Palo Alto Networks
Date TBD
Threat Briefing: Protecting Against Russia-Ukraine Cyber Activity
Join Us
Text goes here
X
Link Text
Text goes here
X

John Smith

SVP of Public Cloud Security Products Palo Alto Networks

More
Text goes here
X

John Smith

SVP of Public Cloud Security Products Palo Alto Networks

Date & Time TBD

Title

RSVP
Text goes here
X
Date & Time TBD
RSVP
Text goes here
X


 

Date TBD

Title

RSVP
Text goes here
X
Palo Alto Networks
Register Now
Text goes here
X
Threat Briefing: Protecting Against Russia-Ukraine Cyber Activity
08
/
30
 – 
08
/
31
Register
Text goes here
X

SELECT AN UPCOMING DATE/ TIME TO REGISTER BELOW:

 

 

Over the past several weeks, the Russia Ukraine cyber activity has escalated substantially, including significant increases in cyber attacks. Beginning on Feb. 15, a series of distributed denial of service (DDoS) attacks commenced. These attacks have continued over the past week, impacting both the Ukrainian government and banking institutions. On Feb. 23, a new variant of wiper malware named HermeticWiper was discovered in Ukraine. Shortly after, a new round of website defacement attacks were also observed impacting Ukrainian government organizations. While these attacks are within Ukraine, our expectation is that similar attacks will be used against additional targets should the situation continue to escalate.

 

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has asked industry to put their “Shields Up” to prepare for a cyberattack that could disrupt, disable, or destroy U.S. critical infrastructure. CISA also recommends all organizations – regardless of size – adopt a heightened posture when it comes to cybersecurity and protecting their most critical assets.

 

Join Ryan Olson, VP of Unit 42 Threat Intelligence, and Jen Miller-Osborn, Deputy Director for Unit 42 Threat Intelligence to learn:

- Key details and analysis of attacks launched to date
- Assessment of how future attacks may unfold in the coming weeks
- Recommended mitigations
- What Palo Alto Networks products will do to protect your organization from these types of threats. 

 

Register
Text goes here
X

We look forward to seeing you in

The Final Countdown!
Time left for the event days hours minutes seconds
The countdown doesn't work if the event start date is set to TBD

We look forward to seeing you in

The Final Countdown!
Time left for the event days hours minutes seconds
The countdown doesn't work if the event start date is set to TBD

Featured Speaker

 

Jen Miller-Osborn

Deputy Director of Threat Intelligence for Unit 42 at Palo Alto Networks


Jen Miller-Osborn is the Deputy Director of Threat Intelligence for Unit 42 at Palo Alto Networks. Her focus is detecting, identifying and differentiating between cyber espionage and cyber crime actors and groups.


For more than 10 years, Jen has worked in cyber threat intelligence and served as a subject matter expert to multiple U.S. federal agencies. She has influenced national cyber security policies and regularly briefed at all levels of government. 


A veteran of the U.S. Air Force, Jen is fluent in Mandarin Chinese. She has several degrees and technical certifications, including a Master of Science degree in information technology from the University of Maryland.

Speakers

John Smith

SVP of Public Cloud Security Products Palo Alto Networks

More
Text goes here
X

John Smith

SVP of Public Cloud Security Products Palo Alto Networks

More
Text goes here
X

Mary Smith

SVP of Public Cloud Security Products Palo Alto Networks

More
Text goes here
X

John Smith

SVP of Public Cloud Security Products Palo Alto Networks

More
Text goes here
X

John Smith

SVP of Public Cloud Security Products Palo Alto Networks

Mary Smith

SVP of Public Cloud Security Products Palo Alto Networks

© 2022 Palo Alto Networks, Inc. All Rights Reserved.

Privacy
Text goes here
X
Contact Us
Text goes here
X
Terms of Use
Text goes here
X

Self-parking validation tickets available at event registration upon check-in

Registration is complimentary for all attendees. Justification Letter for Cloud Security Summit. Palo Alto Networks, Inc.'s internal policies strictly limit the types of amenities it can provide to federal, state and local government, and education customers. These policies are in place to ensure that all business sectors are undertaken with the utmost respect to the applicable laws and regulations surrounding the provision of amenities to those customers. By accepting any item of value in connection with this event, you are specifically representing that Palo Alto Networks' offering and your acceptance of it is in copmliance with your organizations' legal and ethical guidelines. This event is not open to K-12 or Library customers. Should you ahve any questions in regard to this event, please contact your Palo Alto Networks sales representative.

CONTACT THE ORGANIZER
Google   Outlook   iCal   Yahoo

RSVP

Add to my Calendar
  • Google  Outlook  iCal  Yahoo