Experience Palo Alto Networks
at Black Hat USA

The industry’s most innovative cybersecurity portfolio

Join Palo Alto Networks at Black Hat USA 2021

Palo Alto Networks is a proud Titanium Sponsor of Black Hat USA 2021. We have many exciting opportunities for you, whether you’re attending this event in Las Vegas or virtually from the comfort of your home.

We hope you’ll join us! Don’t miss the Palo Alto Networks experience at Black Hat USA 2021!

Business Hall Booth

Wednesday, August 4, 8:30 a.m. – 5 p.m. PDT
Thursday, August 5, 8:30 a.m. – 4 p.m. PDT

If you’re attending in person, you can interact with Palo Alto Networks by visiting our booth or joining our session.

We’ll be showcasing six business segments and offering a live feed of the Black Hat NOC. Swag and a giveaway each day!

An Inside-Out View of the Cyber Pandemic

Wednesday, August 4, 11:30 a.m. – 12:20 p.m. PDT

While it sounds cliche (and a bit alarmist) to use the term pandemic, that’s exactly what we’re facing. Ransomware attacks as well as double, triple and quadruple extortion, state-sponsored attacks, and other cybercrimes are affecting organizations worldwide – every minute. That’s why it’s imperative to understand your adversaries, reexamine your security posture and make significant changes that would otherwise be difficult in relative peacetime.

With our threat intelligence, incident response and product development teams working together, Palo Alto Networks sees attacks from a very different perspective. During this discussion, security experts will share an inside-out view of the cyber pandemic from the front lines, provide detailed intelligence and offer practical guidance on how we are evolving our technology so you can rethink your defenses.

  • Tim Junio, SVP, Products, Cortex
  • Wendi Whitmore, SVP, Cyber Consulting & Threat Intelligence

  • Virtual Booth

    Wednesday, August 4, 8:30 a.m. – 5 p.m. PDT
    Thursday, August 5, 8:30 a.m. – 4 p.m. PDT

    If you’re attending Black Hat USA 2021 from the comfort of your home, you can interact with Palo Alto Networks by visiting our virtual booth or by attending our virtual sessions.

    We’ll be showcasing six business segments, videos and white papers. Don’t forget to participate in our virtual swag bag!

    A Year of Container Attacks and a Very Vulnerable Docker Honeypot

    Wednesday, August 4, 11:20 – 11:40 a.m. PDT

    What happens when you leave a Docker daemon exposed for over a month? We’re taking a look back at a year of threat research on container security, including highlights of the creative ways attackers are targeting containers. Then, we’ll run the numbers and provide examples of the attacks experienced when a Docker daemon is left with a common misconfiguration. Learn the real-world consequences of leaving a container misconfigured.

  • Aviv Sasson, Sr. Staff Researcher, Unit 42
  • Taylor Smith, Sr. Product Marketer, Prisma Cloud

    Design and Deploy Zero Trust Network Security with a
    Next-Generation Identity Architecture

    Thursday, August 5, 2021, 10:50 – 11:10 a.m. PDT

    Identity is a critical component of a Zero Trust approach to network security. With enterprises increasingly migrating from on-prem to cloud identity providers, and users connecting everywhere, it’s difficult to keep security and identity connected and in sync across the network. Networks are designed for a single source of identity, and this can lead to inconsistent security between data centers, campus networks, public clouds, and hybrid environments.

    In this session, Imran Bashir will describe a new cloud-based architecture for identity designed to authenticate and authorize users against various identity sources, whether they’re on-prem, in the cloud, or a hybrid scenario. He’ll describe its applicability to identity-based policies, simplified cloud authentication, and optimized performance for use case policies. Then he’ll close with a short demo of the technology.

  • Imran Bashir, Principal Technical Marketing Engineer

    Cortex XDR vs. SolarWinds and HAFNIUM

    Recent high-impact attacks are raising concerns about whether advanced threat actors have the upper hand over enterprise security. SolarWinds showed how effective an adversary could be by subverting the trust we have in our technology vendors, and HAFNIUM is teaching us just how vulnerable we are against a weaponized exploit on an exposed service – even when a patch is available. This session will analyze what made these attacks so effective, the methods the attackers used and what it takes to prevail with Cortex® XDR™.

  • Yoni Allon, Director, Research
  • Peter Havens, Director, Product Marketing