Wednesday, May 10th, 2023

The State of Cloud-Native Security

04:00 - 05:30 pm PDT | Virtual

Event Overview

As cloud migration continues across regions and sectors, how are organizations choosing security tools, and how are those tools being operationalized? Which practices are producing the best security outcomes, and which are hampering efforts?

These questions are answered in the new report “The State of Cloud-Native Security” by Palo Alto Networks, and it is the topic of this new virtual roundtable. Join this session to gain new insights from event thought leaders, as well as to discuss with your peers:

  • The acceleration of shift-left security.
  • How tooling decisions have become clouded by complexity.
  • Why collaboration across teams is essential to better security outcomes.

Moderator

Tom Field

SVP, Editorial

ISMG

Bob West

Chief Security Officer

Palo Alto

Speakers

Join Bob West, Chief Security Officer at event sponsor Palo Alto Networks to gain his unique insight into the report findings as well as best practices in cloud-native security.

This 90-minute session will be:
  • Chatham house rules
  • Peer driven
  • Pitch free

Watch brief video of the topic

Underwritten by

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world’s greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before. For more information, visit www.paloaltonetworks.com.

Rules of Engagement

By taking part in this discussion you agree that:

  • These events follow Chatham House Rule. Nothing shared will be recorded or distributed anywhere online.
  • If for any reason you need to cancel your reservation, we ask you to let us know 48 hours prior to the event commencing so we can open your seat up to someone else.
  • These are interactive discussions, so we ask that all attendees participate in the discussion. If this is a virtual event, we ask all attendees to join via video.

Upcoming ISMG Events

June 12, 2025

AI Security Imperatives: Protecting Your Enterprise in the Age of GenAI

June 18, 2025

Threat Exposure Management: How Do You Prioritize Vulnerabilities?

June 19, 2025

Building Next-Gen Applications with Severless: Accelerating Development for Data-Intensive Workloads

June 24, 2025

Agentic AI and the Access-Trust Gap

June 25, 2025

The Critical Role of the SOC in Modern Defense

Upcoming ISMG Events

June 12, 2025

AI Security Imperatives: Protecting Your Enterprise in the Age of GenAI

June 18, 2025

Threat Exposure Management: How Do You Prioritize Vulnerabilities?

June 19, 2025

Building Next-Gen Applications with Severless: Accelerating Development for Data-Intensive Workloads