{"id":5913,"date":"2014-06-23T03:00:00","date_gmt":"2014-06-23T10:00:00","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=5913"},"modified":"2014-06-20T09:59:49","modified_gmt":"2014-06-20T16:59:49","slug":"visit-palo-alto-networks-gartner-security-risk-management-summit-2014","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/06\/visit-palo-alto-networks-gartner-security-risk-management-summit-2014\/","title":{"rendered":"Visit Palo Alto Networks at Gartner Security and RIsk Management Summit 2014!"},"content":{"rendered":"<p>Come on over and visit Palo Alto Networks at this week's Gartner Security and Risk Management Summit 2014 in National Harbor, Maryland, which kicks off today. We'll be sharing new research, discussing our next-generation enterprise security platform and providing demos and giveaways throughout the event.<\/p>\n<p>Here's where to find us:<\/p>\n<p><!--more--><\/p>\n<p><strong>Attend Our Session<\/strong>: \"How To Build a Cyber Intelligence Team\"<br \/>\nTODAY: Monday, June 23, 10:45am Eastern, Room Potomac B<\/p>\n<p>Palo Alto Networks CSO Rick Howard will discuss how advanced organizations are having success with innovative ideas when improving their organization's cyber defense, and explain how to build and position a threat intelligence team. Joining Rick will be Adam Rice, ATK CISO, and Sheryl Hanchar, Broadcom Senior Manager of Security.<\/p>\n<p><strong>Come to Booth #308 During Exhibit Hall Hours<\/strong><br \/>\nMeet with Palo Alto Networks cybersecurity experts and check out our products and research, including from our just-released <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/autr\/\" target=\"_blank\">2014 Application Usage and Threat Report<\/a>. You may even walk away with something extra cool:<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:114%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-5914 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/USB-Charging-Device_Gartner-Giveaway-500x570.jpeg\" alt=\"USB Charging Device_Gartner Giveaway\" width=\"500\" height=\"570\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/USB-Charging-Device_Gartner-Giveaway-500x570.jpeg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/USB-Charging-Device_Gartner-Giveaway-230x262.jpeg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/USB-Charging-Device_Gartner-Giveaway-262x300.jpeg 262w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/USB-Charging-Device_Gartner-Giveaway-35x40.jpeg 35w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/USB-Charging-Device_Gartner-Giveaway.jpeg 509w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>For more on the Gartner Security and Risk Management Summit, head <a href=\"http:\/\/www.gartner.com\/technology\/summits\/na\/security\/\" rel=\"nofollow,noopener\"  target=\"_blank\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Come on over and visit Palo Alto Networks at this week's Gartner Security and Risk Management Summit 2014 in National Harbor, Maryland, which kicks off today. We'll be sharing new research, discussing &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133],"tags":[134,120,117],"coauthors":[],"class_list":["post-5913","post","type-post","status-publish","format-standard","hentry","category-events","tag-autr","tag-cybersecurity","tag-gartner"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5913","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=5913"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5913\/revisions"}],"predecessor-version":[{"id":5915,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5913\/revisions\/5915"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=5913"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=5913"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=5913"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=5913"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}