8233fc4e-afa9-4c7f-904b-f24185b18804.jfif

Threat Hunting with Unit 42

Zoom image.pngAn introduction of the threat landscape and how to be breech ready.

                                                                                         

SCHEDULE AT A GLANCE*

Time (in PST) 

9:30 a.m. – 9:35 a.m.

Welcome and Opening Remarks

9:35 a.m. – 10:20 a.m.

Session 1 | Threat Landscape

10:20 a.m. - 10:25 a.m.

Break

10:25 a.m. - 11:10 a.m.

Session 2 | Breach Readiness

11:10 a.m. - 11:15 a.m.

Break

11:15 a.m. - 12:00 p.m.

Session 3 | Data: The Next Frontier in Cybersecurity

12:05 p.m. - 12:10 p.m.

Break

12:10 p.m. - 12:55 p.m.

Session 4 | Cloud Security: Next-Gen Threat Mitigation in the Network

12:55 p.m. - 1:00 p.m. 

Closing Remarks

*Details subject to change


Session 1

Topic: Threat Landscape

Company: Palo Alto Networks 

Speaker: Spencer Smith, Security Architect - Unit 42

In this session, a member of Unit 42 will cover what they are seeing today, what might be coming in the threat landscape, and what Palo Alto Networks is doing to help customers with these ever-changing challenges

View Recording 


Session 2 

Topic: Breach Readiness

Company: Palo Alto Networks

Speaker: Steve Dyson, Senior Consultant - Unit 42

It is not a question of if, but when a breach is going to occur, in this session we will review common practices, guides, and tips to move from being reactive to a proactive, secure state.

View Recording


Session 3

Topic: Data: The Next Frontier in Cybersecurity 

Company: Rubrik

Speaker: Sterling Wilson, National Alliances Leader – Data Security, Public Sector

Ransomware is on the rise and cyberattacks are getting more sophisticated. Despite investments in infrastructure security tools, cybercriminals are still getting through to the data. And when they take the data down, they take down the entire organization—and hold it for ransom or exfiltration. As the importance of data grows, we need to trust our data is safe and resilient, no matter where it resides. It’s time for a new approach. 
 
Join this session to learn how the next frontier in cybersecurity pairs the investments in infrastructure security with data security giving organizations security from the point of data. Learn the importance of a Zero Trust approach and hear industry standards that will help you stay ahead of the inevitable attack.

View Recording


Session 4

Topic: Cloud Security: Next-Gen Threat Mitigation in the Network 

Company: Aviatrix

Speakers: Shahzad Ali, VP, Solutions Architecture, and Anas Shahid, Senior Technical Marketing Engineer

Cybercriminals are actively threatening networks and applications with malicious activity including ransomware, phishing, data exfiltration, crypto mining, and DDoS attacks. Cloud threats today are complex and have become completely out of the reach for siloed security solutions that use coarse, out-of-context, and non-real-time analysis. 

Aviatrix’s threat intelligence solution, ThreatIQ, provides 360-degree threat hunting by working with major next-generation firewall (NGFW) vendors like Palo Alto Networks. The joint solution allows enterprises to hunt and block the full spectrum of malicious activities applied in an attack. 

Join this webinar to learn how the network data plane provides an extremely powerful foundation not only to detect cybersecurity threats in realtime, but also to layer in intelligence for rapid remediation in conjunction with NGFW and other security controls. 

View Recording