Public Sector Ignite 2025
Registration is closedThis event has been postponed and registration is currently closed. For any inquiries, please contact
[email protected] . Organizations around the globe are riding a wave of disruption—ramping up their operations with investments in generative AI to increase automation, improve content and services, and enhance employee experiences. Welcome to the future of cybersecurity.At Public Sector Ignite, we...
Branch Transformation with SD-WAN
Your branch has evolved—shouldn't your SD-WAN? As businesses shift to hybrid workplaces and embrace the cloud, it's essential to rethink branch networking. Next-Gen SD-WAN and SASE solutions are revolutionizing the way organizations unify security, simplify infrastructure, and enhance user experiences on a global scale.Webinar Highlights:In our Masterclass, you’ll discover how Prisma SD-WAN can drive operational efficiencies, boost...
Runtime Protection Bootcamp
Welcome to the Runtime Protection Bootcamp — where expertise meets hands-on action. Get ready for an immersive session guided by cloud security experts and stay ahead of evolving threats.What You’ll ExperienceHost, Container and Serverless Protection: Understand best practices for securing workloads at runtime with confidence.Hands-on Training: Dive into practical, expert-led sessions to elevate your cloud security skills.Prisma Cl...
Shift Left Bootcamp
Elevate Your Cloud Security GameWelcome to the Shift Left Bootcamp — where expertise meets hands-on action. Get ready for an immersive session guided by cloud security experts. What You’ll ExperienceHands-on Training: Dive into a practical expert-led session focused on shifting security left and securing applications by design.Cloud-Native Best Practices: Uncover best practices for securing apps and infrastructure from code to clou...
Into the Future: A trip to the Palo Alt...
AI and automation are the future of cybersecurity. However, the future is already here at the Palo Alto Networks SOC.Our security operations team handles 1 trillion events per month that trigger an average of 4,000 threat incidents. And over 90% of those threats are automatically triaged within our SOC.Want to see how we do it? Join us on a one-hour virtual SOC tour. See how our SecOps team applies Cortex� machine learning and AI models to dri...
Hands-on Investigations: Ransomware Edition
The situation: Your boss has read the 2023 Unit 42 Ransomware and Extortion Threat Report. After being alerted of a possible cyberattack targeting your company, concerns arise. You now have 60 minutes to report back if any departments have been affected. How fast can you deliver?Join this 45-minute session where attendees will dive into how Cortex XDR�:Determines if any users are victims.Collects endpoint, network and forensics events about th...
Enterprise IoT Hands-on Workshop
Did you know that 30% of connected devices on an enterprise network are IoT devices that are unseen, unmanaged and unprotected? What if you could discover 90% of your devices in 48 hours while paving the way for comprehensive Zero Trust?Join Palo Alto Networks for an interactive hands-on workshop and learn how you can eliminate implicit trust and enforce least privilege access with continuous verification and inspection capabilities. Sign up f...
The Power of AI in Action
Security teams have an important job: to protect the organization from an ever-evolving threat landscape. With growing amounts of data, ever-changing threats and the sheer volume of security alerts, this can feel overwhelming. But there is a better way. Cortex XSIAM� unites SOC capabilities that include XDR, SOAR, SIEM, ASM and others into a single SecOps platform. It empowers security analysts with AI-driven outcomes and an automation-first a...
Revolutionizing Cloud Data Security wit...
As data volumes continue to soar and regulations become increasingly stringent, organizations grapple with the challenge of comprehending their sensitive data, controlling access to it and pinpointing potential vulnerabilities. To regain visibility and control, forward-thinking organizations are turning to data security posture management coupled with data detection and response. In this session, you'll learn:The security and compliance risks...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.