Data base for:

  • Conferences
  • Research funding opportunities
  • Competitions / Awards

Register for free and add any data by yourself!

Filter conferences

 
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
 
      
      
 
      
 
      
      
      
      
      
      
      
      
      
      
Palo Alto Networks: Are You AI Ready?

Palo Alto Networks: Are You AI Ready?

Date of beginning

Thursday, 16 May 2019

Duration

1 day

City

San Pedro Garza GarcĂ­a, N.L.

Country

Mexico

Contact

Palo Alto Networks

E-Mail

This email address is being protected from spambots. You need JavaScript enabled to view it.

Memo

Artificial Intelligence and Machine Learning are revolutionizing security for ICS / SCADA industrial networks "It is estimated that until 2023, 99% of attacks on the firewall will be caused by incorrect configurations, not by firewall failures." - Gartner, Technology Insight for Network Security Policy Management We believe that network security for ICS / SCADA environments should be simple. The best security results emerge from an integrated platform of high performance, which is effective and easy to operate. We invite you to enjoy an exquisite dinner at our specialized security seminar for ICS / SCADA networks, which will take place at the Quinta Real Hotel, on Thursday, May 16, at 6:00 p.m.Our experts will address the most common security challenges in ICS / SCADA networks: segmentation in industrial networks, most common threats, and how to adopt a Zero Trust approach. You will learn about the fastest and most efficient integrated cybersecurity platform in the industry, which simplifies and maximizes safety in industrial environments. In this event, we will review the following topics in detail: - Specialized security for industrial environments ICS / SCADA to prevent and detect any possible threat - Detection of malware and specific exploits of Operational Technology (OT) - Extension of protection for all devices. - Identification and automatic prevention of threats.- Implementation of the Zero Trust methodology to minimize potential vulnerabilities in the network - Best security practices for ICS / SCADA networks