<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Threat Vector | Securing the Insecurable: Inside the Black Hat NOC and Zero-Hour Resilience in Threat Vector</title>
    <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-securing-the-insecurable-inside-the-black-hat-noc/ta-p/1235545</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat Vector Template.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68777i37D3A01A26A6C5F3/image-size/large?v=v2&amp;amp;px=999" role="button" title="Threat Vector Template.jpg" alt="Threat Vector Template.jpg" /&gt;&lt;/span&gt;&lt;BR /&gt;In this episode of Threat Vector, host &lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/davidrmoulton/" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;David Moulton&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; speaks with &lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/jason-reverri-84801611" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Jason Reverri&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;, Manager of Technical Product Engineering for Cortex at Palo Alto Networks, and &lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/hollandj/" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;James Holland&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;, Distinguished Engineer for Technology Innovation at Palo Alto Networks, about the unique challenge of defending Black Hat—one of the world’s most complex cybersecurity events.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Key Discussion Points:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Real-time threat response&lt;/STRONG&gt;&lt;SPAN&gt;: How the NOC team responds to live exploitation of vulnerabilities disclosed moments earlier during conference talks&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Dedicated network architecture&lt;/STRONG&gt;&lt;SPAN&gt;: Why Black Hat requires its own bespoke network infrastructure rather than venue systems for complete visibility and control&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Massive scale operations&lt;/STRONG&gt;&lt;SPAN&gt;: Managing over 900 million threat events annually while distinguishing between training scenarios and genuine malicious activity&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;AI-driven automation&lt;/STRONG&gt;&lt;SPAN&gt;: How &lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/cortex/cortex-xsiam" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Cortex XSIAM&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; automates 80% of initial triage, freeing analysts to focus on high-priority incidents&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG style="font-family: inherit;"&gt;Multi-vendor collaboration&lt;/STRONG&gt;&lt;SPAN&gt;: Coordinating real-time security operations with partners including Arista, Cisco, and Corelight&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;Join the conversation on our social media channels:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Website&lt;/STRONG&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/unit42" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.paloaltonetworks.com/&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Threat Research:&lt;/STRONG&gt;&lt;A href="https://unit42.paloaltonetworks.com/" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Facebook:&lt;/STRONG&gt;&lt;A href="https://www.facebook.com/LifeatPaloAltoNetworks/" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;LinkedIn:&lt;/STRONG&gt;&lt;A href="https://www.linkedin.com/company/unit42/" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;YouTube:&lt;/STRONG&gt; &lt;SPAN&gt;@paloaltonetworks&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Twitter:&lt;/STRONG&gt;&lt;A href="https://twitter.com/PaloAltoNtwks" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;A href="https://twitter.com/PaloAltoNtwks%E2%81%A0%E2%81%A0%E2%81%A0%E2%81%A0" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠&lt;/SPAN&gt; &lt;BR /&gt;&lt;BR /&gt;&lt;IFRAME src="https://playlist.megaphone.fm?e=CYBW8022513908" width="100%" height="200" frameborder="0" scrolling="no"&gt;&lt;/IFRAME&gt; &lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;</description>
    <pubDate>Thu, 07 Aug 2025 16:00:00 GMT</pubDate>
    <dc:creator>dmoulton</dc:creator>
    <dc:date>2025-08-07T16:00:00Z</dc:date>
    <item>
      <title>Threat Vector | Securing the Insecurable: Inside the Black Hat NOC and Zero-Hour Resilience</title>
      <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-securing-the-insecurable-inside-the-black-hat-noc/ta-p/1235545</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat Vector Template.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68777i37D3A01A26A6C5F3/image-size/large?v=v2&amp;amp;px=999" role="button" title="Threat Vector Template.jpg" alt="Threat Vector Template.jpg" /&gt;&lt;/span&gt;&lt;BR /&gt;In this episode of Threat Vector, host &lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/davidrmoulton/" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;David Moulton&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; speaks with &lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/jason-reverri-84801611" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Jason Reverri&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;, Manager of Technical Product Engineering for Cortex at Palo Alto Networks, and &lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/hollandj/" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;James Holland&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;, Distinguished Engineer for Technology Innovation at Palo Alto Networks, about the unique challenge of defending Black Hat—one of the world’s most complex cybersecurity events.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Key Discussion Points:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Real-time threat response&lt;/STRONG&gt;&lt;SPAN&gt;: How the NOC team responds to live exploitation of vulnerabilities disclosed moments earlier during conference talks&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Dedicated network architecture&lt;/STRONG&gt;&lt;SPAN&gt;: Why Black Hat requires its own bespoke network infrastructure rather than venue systems for complete visibility and control&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Massive scale operations&lt;/STRONG&gt;&lt;SPAN&gt;: Managing over 900 million threat events annually while distinguishing between training scenarios and genuine malicious activity&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;AI-driven automation&lt;/STRONG&gt;&lt;SPAN&gt;: How &lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/cortex/cortex-xsiam" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Cortex XSIAM&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; automates 80% of initial triage, freeing analysts to focus on high-priority incidents&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG style="font-family: inherit;"&gt;Multi-vendor collaboration&lt;/STRONG&gt;&lt;SPAN&gt;: Coordinating real-time security operations with partners including Arista, Cisco, and Corelight&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;Join the conversation on our social media channels:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Website&lt;/STRONG&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/unit42" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.paloaltonetworks.com/&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Threat Research:&lt;/STRONG&gt;&lt;A href="https://unit42.paloaltonetworks.com/" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Facebook:&lt;/STRONG&gt;&lt;A href="https://www.facebook.com/LifeatPaloAltoNetworks/" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;LinkedIn:&lt;/STRONG&gt;&lt;A href="https://www.linkedin.com/company/unit42/" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;YouTube:&lt;/STRONG&gt; &lt;SPAN&gt;@paloaltonetworks&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Twitter:&lt;/STRONG&gt;&lt;A href="https://twitter.com/PaloAltoNtwks" target="_blank" rel="noopener"&gt; &lt;SPAN&gt;⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/A&gt;&lt;A href="https://twitter.com/PaloAltoNtwks%E2%81%A0%E2%81%A0%E2%81%A0%E2%81%A0" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠&lt;/SPAN&gt; &lt;BR /&gt;&lt;BR /&gt;&lt;IFRAME src="https://playlist.megaphone.fm?e=CYBW8022513908" width="100%" height="200" frameborder="0" scrolling="no"&gt;&lt;/IFRAME&gt; &lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;</description>
      <pubDate>Thu, 07 Aug 2025 16:00:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-securing-the-insecurable-inside-the-black-hat-noc/ta-p/1235545</guid>
      <dc:creator>dmoulton</dc:creator>
      <dc:date>2025-08-07T16:00:00Z</dc:date>
    </item>
  </channel>
</rss>

