{"id":45138,"date":"2017-10-05T13:00:48","date_gmt":"2017-10-05T20:00:48","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=45138"},"modified":"2017-10-05T09:55:19","modified_gmt":"2017-10-05T16:55:19","slug":"watch-mark-mclaughlin-talks-breach-prevention-at-cnbcs-cambridge-cyber-summit","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2017\/10\/watch-mark-mclaughlin-talks-breach-prevention-at-cnbcs-cambridge-cyber-summit\/","title":{"rendered":"Watch: Mark McLaughlin Talks Breach Prevention at CNBC\u2019s Cambridge Cyber Summit"},"content":{"rendered":"<p><iframe loading=\"lazy\" width=\"530\" height=\"298\" src=\"https:\/\/player.cnbc.com\/p\/gZWlPC\/cnbc_global?playertype=synd&amp;byGuid=3000660179&amp;size=530_298\" type=\"application\/x-shockwave-flash\" allowfullscreen=\"allowfullscreen\" bgcolor=\"#131313\"><\/iframe><\/p>\n<p>After presenting onstage at CNBC\u2019s <a href=\"https:\/\/www.cnbc.com\/securing-our-future\/\" rel=\"nofollow,noopener\" >Cambridge Cyber Summit<\/a>, Palo Alto Networks Chairman and CEO Mark McLaughlin appeared on CNBC\u2019s Closing Bell to discuss how an automated, prevention-focused security environment increases the resources needed by the \u201cbad guys\u201d to execute a successful cyberattack.<\/p>\n<p><a href=\"https:\/\/www.cnbc.com\/video\/2017\/10\/04\/palo-alto-networks-ceo-cyber-bad-guys-dont-have-to-be-sophisticated.html?play=1\" rel=\"nofollow,noopener\" >Watch the full Interview<\/a>.<\/p>\n<p>You can also check out Mark\u2019s <a href=\"https:\/\/www.cnbc.com\/2017\/10\/03\/this-is-how-you-prevent-the-next-cyberattack-without-stifling-innovation-commentary.html\" rel=\"nofollow,noopener\" >piece<\/a> on how the public and private sectors can collaborate on securing the increasingly growing Internet of Things (IoT) space on CNBC\u2019s website.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mark McLaughlin talks breach prevention at CNBC\u2019s Cambridge Cyber Summit.<\/p>\n","protected":false},"author":153,"featured_media":21531,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,112],"tags":[161,4635,4321,191],"coauthors":[1515],"class_list":["post-45138","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-2","category-interview","tag-automation","tag-closing-bell","tag-machine-learning","tag-mark-mclaughlin"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/11\/blog-generic-banner-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/45138","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=45138"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/45138\/revisions"}],"predecessor-version":[{"id":45147,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/45138\/revisions\/45147"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/21531"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=45138"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=45138"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=45138"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=45138"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}