Palo Alto Networks
Date TBD

Log4j Threat Update

Join Us
Text goes here
X
Link Text
Text goes here
X

John Smith

SVP of Public Cloud Security Products Palo Alto Networks

More
Text goes here
X

John Smith

SVP of Public Cloud Security Products Palo Alto Networks

Mrs Robinson
Description
Date TBD
RSVP
Text goes here
X
Palo Alto Networks
Register Now
Text goes here
X

Log4j Threat Update

08
/
30
 – 
08
/
31
Register
Text goes here
X

Upcoming briefings, webinars and helpful resources 

Unit 42 Live Briefing and Threat Update

Join Jen Miller-Osborn, Deputy Director for Unit 42 Threat Research in our briefing to learn:


- Key details and analysis about the vulnerability
- How to determine whether your organization is vulnerable
- Recommended mitigations, and more

Can't join us live on December 29th?  Take advantage of our on demand briefing instead.   

Wednesday, DEC 29 at 8:00am


Pacific Standard Time (US & CAN)


RSVP
Text goes here
X

Top Questions Your C-Suite and Board Will Ask About Log4j

Join our Unit 42 strategic advisory security experts Tim Erridge, David Faraone, and LeeAnne Pelzer as they walk through critical next steps in communicating your organization’s response and mitigation plans to your C-Suite and Board, and help you to:


- Understand the impact of the Apache Log4j vulnerability through the eyes of threat actors
- Articulate the business impact and specific remediation plans to C-level executives and the Board
- Proactively prepare answers to the questions executives and Board members are likely to ask

Tuesday, JAN 11 at 10:00am


Pacific Standard Time (US & CAN)


RSVP
Text goes here
X

How Palo Alto Networks Protects Customers From the Apache Log4j Vulnerability

When the Apache Log4j vulnerability became priority one, security and IT teams needed to know if their current set of products provided protection.
Join Rob Rachwald, Product Marketing Director, in this webinar to learn how Palo Alto Network’s broad portfolio of products and services protected customers from attacks with:

- Exploit blocking to give security teams time to patch the vulnerability
- Incident scoping to answer the question: What is my full inventory of affected assets?
- Incident response to make up for any gaps in skill or resources

 Thursday, JAN 13 at 08:00am


Pacific Standard Time (US & CAN)


RSVP
Text goes here
X

Unit 42 threat researchers are closely tracking this vulnerability and are regularly updating this threat blog as new details emerge.
Please refer to this blog for the latest indicators, mitigations and guidance.

Apache Log4j Threat Update: Upcoming briefings, webinars and helpful resources

Featured Speaker

 

Jen Miller-Osborn

Deputy Director of Threat Intelligence for Unit 42 at Palo Alto Networks


Jen Miller-Osborn is the Deputy Director of Threat Intelligence for Unit 42 at Palo Alto Networks. Her focus is detecting, identifying and differentiating between cyber espionage and cyber crime actors and groups.


For more than 10 years, Jen has worked in cyber threat intelligence and served as a subject matter expert to multiple U.S. federal agencies. She has influenced national cyber security policies and regularly briefed at all levels of government. 


A veteran of the U.S. Air Force, Jen is fluent in Mandarin Chinese. She has several degrees and technical certifications, including a Master of Science degree in information technology from the University of Maryland.

Speakers

John Smith

SVP of Public Cloud Security Products Palo Alto Networks

More
Text goes here
X

John Smith

SVP of Public Cloud Security Products Palo Alto Networks

More
Text goes here
X

Mary Smith

SVP of Public Cloud Security Products Palo Alto Networks

More
Text goes here
X

John Smith

SVP of Public Cloud Security Products Palo Alto Networks

More
Text goes here
X

John Smith

SVP of Public Cloud Security Products Palo Alto Networks

Mary Smith

SVP of Public Cloud Security Products Palo Alto Networks

© 2021 Palo Alto Networks, Inc. All Rights Reserved.

Privacy
Text goes here
X
Contact Us
Text goes here
X
Terms of Use
Text goes here
X

Self-parking validation tickets available at event registration upon check-in

Registration is complimentary for all attendees. Justification Letter for Cloud Security Summit. Palo Alto Networks, Inc.'s internal policies strictly limit the types of amenities it can provide to federal, state and local government, and education customers. These policies are in place to ensure that all business sectors are undertaken with the utmost respect to the applicable laws and regulations surrounding the provision of amenities to those customers. By accepting any item of value in connection with this event, you are specifically representing that Palo Alto Networks' offering and your acceptance of it is in copmliance with your organizations' legal and ethical guidelines. This event is not open to K-12 or Library customers. Should you ahve any questions in regard to this event, please contact your Palo Alto Networks sales representative.

CONTACT THE ORGANIZER
Google   Outlook   iCal   Yahoo

RSVP

Add to my Calendar
  • Google  Outlook  iCal  Yahoo