[](https://www.paloaltonetworks.com/unit42?ts=markdown) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![unit42 logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/unit42-logo-dark.svg)](https://www.paloaltonetworks.com/unit42?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/unit42?ts=markdown) * [About Unit 42](https://www.paloaltonetworks.com/unit42/about?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Assess and Test Your Security Controls](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/business-email-compromise?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Respond in Record Time](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Unit 42 Threat Research ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Unit 42 Threat Research [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Threat Briefs and Assessments Details on the latest cyber threats](https://unit42.paloaltonetworks.com/category/threat-research/) * [Tools Lists of public tools released by our team](https://unit42.paloaltonetworks.com/tools/) * [Threat Reports Downloadable, in-depth research reports](https://www.paloaltonetworks.com/resources?q=*%3A*&_charset_=UTF-8&fq=PRODUCTS0_DFACET%3Apan%253Aresource-center%252Fproducts0%252Funit42-managed-detection-and-response&fq=RC_TYPE_DFACET%3Apan%253Aresource-center%252Frc-type%252Fresearch&ts=markdown) [THREAT REPORT 2026 Unit 42 Global Incident Response Report Read now](https://www.paloaltonetworks.com/resources/research/unit-42-incident-response-report?ts=markdown) [THREAT BRIEF Russia-Ukraine Cyberattacks: How to Protect Against Related Cyberthreats Including DDoS, HermeticWiper, Gamaredon, Website Defacement Learn more](https://unit42.paloaltonetworks.com/preparing-for-cyber-impact-russia-ukraine-crisis/) [THREAT REPORT Highlights from the Unit 42 Cloud Threat Report, Volume 6 Learn more](https://www.paloaltonetworks.com/resources/research/unit-42-cloud-threat-report-volume-6?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners Partners * [Threat Intelligence Sharing](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) * [Law Firms and Insurance Providers](https://www.paloaltonetworks.com/unit42/incident-response-partners?ts=markdown) [THREAT REPORT 2026 Unit 42 Global Incident Response Report Read now](https://www.paloaltonetworks.com/resources/research/unit-42-incident-response-report?ts=markdown) [THREAT BRIEF Russia-Ukraine Cyberattacks: How to Protect Against Related Cyberthreats Including DDoS, HermeticWiper, Gamaredon, Website Defacement Learn more](https://unit42.paloaltonetworks.com/preparing-for-cyber-impact-russia-ukraine-crisis/) [THREAT BRIEF Operation Falcon II: Unit 42 Helps Interpol Identify Nigerian Business Email Compromise Ring Members Learn more](https://unit42.paloaltonetworks.com/operation-falcon-ii-silverterrier-nigerian-bec/) * Resources ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Resources Resources * [Research Reports](https://www.paloaltonetworks.com/resources?q=*%3A*&_charset_=UTF-8&fq=PRODUCTS0_DFACET%3Apan%253Aresource-center%252Fproducts0%252Funit42-managed-detection-and-response&fq=RC_TYPE_DFACET%3Apan%253Aresource-center%252Frc-type%252Fresearch&ts=markdown) * [Webinars](https://www.paloaltonetworks.com/resources?q=*%3A*&_charset_=UTF-8&fq=PRODUCTS0_DFACET%3Apan%253Aresource-center%252Fproducts0%252Funit42-managed-detection-and-response&fq=RC_TYPE_DFACET%3Apan%253Aresource-center%252Frc-type%252Fwebinar&ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/unit42/customer-stories?ts=markdown) * [Datasheets](https://www.paloaltonetworks.com/resources?q=*%3A*&_charset_=UTF-8&fq=PRODUCTS0_DFACET%3Apan%253Aresource-center%252Fproducts0%252Funit42-managed-detection-and-response&fq=RC_TYPE_DFACET%3Apan%253Aresource-center%252Frc-type%252Fdatasheet&ts=markdown) * [Videos](https://www.paloaltonetworks.com/resources?q=*%3A*&_charset_=UTF-8&fq=PRODUCTS0_DFACET%3Apan%253Aresource-center%252Fproducts0%252Funit42-managed-detection-and-response&fq=RC_TYPE_DFACET%3Apan%253Aresource-center%252Frc-type%252Fvideo&ts=markdown) * [Infographics](https://www.paloaltonetworks.com/resources?q=*%3A*&_charset_=UTF-8&fq=PRODUCTS0_DFACET%3Apan%253Aresource-center%252Fproducts0%252Funit42-managed-detection-and-response&fq=RC_TYPE_DFACET%3Apan%253Aresource-center%252Frc-type%252Finfographic&ts=markdown) * [Whitepapers](https://www.paloaltonetworks.com/resources?q=*%3A*&_charset_=UTF-8&fq=PRODUCTS0_DFACET%3Apan%253Aresource-center%252Fproducts0%252Funit42-managed-detection-and-response&fq=RC_TYPE_DFACET%3Apan%253Aresource-center%252Frc-type%252Fwhitepaper&ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/resources?q=*%3A*&_charset_=UTF-8&fq=PRODUCTS0_DFACET%3Apan%253Aresource-center%252Fproducts0%252Funit42-managed-detection-and-response&fq=RC_TYPE_DFACET%3Apan%253Aresource-center%252Frc-type%252Farticle&ts=markdown) Industries * [Financial Services](https://www.paloaltonetworks.com/industry/unit42-financial-services?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/unit42-healthcare?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/unit42-manufacturing?ts=markdown) [THREAT REPORT 2026 Unit 42 Global Incident Response Report Read now](https://www.paloaltonetworks.com/resources/research/unit-42-incident-response-report?ts=markdown) [ANALYST REPORT Unit 42^®^ named a Leader in the 2025 IDC MarketScape for Worldwide IR Services. See our difference](http://start.paloaltonetworks.com/idc-incident-response-marketscape-2025) * * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![palo alto networks logo icon](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-default.svg) ![white arrow icon pointing left to return to main Palo Alto Networks site](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-white.svg) [](https://www.paloaltonetworks.com/unit42?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search#q=unit%2042&sort=relevancy&layout=card&numberOfResults=25) Close search modal # Unit 42 Cyber Vigilance Program ## Securing the World's Largest Events with Unit 42 When the world is watching, there is no margin for downtime. From massive sporting events like the Olympics and FIFA World Cup to global political summits like the G20 Summit, attackers see big-name events as big-time opportunities. Whether politically, financially, or criminally motivated, they're out to cause disruption. Defending against them is paramount. Such a contest is not one of tools or sophistication, but of preparation. Read our latest threat Report ### Defending the 2026 Milano Cortina Winter Games Staying vigilant on the world's largest stage. [Read more on latest threat Report](https://www.paloaltonetworks.com/resources/research/unit-42-cyber-vigilance-program/2026-winter-games-milano-cortina?ts=markdown) ### Be Victorious on the World's Biggest Stage Through the Unit 42 Cyber Vigilance program, Palo Alto Networks partners with CISOs and their teams to prepare for and secure large-scale events against modern threats. Explore the framework below for the potential risks and tips defenders can take to position themselves for success. Anticipate + Prepare Pre-Event ![vigilance-section-3-icon-1](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/unit-42-cyber-vigilance-program/vigilance-section-3-icon-1.svg) Capabilities Assessment Will your existing tech stack and playbooks provide the visibility needed to detect an attack? ![vigilance-section-3-icon-2](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/unit-42-cyber-vigilance-program/vigilance-section-3-icon-2.svg) Threat Profiling Who is most likely to disrupt the event and are your defenses positioned to stop them? ![vigilance-section-3-icon-3](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/unit-42-cyber-vigilance-program/vigilance-section-3-icon-3.svg) Attack Surface Assessment Are there exposures in your attack surface a threat actor might expose? ![vigilance-section-3-icon-4](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/unit-42-cyber-vigilance-program/vigilance-section-3-icon-4.svg) Ransomware Readiness Are you prepared to respond to a ransomware attack? ![vigilance-section-3-icon-5](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/unit-42-cyber-vigilance-program/vigilance-section-3-icon-5.svg) Crisis \& Response Training Does everyone in your organization know their roles and responsibilities in a cyber emergency? Monitor + Respond During, Post-Event ![vigilance-section-3-icon-6](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/unit-42-cyber-vigilance-program/vigilance-section-3-icon-6.svg) Threat Monitoring As the event goes live, we'll monitor the Dark Web for any mention of participating organizations. ![vigilance-section-3-icon-7](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/unit-42-cyber-vigilance-program/vigilance-section-3-icon-7.svg) Incident Response on Standby Our incident response experts will be on standby with a 2-hour SLA, should an incident occur. ![vigilance-section-3-icon-8](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/unit-42-cyber-vigilance-program/vigilance-section-3-icon-8.svg) Lessons Learned Workshop After the event, we'll conduct a lessons learned workshop to capture wins and areas for improvement. ### Why Attackers Target Global Events A Target Rich Environment The sheer volume of people, systems, money and data surrounding large scale events creates a target-rich environment for attackers. High-Value Marks Nation-state actors will take advantage of close access to VIPs, mounting sophisticated attacks to surveil them and their staff. Critical Infrastructure The integration of utilities, transportation, stadium functions and more creates complexity and gaps that attackers can exploit. Geopolitical Tensions Given a divisive political climate, groups or individual actors may attempt to hijack or deface digital infrastructure to amplify their stance. Visibility With millions to billions of viewers worldwide, disruption could bring visibility and credibility to the threat actor's cause or organization. ### Unit 42: Preparing You for the World's Largest Events High-profile global events like the FIFA World Cup 2026 create a target-rich environment for financially motivated criminals, hacktivists, and nation-state actors seeking to disrupt critical infrastructure, commit fraud, or conduct espionage against complex, temporary digital ecosystems. To address these intensified risks, the Unit 42 Cyber Vigilance Program leverages deep experience securing major sporting events, including the Qatar 2022 World Cup and Paris 2024 Olympics, to equip organizations with executive-level crisis simulation workshops, bespoke threat intelligence briefings, and proactive technical assessments. Delivered through tiered "Event Readiness" services, the program strengthens operational resilience by combining pre-event preparation services like dark web monitoring and playbook development with rapid, 24/7 incident response support featuring a 2-hour response SLA. For large-scale events, the stakes are high and success is the only option. Through our Cyber Vigilance Program, with its realistic simulations, tailored feedback, and hands-on support, you'll arrive at your event ready to defend at your peak. World-renowned threat research We work alongside organizations and governments of all types and sizes, all over the globe. No one is more in touch with the threat landscape --- who's making moves, how they operate, and what tactics they employ to achieve their ends. Understand the latest TTPs and IOCs Every attacker leaves a trail. However, as tactics change, so do the indicators you need to check for. Whether it's a zero-day vulnerability, widespread supply chain attack, or a novel new malware, we specialize in keeping defenders ahead of the curve. Assessments and consulting Leverage our team in meeting your goals, whether you're looking to secure your cloud environment, advance your zero-trust strategy, assess the risk in your attack surface, and prepare your security team with incident simulations or other assessments that will pressure test your security posture. ### See Defense in Action [Green Bay Packers](https://www.youtube.com/watch?v=kzQHZPjqxPA&t=1s) ![section-6-thumbnail-1](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/unit-42-cyber-vigilance-program/section-6-thumbnail-1.webp) Green Bay Packers Protecting a high-visibility environment with a lean team, the Packers increased data ingestion by 490% while reducing alert noise by 95%. [This 250% efficiency gain](https://www.paloaltonetworks.com/customers/securing-the-green-bay-packers-through-an-ai-driven-platform-approach?ts=markdown) provided the confidence needed to secure a complex attack surface. [Oneida Nation](https://www.youtube.com/watch?v=GmbVl7H3L60&t=1s) ![section-6-thumbnail-1](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/unit-42-cyber-vigilance-program/section-6-thumbnail-2.webp) Oneida Nation Securing 17,000+ members across government services, healthcare, hospitality and gaming, Oneida reduced MTTR to just 43 seconds after implementing Unit 42 MDR and Cortex XSIAM. They now ingest [7x more data at 20% lower cost](https://www.paloaltonetworks.com/customers/safeguarding-tradition-in-the-digital-age-oneida-nation-security-transformation?ts=markdown), enabling rapid, accurate response across a highly complex environment. {#contact} ![jeffries-logo](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/unit42-contained-exp/overview/panw-sml-logo-white.svg) ### Go from reactive to proactive Our consultants serve as your trusted advisors to assess and test your security controls, transform your security strategy with an intelligence-informed approach, and respond to incidents in record time. First Name \* Last Name \* Email \* Company \* Job Level \*Job Level Job Function/Focus Area \*Job Function/Focus Area Phone \* Country \*Country Department \* StateState ProvinceProvince Zip Code \* Sign me up to receive news, product updates, sales outreach, event information and special offers about Palo Alto Networks and its partners. By submitting this form, I understand my personal data will be processed in accordance with [Palo Alto Networks Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) and [Terms of Use.](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. Contact us #### THANK YOU! A Palo Alto Networks specialist will reach out to you shortly. We look forward to connecting with you! © 2025 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo Alto Networks, Inc. A list of our trademarks in the United States and other jurisdictions can be found at www.paloaltonetworks.com/company/trademarks. All other marks mentioned herein may be trademarks of their respective companies.