Experience Automated Threat Intel Playbooks
May 
3rd
2:00pm
 
CEST
RSVPs Closed
Text goes here
X
Link Text
Text goes here
X
Palo Alto Networks
Register now
Text goes here
X
About
Experience Automated Threat Intel Playbooks
Thursday
, 
July
 
14th
2:00PM
–
4:00PM
 
CEST
08
/
30
 – 
08
/
31
RSVPs Closed
Text goes here
X

Experience Automated Threat Intel Playbooks

Threat intelligence is at the core of every security operation. It applies to every security use case. Unfortunately, security teams are too overtaxed – with thousands of alerts and millions of indicators coming at them daily – to truly take advantage of their threat intel feeds.


Automation can play a key role in collecting, aggregating, scoring, correlating and distributing threat intel. It requires additional context, standardized processes, collaboration and automation to extract real value, and security teams need a solution that gives them the confidence to do their jobs effectively and make a real impact in securing their enterprise environments.


Join our hands-on virtual Cortex® XSOAR Threat Intel Management workshop to learn how you can use automated threat intel playbooks to get the job done faster. We’ll take a deeper look at common use cases, such as:


- Threat indicator feed ingestion from external and internal sources
- Threat data management
- Indicator lifecycle management
- Automated threat intel playbooks in action
- Security case management

- Sharing of processed IOCs with external entities


Our Cortex XSOAR experts will provide initial overviews and demos, followed by hands-on exercises and a virtual lunch wrap-up. We hope you can join!

Thank You

[confirmation_headline]
[confirmation_messaging]
Add to Calendar
Text goes here
X

Threat intelligence is at the core of every security operation. It applies to every security use case. Unfortunately, security teams are too overtaxed – with thousands of alerts and millions of indicators coming at them daily – to truly take advantage of their threat intel feeds.


Automation can play a key role in collecting, aggregating, scoring, correlating and distributing threat intel. It requires additional context, standardized processes, collaboration and automation to extract real value, and security teams need a solution that gives them the confidence to do their jobs effectively and make a real impact in securing their enterprise environments.


Join our hands-on virtual Cortex® XSOAR Threat Intel Management workshop to learn how you can use automated threat intel playbooks to get the job done faster. We’ll take a deeper look at common use cases, such as:


- Threat indicator feed ingestion from external and internal sources
- Threat data management
- Indicator lifecycle management
- Automated threat intel playbooks in action
- Security case management

- Sharing of processed IOCs with external entities


Our Cortex XSOAR experts will provide initial overviews and demos, followed by hands-on exercises and a virtual lunch wrap-up. We hope you can join!

PSE Associate Platform Prep and Online Testing

We look forward to seeing you in

The Final Countdown!
Time left for the event days hours minutes seconds
The countdown doesn't work if the event start date is set to TBD

PSE Associate Platform Prep and Online Testing

Copyright © 2023 Palo Alto Networks. All rights reserved

Privacy
Text goes here
X
Contact Us
Text goes here
X
Terms of Use
Text goes here
X
Link Text
Text goes here
X

© 2020 Palo Alto Networks, Inc. All Rights Reserved.

Privacy
Text goes here
X
Contact Us
Text goes here
X
Terms of Use
Text goes here
X

Self-parking validation tickets available at event registration upon check-in

Registration is complimentary for all attendees. Justification Letter for Cloud Security Summit. Palo Alto Networks, Inc.'s internal policies strictly limit the types of amenities it can provide to federal, state and local government, and education customers. These policies are in place to ensure that all business sectors are undertaken with the utmost respect to the applicable laws and regulations surrounding the provision of amenities to those customers. By accepting any item of value in connection with this event, you are specifically representing that Palo Alto Networks' offering and your acceptance of it is in copmliance with your organizations' legal and ethical guidelines. This event is not open to K-12 or Library customers. Should you ahve any questions in regard to this event, please contact your Palo Alto Networks sales representative.

CONTACT THE ORGANIZER
Google   Outlook   iCal   Yahoo
Sorry, RSVPs have closed.