Best Practices for Cyber Risk Management in the Digital Age

In the digital age, functional leaders within an organization must be proactive in their approach to cybersecurity. Join us on November 19, 2015 at 2:00 p.m. EST for a discussion on how you and your organization can prepare, implement, and respond to cyber threats.

Discussion Topics

Planning for Prevention: Setting a New Tone for Cybersecurity

Mark McLaughlin, CEO, Palo Alto Networks

Making It Work: Implementing and Maintaining Effective Cyber Risk Management

Jamey Cummings, Senior Client Partner, Korn Ferry

In Case of Emergency…: A Full-Spectrum View of Cyber Incident Response

Gus Coldebella, Principal, Fish & Richardson P.C.

Register for Cyber Risk Management in the Digital Age

Host: Adam Sodowick, President, NYSE Governance Services
November 19, 2015 at 2:00 p.m. EST

The discussion topics of this webinar are based on the new book from NYSE and Palo Alto Networks, Navigating the Digital Age. Get your copy of the book here.

[Palo Alto Networks Blog]

Palo Alto Networks Researcher Discovers Critical Vulnerabilities in Internet Explorer and Microsoft Edge

Palo Alto Networks researcher Bo Qu was credited with discovery of six new critical Microsoft vulnerabilities affecting Internet Explorer (IE) versions 7, 8, 9, 10 and 11 and Microsoft Edge. These vulnerabilities are covered in Microsoft’s November 2015 Security Bulletin and documented in Microsoft Security Bulletins MS15-112 and MS15-113.

In our continuing commitment to the security research community, these vulnerabilities were disclosed to Microsoft through our participation in the Microsoft Active Protections Program (MAPP) program, which ensures the timely, responsible disclosure of new vulnerabilities and creation of protections from security vendors.

Palo Alto Networks is a regular contributor to vulnerability research. Previous critical Microsoft vulnerability discoveries from the past 18 months included: 

By proactively identifying these vulnerabilities, developing protections for our customers, and sharing them with Microsoft for patching, we are removing weapons used by attackers to compromise enterprise, government and service provider networks.

[Palo Alto Networks Blog]

Configuration and Change Management in Network Security – Ensuring the Left Hand Knows What the Right Hand Is Doing

Multiple security deployments, distributed networks, and several administrators – these are just some of the causes that make it increasingly tough to stay on top of effective security policies, compliance and streamlined management of your network security. Changes in one part of your network may negatively impact the effectiveness of your security in another part, and you may not even be aware of all the changes before they are being committed. It’s a case of the left hand not knowing what the right hand is doing.

The good news is that there are steps any organization can take to make the configuration and ongoing management of security deployments easier and more secure. Network security management streamlines configuration and management, as well as visibility into threats. In addition, security orchestration ensures that all security rules and policies work well together and don’t cancel out each other’s effectiveness.

Let’s take a closer look at network security management and security orchestration, and how Palo Alto Networks and Tufin, one of our technology partners, work together to offer both, providing streamlined, secure, and compliant network security.

Network Security Management by Palo Alto Networks

It all starts with the setup and configuration of your security deployment. Deploying an effective network security management solution that reduces duplication of work and human error, and offers the power to manage all policies with one security rule base, is key in streamlining management of any security deployment.

A good network security management solution, such as Palo Alto Networks Panorama, also provides central visibility into all network traffic and consolidates multiple management consoles into one.

Panorama provides effective and efficient network security management in all of the above areas. Learn more about Panorama.

Security Orchestration by Tufin

While Panorama provides streamlined configuration and management of your next-generation security deployment, the security orchestration suite by Tufin ensures any network changes happen harmoniously across your network and don’t impact security or compliance negatively.

With a security orchestration suite, you can deploy and coordinate not just one security rule base across one distributed security deployment but also multiple security rule bases across multiple security technologies. Security orchestration ensures no changes in your security deployment are being implemented that could jeopardize your security posture or compliance with important regulations.

Learn more about how security orchestration by Tufin can help in your security deployments.

These two solutions are nicely integrated and increase security, compliance, and streamlined management capabilities. Learn more about the combined Palo Alto Networks and Tufin solution.

[Palo Alto Networks Blog]

English
Exit mobile version