Click here to register


Date:
Wednesday, January 29
Time: 11:00 a.m. PT / 2:00 p.m ET


The first step to defeating advanced threats is understanding the sophisticated techniques malware and exploits are using to evade detection and slip past traditional security controls. We will share a detailed review of the cyber kill-chain, including each step used to compromise hosts, with data from real attacks and specific anecdotes.

You will learn the Palo Alto Networks principles to defend against these attacks with an integrated Enterprise Security Platform to help Security and IR teams scale, including:

  • Applying positive security controls to reduce the attack surface
  • Blocking all known threats with near real-time controls
  • Discovering unknown threats and quickly generating protections
  • The value of an integrated approach that correlates data from multiple security technologies
Featured Speaker:
Scott Simkin, Sr. Cyber Analyst, Palo Alto Networks


Sponsored by: