Attackers employ a variety of threats with the goal of deliberately infiltrating, disrupting, exposing, damaging or stealing from their intended targets. These cyberattacks come in many forms, understanding the various types of cyberthreats and how to properly defend against them is imperative for enabling secure and successful business growth.
Following the success of our inaugural Practitioner MicroSummit in December we will be hosting our second event in January. Join us for an afternoon of technical insights where we will look at how the network, endpoint and cloud all provide the necessary information to effectively identify, protect, detect and respond to these threats and Unit 42 - our class-leading Threat Intelligence and consultancy services arm - will bring these data-points into line with the essential processes needed to effectively recover from an attack. Post Summit, join the team for an informal evening reception whilst admiring the best views of London on the 55th floor of our flagship London office at 22 Bishopsgate.
Due to the interactive nature of the Threat Management Elective Workshops spaces are limited.
Any questions about the content of the Summit or logistics please reach out to rejones@paloaltonetworks.com
Speaker: Chris George - Senior Director, Unit 42
A deep dive into the ever-evolving world of cybersecurity threat management, tailored to provide IT and security professionals with the knowledge and tools necessary to combat cyber threats effectively. Explore incident response cases, threat vectors, and pragmatic solutions to bolster your cybersecurity defences. Discover how to recognize signs of cyber threats and potential vulnerabilities and gain insights into good practices and tools to protect your organisation against cyber threats.
Elective 1:
So You’ve Blocked A Threat on the Network, is That it?
Speaker: Matt Smith - Consulting Engineer - Security Services
You've successfully blocked a threat, now what?
In this session we will explore how to take security operations to the next level. By joining this hands-on workshop, tailored for cybersecurity practitioners and engineers, you will see direct examples of how deep learning is revolutionising Threat Management and how underutilised functionalities such as HTTP Log Forwarding and tagging are still relevant and potent weapons in the Threat Management practitioner's back-pocket.
Elective 2:
Windows Management Instrumentation (WMI) Event Consumers: A Powerful Ally in Uncovering Hidden Threats
Speaker: Kyle Van Schalkwyk - Sr. Systems Engineer Specialist
We will explore the world of Windows Management Instrumentation (WMI) Event Consumers, a stealthy choice for attackers seeking system persistence. Learn what WMI is, how event consumers work and get insights into how these map to threat hunting methods to successfully identify, detect and protect against threats that use WMI hidden persistence.
Elective 3:
Not my Cloud, but 100% my Problem! Managing Threats on Someone Else’s Infrastructure
Speaker: Steve Alsop - Solutions Architect
This elective session will discuss how to best use all available security controls to manage threats in public cloud against the backdrop of a typical attack on a hosted web application.
Elective 4:
The Press are Asking for Comment…What Now?
Speakers: Chris George - Senior Director - Unit 42 & John Higginson - Consulting Director
In this elective session, delegates will participate in an interactive discussion based game to walk through and discuss some of the key things of consideration during a serious cyber attack alongside ‘from-the-field’ insights into the pros and cons of the various options available. Based on decades of combined experience, the Unit 42 team will share their views on the things that work and the things that don’t when responding to the type of event we all hope will never happen.
Elective 1:
So You’ve Blocked A Threat on the Network, is That it?
Speaker: Matt Smith - Consulting Engineer - Security Services
You've successfully blocked a threat, now what?
In this session we will explore how to take security operations to the next level. By joining this hands-on workshop, tailored for cybersecurity practitioners and engineers, you will see direct examples of how deep learning is revolutionising Threat Management and how underutilised functionalities such as HTTP Log Forwarding and tagging are still relevant and potent weapons in the Threat Management practitioner's back-pocket.
Elective 2:
Windows Management Instrumentation (WMI) Event Consumers: A Powerful Ally in Uncovering Hidden Threats
Speaker: Kyle Van Schalkwyk - Sr. Systems Engineer Specialist
We will explore the world of Windows Management Instrumentation (WMI) Event Consumers, a stealthy choice for attackers seeking system persistence. Learn what WMI is, how event consumers work and get insights into how these map to threat hunting methods to successfully identify, detect and protect against threats that use WMI hidden persistence.
Elective 3:
Not my Cloud, but 100% my Problem! Managing Threats on Someone Else’s Infrastructure
Speaker: Steve Alsop - Solutions Architect
This elective session will discuss how to best use all available security controls to manage threats in public cloud against the backdrop of a typical attack on a hosted web application.
Elective 4:
The Press are Asking for Comment…What Now?
Speakers: Chris George - Senior Director - Unit 42 & John Higginson - Consulting Director
In this elective session, delegates will participate in an interactive discussion based game to walk through and discuss some of the key things of consideration during a serious cyber attack alongside ‘from-the-field’ insights into the pros and cons of the various options available. Based on decades of combined experience, the Unit 42 team will share their views on the things that work and the things that don’t when responding to the type of event we all hope will never happen.