AutoFocus - How to Identify the Attacks that Matter Most

For most security teams, there are simply too many alerts to deal with in a day. From various security devices and third-party feeds to threat intelligence sources — the sea of information makes it virtually impossible for organizations to quickly respond before damage can be done. How can security operations, analysis, and research teams cut through the noise, and drill straight down into the security events that matter most? Join Palo Alto Networks® for a live webinar that will focus on how Cyberthreat Intelligence helps security teams
Watch Now

Spotlight

MedImpact is the largest privately held pharmacy benefit manager (PBM), serving health plans, self-funded employers, and government entities in the United States. Watch the video to learn how Frank Bunton, VP and CISO and Larry Biggs, IT Security Engineer from MedImpact discuss their multi layered security strategy to protect the organization and sensitive patient data.


OTHER ON-DEMAND WEBINARS

Mobile Device Threats and BYOD Update

What security risks do mobile devices introduce into your organization, and how can you protect against them now that so many employees are using their own devices for work? ESET Distinguished Researcher, Aryeh Goretsky explains.
Watch Now

Matching Application Security to Business Needs

BankInfoSecurity

Applications are the #1 attack target of hackers, so application security should be an integral part of your software development tools and processes. At the same time, it's more difficult than ever before to pick an AppSec solution. It's easy to find yourself lost in sea of confusing 3 and four-letter acronyms. SAST, DAST, SCA, IAST, PEN, RASP - How do you know which one or ones to choose? Register for this webinar and you will learn: How to ensure your AppSec program moves at the speed of business; Strengths, weaknesses, and applicability of AppSec approaches; How to build out your AppSec toolbox with confidence.
Watch Now

Database Security Threats: Risks to Your Data

"Today, businesses leverage confidential and mission critical data that is often stored in traditional, relational databases or more modern, big data platforms. Understanding the key threats to database security and how attackers use vulnerabilities to gain access to your sensitive information is critical to deterring a database attack. Join this webinar to learn about the latest threats and how to remediate them"
Watch Now

How Security Culture Reduces the Likelihood of Being Breached

In this webinar I will discuss what security culture is, where it belongs in the organisation, and how good security culture can reduce the likelihood of being breached. I will point to research on culture, human behaviours, and how to motivate people to do the right thing.
Watch Now

Spotlight

MedImpact is the largest privately held pharmacy benefit manager (PBM), serving health plans, self-funded employers, and government entities in the United States. Watch the video to learn how Frank Bunton, VP and CISO and Larry Biggs, IT Security Engineer from MedImpact discuss their multi layered security strategy to protect the organization and sensitive patient data.

resources