PREVENT CREDENTIAL THEFT IN HEALTHCARE
|
|
- Louisa Farmer
- 5 years ago
- Views:
Transcription
1 PREVENT CREDENTIAL THEFT IN HEALTHCARE SPOTLIGHTS Industry Healthcare Use Case Prevent credential theft Credential Phishing and Credential Abuse Theft and abuse of stolen passwords is one of the oldest attacks in the book, yet it remains highly effective. Adversaries can use stolen credentials to impersonate valid users, allowing them to bypass the entire attack lifecycle, move uninterrupted throughout their target organization s network and shift to the abuse of credentials from within. You can prevent credential theft with Palo Alto Networks Next-Generation Security Platform by stopping credential leakage, blocking access to phishing sites and enforcing multi-factor authentication security policy in the network. Business Benefits Decrease risk to patient data through improved security capabilities. Prevent unauthorized users and malicious content in hospital networks. Improve compliance with HIPAA, GDPR and other applicable data protection regulations. Operational Benefits Rely on technology, not just traditional user education, to prevent credential theft. Security Benefits Reduce risk of successful cyberattacks, including exfiltration of ephi. Prevent unauthorized users from moving laterally across your network. Business Problem A recent HIMSS Analytics survey of healthcare providers, commissioned by Palo Alto Networks, highlighted as providers most important security challenge, with more than 86 percent of respondents reporting and phishing attacks as their greatest area of vulnerability. 1 Similarly, according to threat data from more than 1,000 global healthcare providers on Palo Alto Networks Next-Generation Security Platform, -based cyberattacks account for 94 percent of attacks against healthcare organizations (see Figure 1). 2 As for why is so extensively used to launch cyberattacks against healthcare organizations, there is a simple reason: Credential phishing is a proven method of stealing passwords by taking advantage of the human element. Sources of Cyberattacks in Healthcare Web Browsing 2% 94% 4% FTP /Phishing Figure 1: Origin of cyberattacks against healthcare organizations on the Next-Generation Security Platform in 2017 Passwords are among the weakest links in computer security easy to steal, hard to secure and little proof of a user s identity. Stolen passwords let attackers greatly simplify their attacks and effectively bypass security measures designed to stop other types of threats, such as malware and exploits. 1. HIMSS Analytics Healthcare IT Cybersecurity Study, October paloaltonetworks.com/resources/techbriefs/himss-analytics Flash and other sources constituted less than.05%. Data from AutoFocus filtered on global healthcare industry from 1/1/17 through 6/1/17 Palo Alto Networks Prevent Credential Theft in Healthcare Use Case 1
2 Security practitioners and threat actors are constantly developing new techniques to gain advantages over each other. In recent years, security teams have stepped up their approaches to protecting their infrastructure by fortifying network perimeter defenses, building up protections against advanced malware, upgrading vulnerable operating systems, automating patch delivery to stop exploits and developing countermeasures to spot intruders. Threat actors looking to circumvent these measures are shifting their attention toward the next weakest link in the security chain users. Instead of finding and exploiting vulnerabilities in networked systems, it is faster, cheaper and far easier to steal a password from a user. With stolen credentials in hand, the attacker no longer appears as an anomaly, for they operate as a known user and outside the traditional threat protections aimed at stopping intruders. Schemes to steal passwords have existed for decades long enough for many refinements in the techniques to trick users. It would be a mistake to think of modern, targeted credential theft as the same as garden-variety phishing, such as the ploys used to defraud consumers. Advanced attackers are looking for entry points into healthcare organizations, not just access to individual bank accounts, and as such, they target specific victims who have the access they want. For example, attackers know users in a hospital s finance department may have access to a large amount of health insurance information, and that a database administrator in IT can access many patient records. Business Drivers There are a multitude of business risks associated with credential theft through phishing. Credential theft in healthcare can lead to exfiltration of patient or financial data, deployment of ransomware, or both. Given the high value of patient records on the black market compared to financial records, the healthcare industry is frequently targeted by cyber adversaries. Possible outcomes of credential theft include: Impact to patient care Loss of patient data Negative publicity Regulatory compliance penalties Traditional Approaches Typical approaches to phishing mitigation usually center on security awareness efforts and security point products for . Security awareness efforts are always a best practice, but many hospitals struggle to operationalize such efforts due to the unique culture in healthcare. Doctors are notoriously resistant to reading security-related s, and security teams often struggle to get leadership buy-in for testing hospital staff with fake phishing s. Cyber adversaries usually attempt credential theft by first launching targeted campaigns against specific users to steal credentials, which they subsequently abuse to get inside the organization. With the appearance of a valid user, an attacker can conduct lateral movement to gain more access. Healthcare organizations traditional approaches to mitigating phishing and credential abuse have been largely ineffective. Credential Phishing How It Works While there are many ways an attacker can obtain user credentials, credential phishing is the method of choice for a targeted attack. With credential phishing, the attacker will build a site that appears legitimate, or reuse a legitimate site s content, along with a look-alike domain name. The site mimics an application the victim expects to interact with, such as a clone of his or her webmail front end or the company s employee authentication page. The attacker baits the victim into visiting this site via an or social media message that appears to be from a known, trusted person or organization. After harvesting the user s credentials, the attacker can impersonate that user or use the credentials from a compromised endpoint within the victim s organization. Traditional Mitigation Approach Security products like mail gateways try to stop the delivery of phishing s to users, using techniques such as rewriting URLs embedded within copy to redirect and block visits to phishing sites. The efficacy of this approach depends on whether malicious links are sent to users corporate accounts and whether the security vendor has identified a given site as bad before users encounter it. In healthcare, it is common for security teams to attempt to block all uncategorized websites to mitigate the risk of new phishing domains. However, this usually fails in practice due to a small number of lightly trafficked, healthcare-related websites deemed critical by a select group of outspoken doctors. Although it s an effective practice, simply blocking all uncategorized websites is usually not well-received by the business. Palo Alto Networks Prevent Credential Theft in Healthcare Use Case 2
3 is not the only way to deliver a link to a user. For instance, most social media platforms have some form of messaging, and links sent through these bypass any protections applied to . In addition, cloaking techniques can make it very difficult to categorize a link as malicious before the user clicks it. A site may use short-lived or targeted content that appears benign to most visitors, which makes it difficult to categorize the site as malicious before it lures the intended victim. When the victim interacts with the site, it harvests their credentials, and the process is complete. Credential Abuse How It Works With stolen credentials in hand, the attacker can move on to the next stage of the attack to escalate access through credential abuse. Traditional Mitigation Approach Traditionally, healthcare organizations concerned about password theft implement multi-factor authentication, or MFA, at a VPN gateway to control remote access to the network. However, there are still many other ways for an attacker to get inside. For instance, an attacker can compromise an endpoint when its user is working remotely, then wait for the user to go to the office and connect the compromised endpoint to the internal network. With connectivity, the attacker can begin reconnaissance and lateral movement, and leverage stolen credentials, allowing the attacker to appear as a valid user and hide within normal network activity. In short, credential phishing leads to credential abuse, and traditional mitigation approaches based on security point products cannot effectively stop modern, motivated cyber adversaries from executing successful cyberattacks. Palo Alto Networks Approach to Neutralizing Credential Theft Palo Alto Networks Next-Generation Security Platform integrates protections against multiple types of threats, including capabilities to prevent credential phishing and stop the abuse of stolen credentials for lateral movement. The platform applies protections across the full attack lifecycle, making it difficult for attackers to successfully complete their objectives. Unlike legacy point products, components of the Next- Generation Security Platform automatically send and receive threat intelligence information from WildFire cloud-based threat analysis service to ensure threats discovered in one area of the network are quickly prevented in all others (see Figure 2). For example, malicious URLs WildFire discovers during the analysis PALO ALTO NETWORKS APPS Security Function of malicious files are blocked by Palo Alto Networks Next-Generation Firewall. CLOUD-DELIVERED SECURITY SERVICES APPLICATION FRAMEWORK & LOGGING SERVICE Layer 7 firewall (physical and virtual) Application whitelisting URL Filtering Intrusion Protection System, including anti-exploit Intrusion Detection System Network-based polymorphic anti-malware Polymorphic command-and-control prevention Credential theft prevention (only available with Palo Alto Networks) Multi-factor authentication for internal or external flows Malware analysis environment (sandboxing) with automatic signature creation for closedloop protection from new threats at security enforcement points Analysis of links in inbound Device and policy management and threat visibility Endpoint-based anti-exploit (signature-less) Endpoint-based anti-malware (signature-less) Threat intelligence analysis, hunting and response Closed-loop, preventive automation of threat intelligence feeds SaaS application visibility, intellectual property protection and threat prevention Always-on client VPN for endpoints ensures all traffic from endpoints passes through a next-generation firewall, whether the user is external or internal 3 RD PARTY PARTNER APPS CUSTOMER APPS NETWORK SECURITY ADVANCED ENDPOINT PROTECTION CLOUD SECURITY Figure 2: Palo Alto Networks Next-Generation Security Platform Product Next-Generation Firewall URL Filtering subscription Threat Prevention subscription WildFire subscription or appliance Panorama network security management Traps advanced endpoint protection AutoFocus contextual threat intelligence MineMeld threat intelligence syndication engine, stand-alone or as part of AutoFocus Aperture SaaS security service GlobalProtect network security for endpoints Figure 3: Core functions of the Next-Generation Security Platform ( functions in bold are especially relevant to preventing credential theft) The modern healthcare IT environment is widely interconnected, supports a highly mobile workforce and must embrace the growing demands of medical innovation. The Next-Generation Security Platform is designed to protect healthcare data wherever it goes, inside or outside the hospital boundary, by protecting endpoints, networks and clouds. Figure 3 provides a high-level summary of the capabilities of the security platform. Functions in bold face are especially relevant to credential theft and are detailed in the next section. Palo Alto Networks Prevent Credential Theft in Healthcare Use Case 3
4 The following sections detail how the Next-Generation Security Platform provides multiple layers of defense throughout the credential theft attack lifecycle (see Figure 4). PREVENT CREDENTIAL-BASED ATTACKS Research + Target Harvest Credentials Infiltrate Move Laterally Exfiltrate Move CREDENTIAL-BASED ATTACK LIFECYCLE Reconnaissance Harvest additional credentials PREVENT CREDENTIAL THEFT AND ABUSE Educate Educate your users to identify phishing attacks Prevent credential phishing Identify and prevent valid corporate credentials from being sent to illegitimate websites Prevent infiltration Use MFA with VPN and reduce the attack surface with perimeter defenses and threat prevention Prevent credential abuse Centrally enforce policy-based MFA at the network layer for all sensitive/critical resources and application Successfully prevent data exfiltration DONE Figure 4: Palo Alto Networks approach to preventing credential-based attacks STEP 1: RESEARCH AND TARGET The first step of a credential-based cyberattack is research and targeting. In this phase, an attacker sends targets carefully crafted s that encourage them to follow a link to a phishing website created recently enough that no security vendor has categorized it. Palo Alto Networks Strategy: Educate Educate your users on how to spot phishing s. Test your users security hygiene with fake phishing s. Follow up with the worst offenders. STEP 2: HARVEST CREDENTIALS Next, the attacker waits for users to log in to the phishing site using their enterprise credentials. Phishing sites are designed to catch victims with their guard down. Victims might, for instance, be excited for the opportunity to request more space in their box and fail to notice that the domain name is misspelled. Palo Alto Networks Strategy: Prevent Credential Phishing Implement a feature called Credential Theft Prevention, unique to Palo Alto Networks, to identify and prevent submission of valid credentials to illegitimate or uncategorized websites (more about this feature in Step 5: Exfiltrate ). Transmit links in s to WildFire for sandbox analysis. WildFire browses the websites in a virtual environment to determine whether they are malicious. URLs determined to be malicious are blocked at the firewall. Integrate Palo Alto Networks firewalls with Proofpoint, a popular security provider. Links inspected by Proofpoint are transmitted to WildFire for analysis, and malicious links are blocked by Proofpoint and next-generation firewalls. Block access to known phishing sites at the firewall with a URL Filtering subscription. STEP 3: INFILTRATE THE NETWORK Once armed with a user s credentials, the attacker attempts to remotely connect to the hospital network through the client VPN. Palo Alto Networks Strategy: Prevent Infiltration Require MFA on remote VPN connections. When anyone attempts to log in, the user will receive a notification on their phone requesting confirmation of the attempt. Deploy strong perimeter defenses based on a next-generation firewall with WildFire and a Threat Prevention subscription. Palo Alto Networks Prevent Credential Theft in Healthcare Use Case 4
5 STEP 4: MOVE LATERALLY With access to the network, the attacker moves laterally in search of servers or applications containing high-value information (i.e., PHI or financial data). If the compromised user doesn t have the required credentials to access the resource the attacker is pursuing, the attacker may engage in further credential harvesting techniques (i.e., exploit applications and deploy malware). Palo Alto Networks Strategy: Prevent Credential Abuse Centrally enforce policy-based MFA, internally, at the network layer, for sensitive/critical/legacy resources and applications. STEP 5: EXFILTRATE At this stage, without the previous measures in place, the attacker would exfiltrate network data through an approved, seemingly benign tactic, such as uploading it to a free file sharing site. However, since the network is protected by the techniques detailed here to stop the credential-based attack lifecycle, the attack is interrupted and ultimately unsuccessful. Credential Theft Prevention: A Unique Feature of Palo Alto Networks Next-Generation Firewall Palo Alto Networks Next-Generation Firewall delivers preventative capabilities to stop the leakage of corporate credentials to illegitimate websites. These capabilities identify when users attempt to submit corporate credentials and enforce policies that check whether credential submissions are allowed. These capabilities stop attackers ability to use new, previously unknown credential phishing sites to steal corporate credentials. Unlike other security products on the market, Palo Alto Networks does not rely on pre-emptively classifying sites as malicious as the sole means of enforcing policy. Most traditional security products attempt to catalog and block access to every bad site. Although this is the proper action from a policy perspective, it remains impossible to know every phishing site in existence, especially if an attack is narrowly targeted in nature. Anything not known to be malicious is allowed, including new, previously unknown phishing sites. Palo Alto Networks enables healthcare organizations to enforce policy that keeps corporate credentials within the realm of known business applications. It is much easier to identify known, valid sites compared to the ever-changing list of new, malicious sites. If a user accesses a known business application, policy permits the user to connect and authenticate with corporate credentials. If a site is known to be malicious, all interaction with the site is immediately blocked. If the site is neither a business application nor a known phishing site, it is still unclear if it is benign or a new, unknown phishing site. In either case, it should not be allowed to have corporate credentials submitted. The next-generation firewall allows the user to access the site, but enforces policy to detect and block any attempt to submit corporate credentials. Only Palo Alto Networks Next-Generation Firewall is capable of enforcing these types of policies. As an in-line network device, it sees all traffic, which makes it effective at stopping all attempts to access known and unknown phishing links, no matter how the user receives them via , embedded in a document or through social media. These capabilities build upon the principles of prevention, providing important measures to stop the theft of credentials through phishing. Multi-Factor Authentication Prevents Credential Abuse As discussed, MFA is a common technique used to control remote access to hospital networks, but a problem remains MFA is seldom enforced for internal traffic. To stop attackers from moving laterally inside the network, next-generation firewalls include the ability to enforce MFA as an authentication gateway within the network. These measures validate users identities (with MFA) and enforce segmentation policies to neutralize attackers ability to use stolen credentials to gain access to critical internal systems or legacy applications. Enforcing authentication policy at the network layer, rather than at the application layer, avoids the application integration problems that derail many MFA deployments. By enforcing MFA policy in the network layer with the next-generation firewall, the application does not require any modification at all. This makes enforcement of MFA policy possible across all types of applications, whether or not the application itself supports interfaces for external authentication. It provides great coverage and protection for all types of applications whether delivered through the web, client/server, internally developed or through a terminal by placing the enforcement at the intersection for all applications: the network. MFA plays a key role in stopping the advance of attackers in lateral movement. For one thing, MFA stops many lateral movement techniques attackers use when operating on compromised endpoints. Even if a device were connected to the internal network and an attacker possessed stolen credentials, the attacker would still not be able to complete MFA to pass through the next-generation firewall. MFA eliminates attackers ability to interact with protected applications altogether, because there is no network access at all to the application if MFA is not completed. For example, an attacker conducting reconnaissance may try to find and exploit a vulnerability in an older database that s still in production. However, that attacker would not be able to reach a database protected by MFA policy in the next-generation firewall, nor send the packets to the server to exploit the vulnerability. Palo Alto Networks Prevent Credential Theft in Healthcare Use Case 5
6 Palo Alto Networks Credential Theft Prevention How It Works Now that you re more familiar with the multiple layers of defenses in Palo Alto Networks Next-Generation Security Platform that work together to prevent credential theft, let s take a look at how these functionalities work. Medical staff Method: HTTP Post Username: doctor Password: password123 Next-generation firewall (edge) 10gin.c0mpany.com User-ID Agent Active Directory domain controller (read-only) Figure 5: How Credential Theft Prevention works on the next-generation firewall The Credential Theft Prevention function of the next-generation firewall requires access to a read-only domain controller (see Figure 5). This enables a lookup to compare user-submitted credentials against a given user s actual credentials stored in the domain controller. In addition, a User-ID technology agent is installed on the read-only domain controller. The User-ID agent builds a bloom filter a space-efficient, probabilistic data structure used to test whether an element is a member of a set that the firewall uses to look up credentials. The bloom filter, by design, cannot be used to extract the original password hashes. This architecture provides a high-performance yet secure way to ensure users in the hospital network cannot submit their enterprise credentials to illegitimate or uncategorized websites. Palo Alto Networks Multi-Factor Authentication How It Works There are two ways to implement MFA on Palo Alto Networks Next-Generation Security Platform. Web applications are protected differently from non-web-based applications. Protecting Web-Based Applications With MFA Products required: Palo Alto Networks Next-Generation Firewall Third-party multi-factor authentication product (Ping Identity, Duo, Okta) MFA is enabled for web-based applications by enabling the captive portal via a security policy on the next-generation firewall. To enable additional authentication factors beyond username and password, you can integrate the firewall with MFA vendors like Ping Identity, Okta and Duo, through RADIUS or vendor APIs. Refer to Figure 6 for a diagram that illustrates a high-level architecture for this scenario. Captive portal Internal medical staff MFA gateway (next-generation firewall) GP Internal users Healthcare applications Data center Mobile device for MFA Enabled through MFA vendors Figure 6: How MFA works for web-based applications Palo Alto Networks Prevent Credential Theft in Healthcare Use Case 6
7 Policy is configured on the MFA gateway, which is typically a next-generation firewall at the data center edge, to enforce MFA for a specific combination of web-based applications based on a group of IP addresses, or applications (with App-ID technology) and users (with User-ID). When the MFA gateway policy is triggered, the MFA gateway presents the user with a captive portal page. You can customize this page to match your organization s branding and standard web style. The captive portal page prompts the user for a username and password, then integrates with your selected MFA provider to prompt the user to validate the attempt via a mobile app. Protecting Non-Web-Based Applications With MFA Products required: Palo Alto Networks Next-Generation Firewall GlobalProtect client MFA is enabled for non-web-based applications, such as RDP, fat clients and SSH, using the GlobalProtect client in conjunction with the next-generation firewall, which acts as an MFA gateway for internal users and an external GlobalProtect gateway for external users. Refer to Figure 7, below, for an illustration of the high-level architecture for this scenario. Captive portal External GlobalProtect gateway (next-generation firewall at network edge) MFA gateway (next-generation firewall at data center edge) Healthcare applications Remote medical staff Internal medical staff Mobile device for MFA Enabled through MFA vendors Data center GP Remote users GP Internal users Figure 7: How MFA works for non-web-based applications Much like the previous scenario, policy is configured on the MFA gateway, which is typically a next-generation firewall at the data center edge, to enforce MFA for a specific combination of non-web-based applications based on a group of IP addresses or applications (with App-ID) and users (with User-ID). However, in this scenario, when the MFA gateway policy is triggered, the GlobalProtect client prompts the user to authenticate at the captive portal page (see Figure 8). You can customize this message however you like. Clicking this link will send the user to the captive portal page to start the multi-factor authentication process (the same as with browser-based HTTP applications). Figure 8: GlobalProtect notification to authenticate with MFA on the captive portal page Implementation Considerations in Healthcare As with any large-scale technology deployment, it is best to introduce MFA into a production healthcare environment in phases, and only after a successful proof of concept and testing. It is common for healthcare organizations with multiple locations to enable MFA in a test lab first, and then for specific users in IT prior to a phased deployment by location, beginning with those systems least likely to introduce issues with standards of patient care. Users in hospital and clinical locations should be the last group. Palo Alto Networks Prevent Credential Theft in Healthcare Use Case 7
8 Internal network segmentation can significantly bolster healthcare organizations efforts to mitigate the risk of lateral movement. Migration of a flat legacy hospital environment to a highly-segmented one requires careful planning, change management and adequate time to avoid negative publicity that could derail the project. It is certainly worth the effort, though, especially once the automation capabilities of the security platform show their value. Benefits of Using Palo Alto Networks to Prevent Credential Theft in Healthcare Business Benefits Decrease risk to patient data through improved technical security capabilities. Prevent unauthorized users and malicious content in hospital networks. Improve compliance with HIPAA, GDPR and other applicable data protection regulations. Operational Benefits Rely on technology, not just traditional user education, to prevent credential theft. Security Benefits Reduce risk of successful cyberattacks, including exfiltration of ephi. Prevent unauthorized users from conducting lateral movement across the network. Conclusion Hospitals and other healthcare providers will continue to be targeted by cyberattackers to exfiltrate PHI data from their networks. Credential theft remains the easiest and most effective method for attackers to do so. It s critical for healthcare organizations to re- examine the people and technology based strategies they are employing to directly combat this type of attack. Using Palo Alto Networks Next-Generation Security Platform, security teams can stop credential leakage, block access to phishing sites and enforce multi-factor authentication security policy in their networks. These capabilities add to the multiple layers of security defenses healthcare organizations need to prevent credential theft Tannery Way Santa Clara, CA Main: Sales: Support: Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo Alto Networks. A list of our trademarks can be found at paloaltonetworks.com/company/trademarks.html. All other marks mentioned herein may be trademarks of their respective companies.prevent-credential-theft-inhealthcare-uc
SECURITY PLATFORM FOR HEALTHCARE PROVIDERS
SECURITY PLATFORM FOR HEALTHCARE PROVIDERS Hundreds of hospitals, clinics and healthcare networks across the globe prevent successful cyberattacks with our Next-Generation Security Platform. Palo Alto
More informationZero Trust on the Endpoint. Extending the Zero Trust Model from Network to Endpoint with Advanced Endpoint Protection
Zero Trust on the Endpoint Extending the Zero Trust Model from Network to Endpoint with Advanced Endpoint Protection March 2015 Executive Summary The Forrester Zero Trust Model (Zero Trust) of information
More informationGLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications
GLOBALPROTECT Prevent Breaches and Secure the Mobile Workforce GlobalProtect extends the protection of Palo Alto Networks Next-Generation Security Platform to the members of your mobile workforce, no matter
More informationThe Next Generation Security Platform. Domenico Stranieri Pre- Sales Engineer Palo Alto Networks EMEA Italy
The Next Generation Security Platform Domenico Stranieri Pre- Sales Engineer Palo Alto Networks EMEA Italy The Next Generation Enterprise Security Platform Core Value Proposition An Enterprise Security
More informationwith Advanced Protection
with Advanced Email Protection OVERVIEW Today s sophisticated threats are changing. They re multiplying. They re morphing into new variants. And they re targeting people, not just technology. As organizations
More informationBuilding Resilience in a Digital Enterprise
Building Resilience in a Digital Enterprise Top five steps to help reduce the risk of advanced targeted attacks To be successful in business today, an enterprise must operate securely in the cyberdomain.
More information10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS
10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS WHITE PAPER INTRODUCTION BANKS ARE A COMMON TARGET FOR CYBER CRIMINALS AND OVER THE LAST YEAR, FIREEYE HAS BEEN HELPING CUSTOMERS RESPOND
More informationATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK
PARTNER BRIEF ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK INTRODUCTION Attivo Networks has partnered with Cisco Systems to provide advanced real-time inside-the-network
More information3 Ways to Prevent and Protect Your Clients from a Cyber-Attack. George Anderson Product Marketing Director Business October 31 st 2017
3 Ways to Prevent and Protect Your Clients from a Cyber-Attack George Anderson Product Marketing Director Business October 31 st 2017 Agenda One ounce of prevention is worth a pound of protection 01 Aiming
More informationDECRYPT SSL AND SSH TRAFFIC TO DISRUPT ATTACKER COMMUNICATIONS AND THEFT
DECRYPT SSL AND SSH TRAFFIC TO DISRUPT ATTACKER COMMUNICATIONS AND THEFT SUMMARY Industry Federal Government Use Case Prevent potentially obfuscated successful cyberattacks against federal agencies using
More informationSecurity and Compliance for Office 365
Security and Compliance for Office 365 [Proofpoint has] given us our time back to focus on the really evil stuff. CISO, Global 500 Manufacturer Like millions of businesses around the world, you may be
More informationWayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk
Wayward Wi-Fi How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk 288 MILLION There are more than 288 million unique Wi-Fi networks worldwide. Source: Wireless Geographic Logging
More informationBest Practices in Securing a Multicloud World
Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers
More informationOffice 365 Buyers Guide: Best Practices for Securing Office 365
Office 365 Buyers Guide: Best Practices for Securing Office 365 Microsoft Office 365 has become the standard productivity platform for the majority of organizations, large and small, around the world.
More informationTeradata and Protegrity High-Value Protection for High-Value Data
Teradata and Protegrity High-Value Protection for High-Value Data 12.16 EB7178 DATA SECURITY Table of Contents 2 Data Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:
More informationPrecisionAccess Trusted Access Control
Data Sheet PrecisionAccess Trusted Access Control Defeats Cyber Attacks Credential Theft: Integrated MFA defeats credential theft. Server Exploitation: Server isolation defeats server exploitation. Compromised
More informationWhite Paper. Why IDS Can t Adequately Protect Your IoT Devices
White Paper Why IDS Can t Adequately Protect Your IoT Devices Introduction As a key component in information technology security, Intrusion Detection Systems (IDS) monitor networks for suspicious activity
More informationWHITEPAPER ATTIVO NETWORKS THREATDEFEND PLATFORM AND THE MITRE ATT&CK MATRIX
WHITEPAPER ATTIVO NETWORKS THREATDEFEND PLATFORM AND THE MITRE ATT&CK MATRIX 1 INTRODUCTION The MITRE Corporation Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK ) Matrix provides a model
More informationIntegrated Access Management Solutions. Access Televentures
Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1
More informationVerizon Software Defined Perimeter (SDP).
Verizon Software Defined Perimeter (). 1 Introduction. For the past decade, perimeter security was built on a foundation of Firewall, network access control (NAC) and virtual private network (VPN) appliances.
More informationPROTECT WORKLOADS IN THE HYBRID CLOUD
PROTECT WORKLOADS IN THE HYBRID CLOUD SPOTLIGHTS Industry Aviation Use Case Protect workloads in the hybrid cloud for the safety and integrity of mission-critical applications and sensitive data across
More informationThe Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It
The Credential Phishing Handbook Why It Still Works and 4 Steps to Prevent It Introduction Phishing is more than 20 years old, but still represents more than 90% of targeted attacks. The reason is simple:
More informationPaloalto Networks PCNSA EXAM
Page No 1 m/ Paloalto Networks PCNSA EXAM Palo Alto Networks Certified Network Security Administrator Product: Full File For More Information: /PCNSA-dumps 2 Product Questions: 50 Version: 8.0 Question:
More informationATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS
PARTNER BRIEF ATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS INTRODUCTION Attivo Networks has partnered with McAfee to detect real-time in-network threats and to automate incident response
More informationConfigure Unsanctioned Device Access Control
Configure Unsanctioned Device Access Control paloaltonetworks.com/documentation Contact Information Corporate Headquarters: Palo Alto Networks 3000 Tannery Way Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-support
More informationGetting over Ransomware - Plan your Strategy for more Advanced Threats
Getting over Ransomware - Plan your Strategy for more Advanced Threats Kaspersky Lab Hong Kong Eric Kwok General Manager Lapcom Ltd. BEYOND ANTI-VIRUS: TRUE CYBERSECURITY FROM KASPERSKY LAB 20 years ago
More informationTHE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION
BREACH & ATTACK SIMULATION THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION Cymulate s cyber simulation platform allows you to test your security assumptions, identify possible security gaps and receive
More informationTHE ACCENTURE CYBER DEFENSE SOLUTION
THE ACCENTURE CYBER DEFENSE SOLUTION A MANAGED SERVICE FOR CYBER DEFENSE FROM ACCENTURE AND SPLUNK. YOUR CURRENT APPROACHES TO CYBER DEFENSE COULD BE PUTTING YOU AT RISK Cyber-attacks are increasingly
More informationPEOPLE CENTRIC SECURITY THE NEW
PEOPLE CENTRIC SECURITY THE NEW PARADIGM IN CYBERSECURITY David Karlsson SE Nordics March 2018 1 2018 Proofpoint, Inc. Proofpoint at a Glance LEADING CUSTOMERS DEEP SECURITY DNA UNIQUE VISIBILITY PARTNERS
More informationService. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution
Service SM Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Product Protecting sensitive data is critical to being
More informationSecuring Your Most Sensitive Data
Software-Defined Access Securing Your Most Sensitive Data Company Overview Digital Growth Means Digital Threats Digital technologies offer organizations unprecedented opportunities to innovate their way
More informationTRAPS ADVANCED ENDPOINT PROTECTION
TRAPS ADVANCED ENDPOINT PROTECTION Technology Overview Palo Alto Networks White Paper Most organizations deploy a number of security products to protect their endpoints, including one or more traditional
More informationSustainable Security Operations
Sustainable Security Operations Optimize processes and tools to make the most of your team s time and talent The number and types of security incidents organizations face daily are steadily increasing,
More informationGovernance Ideas Exchange
www.pwc.com.au Anatomy of a Hack Governance Ideas Exchange Robert Di Pietro October 2018 Cyber Security Anatomy of a Hack Cyber Security Introduction Who are the bad guys? Profiling the victim Insights
More informationWHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS
July 2018 WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS JUST WHAT THE DOCTOR ORDERED... PROTECT PATIENT DATA, CLINICAL RESEARCH AND CRITICAL INFRASTRUCTURE HEALTHCARE S KEY TO DEFEATING IOT CYBERATTACKS
More informationAPP-ID. A foundation for visibility and control in the Palo Alto Networks Security Platform
APP-ID A foundation for visibility and control in the Palo Alto Networks Security Platform App-ID uses multiple identification techniques to determine the exact identity of applications traversing your
More informationEBOOK. Stopping Fraud. How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats.
EBOOK Stopping Email Fraud How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats www.proofpoint.com EBOOK Stopping Email Fraud 2 Today s email attacks have
More informationSymantec Ransomware Protection
Symantec Ransomware Protection Protection Against Ransomware Defense in depth across all control points is required to stop ransomware @ Email Symantec Email Security.cloud, Symantec Messaging Gateway
More informationRSA INCIDENT RESPONSE SERVICES
RSA INCIDENT RESPONSE SERVICES Enabling early detection and rapid response EXECUTIVE SUMMARY Technical forensic analysis services RSA Incident Response services are for organizations that need rapid access
More informationSecuring Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)
Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF) A Guide to Leveraging Privileged Account Security to Assist with SWIFT CSCF Compliance Table of Contents Executive Summary...
More informationComprehensive Database Security
Comprehensive Database Security Safeguard against internal and external threats In today s enterprises, databases house some of the most highly sensitive, tightly regulated data the very data that is sought
More informationCisco Cloud Security. How to Protect Business to Support Digital Transformation
Cisco Cloud Security How to Protect Business to Support Digital Transformation Dragan Novakovic Cybersecurity Consulting Systems Engineer January 2018. Security Enables Digitization Digital Disruption,
More informationSecurity & Phishing
Email Security & Phishing Best Practices In Cybersecurity Presenters Bill Shieh Guest Speaker Staff Engineer Information Security Ellie Mae Supervisory Special Agent Cyber Crime FBI 2 What Is Phishing?
More informationSpotlight Report. Information Security. Presented by. Group Partner
Cloud SecuriTY Spotlight Report Group Partner Information Security Presented by OVERVIEW Key FINDINGS Public cloud apps like Office 365 and Salesforce have become a dominant, driving force for change in
More informationMcAfee Endpoint Security
McAfee Endpoint Security Frequently Asked Questions Overview You re facing new challenges in light of the increase of advanced malware. Limited integration between threat detection, network, and endpoint
More informationHow-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018
How-to Guide: Tenable.io for Microsoft Azure Last Updated: November 16, 2018 Table of Contents How-to Guide: Tenable.io for Microsoft Azure 1 Introduction 3 Auditing the Microsoft Azure Cloud Environment
More informationHow Breaches Really Happen
How Breaches Really Happen www.10dsecurity.com About Dedicated Information Security Firm Clients Nationwide, primarily in financial industry Services Penetration Testing Social Engineering Vulnerability
More informationMachine-Powered Learning for People-Centered Security
White paper Machine-Powered Learning for People-Centered Security Protecting Email with the Proofpoint Stateful Composite Scoring Service www.proofpoint.com INTRODUCTION: OUTGUNNED AND OVERWHELMED Today
More informationA Comprehensive CyberSecurity Policy
A Comprehensive CyberSecurity Policy Review of ALL NGFW Capabilities Attack Surface Reduction From Complex to Comprehensive Before and After of a PANW customer 1 2 1 Enhanced Policy on the L7 layer Leverage
More informationEntertaining & Effective Security Awareness Training
Entertaining & Effective Security Awareness Training www.digitaldefense.com Technology Isn t Enough Improve Security with a Fun Training Program that Works! Social engineering, system issues and employee
More informationSIEM: Five Requirements that Solve the Bigger Business Issues
SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered
More informationAUTHENTICATION. Do You Know Who You're Dealing With? How Authentication Affects Prevention, Detection, and Response
AUTHENTICATION Do You Know Who You're Dealing With? How Authentication Affects Prevention, Detection, and Response Who we are Eric Scales Mandiant Director IR, Red Team, Strategic Services Scott Koller
More informationTOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION
INFORMATION TECHNOLOGY SECURITY GUIDANCE TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION ITSM.10.189 October 2017 INTRODUCTION The Top 10 Information Technology (IT) Security
More informationCybersecurity Survey Results
Cybersecurity Survey Results 4 November 2015 DISCLAIMER: The views and opinions expressed in this presentation are those of the author and do not necessarily represent official policy or position of HIMSS.
More informationFIREWALL OVERVIEW. Palo Alto Networks Next-Generation Firewall
FIREWALL OVERVIEW Palo Alto Networks Next-Generation Firewall Fundamental shifts in application usage, user behavior, and complex, convoluted network infrastructure create a threat landscape that exposes
More informationmhealth SECURITY: STATS AND SOLUTIONS
mhealth SECURITY: STATS AND SOLUTIONS www.eset.com WHAT IS mhealth? mhealth (also written as m-health) is an abbreviation for mobile health, a term used for the practice of medicine and public health supported
More informationHow Enterprise Tackles Phishing. Nelson Yuen Technology Manager, Cybersecurity Microsoft Hong Kong
How Enterprise Tackles Phishing Nelson Yuen Technology Manager, Cybersecurity Microsoft Hong Kong Hackers turning to easy marks - Social engineering Phishing was the #1 threat vector (> 50%) for Office
More informationSOLUTION BRIEF ASSESSING DECEPTION TECHNOLOGY FOR A PROACTIVE DEFENSE
SOLUTION BRIEF ASSESSING DECEPTION TECHNOLOGY FOR A PROACTIVE DEFENSE 1 EXECUTIVE SUMMARY Attackers have repeatedly demonstrated they can bypass an organization s conventional defenses. To remain effective,
More information2018 Edition. Security and Compliance for Office 365
2018 Edition Security and Compliance for Office 365 [Proofpoint has] given us our time back to focus on the really evil stuff. CISO, Global 500 Manufacturer Like millions of businesses around the world,
More informationFIREWALL BEST PRACTICES TO BLOCK
Brought to you by Enterprie Control Systems FIREWALL BEST PRACTICES TO BLOCK Recent ransomware attacks like Wanna and Petya have spread largely unchecked through corporate networks in recent months, extorting
More information10 FOCUS AREAS FOR BREACH PREVENTION
10 FOCUS AREAS FOR BREACH PREVENTION Keith Turpin Chief Information Security Officer Universal Weather and Aviation Why It Matters Loss of Personally Identifiable Information (PII) Loss of Intellectual
More informationData Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle
Data Security and Privacy : Compliance to Stewardship Jignesh Patel Solution Consultant,Oracle Agenda Connected Government Security Threats and Risks Defense In Depth Approach Summary Connected Government
More informationSecurity for an age of zero trust
Security for an age of zero trust A Two-factor authentication: Security for an age of zero trust shift in the information security paradigm is well underway. In 2010, Forrester Research proposed the idea
More informationAre we breached? Deloitte's Cyber Threat Hunting
Are we breached? Deloitte's Cyber Threat Hunting Brochure / report title goes here Section title goes here Have we been breached? Are we exposed? How do we proactively detect an attack and minimize the
More informationRSA INCIDENT RESPONSE SERVICES
RSA INCIDENT RESPONSE SERVICES Enabling early detection and rapid response EXECUTIVE SUMMARY Technical forensic analysis services RSA Incident Response services are for organizations that need rapid access
More informationCyberArk Privileged Threat Analytics
CyberArk Privileged Threat Analytics Table of Contents The New Security Battleground: Inside Your Network 3 Privileged account security 3 Collect the right data 4 Detect critical threats 5 Alert on critical
More informationThe Cognito automated threat detection and response platform
Overview The Cognito automated threat detection and response platform HIGHLIGHTS Finds active cyberattackers inside cloud, data center and enterprise environments Automates security investigations with
More informationTraps Advanced Endpoint Protection
Traps Advanced Endpoint Protection Technology Overview March 2015 Dear Reader, Just three weeks before sitting down to write this letter, I was the chief information security officer for a large multi-national
More informationCloudSOC and Security.cloud for Microsoft Office 365
Solution Brief CloudSOC and Email Security.cloud for Microsoft Office 365 DID YOU KNOW? Email is the #1 delivery mechanism for malware. 1 Over 40% of compliance related data in Office 365 is overexposed
More informationProtecting Against Modern Attacks. Protection Against Modern Attack Vectors
Protecting Against Modern Attacks Protection Against Modern Attack Vectors CYBER SECURITY IS A CEO ISSUE. - M C K I N S E Y $4.0M 81% >300K 87% is the average cost of a data breach per incident. of breaches
More informationPrivileged Account Security: A Balanced Approach to Securing Unix Environments
Privileged Account Security: A Balanced Approach to Securing Unix Environments Table of Contents Introduction 3 Every User is a Privileged User 3 Privileged Account Security: A Balanced Approach 3 Privileged
More informationHow-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018
How-to Guide: Tenable Nessus for Microsoft Azure Last Updated: April 03, 2018 Table of Contents How-to Guide: Tenable Nessus for Microsoft Azure 1 Introduction 3 Auditing the Microsoft Azure Cloud Environment
More informationBUILD A NEXT-GENERATION SECURITY OPERATIONS CENTER
BUILD A NEXT-GENERATION SECURITY OPERATIONS CENTER SPOTLIGHTS Industry All Use Case Build a Next-Generation SOC What Is a Next-Generation SOC? A next-generation SOC is where information systems in the
More informationKeep the Door Open for Users and Closed to Hackers
Keep the Door Open for Users and Closed to Hackers A Shift in Criminal Your Web site serves as the front door to your enterprise for many customers, but it has also become a back door for fraudsters. According
More informationARTIFICIAL INTELLIGENCE POWERED AUTOMATED THREAT HUNTING AND NETWORK SELF-DEFENSE
ARTIFICIAL INTELLIGENCE POWERED AUTOMATED THREAT HUNTING AND NETWORK SELF-DEFENSE Vectra Cognito HIGHLIGHTS Finds active attackers inside your network Automates security investigations with conclusive
More informationTechnology Roadmap for Managed IT and Security. Michael Kirby II, Scott Yoshimura 04/12/2017
Technology Roadmap for Managed IT and Security Michael Kirby II, Scott Yoshimura 04/12/2017 Agenda Managed IT Roadmap Operational Risk and Compliance Cybersecurity Managed Security Services 2 Managed IT
More informationAKAMAI CLOUD SECURITY SOLUTIONS
AKAMAI CLOUD SECURITY SOLUTIONS Whether you sell to customers over the web, operate data centers around the world or in the cloud, or support employees on the road, you rely on the Internet to keep your
More informationVMware AirWatch Integration with Palo Alto Networks WildFire Integrate your application reputation service with AirWatch
VMware AirWatch Integration with Palo Alto Networks WildFire Integrate your application reputation service with AirWatch Multiple AirWatch versions Have documentation feedback? Submit a Documentation Feedback
More informationTRAPS ADVANCED ENDPOINT PROTECTION
TRAPS ADVANCED ENDPOINT PROTECTION Technology Overview Palo Alto Networks Traps White Paper Despite continuous investments in traditional and next-gen antivirus solutions, many organizations continue to
More informationCyber Security Stress Test SUMMARY REPORT
Cyber Security Stress Test SUMMARY REPORT predict prevent respond detect FINAL SCORE PREDICT: PREVENT: Final score: RESPOND: DETECT: BRILLIANT! You got a 100/100. That's as good as it gets. So take a second
More informationIsla Web Malware Isolation and Network Sandbox Solutions Security Technology Comparison and Integration Guide
Isla Web Malware Isolation and Network Sandbox Solutions Security Technology Comparison and Integration Guide How the Two Approaches Compare and Interoperate Your organization counts on its security capabilities
More informationDefend Against the Unknown
Defend Against the Unknown Stay ahead of new threats with McAfee Endpoint Threat Defense solutions Targeted exploits. Ransomware. Explosive growth in zero-day malware. Organizations are locked in an ongoing
More informationAN IPSWITCH WHITEPAPER. The Definitive Guide to Secure FTP
AN IPSWITCH WHITEPAPER The Definitive Guide to Secure FTP The Importance of File Transfer Are you concerned with the security of file transfer processes in your company? According to a survey of IT pros
More informationOne Hospital s Cybersecurity Journey
MAY 11 12, 2017 SAN FRANCISCO, CA One Hospital s Cybersecurity Journey SanFrancisco.HealthPrivacyForum.com #HITprivacy Introduction Senior Director Information Systems Technology, Children s Mercy Hospital
More informationCybersecurity The Evolving Landscape
Cybersecurity The Evolving Landscape 1 Presenter Zach Shelton, CISA Principal DHG IT Advisory Zach.Shelton@DHG.com Raleigh, NC 14+ years of experience in IT Consulting 11+ years of experience with DHG
More informationTHE BUSINESS CASE FOR OUTSIDE-IN DATA CENTER SECURITY
THE BUSINESS CASE FOR OUTSIDE-IN DATA CENTER SECURITY DATA CENTER WEB APPS NEED MORE THAN IP-BASED DEFENSES AND NEXT-GENERATION FIREWALLS table of contents.... 2.... 4.... 5 A TechTarget White Paper Does
More informationChecklist for Evaluating Deception Platforms
Checklist for Evaluating Deception Platforms With over 700 reported breaches occurring annually, a modern day adaptive security defense requires a combination of prevention, detection, response, and prediction
More informationTechnology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited
Technology Risk Management in Banking Industry Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited Change in Threat Landscape 2 Problem & Threats faced by Banking Industry
More informationDefense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation
Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client
More informationProtect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com
Protect Your Endpoint, Keep Your Business Safe. White Paper Exosphere, Inc. getexosphere.com White Paper Today s Threat Landscape Cyber attacks today are increasingly sophisticated and widespread, rendering
More informationWHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365
WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 Airwatch Support for Office 365 One of the most common questions being asked by many customers recently is How does AirWatch support Office 365? Customers often
More informationThe Top 6 WAF Essentials to Achieve Application Security Efficacy
The Top 6 WAF Essentials to Achieve Application Security Efficacy Introduction One of the biggest challenges IT and security leaders face today is reducing business risk while ensuring ease of use and
More informationCipherCloud CASB+ Connector for ServiceNow
ServiceNow CASB+ Connector CipherCloud CASB+ Connector for ServiceNow The CipherCloud CASB+ Connector for ServiceNow enables the full suite of CipherCloud CASB+ capabilities, in addition to field-level
More informationTABLE OF CONTENTS Introduction: IS A TOP THREAT VECTOR... 3 THE PROBLEM: ATTACKS ARE EVOLVING FASTER THAN DEFENSES...
The Guide TABLE OF CONTENTS Introduction: EMAIL IS A TOP THREAT VECTOR... 3 THE PROBLEM: ATTACKS ARE EVOLVING FASTER THAN EMAIL DEFENSES... 4 Today s Top Email Fraud Tactics...5 Advanced Malware...8 Outbound
More informationADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY
ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY OUTLINE Advanced Threat Landscape (genv) Why is endpoint protection essential? Types of attacks and how to prevent them
More informationAZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments
AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES To Secure Azure and Hybrid Cloud Environments Introduction Cloud is at the core of every successful digital transformation initiative. With cloud comes new
More informationWhat It Takes to be a CISO in 2017
What It Takes to be a CISO in 2017 Doug Copley Deputy CISO Sr. Security & Privacy Strategist February 2017 IMAGINE You re the CISO In Bangladesh Of a bank On a Friday when you re closed You realize 6 huge
More informationCABLE MSO AND TELCO USE CASE HANDBOOK
CALE MSO AND TELCO USE CASE HANDOOK ackground Service providers, including cable multiple-system operators, or MSOs, telecom network operators and other broadband providers, manage and secure multiple
More informationSECURING YOUR MICROSOFT ENVIRONMENT
SECURING YOUR MICROSOFT ENVIRONMENT From the Network to the Cloud to the Endpoint Your business relies on a Microsoft infrastructure that stretches from your network to the cloud to endpoints located around
More informationACTIONABLE SECURITY INTELLIGENCE
ACTIONABLE SECURITY INTELLIGENCE Palo Alto Networks ACC, Logging and Reporting Data is widely available. What is scarce is the ability to extract actionable intelligence from it. Palo Alto Networks next-generation
More information