www.brighttalk.com Open in urlscan Pro
23.196.243.221  Public Scan

Submitted URL: http://links.brighttalk.com/ls/click?upn=u001.MfOm4j6cWZ-2FQp-2FeUn5XDz9Lcs2f7rN6LJtpU9rFdMbtBBPln-2B5nuno-2FfCJ7C5xyq4jq4nQ...
Effective URL: https://www.brighttalk.com/webcast/20137/627872?player-preauth=bt8k7VT5wrAmrN7%2B1XLONJJQCPBBR%2Ffm2OI2k7WK%2BP4%3D&&utm_so...
Submission: On November 11 via api from AE — Scanned from DE

Form analysis 1 forms found in the DOM

POST

<form novalidate="" method="post" enctype="multipart/form-data"><label for="avatar-upload" data-bdd="attendees-add-button" class="AttendeesItem_AttendeesItem-Add__fngNj AttendeesItem_AttendeeItem-Add-Disabled__Rt_lf"><svg aria-hidden="true"
      focusable="false" data-prefix="fas" data-icon="camera" class="svg-inline--fa fa-camera getColorClass_text-white__FAWAD AttendeesItem_AttendeesItem-Big-Camera__F7wIA" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"
      data-bdd="attendees-add-icon">
      <path fill="currentColor"
        d="M149.1 64.8L138.7 96H64C28.7 96 0 124.7 0 160V416c0 35.3 28.7 64 64 64H448c35.3 0 64-28.7 64-64V160c0-35.3-28.7-64-64-64H373.3L362.9 64.8C356.4 45.2 338.1 32 317.4 32H194.6c-20.7 0-39 13.2-45.5 32.8zM256 192a96 96 0 1 1 0 192 96 96 0 1 1 0-192z">
      </path>
    </svg><span class="globalStyle_hnb__WOuPu">Add photo</span></label><input type="file" class="AttendeesItem_AttendeesItem-Input___pZLk" name="profile_photo_upload" data-ga-action="My BrightTALK photo uploaded"
    ga-click-tracker-action="My BrightTALK upload photo" ga-click-tracker-category="Social" accept="image/*" id="avatar-upload" data-bdd="attendees-add-input" disabled=""></form>

Text Content

PROTECTING KUBERNETES® WORKLOADS ON GOOGLE CLOUD PLATFORM


Share

Post

Share

Link
Copied!





NETWORK WITH LIKE-MINDED ATTENDEES


More attendees
Add photo
Jaydeep Patel
Application Development Manager - Wire and Cable
Borouge
United Arab Emirates
Casey Alexander
Event Producer
BrightTALK
United States
Kate OConnell
Customer Success Director
TechTarget
United States
Morten Hallstrom
IAM Specialist
Capgemini
Norway
Hide me from other attendees

PRESENTED BY

Scott Orton, Prisma Cloud Solutions Architect, Palo Alto Networks and Abhinav
Bhatia, UK ISV Partner Engineer, Google Cloud Platform


ABOUT THIS TALK

Join Google Cloud and Palo Alto Networks for an educational overview of
containers, Kubernetes and the tools available to help your organization
securely adopt these technologies. Then, see how they work firsthand in a
hands-on lab featuring our joint offerings. During the session, you'll: • Use
Google Kubernetes Engine to deploy and manage containerized services • Secure
the CI/CD process flow and GKE™ cluster with Prisma® Cloud • Launch a malicious
attack against the services to see how Prisma Cloud is able to enforce run time
security policies Even in a virtual environment, to give you the best experience
"seating" is limited, so register today to reserve your spot. By registering for
this event, you agree to have your information shared with both Palo Alto
Networks and Google Cloud. Note: To participate, you will need to have an
updated, HTML5-compatible browser and Internet bandwidth capable of handling
Zoom Webinar without video.

Related topics:
Cloud Security
Network Security
Google Cloud
Palo Alto
Firewalls
Data Loss Prevention
Kubernetes
CSPM
Secure Cloud
SecOps


MORE FROM THIS CHANNEL


Palo Alto Networks | Google Cloud
Upcoming talks (3)
On-demand talks (23)
Subscribers (5024)
Join Google Cloud and Palo Alto Networks for an educational overview of
containers,
Kubernetes and the tools available to help your organization securely adopt
these
technologies. Then, see how they work firsthand in a hands-on lab featuring our
joint
offerings.…
Network Security Essentials on
Google Cloud with Palo Alto Networks…

Dec 04 2024, 10:00pm Gulf ST
Protecting Kubernetes® Workloads
on Google Cloud Platform…

Dec 03 2024, 10:00pm Gulf ST
Network Security Essentials on
Google Cloud with Palo Alto Networks…
4 days ago25 mins
Protecting Kubernetes® Workloads
on Google Cloud Platform…
5 days ago1 hr 8 mins
Palo Alto Networks and Google |
Google Cloud Marketplace Marvels…
9 days ago21 mins
Network Security Essentials on
Google Cloud with Palo Alto Networks…
1 month ago25 mins
Protecting Kubernetes® Workloads
on Google Cloud Platform…
1 month ago1 hr 11 mins
Network Security Essentials on
Google Cloud with Palo Alto Networks…
3 months ago24 mins
Protecting Kubernetes® Workloads
on Google Cloud Platform…
3 months ago1 hr 6 mins
Protecting Kubernetes® Workloads
on Google Cloud Platform…
3 months ago1 hr 7 mins
Network Security Essentials on
Google Cloud with Palo Alto Networks…
3 months ago25 mins
Protecting Kubernetes® Workloads
on Google Cloud Platform…
4 months ago1 hr 7 mins
Network Security Essentials on
Google Cloud with Palo Alto Networks…
5 months ago23 mins
Network Security Essentials on
Google Cloud with Palo Alto Networks…
6 months ago25 mins
Protecting Kubernetes® Workloads
on Google Cloud Platform…
6 months ago1 hr 9 mins
Achieving Simplicity, Scale, and
Security with Google Cloud NGFW
Enterprise…
6 months ago5 mins
Protecting Kubernetes® Workloads
on Google Cloud Platform…
7 months ago1 hr 26 mins

You're registered!
We look forward to seeing you online on:

Nov 12 2024, 2:00pm Gulf ST

Add to calendar

Outlook

Google

iCal

Share with your team

Click to copy event link

Link copied to clipboard


Open in your default mail app


DISCOVER MORE ON BRIGHTTALK:

OWASP Top 10 | Understanding IT
and Using IT…
Nivedita Murthy, Associate Principal ……
1 month ago18 mins
2024 Recap: IT Security Trends and
Insights…
Diana Kelley, Protect AI and Guests…
Dec 11 20249:00pm
The Finance Industry Deep Dive:
Targeted BI & Gen AI Capabilities…
Gowri Selka, Volantsys Analytics…
Dec 12 20249:00pm
Cloud in Review: A Look Back at
2024…
Jo Peterson, Clarify360…
Dec 18 20249:00pm
DevSecOps in the Wild: Examining
Global Security Factors in 2024…
Steven Zimmerman, DevOps Securit……
Nov 26 20242:00pm
Pen Testing 101…
Dylan Iuzzolino, Senior Security Con……
1 month ago26 mins
Black Duck Snippet Matching and
Generative AI Models…
Frank Tomasello, Senior Sales Engin……
3 days ago41 mins
DORA and Software Security…
Adam Brown, Marc England, Adam ……
Nov 28 20242:00pm
Artificial Intelligence, Real Security:
Preparing DevSecOps for AI Develo……
Steven Zimmerman, DevOps Securit……
Nov 21 20242:00pm
Cyber Risk Series: AI & LLM - How
Secure are Your Generative Sheep?…
Qualys…
Dec 04 202410:00pm
Four Types of Supply Chain Attacks
Development Teams Should Worry ……
Mike McGuire, Senior Security Soluti……
1 month ago39 mins
PCI-DSS 4.0 Explained:
Enhancements, Challenges, and A……
John Waller, Cybersecurity Practice ……
25 days ago20 mins
Best Practices for Using AI in
Software Development…
Anthony Decicco, GTC Law Group a……
24 days ago65 mins
AI Strategy, Security, and
Governance: The View from the Top…
Sayoko Blodgett-Ford, GTC Law Gro……
1 month ago61 mins
AppSec Automation: Five Steps to
Achieving Developer-First Security…
Steven Zimmerman, DevOps Securit……
Nov 14 20242:00pm
Open Source Software Audit vs
Scan: What’s Right for M&A?…
Emmanuel Tournier and Phil Odence……
18 days ago58 mins
Embracing the Future of
Cybersecurity with NIST CSF 2.0…
John Waller, Cybersecurity Practice ……
24 days ago18 mins
Cloud-native and Generative AI
Implications in DevSecOps…
Kimm Yeo, Senior Manager, Platfor……
1 month ago64 mins
Passwordless 360°: Enhancing
Security and User Experience for W……
Michael Dybek Sr Solutions Consult……
2 months ago56 mins
The impact of DORA on
cryptography management and dig……
Romain Deslorieux - Partnership Alli……
1 month ago58 mins
Workforce Identity Maturity: Top 3
Tactics to meet your goals…
Alexandria Hodgson - Sr. Product M……
4 months ago34 mins
Introducing Okta Fine Grained
Authorization for Your Apps…
Leigh Malone, Okta, Area Sales Direc……
7 months ago29 mins
Securing Microsoft 365 Copilot Live
Lab…
Brian Vecci (Field CTO, Varonis) and ……
6 months ago57 mins
Building the Foundation for
Enterprise-Wide Security with Sing……
Albert Caballero…
3 months ago50 mins
You’re Ready for AI. Is your Data
Center?…
Brad TerEick | Global Systems Engin……
17 days ago37 mins
How to Prepare for the
Wide-Ranging Effects of NIS2 & D……
Gerald Deck | Nuria Inserte | Cheryl ……
4 months ago30 mins
Mission Possible: Zero Trust for OT…
Chris Trynoga - Senior Solutions Eng……
2 months ago30 mins
Complete Cloud Sustainability: What
You Need to Know…
David Terrar - Cloud Industry Forum,……
5 months ago62 mins
Passwordless 360°: A
Game-Changing Approach to Auth……
Haider Iqbal, Director of Product Ma……
3 months ago54 mins
Achieve Multi-Cloud Visibility with
Universal Asset Insights…
Cricket Liu, Chief Evangelist, Infoblox…
Nov 20 202410:00pm
Start preparing your network for
Quantum-safe security now…
Julian Fay, CTO, Senetas | Stan Mes……
3 months ago54 mins
The Challenges of the NIS 2
Directive and How Thales Can Help…
Romain Deslorieux: Director, GSI Str……
4 months ago42 mins
Secure processing of cryptographic
keys towards KeyBlock and TR-31…
Sergio Soler, R&D Head Utimaco Ibe……
17 days ago52 mins
Discover the Gold Standard for
Cloud Security…
David Phister, Product Management ……
11 days ago61 mins
Radical Simplicity: Deploy Critical
Network Services in Minutes…
Cricket Liu, Chief Evangelist, Infoblox…
Dec 18 202410:00pm
The 2024 Guide to Open Source
Security and Risk…
Mike McGuire, Black Duck…
2 months ago50 mins
The Power of a Future-Proof Data
Security Strategy…
Terry Ray, SVP Data Security CTO, I……
25 days ago47 mins
A Year in Review: How Did AI
Change the Playing Field in 2024?…
Ramesh Dontha, Digital Transformat……
Dec 10 20249:00pm
What the EU Cyber Resilience Act
Means for AppSec…
Michael White, Technical Director an……
1 month ago33 mins
Elevating API Security: A Structured
Approach…
John Waller, Cybersecurity Practice ……
10 days ago25 mins
What is Application Security Posture
Management (ASPM)?…
Natasha Gupta, Senior Product Mar……
2 months ago36 mins
Elevating Security in the Cloud:
Detection and Response Unleashed…
Cloud Security Practice…
3 months ago24 mins
How to Improve AppSec Efficiency…
Hugues Martin, Sales Engineer Man……
3 months ago25 mins
Ask the Experts: AI and Software
Development…
DLA Piper, GTC Law Group, Hall La……
3 months ago58 mins
How Do You Secure Hype:
Baselining Your Org’s Generative AI……
David Benas, Associate Principal Co……
1 month ago41 mins
How to Protect Yourself from AI
Cybersecurity Nightmares…
Menny Barzilay, Cyber Security Expe……
3 months ago32 mins
How Many Types of SBOM Are
There?…
Mike McGuire, Senior Software Solut……
3 months ago39 mins
By the Numbers: Software Supply
Chain Security Risks…
Larry Ponemon, Ponemon Institute ……
3 months ago46 mins
Elevate your AWS Threat
Intelligence with Prisma Cloud and……
Kanthi Sarella, Palo Alto Networks | ……
1 year ago28 mins
Shifting Security Left with Prisma
Cloud…
Stephen Giguere, Palo Alto Network……
1 year ago39 mins