Threat Hunting with Unit 42
October 25, 2022
An introduction of the threat landscape and how to be breech ready.
Agenda
Time (in PST)
9:30 a.m. – 9:35 a.m. Welcome and Opening Remarks
9:35 a.m. – 10:20 a.m. Session 1 | Threat Landscape
10:20 a.m. - 10:25 a.m. Break
10:25 a.m. - 11:10 a.m. Session 2 | Breach Readiness
11:10 a.m. - 11:15 a.m. Break
11:15 a.m. - 12:00 p.m. Session 3 | Data: The Next Frontier in Cybersecurity
12:05 p.m. - 12:10 p.m. Break
12:10 p.m. - 12:55 p.m. Session 4 | Cloud Security: Next-Gen Threat Mitigation in the Network
12:55 p.m. - 1:00 p.m. Closing Remarks
Session 1
Topic: Threat Landscape
Company: Palo Alto Networks
Speaker: Spencer Smith, Security Architect - Unit 42
In this session, a member of Unit 42 will cover what they are seeing today, what might be coming in the threat landscape, and what Palo Alto Networks is doing to help customers with these ever-changing challenges.
Session 2
Topic: Breach Readiness
Company: Palo Alto Networks
Speaker: Steve Dyson, Senior Consultant - Unit 42
It is not a question of if, but when a breach is going to occur, in this session we will review common practices, guides, and tips to move from being reactive to a proactive, secure state.
Session 3
Topic: Data: The Next Frontier in Cybersecurity
Company: Rubrik
Speaker: Sterling Wilson, National Alliances Leader – Data Security, Public Sector
Ransomware is on the rise and cyberattacks are getting more sophisticated. Despite investments in infrastructure security tools, cybercriminals are still getting through to the data. And when they take the data down, they take down the entire organization—and hold it for ransom or exfiltration. As the importance of data grows, we need to trust our data is safe and resilient, no matter where it resides. It’s time for a new approach.
Join this session to learn how the next frontier in cybersecurity pairs the investments in infrastructure security with data security giving organizations security from the point of data. Learn the importance of a Zero Trust approach and hear industry standards that will help you stay ahead of the inevitable attack.
Session 4
Topic: Cloud Security: Next-Gen Threat Mitigation in the Network
Company: Aviatrix
Speakers: Shahzad Ali, VP, Solutions Architecture, and Anas Shahid, Senior Technical Marketing Engineer
Cybercriminals are actively threatening networks and applications with malicious activity including ransomware, phishing, data exfiltration, crypto mining, and DDoS attacks. Cloud threats today are complex and have become completely out of the reach for siloed security solutions that use coarse, out-of-context, and non-real-time analysis.
Aviatrix’s threat intelligence solution, ThreatIQ, provides 360-degree threat hunting by working with major next-generation firewall (NGFW) vendors like Palo Alto Networks. The joint solution allows enterprises to hunt and block the full spectrum of malicious activities applied in an attack.
Join this webinar to learn how the network data plane provides an extremely powerful foundation not only to detect cybersecurity threats in realtime, but also to layer in intelligence for rapid remediation in conjunction with NGFW and other security controls.