Join Rick Howard, CSO at Palo Alto Networks to learn about must-read books for all cybersecurity practitioners – be they from industry, government or academia — where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional’s education that will make the practitioner incomplete.
In 2017, CBS Interactive’s Tech Pro Research surveyed ZDNet and TechRepublic readers in the United States to engage them about their current cloud security operations and future priorities. After gathering detailed insights into the concerns and plans of both C-level executives and endpoint, networking and DevOps professionals, CBS Interactive is proud to present “Protecting Your Clouds: Business and IT Considerations" with key industry analysts who can help you plan your IT strategy into the future.
The signs that the security market is ready for disruption are here. Join in discussion with Nir Zuk, Palo Alto Networks co-founder and CTO, on how the security market is evolving and maturing and ultimately, ready for disruption.
Zero Trust is revolutionizing network security architecture: it is data-centric and designed to stop data breaches. Zero Trust also adds a layer of agility to modern networks that is impossible to do in traditional network designs. These 21st century networks have been adopted by government entities and large enterprises around the world.
Creating a culture of cybersecurity is critical for all organizations. Join the conversation with our own security pros to learn how they keep employees ahead of phishing attacks, share best practices for phishing education and explain how to use innovative technologies to strengthen cyber resilience.
Today’s security deployments are quickly becoming unmanageable. Multiple user interfaces, too many security policies, and mountains of data from many different sources create the complexity of today’s cyber security environment. Combined with the global shortage of security personnel this situation calls for streamlined management solutions that empower network security administrators to do more with less.
Compliance and security are both top-of-mind issues for electric utilities. The NERC CIP standards mandate controls that protect against malware, provide device monitoring, and enable the detection and response to cyber incidents. This webinar will explore the application of one advanced solution to meet both compliance requirements and security objectives.
The ISA99/IEC 62443 portfolio of standards has emerged as a leading framework for cybersecurity in ICS and SCADA and was referenced in the recent Presidential Framework. Its concepts around segmentation and least-privilege access were developed specifically for SCADA/control system applications. They are simple yet extremely powerful in helping to reduce the risk of compromised uptime and safety due to malicious or unintentional cyber incidents. Hear from ISA99 Managing Director Joe Weiss, Palo Alto Networks SCADA Product Marketing Manager, Del Rodillas, and an Oil & Gas SCADA security practitioner to learn about:
- The essential concepts prescribed by IEC 62443 including zones, conduits, and least-privilege access
- Real world use cases and cyber incidents that highlight the importance of segmentation and role-based access controls
- How to realize the benefits of the IEC62443 framework using the advanced segmentation capabilities of the Palo Alto Networks Security Platform
Today’s security deployments overwhelm security organizations with vast amounts of data. Presenting this data in a meaningful way and making it actionable is crucial in preventing successful cyber attacks.
Whether a Fortune 500, local municipality, or the neighborhood pizza spot, cyber threats from a range of actors and criminals are becoming more of a risk to organizations of every size and purpose. Similarly, whether you are a board member or functional leader within the organization, you have a responsibility to understand the threats and plan for them. Everyone knows cybersecurity is a major risk…but do you know where the real risks to your organization lie? And how to find and react to them?