{"id":104695,"date":"2019-12-31T06:00:23","date_gmt":"2019-12-31T14:00:23","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=104695"},"modified":"2020-07-09T16:34:13","modified_gmt":"2020-07-09T23:34:13","slug":"network-security-roundtable","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2019\/12\/network-security-roundtable\/","title":{"rendered":"10 Articles from Security Roundtable That You Shouldn\u2019t Miss"},"content":{"rendered":"<p><span style=\"font-weight: 400\">As we look back over the year, we\u2019d love to take this opportunity to highlight the work of Security Roundtable, powered by Palo Alto Networks, a resource for insightful and actionable information about cybersecurity.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">The mission of <\/span><a href=\"http:\/\/securityroundtable.org\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400\">Security Roundtable<\/span><\/a><span style=\"font-weight: 400\"> is to educate and inform C-level executives and other business leaders tasked with setting the tone for cybersecurity culture within their organizations. Security Roundtable publishes original articles by leading experts to provide objective, brand-agnostic opinions and best practices for the cybersecurity industry and the greater business world.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Here is Security Roundtable senior managing editor Flora Zhang\u2019s selection of top 10 pieces from 2019. The list covers topics from machine learning and cloud computing to guidance for executives coping with managing risks in a rapidly changing world to advice for returning to the basics of cyber hygiene. Take a read as we enter 2020.\u00a0\u00a0<\/span><\/p>\n<p>10. <a href=\"https:\/\/www.securityroundtable.org\/how-to-become-a-board-member-4-pointers-for-cios-and-cisos\/\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400\">How to Become a Board Member? 4 Pointers for CIOs and CISOs<\/span><\/a><\/p>\n<p>9. <a href=\"https:\/\/www.securityroundtable.org\/security-chiefs-dont-ignore-the-5g-future-its-coming-fast\/\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400\">Security Chiefs: Don\u2019t Ignore the 5G Future, It\u2019s Coming Fast<\/span><\/a><\/p>\n<p>8. <a href=\"https:\/\/www.securityroundtable.org\/the-growing-role-of-machine-learning-in-cybersecurity\/\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400\">The Growing Role of Machine Learning in Cybersecurity<\/span><\/a><\/p>\n<p>7. <a href=\"https:\/\/www.securityroundtable.org\/8-steps-to-simplify-cybersecurity\/\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400\">8 Steps to Simplify Cybersecurity<\/span><\/a><\/p>\n<p>6. <a href=\"https:\/\/www.securityroundtable.org\/a-cloud-security-strategy-that-executives-can-grok\/\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400\">A Cloud Security Strategy that Executives Can Grok<\/span><\/a><\/p>\n<p>5. <a href=\"https:\/\/www.securityroundtable.org\/why-automation-why-now\/\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400\">Why Automation, Why Now?<\/span><\/a><\/p>\n<p>4. <a href=\"https:\/\/www.securityroundtable.org\/data-security-is-risky-business-watch-out-for-sharks\/\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400\">Data Security Is Risky Business\u2013Watch Out for Sharks<\/span><\/a><\/p>\n<p>3. <a href=\"https:\/\/www.securityroundtable.org\/cios-dont-get-stuck-in-a-situational-leadership-trap\/\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400\">CIOs: Don\u2019t Get Stuck in a Situational Leadership Trap<\/span><\/a><\/p>\n<p>2. <a href=\"https:\/\/www.securityroundtable.org\/phishing-isnt-going-away-heres-how-to-not-fall-prey\/\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400\">Phishing Isn\u2019t Going Away<\/span><\/a><\/p>\n<p>1. <a href=\"https:\/\/www.securityroundtable.org\/whats-old-is-new-back-to-security-basics-with-good-cyber-hygiene\/\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400\">What\u2019s Old Is New: Back to Security Basics with Good Cyber Hygiene<\/span><\/a><\/p>\n<p>Want to read more about the year in cybersecurity? Read \"<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/12\/cybersecurity-trends\/\">Palo Alto Networks Cybersecurity Trends: Expert and Customer Insights, Visionary Products<\/a>.\"<\/p>\n<p><i><span style=\"font-weight: 400\">This list of top posts originally appeared on <\/span><\/i><a href=\"https:\/\/www.securityroundtable.org\/2019-most-popular-articles-on-security-roundtable\/\" rel=\"nofollow,noopener\" ><i><span style=\"font-weight: 400\">Security Roundtable<\/span><\/i><\/a><i><span style=\"font-weight: 400\">.<\/span><\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Read outlooks from Security Roundtable on machine learning, cloud computing and how executives can manage risks in a rapidly changing world. <\/p>\n","protected":false},"author":663,"featured_media":103958,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6724,6765],"tags":[2669],"coauthors":[6844],"class_list":["post-104695","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-points-of-view","category-secure-the-enterprise","tag-security-roundtable"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/11\/CS-trusting-the-cloud-r2d1-800x418.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/104695","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/663"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=104695"}],"version-history":[{"count":4,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/104695\/revisions"}],"predecessor-version":[{"id":113622,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/104695\/revisions\/113622"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/103958"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=104695"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=104695"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=104695"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=104695"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}