{"id":97271,"date":"2019-02-26T00:00:07","date_gmt":"2019-02-26T08:00:07","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=97271"},"modified":"2019-02-24T18:56:47","modified_gmt":"2019-02-25T02:56:47","slug":"cyberforce-profile-cn","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2019\/02\/cyberforce-profile-cn\/?lang=zh-hans","title":{"rendered":"CYBERFORCE \u4eba\u7269\u4ecb\u7ecd\u7cfb\u5217\uff1a\u5229\u7528\u6700\u4f73\u5b9e\u8df5\u8bc4\u4f30\u6539\u53d8\u6280\u672f\u5bf9\u8bdd"},"content":{"rendered":"<p><em>CYBERFORCE <\/em><em>\u5bf9<\/em><em> NextWave <\/em><em>\u5408\u4f5c\u4f19\u4f34\u793e\u533a\u4e2d\u7684\u4f7c\u4f7c\u8005\u8fdb\u884c\u5609\u5956\uff1b\u8912\u5956\u90a3\u4e9b\u5c06\u5ba2\u6237\u653e\u5728\u9996\u4f4d\u3001\u5b89\u5168\u9632\u62a4\u4e13\u4e1a\u77e5\u8bc6\u503c\u5f97\u4fe1\u8d56\u4e14\u4e13\u6ce8\u4e8e\u9632\u6b62\u7f51\u7edc\u653b\u51fb\u5f97\u901e\u7684\u5408\u4f5c\u4f19\u4f34\u5de5\u7a0b\u5e08\u3002<\/em><\/p>\n<p><strong>\u7ed3\u8bc6\u7b2c 29 \u4f4d CYBERFORCE \u6770\u51fa\u4eba\u58eb\uff1aChris<\/strong><\/p>\n<p>Chris Yates \u5c31\u804c\u4e8e\u603b\u90e8\u5728\u5fb7\u514b\u8428\u65af\u5dde\u7684 Critical Start\uff0c\u4ed6\u662f\u4e00\u540d\u62e5\u6709 25 \u5e74\u7ecf\u9a8c\u7684\u8d44\u6df1\u7f51\u7edc\u5b89\u5168\u4eba\u58eb\u3002\u00a0 Chris \u62e5\u6709\u6559\u80b2\u7855\u58eb\u5b66\u4f4d\uff0c\u5e76\u4e14\u4ed6\u80fd\u591f\u5b66\u4ee5\u81f4\u7528\uff0c\u901a\u8fc7\u5728\u6821\u56ed\u4e2d\u548c\u5de5\u4f5c\u4e2d\u6240\u5b66\u5230\u7684\u5185\u5bb9\u6765\u5e2e\u52a9\u5468\u56f4\u7684\u4eba\u4eec\uff0c\u5305\u62ec\u4ed6\u6240\u62dc\u8bbf\u7684\u6bcf\u4e00\u540d\u5ba2\u6237\u3002\u201c\u5728\u4e0e\u65b0\u5ba2\u6237\u8fdb\u884c\u5bf9\u8bdd\u65f6\uff0c\u6211\u603b\u662f\u559c\u6b22\u4ee5\u2018\u8bf7\u8bb2\u8bb2\u60a8\u7684\u6545\u4e8b\u2019\u6765\u4f5c\u4e3a\u5f00\u5934\u3002\u76f8\u6bd4\u81ea\u5df1\u53bb\u8bb2\uff0c\u6211\u66f4\u503e\u5411\u4e8e\u8046\u542c\uff0c\u8ba9\u5ba2\u6237\u8bc9\u8bf4\u4ed6\u4eec\u9047\u5230\u7684\u96be\u9898\u3002\u201d<\/p>\n<p>&nbsp;<\/p>\n<p><strong>\u4f7f\u7528\u7684\u5546\u4e1a\u5de5\u5177<\/strong><\/p>\n<p>\u5bf9\u4e8e Chris \u6765\u8bf4\uff0c\u4f7f\u7528 Palo Alto Networks\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/partners\/nextwave-partner-portal\/best-practice-assesment\">\u6700\u4f73\u5b9e\u8df5\u8bc4\u4f30 (BPA)<\/a>\u00a0\u662f\u4ed6\u5c06\u6280\u672f\u5bf9\u8bdd\u4e0a\u5347\u5230\u4e1a\u52a1\u7ea7\u522b\u7684\u6700\u6709\u6548\u65b9\u6cd5\u4e4b\u4e00\u3002BPA \u901a\u8fc7\u6d4b\u91cf\u5ba2\u6237\u5bf9\u529f\u80fd\u7684\u4f7f\u7528\u60c5\u51b5\u6765\u8bc4\u4f30\u5ba2\u6237\u7684\u5e73\u53f0\u914d\u7f6e\uff0c\u9a8c\u8bc1\u5ba2\u6237\u7684\u7b56\u7565\u662f\u5426\u7b26\u5408\u6700\u4f73\u5b9e\u8df5\uff0c\u5e76\u9488\u5bf9\u672a\u901a\u8fc7\u6700\u4f73\u5b9e\u8df5\u68c0\u67e5\u7684\u5185\u5bb9\u63d0\u51fa\u4fee\u590d\u7684\u5efa\u8bae\u548c\u8bf4\u660e\u3002<\/p>\n<p>\u5728\u6700\u8fd1\u4e0e\u4e00\u4f4d\u77f3\u6cb9\u548c\u80fd\u6e90\u5ba2\u6237\u7684\u4f1a\u8bae\u4e2d\uff0cBPA \u548c\u70ed\u56fe\u63d0\u4f9b\u4e86\u901a\u8fc7\u91c7\u7528\u65b0\u7684 Security Operating Platform \u7684\u529f\u80fd\u53ef\u4ee5\u5b9e\u73b0\u91cd\u5927\u6539\u8fdb\u7684\u76f8\u5173\u6307\u6807\u548c\u53ef\u89c1\u6027\u3002\u8fd9\u6b21\u5bf9\u8bdd\u7684\u4e3b\u8981\u76ee\u7684\u4e0d\u662f\u5411 CEO \u4ecb\u7ecd\u6280\u672f\u548c\u529f\u80fd\uff0c\u800c\u662f\u56f4\u7ed5\u6307\u6807\u548c\u53ef\u89c1\u6027\u8fdb\u884c\u4e00\u6b21\u9ad8\u7ea7\u5bf9\u8bdd\uff0c\u9a8c\u8bc1\u516c\u53f8\u5bf9\u7f51\u7edc\u5b89\u5168\u7684\u8fdb\u4e00\u6b65\u6295\u8d44\uff0c\u4ece\u800c\u7acb\u5373\u83b7\u5f97\u8463\u4e8b\u4f1a\u6279\u51c6\u3002<\/p>\n<p>\u5728\u51fa\u73b0 BPA \u4e4b\u524d\uff0cChris \u8868\u793a\u201c\u9488\u5bf9\u7ba1\u7406\uff0c\u5c24\u5176\u662f\u5bf9\u7f51\u7edc\u5b89\u5168\u5de5\u5177\u8fdb\u884c\u8861\u91cf\u975e\u5e38\u56f0\u96be\u3002\u201d\u4ed6\u7ee7\u7eed\u8bf4\u9053\uff0c\u201c\u73b0\u5728\u6211\u4eec\u53ef\u4ee5\u63d0\u4f9b\u8861\u91cf\u8fdb\u5c55\u7684\u6570\u636e\uff0c\u5ba2\u6237\u559c\u6b22\u5728\u7eb8\u9762\u4e0a\u770b\u5230\u8fd9\u4e9b\u6570\u636e\u3002\u8fd9\u662f\u4e00\u4e2a\u5951\u673a\uff0cCIO \u53ef\u4ee5\u5c06\u8fd9\u4e9b\u6570\u636e\u5448\u73b0\u7ed9\u8463\u4e8b\u4f1a\uff0c\u5f88\u5feb\u5c31\u4f1a\u786e\u4fdd\u4e0b\u4e00\u9636\u6bb5\u8ba1\u5212\u6240\u9700\u7684\u9884\u7b97\u3002\u201d<\/p>\n<p>&nbsp;<\/p>\n<p><strong>\u5bf9\u5b9d\u8d35\u7ecf\u9a8c\u7684\u8ba4\u53ef<\/strong><\/p>\n<p>\u4f5c\u4e3a CYBERFORCE \u5de5\u7a0b\u5e08\uff0cChris \u53ef\u4ee5\u4f7f\u7528\u8fd9\u4e9b\u8d44\u6e90\u548c\u5de5\u5177\u5e2e\u52a9\u4ed6\u8fdb\u884c\u5ba2\u6237\u4f1a\u8bae\u6216\u5bf9\u8bdd\u3002\u00a0\u00a0 \u201cCYBERFORCE \u4e3a\u6211\u4eec\u63d0\u4f9b\u4e86\u6781\u9ad8\u7684\u53ef\u4fe1\u5ea6\uff0c\u8ba4\u53ef\u6211\u4eec\u5df2\u7ecf\u8d85\u8d8a\u4e86\u6807\u51c6\u7684\u9500\u552e\u5de5\u7a0b\u5e08\u8bc1\u660e\/\u8ba4\u8bc1\uff0c\u5e76\u8ba4\u53ef\u6211\u4eec\u4ee5\u622a\u7136\u4e0d\u540c\u7684\u53c2\u4e0e\u7ea7\u522b\u8fdb\u884c\u5de5\u4f5c\u3002\u201dChris \u5982\u662f\u8bf4\u9053\u3002\u201c\u5ba2\u6237\u76f8\u4fe1\u6211\u4eec\u3002\u5408\u4f5c\u4f19\u4f34\u793e\u533a\u76f8\u4fe1\u6211\u4eec\u3002Palo Alto Networks \u4e5f\u76f8\u4fe1\u5e76\u652f\u6301\u7740\u6211\u4eec\u3002\u201d<\/p>\n<p>\u5728 Palo Alto Networks \u4e3e\u529e\u7684\u6d3b\u52a8\uff08\u5982 SE \u548c\u6280\u672f\u5cf0\u4f1a\uff09\u4e2d\uff0cCYBERFORCE \u6210\u5458\u62e5\u6709\u7279\u6b8a\u7684\u9080\u8bf7\u5236\u673a\u4f1a\u6765\u7ed3\u8bc6\u5176\u4ed6 CYBERFORCE \u6210\u5458\uff0cChris \u8ba4\u4e3a\u8fd9\u4e00\u70b9\u5c24\u4e3a\u73cd\u8d35\u3002\u201c\u4f5c\u4e3a\u8fd9\u4e2a\u7cbe\u82f1\u793e\u533a\u7684\u4e00\u4efd\u5b50\uff0c\u6211\u4eec\u540c\u5c5e\u4e00\u961f\uff0c\u50cf\u540c\u4e8b\u4e00\u6837\u4e92\u76f8\u4fe1\u8d56\u3002\u6211\u4eec\u53ef\u4ee5\u4e92\u76f8\u5e2e\u52a9\u3001\u4ea4\u6d41\u6700\u4f73\u5b9e\u8df5\u3001\u5171\u4eab\u6700\u6709\u6548\u7684\u5de5\u5177\u5e76\u4e00\u8d77\u53d6\u5f97\u6210\u529f\u3002\u201d<\/p>\n<p>Chris \u62e5\u6709\u4e00\u4e9b\u4ee4\u4eba\u5370\u8c61\u6df1\u523b\u7684\u7edf\u8ba1\u6570\u636e\u3001\u8ba4\u8bc1\u548c\u6280\u5de7\u3002\u6709\u5173\u8be6\u7ec6\u4fe1\u606f\uff0c\u8bf7\u70b9\u51fb\u4ee5\u4e0b\u94fe\u63a5\u89c2\u770b\u5176\u76f8\u5173\u89c6\u9891\u3002<\/p>\n<p><div class=\"styleIt\" style=\"width:500px;height:281px;\"><lite-youtube videoid=\"tSS2Vdn2IR8\" ><\/lite-youtube><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CYBERFORCE \u5bf9 NextWave \u5408\u4f5c\u4f19\u4f34\u793e\u533a\u4e2d\u7684\u4f7c\u4f7c\u8005\u8fdb\u884c\u5609\u5956\uff1b\u8912\u5956\u90a3\u4e9b\u5c06\u5ba2\u6237\u653e\u5728\u9996\u4f4d\u3001\u5b89\u5168\u9632\u62a4\u4e13\u4e1a\u77e5\u8bc6\u503c\u5f97\u4fe1\u8d56\u4e14\u4e13\u6ce8\u4e8e\u9632\u6b62\u7f51\u7edc\u653b\u51fb\u5f97\u901e\u7684\u5408\u4f5c\u4f19\u4f34\u5de5\u7a0b\u5e08\u3002 \u7ed3\u8bc6\u7b2c 29 \u4f4d CYBERFORCE \u6770\u51fa\u4eba\u58eb\uff1aChris Chris Yates \u5c31\u804c\u4e8e\u603b\u90e8\u5728\u5fb7\u514b\u8428\u65af\u5dde\u7684 Critical Start\uff0c\u4ed6\u662f\u4e00\u540d\u62e5\u6709 25 \u5e74\u7ecf\u9a8c\u7684\u8d44\u6df1\u7f51\u7edc\u5b89\u5168\u4eba\u58eb\u3002\u00a0 Chris \u62e5\u6709\u6559\u80b2\u7855\u58eb\u5b66\u4f4d\uff0c\u5e76\u4e14\u4ed6\u80fd\u591f\u5b66\u4ee5\u81f4\u7528\uff0c\u901a\u8fc7\u5728\u6821\u56ed\u4e2d\u548c\u5de5\u4f5c\u4e2d\u6240\u5b66\u5230\u7684\u5185\u5bb9\u6765\u5e2e\u52a9\u5468\u56f4\u7684\u4eba\u4eec\uff0c\u5305\u62ec\u4ed6\u6240\u62dc\u8bbf\u7684\u6bcf\u4e00\u540d\u5ba2\u6237\u3002\u201c\u5728\u4e0e\u65b0\u5ba2\u6237\u8fdb\u884c\u5bf9\u8bdd\u65f6\uff0c\u6211\u603b\u662f\u559c\u6b22\u4ee5\u2018\u8bf7\u8bb2\u8bb2\u60a8\u7684\u6545\u4e8b\u2019\u6765\u4f5c\u4e3a\u5f00\u5934\u3002\u76f8\u6bd4\u81ea\u5df1\u53bb\u8bb2\uff0c\u6211\u66f4\u503e\u5411\u4e8e\u8046\u542c\uff0c\u8ba9\u5ba2\u6237\u8bc9\u8bf4\u4ed6\u4eec\u9047\u5230\u7684\u96be\u9898\u3002\u201d &nbsp; \u4f7f\u7528\u7684\u5546\u4e1a\u5de5\u5177 \u5bf9\u4e8e Chris \u6765\u8bf4\uff0c\u4f7f\u7528 Palo Alto Networks\u00a0\u6700\u4f73\u5b9e\u8df5\u8bc4\u4f30 (BPA)\u00a0\u662f\u4ed6\u5c06\u6280\u672f\u5bf9\u8bdd\u4e0a\u5347\u5230\u4e1a\u52a1\u7ea7\u522b\u7684\u6700\u6709\u6548\u65b9\u6cd5\u4e4b\u4e00\u3002BPA \u901a\u8fc7\u6d4b\u91cf\u5ba2\u6237\u5bf9\u529f\u80fd\u7684\u4f7f\u7528\u60c5\u51b5\u6765\u8bc4\u4f30\u5ba2\u6237\u7684\u5e73\u53f0\u914d\u7f6e\uff0c\u9a8c\u8bc1\u5ba2\u6237\u7684\u7b56\u7565\u662f\u5426\u7b26\u5408\u6700\u4f73\u5b9e\u8df5\uff0c\u5e76\u9488\u5bf9\u672a\u901a\u8fc7\u6700\u4f73\u5b9e\u8df5\u68c0\u67e5\u7684\u5185\u5bb9\u63d0\u51fa\u4fee\u590d\u7684\u5efa\u8bae\u548c\u8bf4\u660e\u3002 \u5728\u6700\u8fd1\u4e0e\u4e00\u4f4d\u77f3\u6cb9\u548c\u80fd\u6e90\u5ba2\u6237\u7684\u4f1a\u8bae\u4e2d\uff0cBPA \u548c\u70ed\u56fe\u63d0\u4f9b\u4e86\u901a\u8fc7\u91c7\u7528\u65b0\u7684 Security Operating &hellip;<\/p>\n","protected":false},"author":569,"featured_media":96771,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3540],"tags":[],"coauthors":[6128],"class_list":["post-97271","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-3540"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/01\/Cyberforce.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/97271","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/569"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=97271"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/97271\/revisions"}],"predecessor-version":[{"id":97273,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/97271\/revisions\/97273"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/96771"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=97271"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=97271"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=97271"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=97271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}