{"id":12620,"date":"2016-03-08T14:00:22","date_gmt":"2016-03-08T22:00:22","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=12620"},"modified":"2016-03-08T10:32:27","modified_gmt":"2016-03-08T18:32:27","slug":"cso-palo-alto-networks-csos-talk-takeaways-from-rsa-2016","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/03\/cso-palo-alto-networks-csos-talk-takeaways-from-rsa-2016\/","title":{"rendered":"Palo Alto Networks CSOs Talk Takeaways from RSA 2016"},"content":{"rendered":"<p class=\"p1\">Threat intelligence sharing, endpoint security competition and mixed messages on prevention vs. detection\u00a0were among the big topics at RSA 2016 last week. Watch below as three of our CSOs, Rick Howard, Greg Day and Sean Duca, pick apart the details:<\/p>\n<p><div class=\"styleIt\" style=\"width:500px;height:281px;\"><lite-youtube videoid=\"TiS3c0jbq94\" ><\/lite-youtube><\/div><\/p>\n<h4 class=\"p1\">For more on Palo Alto Networks at RSA 2016<!--more--><\/h4>\n<ul class=\"ul1\">\n<li class=\"li3\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/03\/palo-alto-networks-at-rsa-conference-2016-connect-to-protect\/\" target=\"_blank\"><span class=\"s1\">Palo Alto Networks at RSA Conference 2016: Connect to Protect<\/span><\/a><\/li>\n<li class=\"li3\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/03\/palo-alto-networks-highlights-from-rsa-conference-2016\/\" target=\"_blank\"><span class=\"s1\">Palo Alto Networks Highlights From RSA Conference 2016<\/span><\/a><\/li>\n<\/ul>\n<p><a href=\"go.paloaltonetworks.com\/ignite2016\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:33.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-12021 size-large lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Ignite-2016-register-now-500x167.png\" alt=\"Ignite 2016 register now\" width=\"500\" height=\"167\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Ignite-2016-register-now-500x167.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Ignite-2016-register-now-230x77.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Ignite-2016-register-now-510x170.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Ignite-2016-register-now-120x40.png 120w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Ignite-2016-register-now.png 900w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Threat intelligence sharing, endpoint security competition and mixed messages on prevention vs. detection\u00a0were among the big topics at RSA 2016 last week. Watch below as three of our CSOs, Rick Howard, Greg &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1766,133],"tags":[129,1807],"coauthors":[709],"class_list":["post-12620","post","type-post","status-publish","format-standard","hentry","category-cso-perspective","category-events","tag-rsa-conference","tag-rsac"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12620","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=12620"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12620\/revisions"}],"predecessor-version":[{"id":12623,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12620\/revisions\/12623"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=12620"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=12620"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=12620"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=12620"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}