Organisations are under pressure to stay agile and innovate while keeping an eye on the bottom line. Digital and network transformation provide opportunities, but they may also have an impact on your security posture.
Invest a couple of hours and come away with the answers to your cybersecurity questions in this unique virtual event. Whether you’re securing your enterprise, cloud or the future, our topics will show you how to securely leverage the opportunities that digital transformation provides.
The registration site has been closed. Please go to the Virtual Event platform for more information. https://paloaltonetworks.eventxtra.com/landing
With the spread of the coronavirus worldwide, interest is high in related topics. As the pandemic grew across the globe, Cyber criminals have capitalised on this growing interest and urgency to profit and further their own goals. This session will cover some of the primary campaigns which Unit 42 has been tracking in the past couple of months and also share efforts taken by Palo Alto Networks to defend against these campaigns.
Zero Trust is quickly becoming the dominant security model for business and governments worldwide. A Zero Trust strategy provides the simplest and most secure opportunity to safeguard important assets and data from cyberattacks and exfiltration. Join John Kindervag, Palo Alto Networks Field CTO and Zero Trust Creator, for a discussion on how Zero Trust provides a strategic framework for protecting sensitive data and assets. John will explain what Zero Trust is and how it is easily implementable using a simple 5 Step model. He will be available to answer question after the presentation.
In this session, we will introduce the latest capabilities to protect hybrid cloud environments, including processing speed enhancements and new firewall scalability features.
We will also unveil the latest in container network security and threat prevention to help network security teams quickly and easily extend next-gen security to their container environments.
We’ll cover game-changing innovations that prevent patient zero across files, credential phishing and malicious scripts.
Our product leaders will also reveal exciting new capabilities across WildFire® malware prevention, DNS Security and Threat Prevention, proving you can have “best of breed” integrated into a platform.
The road to a secure hybrid cloud is a complicated one. Stitching together a security posture across different infrastructures, workload types and public clouds, while enabling IT to deliver the automation and scalability needed to support business innovation, is no small feat.
Palo Alto Networks can make it easier. In this session, we will talk about four key things to keep in mind when building your hybrid cloud security posture and talk about how to best secure the growing number of cloud native applications that many network security teams are tasked with protecting.
SecOps teams must continually improve the speed and accuracy of their investigations to keep up with increasingly advanced attackers. Join this discussion, and learn how to successfully stop cyberattacks through analysis of rich data and alerts. Discover how you can dramatically improve the efficiency and effectiveness of your security operations through better detection, investigation, and threat hunting of stealthy attacks.
In this session, we are sharing a journey of modernizing your applications while easily managing the complexity of business requirements in terms of agile, security, and performance across regions. Alibaba Cloud platform gives you a uniform platform anywhere you need it across hybrid-cloud deployments.
Nowadays, AI and machine learning have become accessible to all businesses – not limited to just the major tech giants and hardcore academic researchers. Cloud Computing has removed so many of the barriers to experimenting and innovating with AI that more and more businesses are making it part of their strategies. In this session, you will learn about the AWS machine learning stack, latest AI services and real-life use cases sharing.
As more enterprises shifts their business applications to the cloud, so as the attackers. They will be going after the misconfigurations in the cloud and the concerns related to security have skyrocketed. In this session, you will know how to transform your security operations with the widely-adopted industry framework, best practices and cutting edge technologies in pursuit of upholding the security posture and improved effectiveness of incident handling across public clouds.