Just Another Day On the Internet
Notice: See below for CPE Policy
Unit 42 is the global threat intelligence team at Palo Alto Networks and a recognized authority on cyberthreats. The team are experts in hunting and collecting unknown threats as well as completely reverse-engineering malware using code analysis. They will share the high-quality, in-depth research that provides insight into tools, techniques, and procedures threat actors execute to compromise organizations. They will provide context to explain the nuts and bolts of attacks as well as who’s executing them and why so that defenders globally can gain visibility into threats to better defend their business against them.
Please join us as we will discuss the following during the webinar:
- Overview of the current threat landscape
- Threat actors and their motivations
- Techniques behind the threats
- Resources, best practices and defenses
A better understanding of the actual threats we face as defenders, affords us the opportunity to proactively optimize our defenses to face them.
There are no upcoming events to display at this time.
Event Sponsored By
Cortex XDR and PCI Compliance Whitepaper is provided complimentary by Palo Alto Networks, our September webinar sponsor.
About Our Speaker
Principal Researcher, Palo Alto Networks
Simon Conant is a Principal Researcher in Palo Alto Networks’ Unit 42 threat research group.
He draws upon a quarter-century of international experience in the fields of malware & infrastructure analysis, networking, and information security, including several years in the Microsoft Security Response Center. He was involved in founding Microsoft’s CSS Security & Internet Crime Investigation teams, and the International Botnet Task Force.
Subsequently he has worked in threat intelligence and analysis in the financial sector and for a large international law firm. Simon now researches malware, campaigns and actors, with Unit 42, and is a recent recipient of the FBI Director’s award.
5:00 PM – 6:15 PM: Webinar Session
Time Details: 1 CPE Credit for the webinar
|ISACA, IIA, ISSA,
*Virtual education events (e.g. Webinars) CPEs
Qualifications for one CPE require attendees to be online for at least 50 minutes and answer at least 3 posted polling questions.
Polling participations are recorded and reviewed for CPE qualifications.
CPE certificates are emailed to attendees within a week of the completion of the live webinar.
If recorded webinars are viewed, CPEs should be self-reported. The chapter only provides formal CPEs for attendance of live virtual events.
ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation. Subject to the rights granted in all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.
*Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.
*Permission to be Photographed, Videotaped, and Recorded
By attending this event, the registrant grants permission to be photographed, videotaped, and recorded during the event (in person or virtual). The resultant photographs, video recordings and virtual event recordings may be used by ISACA for future promotion of ISACA’s educational events on ISACA’s web site, on social media and/or in printed promotional materials, and by attending this event, the registrant consents to any such use. The registrant understands any use of the photographs, video recordings and virtual event recordings will be without remuneration. The registrant also waives any right to inspect or approve the aforementioned use of any photographs, video recordings and virtual event recordings now or in the future.