{"id":4071,"date":"2013-10-30T22:46:44","date_gmt":"2013-10-31T05:46:44","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=4071"},"modified":"2013-10-31T10:56:52","modified_gmt":"2013-10-31T17:56:52","slug":"coverage-infosecurity-netherlands","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2013\/10\/coverage-infosecurity-netherlands\/","title":{"rendered":"Coverage from Infosecurity Netherlands"},"content":{"rendered":"<p>Recently, you might have heard that the <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2013\/10\/time-get-geek\/\">Palo Alto Networks Gang of Geeks<\/a> hit the road to visit customers around the world to discuss security strategies and review the conclusions from our research teams. For me, the past few weeks have been a kaleidoscope of boarding passes, subway tickets, time zone changes, power converters and strong coffee (a single espresso if I have a moment, straight black in a paper cup when I don\u2019t). I've stolen a few minutes from my itinerary to tell you about what I\u2019m doing today.<\/p>\n<p><!--more-->This week, I\u2019m at the Jaarbeurs convention center in Utrecht attending the Infosecurity Netherlands conference together with colleagues, channel and technology partners.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/10\/IMG_9999.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:66.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-4073 lozad\" alt=\"IMG_9999\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/10\/IMG_9999-500x333.jpg\" width=\"500\" height=\"333\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/10\/IMG_9999-500x333.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/10\/IMG_9999-230x153.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/10\/IMG_9999-449x300.jpg 449w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/10\/IMG_9999-59x40.jpg 59w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/10\/IMG_9999.jpg 1000w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Utrecht is a city about an hour outside of Amsterdam, home to over 300,000 residents, and its canal-lined bike-filled streets showcase its proud ties to its historical past, while construction around the Central train station provide hints towards its future. It\u2019s here where security professionals from across the country converge to discuss strategies for protecting their networks, applications and data from harm.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/10\/IMG_0053.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:66.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-4072 lozad\" alt=\"IMG_0053\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/10\/IMG_0053-500x333.jpg\" width=\"500\" height=\"333\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/10\/IMG_0053-500x333.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/10\/IMG_0053-230x153.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/10\/IMG_0053-449x300.jpg 449w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/10\/IMG_0053-59x40.jpg 59w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/10\/IMG_0053.jpg 1000w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Nothing is more gratifying than spending time with customers to hear what\u2019s on their minds, and to share the latest data from our application and threat research. Here at the event, we are conducting workshops on several topics. These topics include findings from the latest Application Usage and Threat Report, strategies for securing the virtualized data center, and developing plans for dealing with advanced persistent threats.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/10\/IMG_0060.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:66.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-4074 lozad\" alt=\"IMG_0060\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/10\/IMG_0060-500x333.jpg\" width=\"500\" height=\"333\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/10\/IMG_0060-500x333.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/10\/IMG_0060-230x153.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/10\/IMG_0060-449x300.jpg 449w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/10\/IMG_0060-59x40.jpg 59w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/10\/IMG_0060.jpg 1000w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/10\/IMG_0074.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:66.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-4075 lozad\" alt=\"IMG_0074\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/10\/IMG_0074-500x333.jpg\" width=\"500\" height=\"333\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/10\/IMG_0074-500x333.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/10\/IMG_0074-230x153.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/10\/IMG_0074-449x300.jpg 449w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/10\/IMG_0074-59x40.jpg 59w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/10\/IMG_0074.jpg 1000w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>In the months ahead, I hope that you\u2019ll have the opportunity to meet one of the Gang of Geeks at a city near you. If you\u2019re interested in more coverage of news and our activities around the world, be sure to like our <a href=\"https:\/\/www.facebook.com\/PaloAltoNetworks\" rel=\"nofollow,noopener\" >Facebook page<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently, you might have heard that the Palo Alto Networks Gang of Geeks hit the road to visit customers around the world to discuss security strategies and review the conclusions from our &hellip;<\/p>\n","protected":false},"author":19,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133],"tags":[192,202],"coauthors":[],"class_list":["post-4071","post","type-post","status-publish","format-standard","hentry","category-events","tag-gang-of-geeks","tag-infosecurity-netherlands"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4071","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=4071"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4071\/revisions"}],"predecessor-version":[{"id":4078,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4071\/revisions\/4078"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=4071"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=4071"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=4071"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=4071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}