{"id":4322,"date":"2013-12-18T11:25:45","date_gmt":"2013-12-18T19:25:45","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=4322"},"modified":"2013-12-18T12:06:14","modified_gmt":"2013-12-18T20:06:14","slug":"palo-alto-networks-cso-heres-whats-ahead-2014","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2013\/12\/palo-alto-networks-cso-heres-whats-ahead-2014\/","title":{"rendered":"Palo Alto Networks CSO: Here\u2019s What\u2019s Ahead In 2014"},"content":{"rendered":"<p>We\u2019re very pleased to introduce Palo Alto Networks Chief Security Officer Rick Howard, who brings to our company decades of cybersecurity experience in both the commercial and public sectors.<\/p>\n<p>Rick was most recently Chief Information Security Officer for TASC and General Manager of iDefense, the commercial cybersecurity intelligence service at VeriSign. He was previously in charge of intelligence-gathering activities at Counterpane Internet Security, and also served in the United States Army for 23 years, retiring as a lieutenant colonel in 2004.<\/p>\n<p>Rick has published many academic papers on technology and security and has contributed as an executive editor to two books: \u201cCyber Fraud: Tactics, Techniques and Procedures\u201d and \u201cCyber Security Essentials.\u201d And as <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2013\/12\/introducing-cybersecurity-canon-books-read\/\" target=\"_blank\">you\u2019ve already seen this week<\/a>, Rick has a keen interest in cybersecurity literature of all kinds, and leading up to next year\u2019s RSA conference, he\u2019ll be discussing <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2013\/12\/cyber-security-canon-cert-guide-insider-threats\/\" target=\"_blank\">books he thinks belong in the Cybersecurity Canon<\/a>.<\/p>\n<p>Rick\u2019s already underway with a busy schedule of speaking engagements and research activities, but we recently grabbed some time with him to talk about the past year\u2019s big stories in cybersecurity and what he thinks will dominate conversation in 2014. Let\u2019s hear what Rick had to say:<\/p>\n<p><!--more--><\/p>\n<p><div class=\"styleIt\" style=\"width:auto;height:auto;\"><lite-youtube videoid=\"A33VlEE8x-w\" ><\/lite-youtube><\/div><\/p>\n<p>We thank you for all the great feedback we\u2019ve received on our 2014 predictions series \u2013 the Palo Alto Networks community is an opinionated and vocal bunch! Here\u2019s a look back at the series:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2013\/12\/2014-predictions-virtual-data-center\/\" target=\"_blank\">Danelle Au covered<\/a> virtualization, data center and cloud predictions<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2013\/12\/2014-predictions-industry-trends\/\" target=\"_blank\">Scott Gainey examined<\/a> dominant industry trends<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2013\/12\/2014-predictions-mobile-security\/\" target=\"_blank\">Palo Alto Networks experts<\/a> looked at mobility challenges<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2013\/12\/2014-predictions-threat-landscape\/\" target=\"_blank\">Wade Williamson assessed<\/a> the threat landscape<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2013\/12\/2014-predictions-firewall\/\" target=\"_blank\">Matt Keil tackled<\/a> next-generation firewall topics<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2013\/12\/2014-predictions-cybersecurity-trends\/\" target=\"_blank\">Isabelle Dumont discussed<\/a> cybersecurity and vertical market trends<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019re very pleased to introduce Palo Alto Networks Chief Security Officer Rick Howard, who brings to our company decades of cybersecurity experience in both the commercial and public sectors. Rick was most &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[229],"tags":[233,120,145,84],"coauthors":[],"class_list":["post-4322","post","type-post","status-publish","format-standard","hentry","category-predictions","tag-2014-predictions","tag-cybersecurity","tag-next-generation-firewall","tag-virtualization"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4322","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=4322"}],"version-history":[{"count":4,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4322\/revisions"}],"predecessor-version":[{"id":4324,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4322\/revisions\/4324"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=4322"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=4322"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=4322"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=4322"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}