Join Jen Miller-Osborn, Deputy Director for Unit 42 Threat Research in our briefing to learn:
- Key details and analysis about the vulnerability
- How to determine whether your organization is vulnerable
- Recommended mitigations, and more
Can't join us live on December 29th? Take advantage of our on demand briefing instead.
Join our Unit 42 strategic advisory security experts Tim Erridge, David Faraone, and LeeAnne Pelzer as they walk through critical next steps in communicating your organization’s response and mitigation plans to your C-Suite and Board, and help you to:
- Understand the impact of the Apache Log4j vulnerability through the eyes of threat actors
- Articulate the business impact and specific remediation plans to C-level executives and the Board
- Proactively prepare answers to the questions executives and Board members are likely to ask
When the Apache Log4j vulnerability became priority one, security and IT teams needed to know if their current set of products provided protection.
Join Rob Rachwald, Product Marketing Director, in this webinar to learn how Palo Alto Network’s broad portfolio of products and services protected customers from attacks with:
- Exploit blocking to give security teams time to patch the vulnerability
- Incident scoping to answer the question: What is my full inventory of affected assets?
- Incident response to make up for any gaps in skill or resources
Unit 42 threat researchers are closely tracking this vulnerability and are regularly updating this threat blog as new details emerge.
Please refer to this blog for the latest indicators, mitigations and guidance.