No events found
In this webinar you'll learn how to bring together leading practice capabilities across the SOC to enable your team to capitalize on data, harness expert knowledge, and speed response times.Watch Now
Threat hunting is a challenging, complex and time consuming exploratory activity. Threat hunters must explore, prioritize & investigate threats, gather data with context, connect disparate pieces of data, and conduct rapid and relevant analysis. Unfortunately today's tools get in the way and prevent the analyst from doing what they do best - hunt threats. Join our webinar and see firsthand how threat hunting teams can realize their full potential.Watch Now
Does your cybersecurity program include MISP? Because it should. SOC teams must constantly consume and analyze cyber threat intelligence to gain a better understanding of extant threats. However, there are varying levels of integration difficulty and challenges to operationalizing threat data. MISP offers a flexible structure for threat intelligence sharing at a global scale, and with Devo as the data engine, MISP provides improved visibility into IOCs for faster detection and response. Join us to find out why – and how – to make MISP a core element of your cybersecurity program.Watch Now
In the future state of IT Ops, simplicity is the key to unlocking performance and visibility in complex environments. Legacy approaches and complex tool stacks can’t keep up with the realities of multi-cloud architectures, massively larger data streams and automation as a workload. Organizations need a no-compromise log management platform with unparalleled scale, speed and extensibility to deliver the insight and actionable context that matters to the business.Register Now
At Spark Boston, you’ll network with fellow Palo Alto Networks users in the Boston area and hear the latest updates and threat research from Palo Alto Networks. Spark Boston will feature sessions to enhance your skills, including hands-on workshops and collaborative sessions so you will be able to take home actionable solutions and strategies for key security issues.Learn More
Join top cybersecurity leaders and a dedicated community of peers as we exchange the biggest, boldest ideas that will help propel the industry forward.