Fuel Webinars

Stay "In-The-Know" with Fuel Webinars

Fuel webinars are an interactive, educational series of online technical sessions featuring industry experts from among our members, Palo Alto Networks®, our partners and other cybersecurity experts. We'll share the latest partner updates, threat prevention tips, industry news, and more. See what's coming up or check out our archive.

Future Webinars:

Cybersecurity Round Table: I've been breached, what now?

Tuesday, February 27

10:00am - 11:00am Central/11:00am - 12:00pm Eastern

GarlandLogo.pngSpeakers: Chris Bihary, CEO/Co-Founder - Garland Technology, Michael McCartney, President - Avalon Cyber, Kyle Cavalieri, Chief Information Officer - Avalon Cyber and Brahn Olson, Director of Cyber Security Services - Avalon

Cyber threats are quickly becoming more sophisticated with Advanced Persistent Threats (APTs) creating a new level of security risk. If you experience a breach, it is critical that you have 100% network visibility to quickly find and fill the gap in your network, and identify what data may have been compromised.

Join the cyber security round table of Chris Bihary, CEO/Co-Founder of Garland Technology, a Fuel Founding Partner; Michael McCartney, President of Avalon Cyber; Kyle Cavalieri, Chief Information Officer of Avalon Cyber; and Brahn Olson, Director of Cyber Security Services of Avalon Cyber as they answer your questions and discuss next generation threat intelligence, network visibility and what to do if you’ve been breached.

In this webinar you will learn:

  • Network Connectivity Best Practice
  • Network Breach/Incident Response
  • Complying with ever-changing government regulations
  • Cyber security monitoring - collecting security log data from widely used security appliances (e.g., firewalls, antivirus, endpoint detection and response solutions), normalize log data and identify alerts that are of high risk
  • Creating your foundation of visibility

[Register for This Webinar]

Recent Webinars:

Reducing Risk and Increasing Agility through Policy-based Automation with Palo Alto Next-Generation Firewall

tufin logo_resized.png

Speaker: Karen Crowley, Tufin

Join our industry experts for this engaging discussion on the key ways automation provides better protection from emerging threats, ensures continuous compliance, reduces errors, and takes advantages of the built-in capabilities of Palo Alto Networks Next-Generation Firewalls.

Click here to listen to the recording. 

How to Perform Incident Response with Palo Alto Networks

Speaker: IntelliGO

Malware is insidious, hazardous, and today, it’s everywhere. While cybersecurity professionals are all aware of the dangers of malware, it can be tough to truly grasp the difference that seconds can make in an attack unless you see what it looks like in real life. Join Fuel User Group and IntelliGO for an important webinar showcasing 5 real-life examples of malware discovered by Palo Alto Networks tools. We’ll cover how the attack happened, what was uncovered, and what the incident response process was. Find out how well-prepared you are for a cyberattack, and what to do if you’re breached.

Click here to listen to the recording.

Protect Your Organization with Threat Lifecycle Management

Speaker: Jack Reynolds, LogRhythm

Today’s reality is that organizations will continue to be confronted by increasingly frequent and complex cyberthreats. Protecting your organization now mandates effective Threat Lifecycle Management (TLM) to address threats across the threat landscape.

The TLM framework begins with the ability to guard, monitor and search across your IT environment, and ends with the ability to quickly mitigate and recover from security incidents. The result? Faster time to detect and time to respond, with the resources already at hand.

In this webinar, Jake Reynolds, LogRhythm Technology Alliances Engineer, will highlight how LogRhythm’s Threat Lifecycle Management Platform combines with Palo Alto Networks’ Next-Generation Security Platform to empower organizations with exceptional visibility and context to quickly discover and neutralize concerning incidents.

In this session, we will cover:

  • How LogRhythm and Palo Alto Networks integrate for end-to-end threat lifecycle management
  • The growing role SIEMs have with security Data Lakes
  • Palo Alto Networks' upcoming Application Framework

Click here to listen to the recording.

See Threats In Real Time with 100% Visibility
Speaker: Chris Bihary, CEO/Co-Founder - Garland Technology & David Gold, Vice President of Product Management - Protectwise™

Network security becomes increasingly complex with each passing day, making it critical that busy security teams have full visibility and threat detection capabilities. These resource-constrained teams already support a wide range of security appliances like firewalls, intrusion detection systems, and forensics to help guard enterprises from a growing threat landscape. However, that also means they're managing multiple interfaces and more security data than any one person - or team - can use effectively.

Click here to listen to the recording.

Win the War with Zero Trust
Speaker: VMware

Today’s networks aren’t set up to withstand modern cyberwarfare. As enterprises embrace cloud-based delivery and software-defined data centers, you need to stay one step ahead and assume a trust no-one approach. A ‘Zero Trust’ approach to security - know your data, where it is, and which users or devices are supposed to have access to it - becomes fundamental. The technological innovations of today, next-generation firewalls, virtual network infrastructure, and orchestration, make the evolution to Zero Trust easier than ever.

Click here to listen to the recording. 

Machine Learning - What You Need to Know
Speaker: Giora Engel, Palo Alto Networks

There are many applications and uses for the expanding capabilities of machine learning, none more valuable and impactful than those in the field of cybersecurity. You’ve probably already read or heard something about using machine learning to combat emerging threats, but how does this work, and what does it mean for you in your role on the front line of your organization’s defenses. Join Giora Engel, VP Product Management at Palo Alto Networks and Founder of LightCyber, as we get beyond the marketing buzz and define what machine learning really is, the kinds of resources that are required to power this kind of approach, and how machine learning helps cybersecurity professionals actively combat new threats instead of a completely reactive approach.

Giora will also reveal details about the upcoming beta program for LightCyber Behavioral Analytics. If your organization is an early adopter of emerging technologies, you can sign up for LightCyber beta and evaluate the benefits of supervised and unsupervised machine learning first hand.

Click here to listen to the recording. 

Network Connectivity & Security Solutions
Speaker: Chris Bihary, CEO/Co-Founder & Patrick Nixdorf, System Engineer - Garland Technology

Whether you are planning a new data center, remote site deployments or are contending with legacy network architecture - how you deploy is just as important as what you deploy.

Join Garland Technology, a Fuel Founding Partner on a security solutions focused webinar. Chris Bihary, CEO/Co-Founder of Garland Technology has over 20+ years experience in figuring out the most common and complex network access problems.

This is a security solutions based webinar, we will review common Palo Alto Networks Next-Generation Firewall deployments as well as applications for multi-vendor security and monitoring tools.

Security Solution Overview:

  • Avoiding downtime in Palo Alto Networks Next-Generation Firewall deployment 
  • Installing patches without taking the network down 
  • Cost effective High Availability Solutions for Active/Active & Active/Passive 
  • Remote site management 
  • Managing multi-vendor security tools (chaining) 
  • Affordable transition from 10G to 40G 
  • See packets before and after they pass through device

Click here to listen to the recording. 

Fuel Best Practices Roundtable - Decreasing Your Attack Footprint
Speaker: Matt Mellen, Palo Alto Networks

Do you have DNS sinkholing enabled? Do you block connections from countries you don’t do business with? In this interactive call, we’ll discuss questions like this and other creative ways to use the security platform to decrease your attack footprint. Discussion topics will be based primarily around different features you can enable across the security platform. 

There will be a slight bias toward healthcare but any industry is invited to participate. Remember, this is an interactive call so come ready to share your ideas!

Click here to listen to the recording

How Organizations Can Gain Infrastructure Efficiency by Automating Their Network Operations

BackBox logo.png

Speaker: Rafi Zvi, Co-Founder, BackBox

BackBox provides a single, centralized location for automated and seamless network operations. Device Configuration Backup, Automated Recovery and Disaster Recovery Procedures, Dynamic Asset Management, Pre-emptive Health Checks, Configuration Harmonization across all devices and Automated multi-device configuration changes enable organizations to mitigate risk and save time in day-to-day network operations for over 150 Network and Security Vendors.

During this 45-minute educational Webinar, you will find out how to:

  • Fully automate and verify the disaster recovery procedure of your network infrastructure.
  • Harmonize your device configurations to meet your corporate standards.
  • Preemptively monitor your device operations and prevent downtime.
  • Save time and mitigate risk by pushing configuration changes to multiple devices from a central location.

Click here to listen to the recording

Taking Zero-Touch Automation to the Next (Generation) Level

Speakers: Joe Schreiber, Technical Director of Business Development at Tufin;

Erez Tadmor, Sr. Product Manager, Orchestration and Automation at Tufin

Automation is a key element as organizations adapt to digital transformation, and security operations are not excluded. Tufin allows you to automate changes to Palo Alto Networks Next Generation policies and to maximize agility and productivity without losing control. Whether a change is required to App-ID or User-ID to enable a new service, Tufin orchestration suite analyzes, designs and implements the change from a single console to ensure rapid delivery.

Join the session to learn how you can:

  1. Implement changes to Panorama device group NGFW policies in minutes.
  2. Enforce continuous compliance with security standards with proactive risk analysis
  3. Reduce the complexity of your hybrid network environment

Using vRNI to Visualize and Secure Your Data Center Virtual Network

Speaker: Frank Snyder, Sr. Systems Engineer, VMware

vRealize Network Insight (vRNI) is a network analytics and security modeling tool designed for the VMware-based virtual datacenter. By utilizing vRNI to identify and profile traffic inside the virtual data center, an engineer will be able to make accurate security decisions that will result in the accurate and rapid deployment of distributed firewall rules into the NSX enabled virtual data center.

This webinar will provide the following to the attendees:

  1. How to gain 360° visibility to all traffic within the virtual data center, and filter that data from the data center level down to the virtual machine level.
  2. How to group VMs to represent application and visually see how those applications are communicating.
  3. How to manage a full installed and functioning instance of NSX from a security and operations perspective.

Click here to listen to the recording


Network Connectivity - Basics and Beyond

Speakers: Chris Bihary, CEO/Co-Founder, Garland Technology;

Patrick Nixdorf, System Engineer, Garland Technology

Long range, short range, and twisted pair and that’s just the 1G media connection options. There is a dizzying amount of different media types for network connectivity. Once you untangle the cabling questions for your network - you dive straight into the pluggables. On the surface, choosing what pluggable seems simple enough - just match the speed, mode and fiber type, right? But, there are a vast amount of options based on your current infrastructure and future needs.

Join Garland Technology, a Fuel Founding Partner on a network connectivity reboot - this webinar will begin with covering the basics and expand into vendor-specific connectivity such as BiDi and MTP® as well as the unique environmental considerations within Industrial Ethernet and Industrial Internet of things (IIoT) settings.

In this webinar, you will learn:

  • Cabling - it’s more than acronyms!
  • Copper
  • Fiber
  • How to: Measuring dB insertion loss
  • Bend radius tolerances
  • Industrial Ethernet - environmental considerations
  • Pluggables: Common compatibility scenarios Pluggables:
  • Pluggables: Vendor-specific options: BiDi, MTP
  • Converting media for compatibility
  • Converting network speed

Click here to listen to the recording