DevOps driven software development approaches are pervasive among organizations embracing cloud. Unlike traditional software development approaches, DevOps helps organizations shorten the time to build and ship cloud applications. Introducing security early into the software development lifecycle along with continuous monitoring in production environments improves the overall security posture of cloud applications reduces business risk.


Workshop: Investigate and hunt threats with Cortex XDR

SecOps teams must continually improve the speed and accuracy of their investigations to keep up with increasingly advanced attackers. Join this investigation and threat hunting workshop, and learn how to successfully stop cyberattacks through analysis of rich data and alerts. Discover how you can dramatically improve the efficiency and effectiveness of your security operations through better detection, investigation, and threat hunting of stealthy attacks. In this incident response hands-on workshop, learn how to use Cortex XDR to: Improve your detection and response capabilities using behavioral analytics Quickly investigate the attack chain and root cause of endpoint alerts Accelerate threat hunting with enriched, contextualized data Create custom rules that can alert you when suspicious behavior is detected Prerequisite: Participants must bring a laptop with an HTML5-compatible browser.

Fight Automation with Automation
Montreal ,QC ,Canada
  • 19

How to Pick a Winner in EDR

The endpoint security marketplace is crowded with vendors claiming to have superior capabilities. Cutting through all the marketing and sales pitches to understand how these products perform isn’t easy. Luckily, The MITRE Corporation conducted an independent test of the detection and investigation capabilities of leading endpoint detection and response (EDR) products against real-world attack sequences. We’ll break down MITRE’s methodology, the results, and what it all means for your organization as you assess your current and future endpoint security toolkit.

  • 15

Stop Attackers from Using DNS Against You

Any modern organization requires the Domain Name System (DNS) to run its business, regardless of industry, location, size, or products. DNS is fundamental to every single modern organization, all over the world. It’s also a pervasive but easily overlooked attack surface, and bad actors are using this to their advantage.

  • 37

Workshop: Investigate and hunt threats with Cortex XDR

SecOps teams must continually improve the speed and accuracy of their investigations to keep up with increasingly advanced attackers. Join this investigation and threat hunting workshop, and learn how to successfully stop cyberattacks through analysis of rich data and alerts. Discover how you can dramatically improve the efficiency and effectiveness of your security operations through better detection, investigation, and threat hunting of stealthy attacks. In this incident response hands-on workshop, learn how to use Cortex XDR to: Improve your detection and response capabilities using behavioral analytics Quickly investigate the attack chain and root cause of endpoint alerts Accelerate threat hunting with enriched, contextualized data Create custom rules that can alert you when suspicious behavior is detected Prerequisite: Participants must bring a laptop with an HTML5-compatible browser.

Fight Automation with Automation
Toronto ,ON ,Canada
  • 13

Security Operating Platform At A Glance

The Palo Alto Networks Security Operating Platform prevents successful cyberattacks through automation. Accurate analytics allow you to streamline routine tasks and focus on business priorities. Tight integration across the platform and with ecosystem partners delivers consistent security across cloud, network, mobile devices. Customers love our security, because it just works, consistently awarding us the highest loyalty rating in the industry. Download this At-a-Glance document to learn more.

  • 130

Expanding Data Centers: 3 Benefits of a Hybrid Cloud Approach

This brief discusses the three key benefits of using a hybrid cloud approach

  • 137