{"id":10972,"date":"2015-11-15T17:00:42","date_gmt":"2015-11-16T01:00:42","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=10972"},"modified":"2017-12-20T11:05:15","modified_gmt":"2017-12-20T19:05:15","slug":"a-view-into-the-cyber3-conference-crafting-security-in-a-less-secure-world","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/11\/a-view-into-the-cyber3-conference-crafting-security-in-a-less-secure-world\/","title":{"rendered":"A View Into the Cyber3 Conference \u2013 Crafting Security in a Less Secure World"},"content":{"rendered":"<p>Palo Alto Networks was a Gold\u00a0sponsor of the official side program of the \u201cCyber<sup>3<\/sup> Conference Okinawa 2015\u2014Crafting Security in a Less Secure World\u201d, an international cybersecurity conference hosted by the Government of Japan in Okinawa from 7-8 November 2015.\u00a0The conference featured three separate themes which were closely interconnected and interdependent: <strong><em>Cyber Connection<\/em><\/strong><em>, <strong>Cyber Security<\/strong>, <\/em>and <strong><em>Cybercrime<\/em><\/strong><em>.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<p>Held concurrently with the conference, the official side program, which included two Education track sessions, offered the opportunity for conference participants and global leading companies in the cyberspace to discuss comprehensive security measures.<\/p>\n<p>In addition, Palo Alto Networks held a press conference to announce its <a href=\"http:\/\/connect.paloaltonetworks.com\/autr-report\" target=\"_blank\">2015 Application Threat Usage Report (AUTR)<\/a> as well as several media interactions.\u00a0Last but not least, Palo Alto Networks also hosted dinner and networking events throughout the conference.<\/p>\n<p>The event was a great success. Take a look at some of the photos from the event below!<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Cyber3-Blog-2.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:75%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10974 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Cyber3-Blog-2-500x375.png\" alt=\"Cyber3 Blog 2\" width=\"500\" height=\"375\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Cyber3-Blog-2-500x375.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Cyber3-Blog-2-230x173.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Cyber3-Blog-2-400x300.png 400w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Cyber3-Blog-2-53x40.png 53w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Cyber3-Blog-2.png 865w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><em>Application Usage and Threat Report (AUTR) press conference<\/em><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Cyber3-Blog-4.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:75%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-10976 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Cyber3-Blog-4-500x375.png\" alt=\"Cyber3 Blog 4\" width=\"500\" height=\"375\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Cyber3-Blog-4-500x375.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Cyber3-Blog-4-230x173.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Cyber3-Blog-4-400x300.png 400w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Cyber3-Blog-4-53x40.png 53w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/Cyber3-Blog-4.png 865w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><em>Cyber<sup>3<\/sup> Conference Okinawa 2015\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/em><\/p>\n<p style=\"text-align: center;\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:66.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-11001 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/4-500x334.png\" alt=\"4\" width=\"500\" height=\"334\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/4-500x334.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/4-230x153.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/4-450x300.png 450w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/4-60x40.png 60w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/4.png 865w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><em>Vice Chairman of Nissan, Toshiyuki Shiga (center), together with Hiroshi Alley, Chairman and President of Palo Alto Networks Japan K.K. (far right)<\/em><\/p>\n<p style=\"text-align: center;\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:75%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-11002 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/5-500x375.png\" alt=\"5\" width=\"500\" height=\"375\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/5-500x375.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/5-230x173.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/5-400x300.png 400w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/5-53x40.png 53w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/5.png 865w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><em>Navigating the Digital Age books were widely distributed at the Conference.<br \/>\n<a href=\"https:\/\/www.securityroundtable.org\/the-book\/\" rel=\"nofollow,noopener\"  target=\"_blank\">Download your copy.<\/a><\/em><\/p>\n<p style=\"text-align: center;\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:66.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-11003 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/6-500x334.png\" alt=\"6\" width=\"500\" height=\"334\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/6-500x334.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/6-230x153.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/6-450x300.png 450w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/6-60x40.png 60w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/6.png 865w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p style=\"text-align: left;\">Did you attend Cyber<sup>3<\/sup> Conference Okinawa 2015? Share your thoughts from the event in the comments below.<\/p>\n<p style=\"text-align: left;\">\n","protected":false},"excerpt":{"rendered":"<p>Palo Alto Networks was a Gold\u00a0sponsor of the official side program of the \u201cCyber3 Conference Okinawa 2015\u2014Crafting Security in a Less Secure World\u201d, an international cybersecurity conference hosted by the Government of &hellip;<\/p>\n","protected":false},"author":125,"featured_media":20592,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4,155,133],"tags":[134,1571,1570,1302,120],"coauthors":[1158],"class_list":["post-10972","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-application-usage-risk-report","category-cybersecurity-2","category-events","tag-autr","tag-cyber-connection","tag-cyber3","tag-cybercrime","tag-cybersecurity"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-generic-banner.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10972","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/125"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=10972"}],"version-history":[{"count":9,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10972\/revisions"}],"predecessor-version":[{"id":55407,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10972\/revisions\/55407"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/20592"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=10972"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=10972"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=10972"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=10972"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}