Anatomy of an Attack
Dissect the anatomy of recent attacks observed by one of Palo Alto Networks leading managed security service providers. Join Norlem's Vice President of Engineering to learn the latest tools and techniques being used in successful breaches, as he detonates malware and delivers an articulation of each step in the attack sequence. Norlem will then present how organizations are leveraging tools from Palo Alto Networks Cortex XDR to successfully pr...
American Rescue Plan Webinar: Opportuni...
The process for securing American Rescue Plan Act (ARPA) funds has historically been convoluted for recipients. Palo Alto Networks and CDW have teamed up to present some security related projects that have been funded using ARPA funds.During this webinar, we will discuss: The ARPA Funding Process and Grant Allocation in WashingtonWhich technology/security projects can be fundedThe amount of funding dollars available per verticalCase studies of...
CDM Endpoint Detection & Response Series
Join Palo Alto Networks to hear about Cortex XDR, the industry's first extended detection and response platform that integrates endpoint, network, cloud, and third-party data to stop sophisticated attacks. Combining the capabilities of EDR, NDR, and UBA, Cortex XDR provides full protection while simplifying operations and allows security teams to gain enterprise-wide visibility. Topics of discussion include:• Cortex XDR CDM capability ma...
CDM Endpoint Detection & Response Series
Join Palo Alto Networks to hear about Cortex XDR, the industry's first extended detection and response platform that integrates endpoint, network, cloud, and third-party data to stop sophisticated attacks. Combining the capabilities of EDR, NDR, and UBA, Cortex XDR provides full protection while simplifying operations and allows security teams to gain enterprise-wide visibility. Topics of discussion include: • Cortex XDR CDM capability ma...
CDM Endpoint Detection & Response Series
Palo Alto Networks defines endpoint detection and response (EDR) as the capability to provide cybersecurity monitoring and control of endpoint devices through the full cybersecurity lifecycle - from the detection of events and incidents on endpoint devices and users to attack responses and incident follow up and analysis. Because attackers can target any asset, including cloud applications and managed and unmanaged hosts, Federal Agencies nee...
Demystifying The Technology Modernizati...
The Technology Modernization Fund (TMF) was enacted as part of the Modernizing Government Technology Act of 2017, with a goal of better securing sensitive Federal systems and data while utilizing taxpayer dollars as efficiently as possible. Earlier this year, the American Rescue Plan Act added $1 Billion dollars to the program. These funds can help agencies (Civilian, DoD, and the Intelligence Community) modernize systems, expand cybersecurity...
Introducing Next Generation SD-WAN with...
As a result of cloud adoption, and high-performance broadband and infrastructure automation, organizations nationwide have inevitably changed. Now, mobile users directly access the cloud for their app and data needs. It is time to start taking control of your apps and data with the software-defined wide area network (SD-WAN), which promises to enable organizations to seamlessly embrace the benefits of network transformation and remove any limi...
Securely Enable a Cloud-Delivered Branc...
As a result of cloud adoption, high-performance broadband and infrastructure automation, your government entity has inevitably changed. Now, your branch offices and mobile users are directly accessing the cloud for their app and data needs. To keep control of your apps and data, your security architecture needs to match your rapid cloud transformation - and although you may be ready, your network architecture may not be. Join this session with...
SACA Joint Architecture
Join Palo Alto Networks to learn more about how your organization can secure the workloads they are moving to Azure. Utilizing a Microsoft-Palo Alto Networks jointly approved architecture for Secure Azure Computing gives your organization's security team the confidence it needs when moving sensitive content to Azure. During this webinar, you will learn about the rapid shift in cloud computing and how it has challenged our government customers...
Funding 21st Century Cybersecurity
The demand for cybersecurity in education and across state and local governments has never been more pressing, nor have the threats been more numerous. And as your organization works to address these, you may also find that paying for the kind of robust cybersecurity you want and need is also a challenge.Join Palo Alto Networks, Carahsoft, and the Grants Office as we review:Funding opportunities that support cybersecurityStrategies for integra...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.