{"id":8880,"date":"2015-04-23T06:00:04","date_gmt":"2015-04-23T13:00:04","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=8880"},"modified":"2015-04-22T15:15:02","modified_gmt":"2015-04-22T22:15:02","slug":"gisec-2015-palo-alto-networks-to-reveal-the-quiet-intruder-and-share-latest-threat-intelligence","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/04\/gisec-2015-palo-alto-networks-to-reveal-the-quiet-intruder-and-share-latest-threat-intelligence\/","title":{"rendered":"GISEC 2015: Palo Alto Networks to 'Reveal the Quiet Intruder' and Share Latest Threat Intelligence"},"content":{"rendered":"<p>The 3rd Gulf Information Security Expo and Conference (GISEC) returns to the Dubai World Trade Centre April 26-28, and once again, Palo Alto Networks will be at the heart of the action, highlighting the current cybersecurity landscape and how to take a prevention-based approach to advanced threats.<\/p>\n<p><center><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/logo_gisec.png\"><div style=\"max-width:100%\" data-width=\"295\"><span class=\"ar-custom\" style=\"padding-bottom:43.73%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-8881 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/logo_gisec.png\" alt=\"logo_gisec\" width=\"295\" height=\"129\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/logo_gisec.png 295w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/logo_gisec-230x100.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/logo_gisec-91x40.png 91w\" sizes=\"auto, (max-width: 295px) 100vw, 295px\" \/><\/span><\/div><\/a><\/center>&nbsp;<\/p>\n<p>If you will be in Dubai during GISEC 2015, here's how to engage with us:<!--more--><\/p>\n<p>Visit Palo Alto Networks at <strong>Stand SRD-20<\/strong> during exhibition hours to meet with our technical experts, watch demonstrations of the Palo Alto Networks <a href=\"https:\/\/www.paloaltonetworks.com\/products\/platforms.html\" target=\"_blank\">enterprise security platform<\/a> in action, and walk away with great prizes<\/p>\n<p>Catch <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/author\/brian\/\" target=\"_blank\">Brian Tokuyoshi<\/a>, Palo Alto Networks Senior Solutions Analyst, in a keynote presentation: \"<strong>Revealing the Quiet Intruder: Understanding Techniques Used In Modern Cyberattacks<\/strong>\" on Tuesday, April 28, 1140-1210. Brian will discuss:<\/p>\n<ul>\n<li>Preventing and disrupting an attack before the damage is done<\/li>\n<li>How modern attacks use stealth to mask malicious activity<\/li>\n<li>Recent findings from Unit 42, the Palo Alto Networks threat intelligence team<\/li>\n<li>Insights on how to protect your organization by eliminating and preventing common sources of risk<\/li>\n<\/ul>\n<p>GISEC 2015 is the Middle East and North Africa region's only large-scale information security event, and this year's conference focuses on addressing security concerns for the IT, Oil &amp; Gas, Banking &amp; Finance, Government, Legal, Healthcare and Telecom industries. Key industry decision makers have a chance to meet companies providing world-leading solutions across these dedicated verticals.<\/p>\n<p>GISEC this year is also co-located with the 1st Gulf Enterprise Mobility Exhibition and Conference (GEMEC), focused on mobile technologies. Learn more about GISEC 2015 <a href=\"http:\/\/www.gisec.ae\/\" rel=\"nofollow,noopener\"  target=\"_blank\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The 3rd Gulf Information Security Expo and Conference (GISEC) returns to the Dubai World Trade Centre April 26-28, and once again, Palo Alto Networks will be at the heart of the action, &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,133],"tags":[454,1154],"coauthors":[709],"class_list":["post-8880","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-events","tag-enterprise-security-platform","tag-gisec-2015"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8880","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=8880"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8880\/revisions"}],"predecessor-version":[{"id":8882,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8880\/revisions\/8882"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=8880"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=8880"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=8880"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=8880"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}