Breach Prevention Week

Join us for a week of intriguing webinars, interactive discussions, and exclusive content.
By participating you’ll learn:

  • What cybersecurity challenges most organizations face
  • How a Next-Generation Security Platform successfully prevents breaches
  • How you can implement effective breach prevention policies

Featured Breach Prevention Week Presentations

In the spirit of National Cyber Security Awareness Month, an annual campaign to raise awareness about the importance of cybersecurity, we've lined up a series of webinars during our Breach Prevention Week to help educate you on the latest hot topics.

DATE TIME EVENT NAME
Monday, October 16th 10am PT Disrupting the Cybersecurity Status QuoRegister Now >>

The signs that the security market is ready for disruption are here. Join in discussion with Nir Zuk, Palo Alto Networks co-founder and CTO, on how the security market is evolving and maturing and ultimately, ready for disruption.

Register Now >>
Tuesday, October 17th 10am PT Win the Cyberwar with Zero TrustRegister Now >>

Zero Trust is revolutionizing network security architecture: it is data-centric and designed to stop data breaches. Zero Trust also adds a layer of agility to modern networks that is impossible to do in traditional network designs. These 21st century networks have been adopted by government entities and large enterprises around the world.

In this session, John will discuss the concept of Zero Trust and explain why Zero Trust is the world's only true cybersecurity strategy. He will show a Zero Trust Strategy will achieve tactical and operational goals. This session will demonstrate how Zero Trust will not only transform network security but function as a business enabler, by focusing on the businesses grand strategic objectives.

Register Now >>
Wednesday, October 18th 10am PT Essential Reading for the Security ProfessionalRegister Now >>

LJoin Rick Howard, CSO at Palo Alto Networks to learn about must-read books for all cybersecurity practitioners – be they from industry, government or academia — where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional’s education that will make the practitioner incomplete.

Register Now >>
Thursday, October 19th 10am PT Cybersecurity in the Workplace is Everyone’s BusinessRegister Now >>

Creating a culture of cybersecurity is critical for all organizations. Join the conversation with our own security pros to learn how they keep employees ahead of phishing attacks, share best practices for phishing education and explain how to use innovative technologies to strengthen cyber resilience.

Register Now >>
Friday, October 20th 10am PT Advance Your Career in CybersecurityRegister Now >>

Join Palo Alto Networks to learn our best tips on how to land a job in cybersecurity.

Register Now >>

We have great topics lined up for you, including how to prevent successful cyberattacks and achieve high performance across your network, endpoint, and cloud environments. Learn how to keep your users secure, wherever they are.

DATE TIME EVENT NAME
Tuesday, Aug 1st 10:00 AM SGT / 12:00 PM AEST Phishing & Credential Abuse 101: Exposing the Ecosystem and Motives BehindWatch Now >>

Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials.

Join our Unit 42 threat intelligence analyst for an insightful perspective on credential-based attacks and phishing. In addition to presenting its unique attack life-cycle, she will:

  • Identify trends and techniques in methods used for credential theft and abuse.
  • Review how cyber criminals have changed their tactics to compromise networks.
  • Examine who is being targeted, and why.
  • Discuss techniques to stop credential leakage.
Watch Now >>
Tuesday, Aug 1st 5:00 PM SGT / 2:30 PM IST Phishing & Credential Abuse 101: Exposing the Ecosystem and Motives BehindWatch Now >>

Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials.

Join our Unit 42 threat intelligence analyst for an insightful perspective on credential-based attacks and phishing. In addition to presenting its unique attack life-cycle, she will:

  • Identify trends and techniques in methods used for credential theft and abuse.
  • Review how cyber criminals have changed their tactics to compromise networks.
  • Examine who is being targeted, and why.
  • Discuss techniques to stop credential leakage.
Watch Now >>
Wednesday, Aug 2nd 10:00 AM SGT / 12:00 PM AEST How does Credential Theft Affect Your Organization?Watch Now >>

The effects of a credential-based attack differs by organization and by job function. In this session, we will cover a look at how these attacks affect different types of organizations, along with the analysis and demonstration of how an attack is done.

In this session, hear about:

  • Credential theft industry research coverage
  • Industry analysis of the problem space
  • Application of the credential theft lifecycle in light of recent attacks
Watch Now >>
Wednesday, Aug 2nd 5:00 PM SGT / 2:30 PM IST How does Credential Theft Affect Your Organization?Watch Now >>

The effects of a credential-based attack differs by organization and by job function. In this session, we will cover a look at how these attacks affect different types of organizations, along with the analysis and demonstration of how an attack is done.

In this session, hear about:

  • Credential theft industry research coverage
  • Industry analysis of the problem space
  • Application of the credential theft lifecycle in light of recent attacks
Watch Now >>
Thursday, Aug 3rd 10:00 AM SGT / 12:00 PM AEST Disrupting Credential-based AttacksWatch Now >>

Learn how to use the Palo Alto Networks next-generation security platform to disrupt the unique attack lifecycle used in credential-based attacks. In this session, get details about the strategies and key technologies for preventing both the theft and abuse of credentials.

In this session, get details on:

  • Why the platform plays a critical role towards disrupting credential-based attacks
  • Preventing the theft of credentials, using new PAN-OS 8.0 technologies
  • Stopping the use of stolen credentials, through new multi-factor authentication capabilities in PAN-OS 8.0
Watch Now >>
Thursday, Aug 3rd 5:00 PM SGT / 2:30 PM IST Disrupting Credential-based AttacksWatch Now >>

Learn how to use the Palo Alto Networks next-generation security platform to disrupt the unique attack lifecycle used in credential-based attacks. In this session, get details about the strategies and key technologies for preventing both the theft and abuse of credentials.

In this session, get details on:

  • Why the platform plays a critical role towards disrupting credential-based attacks
  • Preventing the theft of credentials, using new PAN-OS 8.0 technologies
  • Stopping the use of stolen credentials, through new multi-factor authentication capabilities in PAN-OS 8.0
Watch Now >>
Friday, Aug 4th 10:00 AM SGT / 12:00 PM AEST Phishing & Credential Abuse 201: Inside the AttackWatch Now >>

This 201 level course builds on the introductory material of Phishing & Credential Theft 101 and takes it deeper. After this course, you’ll understand better how phishers and credential theft attackers ply their trade and how attacks actually work. The course will go into detail on two selected, publicly known breaches which involved credential theft and abuse.

In this presentation, our Unit 42 Threat Intelligence team will show you:

  • How credential theft and abuse were used in real world attacks.
  • Demonstration of tools attackers use to capture credentials.
  • How attackers buy and sell credentials on the dark web to further their criminal operations.
Watch Now >>
Friday, Aug 4th 5:00 PM SGT / 2:30 PM IST Phishing & Credential Abuse 201: Inside the AttackWatch Now >>

This 201 level course builds on the introductory material of Phishing & Credential Theft 101 and takes it deeper. After this course, you’ll understand better how phishers and credential theft attackers ply their trade and how attacks actually work. The course will go into detail on two selected, publicly known breaches which involved credential theft and abuse.

In this presentation, our Unit 42 Threat Intelligence team will show you:

  • How credential theft and abuse were used in real world attacks.
  • Demonstration of tools attackers use to capture credentials.
  • How attackers buy and sell credentials on the dark web to further their criminal operations.
Watch Now >>

We have great topics lined up for you, including how to prevent successful cyberattacks and achieve high performance across your network, endpoint, and cloud environments. Learn how to keep your users secure, wherever they are.

DATE TIME EVENT NAME
Monday, October 2nd, 2017 11am CEST Securing your digital transformation
Register Now >>

The journey to the Cloud is gaining momentum with businesses embracing digital transformation. A large part of making this a success relies on providing the best security available to businesses that are looking to transform. Learn how Microsoft is helping businesses adopt the benefits of the cloud and is working hand in glove with its key security partner Palo Alto Networks to provide the most comprehensive security solution available globally. Chandu Cheeti, Microsoft Cloud Strategy for SAP on Azure & Key Partnerships – EMEA

Register Now >>
Tuesday, October 3rd, 2017 9am CEST Cybersecurity in the Digital, Mobile & Cloud Era Register Now >>

A Comprehensive Enterprise Security Strategy and Approach are needed in the digital, mobile and cloud era. This Strategy and Approach nowadays needs to face the following challenges:

  • EMBRACE HETEROGENEITY: Identity that transcends every application access across multiple devices.
  • TRUST & ASSURANCE: Establish a new, rock solid security model from the data center to the device.
  • CONSUMER-GRADE EXPERIENCE: Ensure ANY app can reach ANY device to best empower employees – beyond basic, individual productivity apps.
During this session we will be covering how VMware can help in this IT transition providing an End to End Intrinsic Security Solution to minimize risk while also reducing the potential impact in case of suffering an infection and helping to provide a much quicker response.

Don´t try to secure virtualization, it is really more about using virtualization to secure! Ghaleb Zekri, Security Architect at VMware

Register Now >>
Wednesday, October 4th, 2017 4pm CEST Combining threat intelligence and detection to prevent email based attacks Register Now >>

Palo Alto Networks and Proofpoint: Combining threat intelligence and detection to prevent email based attacks and increase insight into user behaviour

Securing sensitive data has never been more challenging. Email remains the leading attack vector due to evolving techniques combined with sophisticated social engineering tricks. Security teams struggle to prevent attackers from breaching their companies; once the bad guys are through, they move across the network with stealth and impunity.

The API integration of Palo Alto Networks WildFire and Proofpoint TAP (Targeted Attack Protection) delivers a perfect balance of protection from attackers and malware entering the perimeter and how it travels across the network. A key aspect of the strategic partnership is how simple it is for a customer to enable the dual layers of protection. Join us for a discussion on how two best-of-breed security technologies have been united, resulting in comprehensive protection without the usual complexity.

Speaker: Tim Ricketts, Senior Sales Engineer at Proofpoint

Register Now >>
Thursday, October 5th, 2017 10am CEST Teaming Together to Prevent Attacks and Protect Your Data Register Now >>

Targeted attacks — including advanced persistent threats (APTs) — and today’s sophisticated malware threats are one of the biggest challenges facing customer’s as the threats multiply and create unique compromises within their networks. This creates challenges for traditional security technologies to reliably identify these new class of threats. Even when a threat is detected, there is still the issue of slow response times and extended periods of exposure, as administrators typically need to manually coordinate and configure the necessary changes to their security infrastructure. Please join Palo Alto Networks and Splunk as we work together to deliver an advanced visibility, reporting and monitoring solution for intelligent security analysis that addresses this challenge and delivers new tools to quickly identify and analyze this new class of threats. We will show you how this integration insures better threat response time, and how to automate the steps needed to block malicious sources and quarantine compromised devices you through how Palo Alto Networks and Splunk. Key Benefits:

  • Advanced security and visibility in the cloud, on premise, or hybrid model
  • Accelerated threat response and enhanced threat detection
  • Security visualization, monitoring and analysis
  • Demo to show you how to identify ransomware and correlate IOC data through the app and use adaptive response to take actions
Presenter: Wissam Ali-Ahmad Lead Solutions Architect, Technical Services for Global Strategic Alliances at Splunk. Register Now >>

Register Now >>
Friday, October 6th, 2017 9am CEST The end of the world as we know it? How to tackle security risks in IoT Register Now >>

The Internet of Things or IoT has been widely publicised by the media over recent years. The integration of IT, OT and IoT poses unique challenges to security leaders. Ranging from email spamming fridges to the end of the world as we know it. The reality is, we face a situation where some devices are becoming internet enabled just because they can. At the same time, we adopt internet devices with little thought of our data, because they offer accessing something in a way that makes it easier for us. So how will Dimension Data and Palo Alto networks deal with the "Internet of Threats"? Stefaan Hinderyckx, Director Europe - Security at Dimension Data

Register Now >>