www.brighttalk.com
Open in
urlscan Pro
23.196.243.221
Public Scan
Submitted URL: http://links.brighttalk.com/ls/click?upn=u001.MfOm4j6cWZ-2FQp-2FeUn5XDz9Lcs2f7rN6LJtpU9rFdMbtBBPln-2B5nuno-2FfCJ7C5xyq4jq4nQ...
Effective URL: https://www.brighttalk.com/webcast/20137/627872?player-preauth=bt8k7VT5wrAmrN7%2B1XLONJJQCPBBR%2Ffm2OI2k7WK%2BP4%3D&&utm_so...
Submission: On November 11 via api from AE — Scanned from DE
Effective URL: https://www.brighttalk.com/webcast/20137/627872?player-preauth=bt8k7VT5wrAmrN7%2B1XLONJJQCPBBR%2Ffm2OI2k7WK%2BP4%3D&&utm_so...
Submission: On November 11 via api from AE — Scanned from DE
Form analysis
1 forms found in the DOMPOST
<form novalidate="" method="post" enctype="multipart/form-data"><label for="avatar-upload" data-bdd="attendees-add-button" class="AttendeesItem_AttendeesItem-Add__fngNj AttendeesItem_AttendeeItem-Add-Disabled__Rt_lf"><svg aria-hidden="true"
focusable="false" data-prefix="fas" data-icon="camera" class="svg-inline--fa fa-camera getColorClass_text-white__FAWAD AttendeesItem_AttendeesItem-Big-Camera__F7wIA" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"
data-bdd="attendees-add-icon">
<path fill="currentColor"
d="M149.1 64.8L138.7 96H64C28.7 96 0 124.7 0 160V416c0 35.3 28.7 64 64 64H448c35.3 0 64-28.7 64-64V160c0-35.3-28.7-64-64-64H373.3L362.9 64.8C356.4 45.2 338.1 32 317.4 32H194.6c-20.7 0-39 13.2-45.5 32.8zM256 192a96 96 0 1 1 0 192 96 96 0 1 1 0-192z">
</path>
</svg><span class="globalStyle_hnb__WOuPu">Add photo</span></label><input type="file" class="AttendeesItem_AttendeesItem-Input___pZLk" name="profile_photo_upload" data-ga-action="My BrightTALK photo uploaded"
ga-click-tracker-action="My BrightTALK upload photo" ga-click-tracker-category="Social" accept="image/*" id="avatar-upload" data-bdd="attendees-add-input" disabled=""></form>
Text Content
PROTECTING KUBERNETES® WORKLOADS ON GOOGLE CLOUD PLATFORM Share Post Share Link Copied! NETWORK WITH LIKE-MINDED ATTENDEES More attendees Add photo Jaydeep Patel Application Development Manager - Wire and Cable Borouge United Arab Emirates Casey Alexander Event Producer BrightTALK United States Kate OConnell Customer Success Director TechTarget United States Morten Hallstrom IAM Specialist Capgemini Norway Hide me from other attendees PRESENTED BY Scott Orton, Prisma Cloud Solutions Architect, Palo Alto Networks and Abhinav Bhatia, UK ISV Partner Engineer, Google Cloud Platform ABOUT THIS TALK Join Google Cloud and Palo Alto Networks for an educational overview of containers, Kubernetes and the tools available to help your organization securely adopt these technologies. Then, see how they work firsthand in a hands-on lab featuring our joint offerings. During the session, you'll: • Use Google Kubernetes Engine to deploy and manage containerized services • Secure the CI/CD process flow and GKE™ cluster with Prisma® Cloud • Launch a malicious attack against the services to see how Prisma Cloud is able to enforce run time security policies Even in a virtual environment, to give you the best experience "seating" is limited, so register today to reserve your spot. By registering for this event, you agree to have your information shared with both Palo Alto Networks and Google Cloud. Note: To participate, you will need to have an updated, HTML5-compatible browser and Internet bandwidth capable of handling Zoom Webinar without video. Related topics: Cloud Security Network Security Google Cloud Palo Alto Firewalls Data Loss Prevention Kubernetes CSPM Secure Cloud SecOps MORE FROM THIS CHANNEL Palo Alto Networks | Google Cloud Upcoming talks (3) On-demand talks (23) Subscribers (5024) Join Google Cloud and Palo Alto Networks for an educational overview of containers, Kubernetes and the tools available to help your organization securely adopt these technologies. Then, see how they work firsthand in a hands-on lab featuring our joint offerings.… Network Security Essentials on Google Cloud with Palo Alto Networks… Dec 04 2024, 10:00pm Gulf ST Protecting Kubernetes® Workloads on Google Cloud Platform… Dec 03 2024, 10:00pm Gulf ST Network Security Essentials on Google Cloud with Palo Alto Networks… 4 days ago25 mins Protecting Kubernetes® Workloads on Google Cloud Platform… 5 days ago1 hr 8 mins Palo Alto Networks and Google | Google Cloud Marketplace Marvels… 9 days ago21 mins Network Security Essentials on Google Cloud with Palo Alto Networks… 1 month ago25 mins Protecting Kubernetes® Workloads on Google Cloud Platform… 1 month ago1 hr 11 mins Network Security Essentials on Google Cloud with Palo Alto Networks… 3 months ago24 mins Protecting Kubernetes® Workloads on Google Cloud Platform… 3 months ago1 hr 6 mins Protecting Kubernetes® Workloads on Google Cloud Platform… 3 months ago1 hr 7 mins Network Security Essentials on Google Cloud with Palo Alto Networks… 3 months ago25 mins Protecting Kubernetes® Workloads on Google Cloud Platform… 4 months ago1 hr 7 mins Network Security Essentials on Google Cloud with Palo Alto Networks… 5 months ago23 mins Network Security Essentials on Google Cloud with Palo Alto Networks… 6 months ago25 mins Protecting Kubernetes® Workloads on Google Cloud Platform… 6 months ago1 hr 9 mins Achieving Simplicity, Scale, and Security with Google Cloud NGFW Enterprise… 6 months ago5 mins Protecting Kubernetes® Workloads on Google Cloud Platform… 7 months ago1 hr 26 mins You're registered! We look forward to seeing you online on: Nov 12 2024, 2:00pm Gulf ST Add to calendar Outlook Google iCal Share with your team Click to copy event link Link copied to clipboard Open in your default mail app DISCOVER MORE ON BRIGHTTALK: OWASP Top 10 | Understanding IT and Using IT… Nivedita Murthy, Associate Principal …… 1 month ago18 mins 2024 Recap: IT Security Trends and Insights… Diana Kelley, Protect AI and Guests… Dec 11 20249:00pm The Finance Industry Deep Dive: Targeted BI & Gen AI Capabilities… Gowri Selka, Volantsys Analytics… Dec 12 20249:00pm Cloud in Review: A Look Back at 2024… Jo Peterson, Clarify360… Dec 18 20249:00pm DevSecOps in the Wild: Examining Global Security Factors in 2024… Steven Zimmerman, DevOps Securit…… Nov 26 20242:00pm Pen Testing 101… Dylan Iuzzolino, Senior Security Con…… 1 month ago26 mins Black Duck Snippet Matching and Generative AI Models… Frank Tomasello, Senior Sales Engin…… 3 days ago41 mins DORA and Software Security… Adam Brown, Marc England, Adam …… Nov 28 20242:00pm Artificial Intelligence, Real Security: Preparing DevSecOps for AI Develo…… Steven Zimmerman, DevOps Securit…… Nov 21 20242:00pm Cyber Risk Series: AI & LLM - How Secure are Your Generative Sheep?… Qualys… Dec 04 202410:00pm Four Types of Supply Chain Attacks Development Teams Should Worry …… Mike McGuire, Senior Security Soluti…… 1 month ago39 mins PCI-DSS 4.0 Explained: Enhancements, Challenges, and A…… John Waller, Cybersecurity Practice …… 25 days ago20 mins Best Practices for Using AI in Software Development… Anthony Decicco, GTC Law Group a…… 24 days ago65 mins AI Strategy, Security, and Governance: The View from the Top… Sayoko Blodgett-Ford, GTC Law Gro…… 1 month ago61 mins AppSec Automation: Five Steps to Achieving Developer-First Security… Steven Zimmerman, DevOps Securit…… Nov 14 20242:00pm Open Source Software Audit vs Scan: What’s Right for M&A?… Emmanuel Tournier and Phil Odence…… 18 days ago58 mins Embracing the Future of Cybersecurity with NIST CSF 2.0… John Waller, Cybersecurity Practice …… 24 days ago18 mins Cloud-native and Generative AI Implications in DevSecOps… Kimm Yeo, Senior Manager, Platfor…… 1 month ago64 mins Passwordless 360°: Enhancing Security and User Experience for W…… Michael Dybek Sr Solutions Consult…… 2 months ago56 mins The impact of DORA on cryptography management and dig…… Romain Deslorieux - Partnership Alli…… 1 month ago58 mins Workforce Identity Maturity: Top 3 Tactics to meet your goals… Alexandria Hodgson - Sr. Product M…… 4 months ago34 mins Introducing Okta Fine Grained Authorization for Your Apps… Leigh Malone, Okta, Area Sales Direc…… 7 months ago29 mins Securing Microsoft 365 Copilot Live Lab… Brian Vecci (Field CTO, Varonis) and …… 6 months ago57 mins Building the Foundation for Enterprise-Wide Security with Sing…… Albert Caballero… 3 months ago50 mins You’re Ready for AI. Is your Data Center?… Brad TerEick | Global Systems Engin…… 17 days ago37 mins How to Prepare for the Wide-Ranging Effects of NIS2 & D…… Gerald Deck | Nuria Inserte | Cheryl …… 4 months ago30 mins Mission Possible: Zero Trust for OT… Chris Trynoga - Senior Solutions Eng…… 2 months ago30 mins Complete Cloud Sustainability: What You Need to Know… David Terrar - Cloud Industry Forum,…… 5 months ago62 mins Passwordless 360°: A Game-Changing Approach to Auth…… Haider Iqbal, Director of Product Ma…… 3 months ago54 mins Achieve Multi-Cloud Visibility with Universal Asset Insights… Cricket Liu, Chief Evangelist, Infoblox… Nov 20 202410:00pm Start preparing your network for Quantum-safe security now… Julian Fay, CTO, Senetas | Stan Mes…… 3 months ago54 mins The Challenges of the NIS 2 Directive and How Thales Can Help… Romain Deslorieux: Director, GSI Str…… 4 months ago42 mins Secure processing of cryptographic keys towards KeyBlock and TR-31… Sergio Soler, R&D Head Utimaco Ibe…… 17 days ago52 mins Discover the Gold Standard for Cloud Security… David Phister, Product Management …… 11 days ago61 mins Radical Simplicity: Deploy Critical Network Services in Minutes… Cricket Liu, Chief Evangelist, Infoblox… Dec 18 202410:00pm The 2024 Guide to Open Source Security and Risk… Mike McGuire, Black Duck… 2 months ago50 mins The Power of a Future-Proof Data Security Strategy… Terry Ray, SVP Data Security CTO, I…… 25 days ago47 mins A Year in Review: How Did AI Change the Playing Field in 2024?… Ramesh Dontha, Digital Transformat…… Dec 10 20249:00pm What the EU Cyber Resilience Act Means for AppSec… Michael White, Technical Director an…… 1 month ago33 mins Elevating API Security: A Structured Approach… John Waller, Cybersecurity Practice …… 10 days ago25 mins What is Application Security Posture Management (ASPM)?… Natasha Gupta, Senior Product Mar…… 2 months ago36 mins Elevating Security in the Cloud: Detection and Response Unleashed… Cloud Security Practice… 3 months ago24 mins How to Improve AppSec Efficiency… Hugues Martin, Sales Engineer Man…… 3 months ago25 mins Ask the Experts: AI and Software Development… DLA Piper, GTC Law Group, Hall La…… 3 months ago58 mins How Do You Secure Hype: Baselining Your Org’s Generative AI…… David Benas, Associate Principal Co…… 1 month ago41 mins How to Protect Yourself from AI Cybersecurity Nightmares… Menny Barzilay, Cyber Security Expe…… 3 months ago32 mins How Many Types of SBOM Are There?… Mike McGuire, Senior Software Solut…… 3 months ago39 mins By the Numbers: Software Supply Chain Security Risks… Larry Ponemon, Ponemon Institute …… 3 months ago46 mins Elevate your AWS Threat Intelligence with Prisma Cloud and…… Kanthi Sarella, Palo Alto Networks | …… 1 year ago28 mins Shifting Security Left with Prisma Cloud… Stephen Giguere, Palo Alto Network…… 1 year ago39 mins