Stay "In-The-Know" with Fuel Webinars
Fuel webinars are an interactive, educational series of online technical sessions featuring industry experts from among our members, Palo Alto Networks®, our partners and other cybersecurity experts. We'll share the latest partner updates, threat prevention tips, industry news, and more. See what's coming up or check out our archive.
Cybersecurity Round Table: I've been breached, what now?
Tuesday, February 27
10:00am - 11:00am Central/11:00am - 12:00pm Eastern
Speakers: Chris Bihary, CEO/Co-Founder - Garland Technology, Michael McCartney, President - Avalon Cyber, Kyle Cavalieri, Chief Information Officer - Avalon Cyber and Brahn Olson, Director of Cyber Security Services - Avalon
Cyber threats are quickly becoming more sophisticated with Advanced Persistent Threats (APTs) creating a new level of security risk. If you experience a breach, it is critical that you have 100% network visibility to quickly find and fill the gap in your network, and identify what data may have been compromised.
Join the cyber security round table of Chris Bihary, CEO/Co-Founder of Garland Technology, a Fuel Founding Partner; Michael McCartney, President of Avalon Cyber; Kyle Cavalieri, Chief Information Officer of Avalon Cyber; and Brahn Olson, Director of Cyber Security Services of Avalon Cyber as they answer your questions and discuss next generation threat intelligence, network visibility and what to do if you’ve been breached.
In this webinar you will learn:
- Network Connectivity Best Practice
- Network Breach/Incident Response
- Complying with ever-changing government regulations
- Cyber security monitoring - collecting security log data from widely used security appliances (e.g., firewalls, antivirus, endpoint detection and response solutions), normalize log data and identify alerts that are of high risk
- Creating your foundation of visibility
Reducing Risk and Increasing Agility through Policy-based Automation with Palo Alto Next-Generation Firewall
Speaker: Karen Crowley, Tufin
Join our industry experts for this engaging discussion on the key ways automation provides better protection from emerging threats, ensures continuous compliance, reduces errors, and takes advantages of the built-in capabilities of Palo Alto Networks Next-Generation Firewalls.
How to Perform Incident Response with Palo Alto Networks
Malware is insidious, hazardous, and today, it’s everywhere. While cybersecurity professionals are all aware of the dangers of malware, it can be tough to truly grasp the difference that seconds can make in an attack unless you see what it looks like in real life. Join Fuel User Group and IntelliGO for an important webinar showcasing 5 real-life examples of malware discovered by Palo Alto Networks tools. We’ll cover how the attack happened, what was uncovered, and what the incident response process was. Find out how well-prepared you are for a cyberattack, and what to do if you’re breached.
Protect Your Organization with Threat Lifecycle Management
Speaker: Jack Reynolds, LogRhythm
Today’s reality is that organizations will continue to be confronted by increasingly frequent and complex cyberthreats. Protecting your organization now mandates effective Threat Lifecycle Management (TLM) to address threats across the threat landscape.
The TLM framework begins with the ability to guard, monitor and search across your IT environment, and ends with the ability to quickly mitigate and recover from security incidents. The result? Faster time to detect and time to respond, with the resources already at hand.
In this webinar, Jake Reynolds, LogRhythm Technology Alliances Engineer, will highlight how LogRhythm’s Threat Lifecycle Management Platform combines with Palo Alto Networks’ Next-Generation Security Platform to empower organizations with exceptional visibility and context to quickly discover and neutralize concerning incidents.
In this session, we will cover:
- How LogRhythm and Palo Alto Networks integrate for end-to-end threat lifecycle management
- The growing role SIEMs have with security Data Lakes
- Palo Alto Networks' upcoming Application Framework
See Threats In Real Time with 100% Visibility
Speaker: Chris Bihary, CEO/Co-Founder - Garland Technology & David Gold, Vice President of Product Management - Protectwise™
Network security becomes increasingly complex with each passing day, making it critical that busy security teams have full visibility and threat detection capabilities. These resource-constrained teams already support a wide range of security appliances like firewalls, intrusion detection systems, and forensics to help guard enterprises from a growing threat landscape. However, that also means they're managing multiple interfaces and more security data than any one person - or team - can use effectively.
Win the War with Zero Trust
Today’s networks aren’t set up to withstand modern cyberwarfare. As enterprises embrace cloud-based delivery and software-defined data centers, you need to stay one step ahead and assume a trust no-one approach. A ‘Zero Trust’ approach to security - know your data, where it is, and which users or devices are supposed to have access to it - becomes fundamental. The technological innovations of today, next-generation firewalls, virtual network infrastructure, and orchestration, make the evolution to Zero Trust easier than ever.
Machine Learning - What You Need to Know
Speaker: Giora Engel, Palo Alto Networks
There are many applications and uses for the expanding capabilities of machine learning, none more valuable and impactful than those in the field of cybersecurity. You’ve probably already read or heard something about using machine learning to combat emerging threats, but how does this work, and what does it mean for you in your role on the front line of your organization’s defenses. Join Giora Engel, VP Product Management at Palo Alto Networks and Founder of LightCyber, as we get beyond the marketing buzz and define what machine learning really is, the kinds of resources that are required to power this kind of approach, and how machine learning helps cybersecurity professionals actively combat new threats instead of a completely reactive approach.
Giora will also reveal details about the upcoming beta program for LightCyber Behavioral Analytics. If your organization is an early adopter of emerging technologies, you can sign up for LightCyber beta and evaluate the benefits of supervised and unsupervised machine learning first hand.
Network Connectivity & Security Solutions
Speaker: Chris Bihary, CEO/Co-Founder & Patrick Nixdorf, System Engineer - Garland Technology
Whether you are planning a new data center, remote site deployments or are contending with legacy network architecture - how you deploy is just as important as what you deploy.
Join Garland Technology, a Fuel Founding Partner on a security solutions focused webinar. Chris Bihary, CEO/Co-Founder of Garland Technology has over 20+ years experience in figuring out the most common and complex network access problems.
This is a security solutions based webinar, we will review common Palo Alto Networks Next-Generation Firewall deployments as well as applications for multi-vendor security and monitoring tools.
Security Solution Overview:
- Avoiding downtime in Palo Alto Networks Next-Generation Firewall deployment
- Installing patches without taking the network down
- Cost effective High Availability Solutions for Active/Active & Active/Passive
- Remote site management
- Managing multi-vendor security tools (chaining)
- Affordable transition from 10G to 40G
- See packets before and after they pass through device
Fuel Best Practices Roundtable - Decreasing Your Attack Footprint
Speaker: Matt Mellen, Palo Alto Networks
Do you have DNS sinkholing enabled? Do you block connections from countries you don’t do business with? In this interactive call, we’ll discuss questions like this and other creative ways to use the security platform to decrease your attack footprint. Discussion topics will be based primarily around different features you can enable across the security platform.
There will be a slight bias toward healthcare but any industry is invited to participate. Remember, this is an interactive call so come ready to share your ideas!
How Organizations Can Gain Infrastructure Efficiency by Automating Their Network Operations
Speaker: Rafi Zvi, Co-Founder, BackBox
BackBox provides a single, centralized location for automated and seamless network operations. Device Configuration Backup, Automated Recovery and Disaster Recovery Procedures, Dynamic Asset Management, Pre-emptive Health Checks, Configuration Harmonization across all devices and Automated multi-device configuration changes enable organizations to mitigate risk and save time in day-to-day network operations for over 150 Network and Security Vendors.
During this 45-minute educational Webinar, you will find out how to:
- Fully automate and verify the disaster recovery procedure of your network infrastructure.
- Harmonize your device configurations to meet your corporate standards.
- Preemptively monitor your device operations and prevent downtime.
- Save time and mitigate risk by pushing configuration changes to multiple devices from a central location.
Taking Zero-Touch Automation to the Next (Generation) Level
Speakers: Joe Schreiber, Technical Director of Business Development at Tufin;
Erez Tadmor, Sr. Product Manager, Orchestration and Automation at Tufin
Automation is a key element as organizations adapt to digital transformation, and security operations are not excluded. Tufin allows you to automate changes to Palo Alto Networks Next Generation policies and to maximize agility and productivity without losing control. Whether a change is required to App-ID or User-ID to enable a new service, Tufin orchestration suite analyzes, designs and implements the change from a single console to ensure rapid delivery.
Join the session to learn how you can:
- Implement changes to Panorama device group NGFW policies in minutes.
- Enforce continuous compliance with security standards with proactive risk analysis
- Reduce the complexity of your hybrid network environment
Using vRNI to Visualize and Secure Your Data Center Virtual Network
Speaker: Frank Snyder, Sr. Systems Engineer, VMware
vRealize Network Insight (vRNI) is a network analytics and security modeling tool designed for the VMware-based virtual datacenter. By utilizing vRNI to identify and profile traffic inside the virtual data center, an engineer will be able to make accurate security decisions that will result in the accurate and rapid deployment of distributed firewall rules into the NSX enabled virtual data center.
This webinar will provide the following to the attendees:
- How to gain 360° visibility to all traffic within the virtual data center, and filter that data from the data center level down to the virtual machine level.
- How to group VMs to represent application and visually see how those applications are communicating.
- How to manage a full installed and functioning instance of NSX from a security and operations perspective.
Network Connectivity - Basics and Beyond
Speakers: Chris Bihary, CEO/Co-Founder, Garland Technology;
Patrick Nixdorf, System Engineer, Garland Technology
Long range, short range, and twisted pair and that’s just the 1G media connection options. There is a dizzying amount of different media types for network connectivity. Once you untangle the cabling questions for your network - you dive straight into the pluggables. On the surface, choosing what pluggable seems simple enough - just match the speed, mode and fiber type, right? But, there are a vast amount of options based on your current infrastructure and future needs.
Join Garland Technology, a Fuel Founding Partner on a network connectivity reboot - this webinar will begin with covering the basics and expand into vendor-specific connectivity such as BiDi and MTP® as well as the unique environmental considerations within Industrial Ethernet and Industrial Internet of things (IIoT) settings.
In this webinar, you will learn:
- Cabling - it’s more than acronyms!
- How to: Measuring dB insertion loss
- Bend radius tolerances
- Industrial Ethernet - environmental considerations
- Pluggables: Common compatibility scenarios Pluggables:
- Pluggables: Vendor-specific options: BiDi, MTP
- Converting media for compatibility
- Converting network speed