A. The new ACC offers a fully-redesigned layout that enhances the visualization of threats and improves response time, thanks to a highly interactive and customizable dashboard that provides easily understood, actionable threat information with simple drill down capabilities, trending information, device group segmentation and correlation events.
Securing our digital future against cyberthreats has never been more critical. Collectively, we have a huge opportunity to do it right. At Palo Alto Networks, our mission is to make sure each day is safer than the one before. But we can’t do that on our own. We’re committed to partnering with the world’s cybersecurity leaders, practitioners and strategists to transform cybersecurity.
Achieving cyber transformation requires organizations to respond to major trends and challenges including:
+ Securing hybrid workforces consistently and at scale
+ Protecting cloud-native applications
+ Enabling Zero Trust
+ Running AI-driven security operations with an automation-first approach
+ Defending modern networks and IOT devices
Session Description:
In a world where each new technology innovation "gifts" bad actors a fresh attack landscape, it's natural to wonder if everyone should just stock up on cyber insurance. But Lee Klarich believes that cybersecurity is becoming a solvable problem (and that you should, too). Lee will provide a fresh perspective on how new technology advances have changed what's possible, and a framework that organizations can adopt to embrace what's next.
Session Description:
Natively integrated AI is rapidly emerging as a key differentiator for leading SASE solutions. During this session, Palo Alto Networks SVP Kumar Ramachandran will discuss how organizations can consolidate fragmented security and networking architectures while leveraging cutting-edge AI and ML techniques and unified management to enable better security outcomes and improve user experience.
Session Description:
Our path to an open source, GitOps heaven has exposed new security challenges as our CI solutions are exposed to the outside world. The soft underbelly of our pipeline is as visible to willing contributors as it is to malicious subversives. In this talk, we'll look at examples of known exploits to GitHub Actions workflows showing how simple bad practices can open our supply chain to attackers.
Wendi Whitmore, SVP, Unit 42, Palo Alto Networks
Katie Nickels, Certified Instructor & Director of Intelligence, SANS Institute & Red Canary
Lesley Carhart, Principal Industrial & Incident Responder, Dragos, Inc.
Lily Hay Newman, Senior Writer, WIRED Magazine (Moderator)
Session Description:
Incident responders and threat intelligence analysts will pit their skills directly against threat actors for control of networks. In this session, three leading figures in the incident response and threat intelligence industry share their experiences from responding to incidents in the last 12 months.
Session Description:
This panel will focus on an approach to identifying and prioritizing systemic cyber risk using a critical-functions framework. Panelists will offer their view on what steps government and industry should take to address that risk and how policymakers can balance regulatory burdens while assuring confidence in the functioning of critical systems and minimizing the potential of systemic failure.
Session Description:
From supporting Ukraine in its defense against Russia’s use of cyber operations in the war in Ukraine to helping ensure governments do not use digital surveillance to silence dissent, cyber diplomacy is playing a growing role in advancing security, defending democratic institutions, and protecting digital freedom.
Join us for a conversation with cyber envoys from the Netherlands and the United States, as well as representatives from the private sector, to explore how international collaboration can help set and enforce limits on state behavior in cyberspace and how it can contribute to effective Internet governance.
Omer Gil, Sr. Manager, Research, Palo Alto Networks
Asi Greenholts, Sr. Staff Researcher, Palo Alto Networks
Session Description:
Many organizations opt for a CI/CD architecture that combines SaaS-based source control management systems with a self-managed CI solution not exposed to the public Internet. In this talk presenters will discuss a novel attack vector, allowing anyone on the Internet to abuse repository webhooks to do much more than trigger pipelines, and show how they accessed hundreds of internal CI systems in scale.
Palo Alto Networks is taking over Hotel Zetta in San Francisco during the week of RSA Conference 2023!
Come party the night away with us Wednesday, April 26, 6:00-9:00 PDT to network with the Palo Alto Networks team, industry leaders and your peers. Don't miss the party music courtesy of the in-house DJ, our showcase of hand selected wines and custom cocktails, curated bites and raffle drawing of some cool prizes.
Please feel free to contact globalevents@paloaltonetworks.com