{"id":71714,"date":"2018-04-11T13:00:28","date_gmt":"2018-04-11T20:00:28","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=71714"},"modified":"2019-01-29T13:18:27","modified_gmt":"2019-01-29T21:18:27","slug":"find-us-rsa-conference-2018","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2018\/04\/find-us-rsa-conference-2018\/","title":{"rendered":"Where to Find Us At RSA Conference 2018!"},"content":{"rendered":"<p>We\u2019re back again this year at <a href=\"https:\/\/www.rsaconference.com\/events\/us18\" rel=\"nofollow,noopener\" >RSA Conference 2018<\/a>. Here\u2019s where you can find us next week:<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 18pt;\">Stop by our booth<\/span><\/p>\n<p>This year we\u2019re parking our booth in the <strong>North Hall #3715<\/strong>. Stop by for a chat with our cybersecurity experts to learn about our latest products including the recently launched <a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-network\/magnifier-behavioral-analytics\">Magnifer<\/a>, <a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-endpoint\/traps\">Traps 5.0<\/a>, <a href=\"https:\/\/www.paloaltonetworks.com\/products\/new\/new-panos8-1\">PAN-OS 8.1 and our brand new hardware<\/a> and more!<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 18pt;\">Stay for a presentation<\/span><\/p>\n<p>We\u2019ve got presentations lined up throughout the week. Here\u2019s a preview:<\/p>\n<ul>\n<li>Palo Alto Networks\u2019 Different Approach to Cybersecurity<\/li>\n<li>Behavioral Analytics to Stop Hunting and Take Action<\/li>\n<li>Accelerate Your Deployment to the Cloud, Safely<\/li>\n<li>Protect your cloud data by enforcing best practices<\/li>\n<li>Protect Locally, Enforce Globally to Minimize Endpoint Infections<\/li>\n<li>Using Threat Intelligence without Adding Security Analysts<\/li>\n<li>Are you Minimizing Opportunities for Attack?<\/li>\n<li>Speed up Your Investigations with Splunk<\/li>\n<li>Stopping Threats Together with Accenture<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 18pt;\">Get inspired<\/span><\/p>\n<p>Our cybersecurity thought leaders will be speaking throughout the week. Be sure to add these to your agenda.<\/p>\n<p><strong>Securing Diversity Seminar - The Future Workforce: Eliminating Barriers and Building Capacity for Women in Cybersecurity<\/strong><\/p>\n<ul>\n<li>Monday, April 16\u00a0 |\u00a0 10:30 \u2013 11:00am<\/li>\n<li>Location: Moscone West, Room 2022<\/li>\n<li><em>Panel: Sylvia Acevedo, CEO at Girls Scouts USA and Mark McLaughlin, Chairman and CEO at Palo Alto Networks. Moderated by Jeanette Manfra, Asst. Sec CS&amp;C at DHS<\/em><\/li>\n<\/ul>\n<p><strong>Super Forecasting: Even You Can Perform High Risk Assessments <\/strong><\/p>\n<ul>\n<li>Tuesday, April 17\u00a0 |\u00a0 1:00 \u2013 1:45pm<\/li>\n<li>Location: Moscone West 2018<\/li>\n<li><em>Speakers: Rick Howard, CSO at Palo Alto Networks and Richard Seiersen, SVP and CISO at Lending Club\u00a0<\/em><\/li>\n<\/ul>\n<p><strong>Is Cloud-Native Security Enough?\u00a0 <\/strong><\/p>\n<ul>\n<li>Wednesday, April 18\u00a0 |\u00a0 3:00 -3:45pm<\/li>\n<li>Location: Moscone North 22<\/li>\n<li><em>Speaker: Janet Matsuda, SVP Product Marketing at Palo Alto Networks and Tim Prendergast, Chief Cloud Officer at Palo Alto Networks\u00a0\u00a0<\/em><\/li>\n<\/ul>\n<p><strong>SOC 2030 \u2013 Soc\u2019s are broken. Let\u2019s fix them. <\/strong><\/p>\n<ul>\n<li>Thursday, April 19\u00a0 |\u00a0 8:00 \u2013 8:45am<\/li>\n<li>Location: Moscone West 2009<\/li>\n<li><em>Speaker: Kerry Matre, Head of Security Operations Strategy at Palo Alto Networks\u00a0<\/em><\/li>\n<\/ul>\n<p><strong>Cybersecurity and International Trade: The New Landscape <\/strong><\/p>\n<ul>\n<li>Friday, April 20\u00a0 |\u00a0 9:00 \u2013 9:45am<\/li>\n<li>Location: Marriott Yerba Buena 5<\/li>\n<li><em>Panel discussion featuring Danielle Kriz, Senior Director of Global Policy at Palo Alto Networks<\/em><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 18pt;\">Follow us<\/span><\/p>\n<p>Follow us to get updates on what\u2019s happening throughout the week at RSA Conference 2018:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/\">Palo Alto Networks Blog<\/a><\/li>\n<li><a href=\"https:\/\/twitter.com\/paloaltontwks\" rel=\"nofollow,noopener\" >@PaloAltoNtwks on Twitter<\/a><\/li>\n<li><a href=\"https:\/\/www.facebook.com\/PaloAltoNetworks\" rel=\"nofollow,noopener\" >Palo Alto Networks on Facebook<\/a><\/li>\n<li><a href=\"https:\/\/www.linkedin.com\/company\/palo-alto-networks\" rel=\"nofollow,noopener\" >Palo Alto Networks on LinkedIn<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>See you next week!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Chat with cybersecurity experts and learn about our latest products at RSA Conference 2018! <\/p>\n","protected":false},"author":156,"featured_media":71030,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6719,133],"tags":[5756],"coauthors":[1546],"class_list":["post-71714","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company-culture","category-events","tag-rsa-conference-2018"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/04\/generic-social-media-blog-c-600x300.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/71714","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/156"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=71714"}],"version-history":[{"count":5,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/71714\/revisions"}],"predecessor-version":[{"id":72461,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/71714\/revisions\/72461"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/71030"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=71714"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=71714"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=71714"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=71714"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}