{"id":9875,"date":"2015-08-03T13:00:47","date_gmt":"2015-08-03T20:00:47","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=9875"},"modified":"2015-08-03T10:40:02","modified_gmt":"2015-08-03T17:40:02","slug":"heres-where-to-find-palo-alto-networks-at-black-hat-usa-2015","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/08\/heres-where-to-find-palo-alto-networks-at-black-hat-usa-2015\/","title":{"rendered":"Here\u2019s Where to Find Palo Alto Networks at Black Hat USA 2015"},"content":{"rendered":"<p>Black Hat USA 2015 is taking over Mandalay Bay all this week in Las Vegas, and we invite you to visit with Palo Alto Networks Wednesday and Thursday at the Expo Hall.<\/p>\n<p><center><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/black-hat.png\"><div style=\"max-width:100%\" data-width=\"330\"><span class=\"ar-custom\" style=\"padding-bottom:34.55%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-9876 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/black-hat.png\" alt=\"black hat\" width=\"330\" height=\"114\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/black-hat.png 330w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/black-hat-230x79.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/08\/black-hat-115x40.png 115w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/span><\/div><\/a><\/center>&nbsp;<\/p>\n<p>Join us at Booth #119 this Wednesday and Thursday to:<!--more--><\/p>\n<ul>\n<li>Learn more about new Palo Alto Networks integrations<\/li>\n<li>Watch demonstrations of Palo Alto Networks products, including <a href=\"http:\/\/media.paloaltonetworks.com\/lp\/autofocus\/?ts=autofocus\" target=\"_blank\">AutoFocus actionable threat intelligence<\/a>, and get your questions answered by our technical experts<\/li>\n<li>Meet the Unit 42 threat intelligence team<\/li>\n<li>Play the <a href=\"https:\/\/thetech.org\/cyberdetectives\/\" rel=\"nofollow,noopener\"  target=\"_blank\">Cyber Detective Game<\/a>, that Palo Alto Networks has collaborated with the Tech Museum to create at the nation\u2019s first interactive exhibit on Cyber Security<\/li>\n<li>Nominate your favorite cybersecurity book to be featured on the 2016 <a href=\"https:\/\/www.paloaltonetworks.com\/threat-research\/cybercanon.html\" target=\"_blank\">Cybersecurity Canon<\/a> list<\/li>\n<li>Talk with our onsite recruiters about new opportunities with Palo Alto Networks<\/li>\n<li>Enter to win a Lytro Camera and other great prizes<\/li>\n<\/ul>\n<p>Be sure to catch Palo Alto Networks cybersecurity expert Davis Hake, who will be presenting \u201cSecurity in Focus\u201d on Wednesday, August 5, at 10:20am in the Business Hall, Theater B.<\/p>\n<p>Watch <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/black-hat\/\" target=\"_blank\">this space<\/a> for video updates on the scene at Black Hat.<\/p>\n<h3>For more<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/threat-research.html\" target=\"_blank\">Read about the newest findings from Palo Alto Networks Threat Intelligence Team, Unit 42<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/tech-museum-of-innovation\/\" target=\"_blank\">Learn how Palo Alto Networks has partnered up with the Tech Museum to launch the Cyber Detectives exhibit<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/threat-research\/cybercanon.html\" target=\"_blank\">Check out the full list of 2015 Cybersecurity Canon winners and learn more about the Cybersecurity Canon project<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Black Hat USA 2015 is taking over Mandalay Bay all this week in Las Vegas, and we invite you to visit with Palo Alto Networks Wednesday and Thursday at the Expo Hall. &hellip;<\/p>\n","protected":false},"author":141,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,133],"tags":[166],"coauthors":[1348],"class_list":["post-9875","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-events","tag-black-hat"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9875","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/141"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=9875"}],"version-history":[{"count":4,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9875\/revisions"}],"predecessor-version":[{"id":9880,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9875\/revisions\/9880"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=9875"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=9875"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=9875"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=9875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}