{"id":25983,"date":"2017-03-30T13:00:50","date_gmt":"2017-03-30T20:00:50","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=25983"},"modified":"2017-03-30T11:07:50","modified_gmt":"2017-03-30T18:07:50","slug":"see-you-at-wicys-2017","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2017\/03\/see-you-at-wicys-2017\/","title":{"rendered":"See You at WiCyS 2017"},"content":{"rendered":"<p>Palo Alto Networks is proud to sponsor the Women in Cybersecurity (WiCyS) conference, kicking off this Friday in Tucson, Arizona. This annual conference brings together women in cybersecurity from a variety of backgrounds \u2013 academia, industry and research \u2013 for a weekend of networking, mentoring and the opportunity to share their expertise in the field. Encouraging more women to pursue a career in cybersecurity is one of our imperatives as a company, and we\u2019re thrilled to return to WiCyS as a sponsor.<\/p>\n<p>Our own Rinki Sethi, Senior Director of Security Operations and Strategy, is leading a distinguished speaker session on <strong>Saturday, April 1 at 10:45 a.m.<\/strong> titled \u201cThe Power of Perseverance: Embrace the Discomfort.\u201d During this session, Rinki will share personal experiences from her time in the workplace that have sharpened her leadership skills and helped shape her career as an information security leader. Rinki will discuss how embracing the unknown and tackling unfamiliar projects helped her discover her true passion in information security and ultimately advanced her career \u2013 even if it presented obstacles at the outset. If you\u2019re headed to Tucson this weekend, you won\u2019t want to miss this inspiring session!<\/p>\n<p>Cyberthreat Intelligence Analyst Jen Miller-Osborn from Unit 42 and our Principal Information Security Engineer Prajakta Jagdale will also join Rinki, along with Bishop Fox partner Christie Terrill, in a panel session discussing why incident response is a dynamic and engaging career path within cybersecurity. Catch the panel, \u201cStories from the Battlefield: Cybersecurity Incident Response,\u201d on <strong>Friday, March 31 at 5:45 p.m.<\/strong><\/p>\n<p>At Palo Alto Networks, we are on a mission to maintain trust in the digital age by preventing successful cyberattacks. As part of this, we believe it\u2019s important to build a diverse team of cybersecurity leaders, and encourage more women and students to pursue a career in security.\u00a0 We\u2019re looking forward to meeting you at WiCyS to share more about why a career in cybersecurity is both exciting and impactful.<\/p>\n<p><a href=\"https:\/\/www.csc.tntech.edu\/wicys\/\" rel=\"nofollow,noopener\" ><strong>Learn more about WiCyS 2017<\/strong><\/a><\/p>\n<p><a href=\"http:\/\/go.paloaltonetworks.com\/ignite2017\"><div style=\"max-width:100%\" data-width=\"820\"><span class=\"ar-custom\" style=\"padding-bottom:41.46%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone wp-image-25356 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/03\/ignite17-social-cover-img-facebook-820x340.png\" alt=\"ignite17-social-cover-img-facebook-820x340\" width=\"820\" height=\"340\" \/><\/span><\/div><\/a><\/p>\n<p><strong>Ignite \u201917 Security Conference: Vancouver, BC June 12\u201315, 2017<\/strong><\/p>\n<p>Ignite \u201917 Security Conference is a live, four-day conference designed for today\u2019s security professionals. Hear from innovators and experts, gain real-world skills through hands-on sessions and interactive workshops, and find out how breach prevention is changing the security industry. Visit the <a href=\"http:\/\/www.paloaltonetworksignite.com\" rel=\"nofollow,noopener\" >Ignite website<\/a> for more information on tracks, workshops and marquee sessions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Palo Alto Networks is proud to sponsor the Women in Cybersecurity (WiCyS) conference, kicking off this Friday in Tucson, Arizona.<\/p>\n","protected":false},"author":298,"featured_media":21531,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133],"tags":[3477,3474],"coauthors":[3085],"class_list":["post-25983","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events","tag-wicys","tag-women-in-cybersecurity"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/11\/blog-generic-banner-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/25983","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/298"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=25983"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/25983\/revisions"}],"predecessor-version":[{"id":25992,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/25983\/revisions\/25992"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/21531"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=25983"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=25983"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=25983"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=25983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}