{"id":4584,"date":"2014-01-29T13:00:48","date_gmt":"2014-01-29T21:00:48","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=4584"},"modified":"2014-03-13T10:38:55","modified_gmt":"2014-03-13T17:38:55","slug":"spotlight-on-ignite-2014-keynote-speaker-announced","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/01\/spotlight-on-ignite-2014-keynote-speaker-announced\/","title":{"rendered":"Spotlight On Ignite 2014: Second Keynote Speaker Announced!"},"content":{"rendered":"<p><a href=\"https:\/\/www.paloaltonetworks.com\/content\/campaigns\/ignite\/ignite-2014\/home.html\" target=\"_blank\">Ignite 2014<\/a> is your opportunity to hear from some of today\u2019s most compelling thinkers on mobile, cloud and other computing trends that have pushed legacy products to their breaking point and require a new approach to enterprise security.<!--more--><\/p>\n<p>Today we\u2019re pleased to announce <b>Dan Kaminsky, Chief Scientist and Co-Founder of White Ops<\/b>, as the next addition to the Ignite 2014 keynote roster.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"230\"><span class=\"ar-custom\" style=\"padding-bottom:125.22%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone size-medium wp-image-4587 lozad\" alt=\"kaminsky_headshot[1]\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/01\/kaminsky_headshot1-230x288.png\" width=\"230\" height=\"288\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/01\/kaminsky_headshot1-230x288.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/01\/kaminsky_headshot1-500x627.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/01\/kaminsky_headshot1-239x300.png 239w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/01\/kaminsky_headshot1-31x40.png 31w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/01\/kaminsky_headshot1.png 558w\" sizes=\"auto, (max-width: 230px) 100vw, 230px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p>Formerly of Cisco and Avaya, <a href=\"https:\/\/twitter.com\/dakami\" rel=\"nofollow,noopener\"  target=\"_blank\">Dan<\/a> has spent 15 years working in computer security, many of them consulting closely with Microsoft to protect the Windows ecosystem. Dan is widely known for his work in finding a \u201cskeleton key\u201d in the Internet\u2019s Domain Name System, and led what would become the largest-ever synchronized fix to the Internet\u2019s core design.<\/p>\n<p>Widely quoted by prominent newspapers, magazines and television shows, Dan\u2019s security research spans a wide range of subjects, from gaining visibility into global Internet threats, to the practical deployment of private communications, to the potential and danger of cryptocurrency.<\/p>\n<p>Dan is one of seven Recovery Key Shareholders with the power to recover the Internet\u2019s root DNS keys in case of emergency. At White Ops, he focuses on Internet-scale detection of unknown malware via JavaScript.<\/p>\n<p>We\u2019re excited to welcome Dan to a packed Ignite 2014 lineup that already includes a <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/01\/announcing-ignite-2014-keynote-speaker\/\" target=\"_blank\">keynote presentation from Box CEO Aaron Levie<\/a>, more than 55 <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2013\/12\/first-look-heres-whats-coming-ignite-2014\/\" target=\"_blank\">technical sessions from security experts and customers<\/a>, a slate of <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/01\/spotlight-on-ignite-2014-firewall-panorama-hands-sessions\/\" target=\"_blank\">hands-on sessions providing classroom training on Palo Alto Networks<\/a> technology, and ample opportunity to <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/01\/spotlight-on-ignite-2014-one-one-experts\/\" target=\"_blank\">network with peers and Palo Alto Networks representatives one-on-one<\/a>.<\/p>\n<p>Keep watching this space as we continue to expand our roster of keynote speakers and sessions. <a href=\"https:\/\/ignite2014.paloaltonetworks.com\/\" target=\"_blank\">Register for Ignite 2014<\/a> this week to take advantage of early-bird rates, and follow us on Twitter (<a href=\"https:\/\/twitter.com\/Ignite_Conf\" rel=\"nofollow,noopener\"  target=\"_blank\">@Ignite_Conf<\/a>) for more important updates.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ignite 2014 is your opportunity to hear from some of today\u2019s most compelling thinkers on mobile, cloud and other computing trends that have pushed legacy products to their breaking point and require &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[99],"tags":[217,290,279,304],"coauthors":[],"class_list":["post-4584","post","type-post","status-publish","format-standard","hentry","category-ignite","tag-ignite-2014","tag-keynote","tag-spotlight","tag-white-ops"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4584","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=4584"}],"version-history":[{"count":8,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4584\/revisions"}],"predecessor-version":[{"id":4983,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4584\/revisions\/4983"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=4584"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=4584"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=4584"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=4584"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}