{"id":9089,"date":"2015-05-13T15:50:23","date_gmt":"2015-05-13T22:50:23","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=9089"},"modified":"2015-05-18T13:59:17","modified_gmt":"2015-05-18T20:59:17","slug":"join-state-of-colorado-security-leaders-and-rick-howard-learn-advance-security-agenda","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2015\/05\/join-state-of-colorado-security-leaders-and-rick-howard-learn-advance-security-agenda\/","title":{"rendered":"Join State of Colorado Security Leaders and Rick Howard to Learn How to Advance Your Security Agenda"},"content":{"rendered":"<p>Governments have always been serious about security.\u00a0 However, over the last several years, the United States has been hit extremely hard by blatant cyber attacks that have taken\u00a0conversation about cybersecurity to whole new level.\u00a0 Now,\u00a0an even more profound commitment is required from all parties involved to ensure our safety.<\/p>\n<p>Join this Government Technology webinar for\u00a0a discussion on how to create a safer security environment on Thursday, May 21. This webinar, <em>A Safer Colorado - through Security Excellence<\/em>, is sponsored by Palo Alto Networks and will feature:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/author\/rick\/\">Rick Howard<\/a>, CSO at Palo Alto Networks<\/li>\n<li>Deborah Blyth, CISO from the State of Colorado<\/li>\n<li>Marc Gaither, Director of Infrastructure Services for the Colorado Governor's Office of Information Technology<\/li>\n<\/ul>\n<p><!--more--><\/p>\n<p>This webinar will provide critical insights and an actual application for how organizations, large and small, can move their security agenda forward during these most pressing times. Join to hear more on:<\/p>\n<ul>\n<li><strong>How to get started<\/strong>\u00a0\u2013 where does the buy in for security come from?<\/li>\n<li><strong>The key building blocks<\/strong>\u00a0and fundamental pieces needed to build for success<\/li>\n<li><strong>How to leverage the power of technology<\/strong>\u00a0through an integrated approach around people and processes<\/li>\n<li><strong>Ways to determine your key focus areas<\/strong>\u00a0and what will be measured<\/li>\n<li><strong>How to create a sustainable security program<\/strong>\u00a0that is flexible and value added<\/li>\n<\/ul>\n<p><strong>A Safer Colorado - through Security Excellence<br \/>\n<\/strong>When: Thursday, May 21, 2015 at 11:00 AM PT \/ 2:00 PM ET<br \/>\nWhere: Online<br \/>\n<a href=\"http:\/\/cms.erepublic.com\/common\/resources?appCore=\/common\/forms\/ajax_form\/1060&amp;product_id=1060\" rel=\"nofollow,noopener\"  target=\"_blank\">Register today<\/a>.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Governments have always been serious about security.\u00a0 However, over the last several years, the United States has been hit extremely hard by blatant cyber attacks that have taken\u00a0conversation about cybersecurity to whole &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155],"tags":[1184,97],"coauthors":[709],"class_list":["post-9089","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","tag-state-of-colorado","tag-webinar"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9089","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=9089"}],"version-history":[{"count":5,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9089\/revisions"}],"predecessor-version":[{"id":9132,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9089\/revisions\/9132"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=9089"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=9089"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=9089"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=9089"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}