{"id":12537,"date":"2016-03-01T19:15:56","date_gmt":"2016-03-02T03:15:56","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=12537"},"modified":"2016-03-02T08:35:17","modified_gmt":"2016-03-02T16:35:17","slug":"palo-alto-networks-at-rsa-conference-2016-connect-to-protect","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/03\/palo-alto-networks-at-rsa-conference-2016-connect-to-protect\/","title":{"rendered":"Palo Alto Networks at RSA Conference 2016: Connect to Protect"},"content":{"rendered":"<p>RSA Conference celebrates a milestone this year - its 25<sup>th<\/sup> anniversary. This year\u2019s theme, Connect to Protect, couldn\u2019t be more appropriate as it represents 25 years of information security professionals coming together to address growing cybersecurity threats.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/02\/connect-with-palo-alto-networks-at-rsa-conference-2016\/\" target=\"_blank\">Palo Alto Networks is pleased to be a part of this year\u2019s event<\/a> because we believe in the power of threat intelligence sharing and the role it plays in preventing successful cyber breaches.<\/p>\n<p>We\u2019re nearly halfway through the week but there\u2019s still time to stop by our booth in Moscone North Expo Hall Booth #N3811 to chat with our experts about our latest products and next-generation security platform. Get a preview of what our experts have to share:<\/p>\n<p><div class=\"styleIt\" style=\"width:560px;height:315px;\"><lite-youtube videoid=\"EqkjQ3RyXjE\" ><\/lite-youtube><\/div><\/p>\n<p>In addition to having an opportunity to chat one-on-one with our experts, we also have in-booth presentations in our theater, exciting breakout sessions, and a keynote from Mark McLaughlin, Palo Alto Networks Chairman, President, and CEO.<!--more--><\/p>\n<h3>Upcoming Keynotes and Sessions:<\/h3>\n<p><strong><a href=\"https:\/\/www.rsaconference.com\/events\/us16\/agenda\/sessions\/2675\/more-books-you-should-have-read-by-now-the\" rel=\"nofollow,noopener\"  target=\"_blank\">Session: More Books You Should Have Read By Now: The Cybersecurity Canon Project <\/a><br \/>\n<\/strong>Wednesday, March 2, 2016 | 10:20 AM \u2013 11:10 AM | North | Room: 133<br \/>\n<em>Speaker: Rick Howard, Chief Security Officer, Palo Alto Networks<\/em><\/p>\n<p><strong><a href=\"https:\/\/www.rsaconference.com\/events\/us16\/agenda\/sessions\/2722\/the-inevitable-decline-of-the-digital-age\" rel=\"nofollow,noopener\"  target=\"_blank\">Keynote: The (Inevitable?) Decline of the Digital Age\u2026\u00a0<\/a><\/strong><\/p>\n<p>Wednesday, March 2, 2016 | 3:30 PM | South | Room: Live at Esplanade Ballroom<br \/>\n<em>Speaker: Mark McLaughlin, Chairman, President and CEO, Palo Alto Networks<br \/>\n<\/em>(Also available via\u00a0<a href=\"http:\/\/live stream and on demand\" target=\"_blank\">live stream and on demand<\/a>)<\/p>\n<p><a href=\"https:\/\/www.rsaconference.com\/events\/us16\/agenda\/sessions\/2543\/guiding-principles-to-defending-organizations\" rel=\"nofollow,noopener\"  target=\"_blank\"><strong>Session: Guiding Principles to Defending Organizations<\/strong><\/a><strong><br \/>\n<\/strong>Thursday, March 3, 2016 | 1:00 PM \u2013 1:50 PM | West | Room: 3014<\/p>\n<h3>Upcoming In-Booth Presentations:<\/h3>\n<p><strong>Wednesday, March 2<br \/>\n<\/strong><strong>Introduction to Palo Alto Networks Vision and Strategy<br \/>\n<\/strong>10:30 AM | Nir Zuk<\/p>\n<p><strong>Weaponizing Your Threat Intel with AutoFocus<br \/>\n<\/strong>11:00 AM | Scott Simkin<\/p>\n<p>VM-Series: Next-Generation Security for AWS<br \/>\n11:30 AM | Matt Keil<\/p>\n<p>Modern Threats - Beyond the Hype<br \/>\n1:00 PM | Unit 42<\/p>\n<p>Safely Enable Your Saas Applications<br \/>\n2:30 PM | Chris Morosco<\/p>\n<p>Introduction to Palo Alto Networks Vision and Strategy<br \/>\n3:00 PM | Nir Zuk<\/p>\n<p>Malicious Behavior Detection at Scale with Palo Alto Networks and Tanium<br \/>\n3:30 PM | Matt MacKinnon (Tanium)<\/p>\n<p>Protect Unpatched Systems and Prevent Zero Day Exploits with Traps<br \/>\n4:00 PM | Michael Moshiri<\/p>\n<p><strong>Thursday, March 3 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0<\/strong><\/p>\n<p>Safely Enable Your Saas Applications<br \/>\n10:30 AM | Chris Morosco<\/p>\n<p>Weaponizing Your Threat Intel with AutoFocus<br \/>\n11:00 AM | Scott Simkin<\/p>\n<p>VM-Series: Next-Generation Security for AWS<br \/>\n11:30 AM | Matt Keil<\/p>\n<p>Modern Threats - Beyond the Hype<br \/>\n1:00 PM | Unit 42<\/p>\n<p>Introduction to Palo Alto Networks Vision and Strategy<br \/>\n1:30 PM | Nir Zuk<\/p>\n<p>Malicious Behavior Detection at Scale with Palo Alto Networks and Tanium<br \/>\n3:00 PM | Matt MacKinnon (Tanium)<\/p>\n<p>Protect Unpatched Systems and Prevent Zero Day Exploits with Traps<br \/>\n3:30 PM | Michael Moshiri<\/p>\n<p>Take a look at some of our highlights from the first half of the event.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/03\/RSA-Day-1_1.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:71.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-12540 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/03\/RSA-Day-1_1-500x357.png\" alt=\"RSA Day 1_1\" width=\"500\" height=\"357\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/03\/RSA-Day-1_1-500x357.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/03\/RSA-Day-1_1-230x164.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/03\/RSA-Day-1_1-420x300.png 420w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/03\/RSA-Day-1_1-56x40.png 56w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/03\/RSA-Day-1_1.png 898w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p style=\"text-align: center;\"><em>Stop by the Palo Alto Networks booth for a free T-shirt<\/em><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/03\/RSA-Day-1_2.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:66.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-12541 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/03\/RSA-Day-1_2-500x332.png\" alt=\"RSA Day 1_2\" width=\"500\" height=\"332\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/03\/RSA-Day-1_2-500x332.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/03\/RSA-Day-1_2-230x153.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/03\/RSA-Day-1_2-452x300.png 452w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/03\/RSA-Day-1_2-60x40.png 60w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/03\/RSA-Day-1_2.png 900w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p style=\"text-align: center;\"><em>Palo Alto Networks Chairman, President and CEO Mark McLaughlin chats with attendees<\/em><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/03\/RSA-Day-1_3.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:66.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-12542 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/03\/RSA-Day-1_3-500x334.png\" alt=\"RSA Day 1_3\" width=\"500\" height=\"334\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/03\/RSA-Day-1_3-500x334.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/03\/RSA-Day-1_3-230x154.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/03\/RSA-Day-1_3-450x300.png 450w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/03\/RSA-Day-1_3-60x40.png 60w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/03\/RSA-Day-1_3.png 899w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p style=\"text-align: center;\"><em>Palo Alto Networks Senior Threat Intelligence Manager Scott Simkin talks to a crowd about weaponizing your threat intelligence with AutoFocus<\/em><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/03\/RSA-Day-1_4.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:66.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-12543 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/03\/RSA-Day-1_4-500x331.png\" alt=\"RSA Day 1_4\" width=\"500\" height=\"331\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/03\/RSA-Day-1_4-500x331.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/03\/RSA-Day-1_4-230x152.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/03\/RSA-Day-1_4-453x300.png 453w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/03\/RSA-Day-1_4-60x40.png 60w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/03\/RSA-Day-1_4.png 899w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p style=\"text-align: center;\"><em>Palo Alto Networks Founder and CTO Nir Zuk sharing our vision and strategy<\/em><\/p>\n<blockquote class=\"twitter-tweet\" data-partner=\"tweetdeck\">\n<p dir=\"ltr\" lang=\"en\" style=\"text-align: left;\">Palo Alto Networks' Mark McLaughlin &amp; Sean Duca on the shift from detecting cyber threats to preventing them <a href=\"https:\/\/twitter.com\/hashtag\/RSAC?src=hash\" rel=\"nofollow,noopener\" >#RSAC<\/a><a href=\"https:\/\/t.co\/PS61GLGT6b\">https:\/\/t.co\/PS61GLGT6b<\/a><\/p>\n<p style=\"text-align: left;\">\u2014 DiDataSecurity (@DiDataSecurity) <a href=\"https:\/\/twitter.com\/DiDataSecurity\/status\/704772870321229824\" rel=\"nofollow,noopener\" >March 1, 2016<\/a><\/p>\n<p style=\"text-align: left;\">\n<\/blockquote>\n<blockquote class=\"twitter-tweet\" data-partner=\"tweetdeck\">\n<p dir=\"ltr\" lang=\"en\" style=\"text-align: left;\"><a href=\"https:\/\/twitter.com\/hashtag\/ICYMI?src=hash\" rel=\"nofollow,noopener\" >#ICYMI<\/a> We received a 5 Year Excellence in Information Security Testing Award from <a href=\"https:\/\/twitter.com\/ICSALabs\" rel=\"nofollow,noopener\" >@ICSALabs<\/a> at <a href=\"https:\/\/twitter.com\/hashtag\/RSAC?src=hash\" rel=\"nofollow,noopener\" >#RSAC<\/a>! <a href=\"https:\/\/twitter.com\/hashtag\/EISTAwards?src=hash\" rel=\"nofollow,noopener\" >#EISTAwards<\/a> <a href=\"https:\/\/t.co\/3S47NQJZXa\">pic.twitter.com\/3S47NQJZXa<\/a><\/p>\n<p style=\"text-align: left;\">\u2014 Palo Alto Networks (@PaloAltoNtwks) <a href=\"https:\/\/twitter.com\/PaloAltoNtwks\/status\/704690727377240064\" rel=\"nofollow,noopener\" >March 1, 2016<\/a><\/p>\n<\/blockquote>\n<p><script src=\"\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>RSA Conference celebrates a milestone this year - its 25th anniversary. This year\u2019s theme, Connect to Protect, couldn\u2019t be more appropriate as it represents 25 years of information security professionals coming together &hellip;<\/p>\n","protected":false},"author":156,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133],"tags":[129],"coauthors":[1546],"class_list":["post-12537","post","type-post","status-publish","format-standard","hentry","category-events","tag-rsa-conference"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12537","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/156"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=12537"}],"version-history":[{"count":6,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12537\/revisions"}],"predecessor-version":[{"id":12549,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12537\/revisions\/12549"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=12537"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=12537"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=12537"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=12537"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}