Extending ZeroTrust to the Endpoint

"With exploit kits readily available to attackers, even ‘good’ applications can go ‘bad’. Many endpoint security approaches begin by trusting everything, and monitoring for patterns or malicious behaviors, while others attempt to whitelist trusted applications and block the rest.

The “Zero Trust Model” of information security coined by Forrester, has traditionally been applied to network communications, but today’s advanced cyber threats warrants a new approach in which the Zero Trust model is extended to endpoints. The same rigor must be applied on the endpoint; on the OS, on connected devices, and in memory. This is particularly important as most resources an attacker might be most interested in – data and applications – will live on the endpoint.

Join Palo Alto Networks as we examine how an organization can and should extend a “never trust, always verify” philosophy to their endpoint security"
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Whitehouse-driven Cyber Security Strategy and How it affects your Business

Join Presidio's very own Dan Lohrmann (author of Cyber Mayday and the Day After), and Andy Richter (author of Practical Deployment of Cisco Identity Services Engine (ISE): Real-World Examples of AAA Deployment) as we discuss the new Whitehouse-driven cyber security strategy and how it affects your business.
Watch Now

Automating Cybersecurity Functions in Your Enterprise: A Dark Reading Webcast

Secureworks:

Organizations face tremendous challenges when trying to keep pace with the volume of cyber incidents they are seeing today. Information security leaders are looking to the benefits of security orchestration and automation to relieve the strain on their incident response teams. While the promise of orchestration is great, achieving success requires great care in choosing which processes and investigative actions to automate.
Watch Now

Becoming a Threat Hunter in Your Enterprise

ExtraHop

For years, most IT security organizations have waited to detect new threats and then moved swiftly to defend against them. Today, however, there is a new wave of “threat hunting,” in which the security team takes a more proactive approach --seeking out potential threats before the attackers have a chance to act. How do enterprises build threat hunting programs? How do they staff them, and what tools do they need? What skills and training does a great threat hunter need? In this Dark Reading webinar, a top expert discusses the process for building a threat hunting program, and for optimizing the efforts of designated threat hunters in the organization.
Watch Now

Beyond ChatGPT, Building Security Applications using OpenAI API

ChatGPT was launched by OpenAI in November 2022. Since then, it has been the subject of many discussions. ChatGPT itself is one application that was built on top of OpenAI’s GPT-3 models. We can programmatically interact with these models via OpenAI API. In this talk, we will go beyond ChatGPT and discuss OpenAI API, fine-tuning our own models for specific tasks, and building security applications on top of them. We will be building a sample application that interprets human requests and performs the basic tasks requested.
Watch Now