{"id":12331,"date":"2016-02-24T08:45:59","date_gmt":"2016-02-24T16:45:59","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=12331"},"modified":"2016-02-24T11:11:36","modified_gmt":"2016-02-24T19:11:36","slug":"connect-with-palo-alto-networks-at-rsa-conference-2016","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/02\/connect-with-palo-alto-networks-at-rsa-conference-2016\/","title":{"rendered":"Connect with Palo Alto Networks at RSA Conference 2016"},"content":{"rendered":"<p>IT security professionals across the globe will converge next week in San Francisco, California to attend <a href=\"http:\/\/www.rsaconference.com\/\" rel=\"nofollow,noopener\"  target=\"_blank\">RSA Conference 2016<\/a>. Palo Alto Networks will be there in full force offering live demos, speaking sessions, and more!<\/p>\n<p>Read on to find out how you can connect with Palo Alto Networks while you\u2019re at the event.<\/p>\n<h3>Find Us<\/h3>\n<p>You can find us all week in <a href=\"http:\/\/www.rsaconference.com\/writable\/files\/rsac_2016_north_expo_02-16-2016.pdf\" rel=\"nofollow,noopener\"  target=\"_blank\">Moscone North Expo Hall Booth #N3811<\/a>. Stop by to chat with our security experts to learn how our innovative and game-changing security platform can help you prevent breaches.<!--more--><\/p>\n<p>Stick around for live demos of our next-generation security platform. You\u2019ll also hear a wide range of presentations from speakers such as Nir Zuk, Palo Alto Networks Founder and CTO, Unit 42, our threat intelligence research team, partners, and other industry experts.<\/p>\n<h3>Keynotes and Sessions<\/h3>\n<p>Be sure to add these exciting sessions to your agenda.<\/p>\n<p><strong><a href=\"https:\/\/www.rsaconference.com\/events\/us16\/agenda\/sessions\/2675\/more-books-you-should-have-read-by-now-the\" rel=\"nofollow,noopener\"  target=\"_blank\">Session: More Books You Should Have Read By Now: The Cybersecurity Canon Project<\/a><br \/>\n<\/strong>Wednesday, March 2, 2016 | 10:20 AM \u2013 11:10 AM | North | Room: 133<\/p>\n<p><em>Speaker: Rick Howard, Chief Security Officer, Palo Alto Networks<\/em><\/p>\n<p>Last year, Rick presented 20 books that we all should have read by now. Since then, he has formed the Cybersecurity Canon Committee to add more books to the list and to select candidate books to officially induct into the Canon. He will discuss how the community can help with the project and will present five new books that are on the candidate list.<\/p>\n<p><a href=\"https:\/\/www.rsaconference.com\/events\/us16\/agenda\/sessions\/2722\/the-inevitable-decline-of-the-digital-age\" rel=\"nofollow,noopener\"  target=\"_blank\"><strong>Keynote: The (Inevitable?) Decline of the Digital Age\u2026<br \/>\n<\/strong><\/a>Wednesday, March 2, 2016 | 3:30 PM | South | Room: Live at Esplanade Ballroom<\/p>\n<p><em>Speaker: Mark McLaughlin, Chairman, President and CEO, Palo Alto Networks<\/em><\/p>\n<p>We live in the digital age, an age of immense productivity but at serious risk due to the increasing lack of trust driven by security concerns. This must and will be corrected. The future will show the decline of legacy, point-product security based on technologies that primarily focus on detection. Instead, we\u2019ll see the rise of next-generation prevention-oriented security platforms. Old-line thinking that hurts trust will fall to the wayside.<\/p>\n<p>Not attending RSA Conference 2016? This keynote is also available via <a href=\"http:\/\/www.rsaconference.com\/us16\/palo-alto\" rel=\"nofollow,noopener\"  target=\"_blank\">live stream and on demand<\/a>.<\/p>\n<p><a href=\"https:\/\/www.rsaconference.com\/events\/us16\/agenda\/sessions\/2543\/guiding-principles-to-defending-organizations\" rel=\"nofollow,noopener\"  target=\"_blank\"><strong>Session: Guiding Principles to Defending Organizations<br \/>\n<\/strong><\/a>Thursday, March 3, 2016 | 1:00 PM \u2013 1:50 PM | West | Room: 3014<\/p>\n<p><em>Speakers: Rick Howard, Chief Security Officer, Palo Alto Networks and Dawn Cappelli, Vice President, Information Risk Management, Rockwell Automation<\/em><\/p>\n<p>Effective security principles come from an inside out understanding of the basic building blocks necessary for success. Rick will kick off the session by explaining the power of a network defender\u2019s first principles. Dawn will continue the discussion by sharing predictive techniques to catch insider threats before they become criminals.<\/p>\n<h3>Follow us<\/h3>\n<p>For those not attending RSA Conference 2016, follow us to get live updates on what\u2019s happening at the event.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/\" target=\"_blank\">Palo Alto Networks Blog<\/a><\/li>\n<li><a href=\"https:\/\/twitter.com\/paloaltontwks\" rel=\"nofollow,noopener\"  target=\"_blank\">@PaloAltoNtwks on Twitter<\/a><\/li>\n<li><a href=\"https:\/\/www.facebook.com\/PaloAltoNetworks\" rel=\"nofollow,noopener\"  target=\"_blank\">Palo Alto Networks on Facebook<\/a><\/li>\n<li><a href=\"https:\/\/www.linkedin.com\/company\/palo-alto-networks\" rel=\"nofollow,noopener\"  target=\"_blank\">Palo Alto Networks on LinkedIn<\/a><\/li>\n<\/ul>\n<p>We\u2019re looking forward to seeing you next week at RSA Conference 2016. What activities are you excited for next week?<\/p>\n<p><a href=\"http:\/\/go.paloaltonetworks.com\/ignite2016\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:33.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-12021 size-large lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Ignite-2016-register-now-500x167.png\" alt=\"Ignite 2016 register now\" width=\"500\" height=\"167\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Ignite-2016-register-now-500x167.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Ignite-2016-register-now-230x77.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Ignite-2016-register-now-510x170.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Ignite-2016-register-now-120x40.png 120w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Ignite-2016-register-now.png 900w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>IT security professionals across the globe will converge next week in San Francisco, California to attend RSA Conference 2016. Palo Alto Networks will be there in full force offering live demos, speaking &hellip;<\/p>\n","protected":false},"author":156,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133],"tags":[251,191,345,129],"coauthors":[1546],"class_list":["post-12331","post","type-post","status-publish","format-standard","hentry","category-events","tag-cybersecurity-canon","tag-mark-mclaughlin","tag-rick-howard","tag-rsa-conference"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12331","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/156"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=12331"}],"version-history":[{"count":5,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12331\/revisions"}],"predecessor-version":[{"id":12337,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12331\/revisions\/12337"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=12331"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=12331"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=12331"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=12331"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}