{"id":10941,"date":"2015-11-16T06:00:51","date_gmt":"2015-11-16T14:00:51","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=10941"},"modified":"2015-11-13T16:23:18","modified_gmt":"2015-11-14T00:23:18","slug":"on-demand-webcast-reassessing-the-cyber-threat-landscape","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/11\/on-demand-webcast-reassessing-the-cyber-threat-landscape\/","title":{"rendered":"On Demand Webcast: Reassessing the Cyber Threat Landscape"},"content":{"rendered":"<p>Government organizations are often vulnerable to cyber threats when their various teams run their networks in silos and fail to work together to secure the network and prevent threats.<\/p>\n<p>Threat prevention is possible. Access the <a href=\"https:\/\/fcw.com\/webcasts\/2015\/11\/palo-alto-cybersecurity-webcast-110415.aspx?tc=page0\" rel=\"nofollow,noopener\"  target=\"_blank\">Reassessing the Cyber Threat Landscape On Demand webcast<\/a> to learn about strategies and best practices for tracking and mitigating threats to the government enterprise.<\/p>\n<p>Topics will cover:<!--more--><\/p>\n<ul>\n<li>Advances in technology that could help deal with advances in threats<\/li>\n<li>The challenge of keeping a cyber strategy from growing too complex<\/li>\n<li>The role of automation in a cyber strategy<\/li>\n<\/ul>\n<p>The On Demand webinar will be available for a short period of time. <a href=\"https:\/\/fcw.com\/webcasts\/2015\/11\/palo-alto-cybersecurity-webcast-110415.aspx?tc=page0\" rel=\"nofollow,noopener\" >Watch now<\/a>.<\/p>\n<h3>Presenters<\/h3>\n<p><strong>Mark Weatherford<br \/>\n<\/strong>Principal at the Chertoff Group and former Deputy Undersecretary for Cybersecurity at the U.S. Department of Homeland Security<\/p>\n<p><strong>Pamela Warren<br \/>\n<\/strong>Director, Government &amp; Industry Initiatives at Palo Alto Networks<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Government organizations are often vulnerable to cyber threats when their various teams run their networks in silos and fail to work together to secure the network and prevent threats. Threat prevention is &hellip;<\/p>\n","protected":false},"author":156,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[484],"tags":[1567,1566,97],"coauthors":[1546],"class_list":["post-10941","post","type-post","status-publish","format-standard","hentry","category-government","tag-chertoff-group","tag-reassessing-the-cyber-threat-landscape","tag-webinar"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10941","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/156"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=10941"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10941\/revisions"}],"predecessor-version":[{"id":10996,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10941\/revisions\/10996"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=10941"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=10941"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=10941"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=10941"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}