The Power of AI in Action
Security teams have an important job: to protect the organization from an ever-evolving threat landscape. With growing amounts of data, ever-changing threats and the sheer volume of security alerts, this can feel overwhelming. But there is a better way. Cortex XSIAMŽ unites SOC capabilities that include XDR, SOAR, SIEM, ASM and others into a single SecOps platform. It empowers security analysts with AI-driven outcomes and an automation-first a...
Revolutionizing Cloud Data Security wit...
As data volumes continue to soar and regulations become increasingly stringent, organizations grapple with the challenge of comprehending their sensitive data, controlling access to it and pinpointing potential vulnerabilities. To regain visibility and control, forward-thinking organizations are turning to data security posture management coupled with data detection and response. In this session, you'll learn:The security and compliance risks...
Transforming Federal Defense With AI, C...
The applications of artificial intelligence (AI) in combination with cloud computing and data security are limitless. While federal agencies are increasingly implementing AI to safeguard critical assets, the integration of AI comes with a multitude of risks. Generative AI tools like ChatGPT can change threat vectors for cyberattacks, and the uncertainty of where large language models (LLMs) get their data from brings up ethical concerns. Bad a...
June 11, 2024
Organizer:
GovExec Location:
Webcast
Public Sector Ignite 2024
Digital transformation remains a top priority in the public sector, where global and technology trends continue to drive unprecedented change. As public sector organizations tap into AI, cloud computing, IoT and infrastructure modernization to accelerate their missions, questions remain: How can organizations enable cyber resilience without hindering the mission? How can cyber leaders remain compliant with new government mandates while amplify...
Risk, Curated
As attack surfaces rampantly grow and evolve, security teams find themselves bogged down by manually remediating every new vulnerability. Meanwhile, attackers exploit them within hours — sometimes minutes — of a Common Vulnerabilities and Exposures (CVE) announcement. To help solve this problem, hear directly from our security experts Greg Heon and Abhi Anbazhagan. You’ll discover why traditional risk prioritization methods a...
VM-Series On Amazon Web Services - Virt...
Join us for the Virtual Ultimate Test Drive, where you'll get hands-on experience with Palo Alto Networks Amazon® Web Services (AWS). In this free, two-hour virtual workshop, you'll see how easy it is to securely extend your corporate data center into AWS using our next-generation firewall to protect your valuable applications and data from known and unknown threats. During this workshop you will: See how a VM-Series firewall is deployed o...
Cloud-Delivered Security Services - Vir...
Join us for The Cloud-Delivered Security Services Ultimate Test Drive where you’ll get hands-on experience with Palo Alto Networks next-generation enterprise security platform. In this free half-day technical workshop you will learn how to protect your network and detect known, unknown and zero-day threats 180X faster than any other platform or point solution – all within a single, integrated best-of-breed security platform. Experi...
Prisma SD-WAN - Virtual Ultimate Test Drive
Join us for the Prisma SD-WAN Ultimate Test Drive, where you will get hands-on experience with Palo Alto Networks Prisma™ SD-WAN, the Industry's first next-generation SD-WAN solution. To protect and control your branches and mobile users going straight to the cloud for their app and data needs, your security architecture needs to match your rapid cloud transformation. Secure your spot at this immersive half-day workshop, where we'll walk...
ML-Powered Next Generation Firewall - V...
In this free, two-hour virtual workshop, you will configure security policies that will ultimately restore visibility and control over the applications, users and content traversing your network. During this workshop you will: Configuring Inline ML-Powered malware and phishing preventionn Leveraging Policy Optimizer to migrate from port-based to application-based security policies Configure decryption to inspect and allow TLS 1.3 traffic Secur...
AppSec Bootcamp -DevSecOps Bootcamp Series
Looking to level up your AppSec skills and get hands-on experience securing your applications? Join our upcoming AppSec Bootcamp to learn how to proactively eliminate application risk from code to workload through automated and integrated workflows. Join an instructor-led presentation Get a walkthrough of application security and DevSecOps principles. Focusing on securing the application lifecycle, the presentation discusses software compositi...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.