Date

Displaying 1 to 30 of 48

Cybersecurity Summit – Surabaya

Home Agenda Lucky Draw The Future of Cybersecurity is Here Today’s digital landscape has seen tectonic shifts in recent years with innovations in technology. These innovations have improved our way of life and doing business, and have also provided more entry points for cybercriminals. Prevention is possible. Palo Alto Networks and its partners will be joined by leading regional and global experts at the Cybersecurity Summit – Security in the Digital Age. At this one-day summit, you will learn how to protect your organisation’s digital existence including: • How to secure your digital way of life from the network to the endpoint. • Understand the ways cybercriminals have evolved their methods of infiltrating organisations and how you can prevent attacks including the rise of Ransomware. • Industry trends in cybersecurity and key best practice. Agenda 08:00 - 09:00 Registration and Morning Coffee 09:00 - 09:05 Opening by Emcee 09:05 - 09:45 Welcome Address and Presentation: State of Nation Surung Sinamo, Country Director, Palo Alto Networks Indonesia 09:45 - 10:30 Industry Keynote Dr. Ir. Lukas, MAI, CISA, IPM, Honeynet Indonesia Chapter 10:30 - 10:45 Networking Break 10:45 - 11:30 Next-Generation Security Platform Yudi Arijanto, Lead Solutions Architect, Palo Alto Networks Indonesia 11:30 - 12:30 Lunch 12:30 - 13:00 Protect your Digital Asset Fajar Sutiawan, HPE Security Consultant ASEAN, ArcSight by HPE 13:00 - 13:30 Protecting Yourself from Antivirus Herman Widodo, Solutions Architect, Palo Alto Networks Indonesia 13:30 - 14:00 Secure by Design, Insight for your Business Continuity Plan Anthonius Hutabarat, Channel Development Manager, NetApp Indonesia 14:00 - 14:30 Migrating from Legacy Firewall Agustinus Tene, Solutions Architect, Palo Alto Networks Indonesia 14:30 - 15:00 Closing Note and Door Prize Lucky Draw Attendees can also win a Garmin Forerunner 25 in our lucky door prize. Proudly sponsored by NetApp. *Terms and Conditions apply.  

In Person Event
Kota Surabaya, Jawa Timur
  • 0
  • 207

Threat Prevention Ultimate Test Drive

Given the extensive impact to organizations around the globe of the recent WanaCrypt0r ransomware attacks and questions raised about future attacks, we will be expanding our monthly hands-on workshop to cover information about the threat and how you can help protect your organization from ransomware campaigns. So please join us for the Threat Prevention Ultimate Test Drive. In this free half-day technical workshop you will learn the value of preventing and detecting unknown malware, zero-day exploits, APTs and other advanced cyber attacks and tying them to specific users and devices so they can be stopped efficiently. We will show you how to: Establish policies to prevent known threats Enable sandbox threat analysis using WildFire to control unknown malware Configure decryption and URL filtering policies to manage high risk applications Apply DNS sinkhole techniques to detect and analyze malicious traffic  Enable policies to prevent unknown attacks & zero-day exploits on the endpoint with Traps Attendees will also be entered to win a free PA-220. Agenda:   9:00 AM Welcome   9:30 AM Hands-on Workshop 12:00 PM Lunch   1:00 PM Workshop Wrap-Up PLEASE NOTE: This workshop requires attendees to provide their own laptops with a RDP client installed.

In Person Event
Bellevue, WA
  • 0
  • 664

Threat Prevention Ultimate Test Drive

Given the extensive impact to organizations around the globe of the recent WanaCrypt0r ransomware attacks and questions raised about future attacks, we will be expanding our monthly hands-on workshop to cover information about the threat and how you can help protect your organization from ransomware campaigns. So please join us for the Threat Prevention Ultimate Test Drive. In this free half-day technical workshop you will learn the value of preventing and detecting unknown malware, zero-day exploits, APTs and other advanced cyber attacks and tying them to specific users and devices so they can be stopped efficiently. We will show you how to: Establish policies to prevent known threats Enable sandbox threat analysis using WildFire to control unknown malware Configure decryption and URL filtering policies to manage high risk applications Apply DNS sinkhole techniques to detect and analyze malicious traffic  Enable policies to prevent unknown attacks & zero-day exploits on the endpoint with TrapsAttendees will also be entered to win a free PA-220. Agenda:   9:00 AM Welcome   9:30 AM Hands-on Workshop 12:00 PM Lunch   1:00 PM Workshop Wrap-Up PLEASE NOTE: This workshop requires attendees to provide their own laptops with a RDP client installed.

In Person Event
Portland, OR
  • 0
  • 605

Eat & Learn: Credential Theft & Phishing - Canberra

Defending against cyberattacks is a tough business, especially when attackers pose as authenticated users on your network. We can help with that. Join our Eat & Learn series to discover: The typical lifecycle of credential-based attacks - with real-life cases How to prevent employee credentials from leaving your organisation How to prevent attackers from moving laterally and accessing your data with stolen credentials Join us to learn best practices and get your questions answered. *Breakfast will be served.

In Person Event
Canberra, Australian Capital Territory
  • 0
  • 1171

Phish-Proof Your People & Grab Some "Phish" Tacos

"Phish" tacos paired with cervezas and margaritas... it doesn't get much better than that.  Except when it's paired with an interactive discussion on how to stop credential-based theft and impostures.  Defending against cyberattacks is a tough business, especially when attackers pose as authenticated users on your network. Prevent Phishing and the Abuse of Stolen Credentials Join us to learn best practices and get your questions answered.  In addition to focusing on real-life examples from Unit 42, we will demonstrate what you can do today to stop credential theft and abuse.  In this interactive roundtable we will: Present new threat research from Unit 42 on credential-based attacks and phishing Identify trends and techniques in methods used for credential theft and abuse Present the unique attack lifecycle used in credential-based attacks Evaluate best practices in light of the modern risk profile Demonstrate techniques to stop credential leakage Demonstrate deploying multi-factor authentication at the network layer

In Person Event
Monterey, CA
  • 0
  • 592

Virtual Ultimate Test Drive Threat Prevention May 24th, 2017

JOIN US FOR THE THREAT PREVENTION ULTIMATE TEST DRIVE, WHERE YOU'LL GET HANDS-ON EXPERIENCE WITH PALO ALTO NETWORKS NEXT-GENERATION ENTERPRISE SECURITY PLATFORM. In this free half-day technical workshop you will learn the value of preventing and detecting unknown malware, zero-day exploits, APTs and other advanced cyber attacks and tying them to specific users and devices so they can be stopped efficiently. During this workshop you will: Establish policies to prevent known threats Enable sandbox threat analysis using WildFire to control unknown malware Configure decryption and URL filtering policies to manage high risk applications Enable policies to prevent unknown attacks & zero-day exploits on the endpoint with Traps

Online Event
  • 0
  • 293

NGFW: Next Generation Firewall Live Demo

The Palo Alto Networks demo is a quick and easy way to learn about next-generation firewalls.  Please join us for this live webinar with a Palo Alto Networks firewall consultant and see how Palo Alto Networks can help safely enable the applications traversing your network – and protect your business. If you or your colleagues would like to participate in this live product demonstration with Q&A, register today.

Online Event
  • 0
  • 1505

Optus Lunch and Learn - Sydney

Defending against cyberattacks is a tough business, especially when attackers pose as authenticated users on your network. We can help with that. Join our Lunch & Learn to discover: The typical lifecycle of credential-based attacks - with real-life cases How to prevent employee credentials from leaving your organisation How to prevent attackers from moving laterally and accessing your data with stolen credentials Join us to learn best practices and get your questions answered. *Lunch will be served.

In Person Event
Sydney, NSW
  • 0
  • 126

Eat & Learn: Credential Theft & Phishing - Perth

Defending against cyberattacks is a tough business, especially when attackers pose as authenticated users on your network. We can help with that. Join our Eat & Learn series to discover: The typical lifecycle of credential-based attacks - with real-life cases How to prevent employee credentials from leaving your organisation How to prevent attackers from moving laterally and accessing your data with stolen credentials Join us to learn best practices and get your questions answered. *Lunch will be served.

In Person Event
Perth
  • 0
  • 1162

Virtual Ultimate Test Drive MP May 25th, 2017

JOIN US FOR THE ULTIMATE VIRTUAL TEST DRIVE, WHERE YOU'LL GET HANDS-ON EXPERIENCE WITH MIGRATION PROCESS. In this free, two-hour virtual workshop, you will learn Migrating to a Palo Alto Networks next-generation firewall is a critical step toward the prevention and detection of cyberattacks. During this workshop you will learn: How to simplify and accelerate the migration process with the Migration Tool. Easily convert legacy port-based policies to application-based policies. Optimize your security environment by identifying and removing unused policies.

Online Event
  • 0
  • 182

Get Hands-on with the VM-Series on Microsoft Azure

Next-Generation Security on Microsoft Azure Microsoft’s legacy of delivering critical business capabilities to the Enterprise is unparalleled.  Microsoft has built on this legacy with Microsoft Azure to deliver the premier public cloud most trusted by Enterprise customers.  The depth and breadth of services available, global scale and ease of use of Microsoft Azure have become the foundation for customers looking to transform their business. However, cyber criminals have added public cloud workloads to their target list and they know how to look for weaknesses.  Don’t let them find one.   It’s with the focus on the Enterprise and the ever changing threat landscape that makes the Microsoft Azure + Palo Alto Networks partnership critical in providing Enterprise Cloud Security.   Join us at the Microsoft Office in Houston to learn how you can securely extend your corporate data center into Azure using our next-generation firewall and advanced threat prevention features. This is a hands-on seminar where we will: Discuss common Microsoft Azure deployment scenarios and how Palo Alto Networks secures these workloads Implement security policies to enable applications in your Azure Resource Group Protect your Azure deployment by proactively blocking a brute-force attack Pre-requisites: An existing Azure account PC with HTML 5 compatible browser Following the seminar, we will head over to happy hour at: McCormick & Schmick's 791 Town And Country Blvd Houston, TX 77024 We hope to see you on the 25th!       

In Person Event
Houston, TX
  • 0
  • 709

Virtual Ultimate Test Drive Advanced Endpoint Protection May 26th, 2017

JOIN US FOR THE ADVANCED ENDPOINT PROTECTION ULTIMATE TEST DRIVE, WHERE YOU'LL GET HANDS-ON EXPERIENCE WITH NEXT-GENERATION ENTERPRISE SECURITY PLATFORM. In this free half-day technical workshop you will learn how to defeat the adversary at the endpoint. During this workshop you will: Effortless approach to managing attacks Break down the sophisticated threat lifecycle Prevent successful execution of advanced attacks originating from executables, data files or network-based exploits Take on the roles of the targeted individual,attacker and security professional Understand the chain-like nature of exploits Experience the power of advanced execution control and cloud intelligence

Online Event
  • 0
  • 271

NGFW: Next Generation Firewall Live Demo

The Palo Alto Networks demo is a quick and easy way to learn about next-generation firewalls.  Please join us for this live webinar with a Palo Alto Networks firewall consultant and see how Palo Alto Networks can help safely enable the applications traversing your network – and protect your business. If you or your colleagues would like to participate in this live product demonstration with Q&A, register today.

Online Event
  • 0
  • 1422

Optus Lunch and Learn - Melbourne

Defending against cyberattacks is a tough business, especially when attackers pose as authenticated users on your network. We can help with that. Join our Lunch & Learn to discover: The typical lifecycle of credential-based attacks - with real-life cases How to prevent employee credentials from leaving your organisation How to prevent attackers from moving laterally and accessing your data with stolen credentials Join us to learn best practices and get your questions answered. *Lunch will be served.

In Person Event
Melbourne, VIC
  • 0
  • 125

Die Zwei um Zwölf: Public Cloud? - Aber sicher! VM-Series für AWS und Azure

Public Cloud ist ein brandheisses Thema in allen Bereichen! Nicht mehr die Frage: „Gehe ich in die Public Cloud?”, sondern „Wann und Wie?“ steht im Raum. Sehen Sie, wie der Erfinder der Next Generation Firewall Sie sicher in das Public Cloud Zeitalter führt und dort Ihre Daten und Applikationen absichert, wie Sie es von Ihrem lokalen Rechenzentrum her kennen. Unter anderem werden wir in diesem Webcast die folgenden Themen beleuchten: · Security in der Public Cloud · Use-Cases mit Projektbeispielen · VM-Series in AWS und Azure · Live-Demo Wir möchten Sie herzlich zur Juni-Ausgabe von „Die Zwei um Zwölf“ einladen. Das kostenlose Live-Webinar findet am 02. Juni 2017 um 12 Uhr, moderiert von Thorsten Kolb und Dirk Thelen von Palo Alto Networks, statt und wird ca. 60 Minuten dauern. Die Plätze sind limitiert, daher melden Sie sich noch heute an!      

Online Event
  • 0
  • 129

AGC CXO Roundtable

Please join us for this C-level, invitation only lunch with Sean Duca (Vice President and Regional Chief Security Officer, Asia Pacific, Palo Alto Networks) and Cheng Lim (Partner & Head of Global Security Team, King & Wood Mallesons) who will help you understand the newly legislated Privacy Amendment (Notifiable Data Breaches) Bill and the impact this will have on your company, particularly at Executive and Board level. The presentations will cover: What your company needs to know to avoid breaches of the new Act (which means avoiding fines of up to 1.8 million) What your company should consider implementing now to safeguard and educate staff to avoid breaches Discover what constitutes "serious harm" and how this may vary between customers and businesses Gain advice on how to create a company policy to define what a breach looks like, who's responsible for managing and containing the breach and alerting customers Ask questions of our experts during the Q&A session following the presentations Each attendee will also receive a book: Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers (Australian Edition), for which Sean and Cheng were contributors. Please RSVP by Friday, May 12.

In Person Event
Melbourne, VIC
  • 0
  • 232

NGFW: Next Generation Firewall Live Demo

The Palo Alto Networks demo is a quick and easy way to learn about next-generation firewalls.  Please join us for this live webinar with a Palo Alto Networks firewall consultant and see how Palo Alto Networks can help safely enable the applications traversing your network – and protect your business. If you or your colleagues would like to participate in this live product demonstration with Q&A, register today.

Online Event
  • 0
  • 1165

Preventing Credential-based Attacks in Financial Services

Defending against cyberattacks is a tough business, especially when attackers pose as authenticated users on your network. Ask Our Financial Services Experts How You Can Prevent Phishing and the Abuse of Stolen Credentials Join us for an Ask the Expert luncheon with our cybersecurity team to learn best practices and get your questions answered.  In addition to focusing on real-life examples from Unit 42, we will demonstrate what you can do today to stop credential theft and abuse in the highly targeted financial services industry.  In this session we will: Present new threat research from Unit 42 on credential-based attacks and phishing Identify trends and techniques in methods used for credential theft and abuse Present the unique attack lifecycle used in credential-based attacks Evaluate best practices in light of the modern risk profile Discuss techniques to stop credential leakage Interactive Roundtable Moderated by: SSA John Caruthers, FBI San Diego SSA Caruthers has been with the FBI since 1992 and is currently serving as Supervisory Special Agent of the San Diego Division's National Security Cyber Squad. Bryan Lee, Unit 42 Threat Intelligence Researcher at Palo Alto Networks Bryan's areas of expertise are in cyber espionage threats, cyber security operations, and threat collection.  Prior to joining Palo Alto Networks, Bryan worked at the NASA Security Operations Center where he led the real-time detection team. The Unit 42 team gathers, researches, analyzes, and provides insights into the latest cyber threats, then shares them with Palo Alto Networks customers, partners and the broader community to better protect computing environments.

In Person Event
Tustin, CA
  • 0
  • 497

Cybersecurity Summit – Ho Chi Minh City

Home Agenda Speakers Lucky Draw Get answers to your toughest cybersecurity challenges Everyday life is becoming more dependent on digital technologies, which makes cybersecurity more important than ever to ensure citizens, businesses and governments don’t lose trust in the digital age. The upcoming Palo Alto Networks® Cybersecurity Summit in Ho Chi Minh City, Vietnam, is the place to get answers to your cybersecurity questions and find out how you can better protect your organisation. Don’t miss out on what could be a crucial opportunity for you to make sure your business is fully protected. Agenda 08:00 – 09:00 Registration 09:00 – 09:05 Opening by Emcee 09:05 – 09:15 Welcome Address Kelvin Chin, Regional Head, Vietnam, Indonesia & Philippines, Palo Alto Networks 09:15 – 10:00 The Coming Disruption in Security KP Unnikrishnan, Regional Marketing Director, APAC & Japan, Palo Alto Networks 10:00 – 10:30 Industry Speaker Robert Trong Tran, Director of Cyber Security, PricewaterHouse Coopers 10:30 – 10:40 Networking Break 10:40 – 11:10 Industry Speaker Nguyen Huu Nguyen, South Branch Director, VNCert 11:10 – 11:40 The Future of Cloud, Network and Cybersecurity Starts Here Vincent Oh, Regional System Engineering Director, ASEAN, Palo Alto Networks 11:40 – 12:25 Panel: Customer Success Story 12:25 – 12:55 Actionable Threat Intelligence Adrian Culley, Consulting Engineer Palo Alto Networks APAC 12:55 – 13:30 Lunch and Move to Sessions 30 min / track TRACK 1 TRACK 2 13:30 – 14:00 Sponsor Session Arista A Disruptive Endpoint Protection Ecosystems Paul Wilcox, Director of Sales, APAC, Palo Alto Networks 14:00 – 14:30 Secure the Cloud Philip Cao, Solutions Architect, Vietnam, Palo Alto Networks Sponsor Session Aruba 14:30 – 15:00 Sponsor Session Forescout Preventing Ransom Crime Anna Chockalingam, Consulting Engineering Manager, APAC, Palo Alto Networks 15:00 – 15:30 Fighting Back With Actionable Threat Intelligence Marc Lainez, Solutions Architect, Philippines, Palo Alto Networks Sponsor Session VMware 15:30 – 15:45 Networking Break 15:45 – 16:15 Sponsor Session Sponsor Session 16:15 – 16:45 Security in SDN Andy Dao, Solutions Architect, Vietnam, Palo Alto Networks Defining a Modern Approach to Mobile Security with GlobalProtect Yudi Arijanto, Solutions Architect, Indonesia, Palo Alto Networks 16:45 – 17:15 Closing Note * Agenda subject to change Speakers Kelvin Chin Regional Head for Vietnam, Indonesia and Philippines Palo Alto Networks Married with two children, Kelvin Chin joins us as Regional Head for Vietnam, Indonesia and Philippines for Palo Alto Networks. He has previously worked for companies such as Dimension Data Asia Pacific, IBM, DaimlerChrysler Asia Pacific and Aurelius AG (Getronics) where he has held roles such as Chief Sales Officer, Regional Business Lead, Head of Consulting, CTO and Global Social Media Influencer. He has over 20 years of experience in sales and marketing, general P/L business management, consulting and solutions within start-up incubation business units. He is serving as Entrepreneur Mentor in Residence at a Fintech Accelerator Startup bootcamp and served as board member of Media Development Authority for the Singapore – Board of Films Consultative Panel from 2014 to 2016. In his spare time, Kelvin loves meditation and trekking and has scaled some interesting peaks in Asia. Kelvin has done his studies with Nanyang Business School for Accelerated Executive General Management, BSC IT with University of Central England and Computing from Staffordshire University. He is also a Certified Fitness Instructor from the Singapore Sports Council and American College of Sports Medicine with technical credentials in Google AdWords, AWS, BS7799, CITPM, Microsoft, Cisco, CISSP, ITIL, Citrix, Check Point, Lotus. KP Unnikrishnan Regional Marketing Director, APAC and Japan Palo Alto Networks KP Unnikrishnan (Unni) is part of the Palo Alto Networks regional leadership team, responsible for the company’s growth strategy, building brand and visibility, driving opportunities and growth in new and existing markets, and growing demand for Palo Alto Networks Next-Generation Security Platform in the Asia-Pacific region. Unni has worked in high technology for over 20 years including management roles in marketing, strategy, partnership and sales. Previously Unni was the APAC Marketing Director of Brocade Communications, responsible for executing the Brocade strategy across the region with a key focus of growing the IP business in the region. Before joining Brocade, Unni spent 10 years in Sun Microsystems in marketing, tele-web, sales and partnering leadership roles. In his last stint at Sun as Corporate Director and part of the executive leadership team, he was responsible for executing the Sun marketing strategy across the Emerging Markets Region (Latin America, Central Europe, Middle East Africa, Greater China and India) to achieve the marketing and business objectives of the organization. Prior to joining Sun, Unni headed the marketing operations for Parametric Technology Corp. He did a stint at PTC corporate headquarters in the U.S. and was part of some key global initiatives. Unni is in the APAC Advisory Board of the CMO Council and Chairman of Cloud Computing Chapter, Singapore Info-comm Technology Federation (SiTF). He holds an engineering and a MBA degree with leadership courses from Stanford Graduate Business school and Singapore Management University. Robert Trong Tran Director, Cyber Security Assurance PricewaterhouseCoopers Robert is leading the new Cyber Security Services at PricewaterhouseCoopers Vietnam, and he has over 16 years of experience in this domain. He started his career at Solsoft (now Infoblox), where he had the opportunity to work with many world-class cybersecurity experts, like Nessus and Qualys founders. Prior to PricewaterhouseCoopers Vietnam, he worked as a Cyber Security Senior Consultant at GE Capital, Safran Morpho, Cap Gemini and other multinational companies in Paris, France and in London, UK. He holds a master degree at Telecom Paristech School – France and several professional certifications including CISSP, GCIH, GNFA, CISM, CRISC, CISA, and 27001 IRCA Auditor. Vincent Oh Regional Systems Engineering Director, ASEAN Palo Alto Networks Vincent Oh is responsible for cybersecurity solutions and systems engineering for Palo Alto Network business in ASEAN. With close to 30 years of work experience in various Advanced Information Technology areas such as big data mining, business intelligence, enterprise content management, knowledge management, artificial intelligence and information security, Vincent is a frequent speaker at regional seminars and international conferences, and has authored and co-authored many technical papers, articles and books. He has worked with many CxOs to address cybersecurity issues and their corresponding solutions to help reduce their risk exposure in a constantly changing cyberthreat landscape. Vincent holds a Bachelor of Engineering degree from the Nanyang Technological University and a Master of Science in Intelligent Systems from Brunel University, UK. Adrian Culley Consulting Engineer Palo Alto Networks Adrian Culley is a Consulting Engineer with Palo Alto Networks, specializing in Threat Prevention, Malware and Advanced Peristent Threat actors. He is a graduate of the Information Security Group at Royal Holloway, University of London, and an occasionally visiting lecturer there. Adrian was previously a Detective with Scotland Yard, working around the world with their Special Operations Directorate, and latterly served with the Computer Crime Unit there. He has also worked directly for UK Central Government in a global role. He has subsequently been Regional Manager Europe for Guidance Software, Head of UK Regional Forensic Technology for PricewaterhouseCoopers, and Head of UK Digital Forensic for Tenon Group. He was Global Technical lead with AccessData, then global technical lead with Damballa, specialising in Advanced Threats. Adrian continues to work with government, NGO, military, intelligence, law enforcement, and commercial clients around the world. A sought after industry commentator, he has been interviewed regarding his professional work by CNN, BBC Television, BBC Radio 4 Today program, the Financial Times, Telegraph and Economist amongst others. Nguyen Huu Nguyen Head of Ho Chi Minh Branch for the southern region Vietnam Computer Emergency Response Team (VNCERT) Focus • Building and enhancing CSIRT (Computer Security Incident Response Team) at Vietnam Education • Master of Engineering in Electronics and Telecommunications from Vietnam Posts and Telecommunications Technology Institute, HaNoi, 2000-2003 • Professional CEO certificate, Institute of Leadership & Management (ILM) – UK and PACE Group Education, 2008 • Enhancing Information Security for ASEAN member states: ISMS and ICS Security, HIDA - Japan, Jan. 2016 • Security Incidents Handling course, HoChiMinh, 2016 • Offensive Security Web Expert course, HoChiMinh, 2016 • CISSP course, Hanoi, 2016 Experience • 2014-current: Manager of Ho Chi Minh Branch of VNCERT • 2010-2014: Director of KNK Co. Ltd. • 2010: Managing Director of NamTruongSon Distribution Company • 2009: Deputy General Director of Sunway Mario Plastic Join-Venture Company • 1994-2008: working at LamDong Posts and Telecommunications (P&T) with positions as IT engineer, assistant to the Board of Directors, Director of the IT Center, Head of Marketing & Sales Department, Director of BaoLoc P&T • 1990-1993: Faculty of physics at Dalat University • Project between Nippon CSIRT Association - JPCERT/CC - NTT CERT - Vietnam CERT: Building and Operating CSIRT for Vietnam private/enterprise sectors, Tokyo-Japan and Vietnam, June-December 2016 Lucky Draw Attendees can also win a GoPro Hero 5 or an Apple TV in our lucky draw. Proudly Sponsored by Cybersecurity Summit Sponsors *Terms and Conditions apply.  

In Person Event
Ho Chi Minh City
  • 0
  • 127

Preventing Credential-based Attacks in Healthcare

Defending against cyberattacks is a tough business, especially when attackers pose as authenticated users on your network. Ask Our Healthcare Experts How You Can Prevent Phishing and the Abuse of Stolen Credentials Join us for an Ask the Expert dinner with our cybersecurity team to learn best practices and get your questions answered.  In addition to focusing on real-life examples from Unit 42, we will demonstrate what you can do today to stop credential theft and abuse in the highly targeted healthcare industry.  In this session we will: Present new threat research from Unit 42 on credential-based attacks and phishing Identify trends and techniques in methods used for credential theft and abuse Present the unique attack lifecycle used in credential-based attacks Evaluate best practices in light of the modern risk profile Discuss techniques to stop credential leakage Interactive Roundtable Moderated by: SSA John Caruthers, FBI San Diego SSA Caruthers has been with the FBI since 1992 and is currently serving as Supervisory Special Agent of the San Diego Division's National Security Cyber Squad. Bryan Lee, Unit 42 Threat Intelligence Researcher at Palo Alto Networks Bryan's areas of expertise are in cyber espionage threats, cyber security operations, and threat collection.  Prior to joining Palo Alto Networks, Bryan worked at the NASA Security Operations Center where he led the real-time detection team. The Unit 42 team gathers, researches, analyzes, and provides insights into the latest cyber threats, then shares them with Palo Alto Networks customers, partners and the broader community to better protect computing environments.

In Person Event
Tustin, CA
  • 0
  • 503

PALO ALTO NETWORKS NEXTWAVE PARTNER’S SESSION

Break Away as a Cybersecurity Innovator in FY18 We firmly believe no single organisation holds the key to stopping breaches. Technology is changing more quickly than ever, and our customers need to be able to take advantage of these advancements securely. We must foster an ecosystem of next-generation security innovators. This is why our partnership with you is so important. On Thursday, 8 June, global cybersecurity experts will be in the Philippines for the Cybersecurity Summit. You are invited to connect with them and further enrich your skills: Maximise profitability – embrace new Palo Alto Networks® offerings, such as: - Traps™ advanced endpoint protection - Aperture™ SaaS security service - AutoFocus™ contextual threat intelligence service Optimise revenue mix – deliver more professional services, including risk assessments and security platform designs Drive larger deals – integrate complementary applications, services and products from our NextWave Technology Partners Broaden opportunities – offer alternative purchase options, such as managed and cloud services   You will also have an opportunity to connect with us and your colleagues. Learn what it takes to be a next-generation security innovator and make prevention possible. Let’s break away together in fiscal year 2018.

In Person Event
Hồ Chí Minh
  • 0
  • 36

Preventing Credential-based Attacks in Healthcare

Defending against cyberattacks is a tough business, especially when attackers pose as authenticated users on your network. Ask Our Healthcare Experts How You Can Prevent Phishing and the Abuse of Stolen Credentials Join us for an Ask the Expert luncheon with our cybersecurity team to learn best practices and get your questions answered.  In addition to focusing on real-life examples from Unit 42, we will demonstrate what you can do today to stop credential theft and abuse in the highly targeted healthcare industry.  In this session we will: Present new threat research from Unit 42 on credential-based attacks and phishing Identify trends and techniques in methods used for credential theft and abuse Present the unique attack lifecycle used in credential-based attacks Evaluate best practices in light of the modern risk profile Discuss techniques to stop credential leakage Interactive Roundtable Moderated by: SSA John Caruthers, FBI San Diego SSA Caruthers has been with the FBI since 1992 and is currently serving as Supervisory Special Agent of the San Diego Division's National Security Cyber Squad. Bryan Lee, Unit 42 Threat Intelligence Researcher at Palo Alto Networks Bryan's areas of expertise are in cyber espionage threats, cyber security operations, and threat collection.  Prior to joining Palo Alto Networks, Bryan worked at the NASA Security Operations Center where he led the real-time detection team. The Unit 42 team gathers, researches, analyzes, and provides insights into the latest cyber threats, then shares them with Palo Alto Networks customers, partners and the broader community to better protect computing environments.

In Person Event
San Diego, CA
  • 0
  • 393

Preventing Credential-Based Attacks

Defending against cyberattacks is a tough business, especially when attackers pose as authenticated users on your network. Prevent Phishing and the Abuse of Stolen Credentials Join us to learn best practices and get your questions answered.  In addition to focusing on real-life examples from Unit 42, we will demonstrate what you can do today to stop credential theft and abuse.  In this interactive roundtable luncheon we will: Present new threat research from Unit 42 on credential-based attacks and phishing Identify trends and techniques in methods used for credential theft and abuse Review the unique attack lifecycle used in credential-based attacks Evaluate best practices in light of the modern risk profile Discuss techniques to stop credential leakage Insightful Discussion Moderated by Palo Alto Networks: Bryan Lee, Unit 42 Threat Intelligence Researcher Brian Tokuyoshi, Product Marketing About Unit 42, Palo Alto Networks Threat Intelligence Team: The Unit 42 team gathers, researches, analyzes, and provides insights into the latest cyber threats, then shares them with Palo Alto Networks customers, partners and the broader community to better protect computing environments.

In Person Event
San Jose, CA
  • 0
  • 498

Preventing Credential-based Attacks in Financial Services

Defending against cyberattacks is a tough business, especially when attackers pose as authenticated users on your network. Ask Our Cybersecurity Experts How You Can Prevent Phishing and the Abuse of Stolen Credentials Join us for an Ask the Expert dinner with our cybersecurity team to learn best practices and get your questions answered.  In addition to focusing on real-life examples from Unit 42, we will demonstrate what you can do today to stop credential theft and abuse in the highly targeted financial services industry.  In this session we will: Present new threat research from Unit 42 on credential-based attacks and phishing Identify trends and techniques in methods used for credential theft and abuse Present the unique attack lifecycle used in credential-based attacks Evaluate best practices in light of the modern risk profile Discuss techniques to stop credential leakage Interactive Roundtable Moderated by: SSA John Caruthers, FBI San Diego SSA Caruthers has been with the FBI since 1992 and is currently serving as Supervisory Special Agent of the San Diego Division's National Security Cyber Squad. Bryan Lee, Unit 42 Threat Intelligence Researcher at Palo Alto Networks Bryan's areas of expertise are in cyber espionage threats, cyber security operations, and threat collection.  Prior to joining Palo Alto Networks, Bryan worked at the NASA Security Operations Center where he led the real-time detection team. The Unit 42 team gathers, researches, analyzes, and provides insights into the latest cyber threats, then shares them with Palo Alto Networks customers, partners and the broader community to better protect computing environments.

In Person Event
San Diego, CA
  • 0
  • 299

Live-Demo: Sichere Aktivierung von SaaS-Anwendung mit Aperture

Die Nutzung von SaaS-Anwendungen steigt weiterhin exponentiell an. Da es sich bei diesen Anwendungen um nützliche Werkzeuge für viele Mitarbeiter handelt, möchte man an sich auch nicht dagegen vorgehen. Jedoch setzen Sie Ihr Unternehmen mit den SaaS-Anwendungen großen Risiken in Hinblick auf Sicherheitsbelange und Datendiebstahl aus, da Daten und Nutzung dieser Anwendungen für IT-Administratoren unsichtbar sind. Jedoch setzen Sie Ihr Unternehmen mit den SaaS-Anwendungen großen Risiken in Hinblick auf Sicherheitsbelange und Datendiebstahl aus, da Daten und Nutzung dieser Anwendungen für IT-Administratoren unsichtbar sind. Nehmen Sie an unserem Live-Webinar teil, bei dem Sie mehr über den sicheren Einsatz von SaaS-Anwendungen in Ihrem Unternehmen und die folgenden Themen erfahren: • Das Erlangen von Transparenz und einer granularen, kontextbasierten Steuerung in Hinblick auf SaaS-Anwendungen • Den Schutz von Unternehmensdaten vor schädlichen und unbeabsichtigten Gefährdungen jenseits des herkömmlichen Unternehmensumfangs • Den Schutz vor neuen Angriffsstellen und Verteilungspunkten für Malware Die Herausforderungen, die SaaS-Anwendungen mit sich bringen, sind bereits ein reales Problem, egal ob diese Anwendungen von der IT-Abteilung oder den Anwendern selbst eingeführt werden. Erfahren Sie, wie Sie die Kontrolle zurückerlangen und einen sicheren Einsatz gewährleisten können.

Online Event
  • 0
  • 220

Live Demo: Safely Enable SaaS Applications with Aperture

The adoption of SaaS applications continues to grow at an exponential pace. You do not want to clamp down on these applications because they are valuable tools for many of your employees. However, because the data and usage of these SaaS applications is invisible to IT administrators, they do expose your organization to potentially disastrous security and data theft risks. Join us for a live webinar where you will learn how your organization can enable safe usage of SaaS applications and: • Gain visibility and granular, context-based control of SaaS applications. • Protect corporate data from malicious and inadvertent exposure after it has left the traditional corporate perimeter. • Protect against new insertion and distribution points for malware. • Satisfy compliance requirements while still maintaining the benefits of SaaS based application services. The challenges of SaaS applications are already here whether they are enabled by IT or end users themselves. Find out how to take back control and safely enable their use.

Online Event
  • 0
  • 695

NGFW: Next Generation Firewall Live Demo

The Palo Alto Networks demo is a quick and easy way to learn about next-generation firewalls.  Please join us for this live webinar with a Palo Alto Networks firewall consultant and see how Palo Alto Networks can help safely enable the applications traversing your network – and protect your business. If you or your colleagues would like to participate in this live product demonstration with Q&A, register today.

Online Event
  • 0
  • 533

Virtual Ultimate Test Drive - Next Generation Firewall - Jun 19th, 2017

JOIN US FOR THE ULTIMATE VIRTUAL TEST DRIVE, WHERE YOU'LL GET HANDS-ON EXPERIENCE WITH PALO ALTO NETWORKS NEXT-GENERATION FIREWALL. In this free, two-hour virtual workshop, you will configure security policies that will ultimately restore visibility and control over the applications, users and content traversing your network. During this workshop you will: Establish policies to enable applications based on users and groups Learn how to enable application features while restricting others Configure a policy that decrypts, inspects and allows SSL traffic Safely enable mobile devices using GlobalProtect

Online Event
  • 0
  • 144

Virtual Ultimate Test Drive - Threat Prevention - Jun 20th, 2017

JOIN US FOR THE THREAT PREVENTION ULTIMATE TEST DRIVE, WHERE YOU'LL GET HANDS-ON EXPERIENCE WITH PALO ALTO NETWORKS NEXT-GENERATION ENTERPRISE SECURITY PLATFORM. In this free half-day technical workshop you will learn the value of preventing and detecting unknown malware, zero-day exploits, APTs and other advanced cyber attacks and tying them to specific users and devices so they can be stopped efficiently. During this workshop you will: Establish policies to prevent known threats Enable sandbox threat analysis using WildFire to control unknown malware Configure decryption and URL filtering policies to manage high risk applications Enable policies to prevent unknown attacks & zero-day exploits on the endpoint with Traps

Online Event
  • 0
  • 136

Get Hands-on with the VM-Series on Microsoft Azure

Next-Generation Security on Microsoft Azure Microsoft’s legacy of delivering critical business capabilities to the Enterprise is unparalleled. Microsoft has built on this legacy with Microsoft Azure to deliver the premier public cloud most trusted by Enterprise customers. The depth and breadth of services available, global scale and ease of use of Microsoft Azure have become the foundation for customers looking to transform their business. However, cyber criminals have added public cloud workloads to their target list and they know how to look for weaknesses. Don’t let them find one. It’s with the focus on the Enterprise and the ever changing threat landscape that makes the Microsoft Azure + Palo Alto Networks partnership critical in providing Enterprise Cloud Security. Join us to learn how you can securely extend your corporate data center into Azure using our next-generation firewall and advanced threat prevention features. This is a hands-on seminar where we will: Discuss common Microsoft Azure deployment scenarios and how Palo Alto Networks secures these workloads Implement security policies to enable applications in your Azure Resource Group Protect your Azure deployment by proactively blocking a brute-force attack Pre-requisites: An existing Azure account PC with HTML 5 compatible browser

In Person Event
Mountain View, CA
  • 0
  • 224
Displaying 1 to 30 of 48