attacks in this webinar.

Watch Now >>
Wednesday, March 21st 5:00 PM SGT / 2:30 PM IST A MATURITY MODEL FOR HEALTHCARE CYBERSECURITYWatch Now >>

Out of the hundreds of capabilities for reducing the attack surface of healthcare organisations, which should you focus on first? This webinar splits security capabilities into four levels of maturity to help you prioritise for your organisation.

Watch Now >>
Wednesday, March 21st 10:00 PM SGT / 1:00 PM AEDT A MATURITY MODEL FOR HEALTHCARE CYBERSECURITYWatch Now >>

Out of the hundreds of capabilities for reducing the attack surface of healthcare organisations, which should you focus on first? This webinar splits security capabilities into four levels of maturity to help you prioritise for your organisation.

Watch Now >>
Thursday, March 22nd 5:00 PM SGT / 2:30 PM IST BEST PRACTICES IN PREVENTING CREDENTIAL PHISHING IN HEALTHCAREWatch Now >>

Email attacks and phishing attacks are not going away any time. This webinar will cover some of the successful approaches your healthcare IT peers have followed to lower risks from phishing and how to prepare your healthcare organisation for credential phishing attacks.

Watch Now >>
Thursday, March 22nd 10:00 PM SGT / 1:00 PM AEDT BEST PRACTICES IN PREVENTING CREDENTIAL PHISHING IN HEALTHCAREWatch Now >>

Email attacks and phishing attacks are not going away any time. This webinar will cover some of the successful approaches your healthcare IT peers have followed to lower risks from phishing and how to prepare your healthcare organisation for credential phishing attacks.

Watch Now >>

We have great topics lined up for you, including how to prevent successful cyberattacks and achieve high performance across your network, endpoint, and cloud environments. Learn how to keep your users secure, wherever they are.

DATE TIME EVENT NAME
Monday, October 2nd, 2017 11am CEST Securing your digital transformation
Register Now >>

The journey to the Cloud is gaining momentum with businesses embracing digital transformation. A large part of making this a success relies on providing the best security available to businesses that are looking to transform. Learn how Microsoft is helping businesses adopt the benefits of the cloud and is working hand in glove with its key security partner Palo Alto Networks to provide the most comprehensive security solution available globally. Chandu Cheeti, Microsoft Cloud Strategy for SAP on Azure & Key Partnerships – EMEA

Register Now >>
Tuesday, October 3rd, 2017 9am CEST Cybersecurity in the Digital, Mobile & Cloud Era Register Now >>

A Comprehensive Enterprise Security Strategy and Approach are needed in the digital, mobile and cloud era. This Strategy and Approach nowadays needs to face the following challenges:

  • EMBRACE HETEROGENEITY: Identity that transcends every application access across multiple devices.
  • TRUST & ASSURANCE: Establish a new, rock solid security model from the data center to the device.
  • CONSUMER-GRADE EXPERIENCE: Ensure ANY app can reach ANY device to best empower employees – beyond basic, individual productivity apps.
During this session we will be covering how VMware can help in this IT transition providing an End to End Intrinsic Security Solution to minimize risk while also reducing the potential impact in case of suffering an infection and helping to provide a much quicker response.

Don´t try to secure virtualization, it is really more about using virtualization to secure! Ghaleb Zekri, Security Architect at VMware

Register Now >>
Wednesday, October 4th, 2017 4pm CEST Combining threat intelligence and detection to prevent email based attacks Register Now >>

Palo Alto Networks and Proofpoint: Combining threat intelligence and detection to prevent email based attacks and increase insight into user behaviour

Securing sensitive data has never been more challenging. Email remains the leading attack vector due to evolving techniques combined with sophisticated social engineering tricks. Security teams struggle to prevent attackers from breaching their companies; once the bad guys are through, they move across the network with stealth and impunity.

The API integration of Palo Alto Networks WildFire and Proofpoint TAP (Targeted Attack Protection) delivers a perfect balance of protection from attackers and malware entering the perimeter and how it travels across the network. A key aspect of the strategic partnership is how simple it is for a customer to enable the dual layers of protection. Join us for a discussion on how two best-of-breed security technologies have been united, resulting in comprehensive protection without the usual complexity.

Speaker: Tim Ricketts, Senior Sales Engineer at Proofpoint

Register Now >>
Thursday, October 5th, 2017 10am CEST Teaming Together to Prevent Attacks and Protect Your Data Register Now >>

Targeted attacks — including advanced persistent threats (APTs) — and today’s sophisticated malware threats are one of the biggest challenges facing customer’s as the threats multiply and create unique compromises within their networks. This creates challenges for traditional security technologies to reliably identify these new class of threats. Even when a threat is detected, there is still the issue of slow response times and extended periods of exposure, as administrators typically need to manually coordinate and configure the necessary changes to their security infrastructure. Please join Palo Alto Networks and Splunk as we work together to deliver an advanced visibility, reporting and monitoring solution for intelligent security analysis that addresses this challenge and delivers new tools to quickly identify and analyze this new class of threats. We will show you how this integration insures better threat response time, and how to automate the steps needed to block malicious sources and quarantine compromised devices you through how Palo Alto Networks and Splunk. Key Benefits:

  • Advanced security and visibility in the cloud, on premise, or hybrid model
  • Accelerated threat response and enhanced threat detection
  • Security visualization, monitoring and analysis
  • Demo to show you how to identify ransomware and correlate IOC data through the app and use adaptive response to take actions
Presenter: Wissam Ali-Ahmad Lead Solutions Architect, Technical Services for Global Strategic Alliances at Splunk. Register Now >>

Register Now >>
Friday, October 6th, 2017 9am CEST The end of the world as we know it? How to tackle security risks in IoT Register Now >>

The Internet of Things or IoT has been widely publicised by the media over recent years. The integration of IT, OT and IoT poses unique challenges to security leaders. Ranging from email spamming fridges to the end of the world as we know it. The reality is, we face a situation where some devices are becoming internet enabled just because they can. At the same time, we adopt internet devices with little thought of our data, because they offer accessing something in a way that makes it easier for us. So how will Dimension Data and Palo Alto networks deal with the "Internet of Threats"? Stefaan Hinderyckx, Director Europe - Security at Dimension Data

Register Now >>