www.brighttalk.com
Open in
urlscan Pro
23.213.84.37
Public Scan
Submitted URL: http://links.brighttalk.com/ls/click?upn=u001.MfOm4j6cWZ-2FQp-2FeUn5XDz9Lcs2f7rN6LJtpU9rFdMbss0Z8CqN6zLr5gxJnqIRIFR9C-2FlkAk...
Effective URL: https://www.brighttalk.com/webcast/18475/586151?player-preauth=IY30Kn2120kBnhXrdaNo22HJyb8mAEtWOu%2F%2FB3olsNY%3D&utm_sourc...
Submission: On August 07 via api from OM — Scanned from CA
Effective URL: https://www.brighttalk.com/webcast/18475/586151?player-preauth=IY30Kn2120kBnhXrdaNo22HJyb8mAEtWOu%2F%2FB3olsNY%3D&utm_sourc...
Submission: On August 07 via api from OM — Scanned from CA
Form analysis
1 forms found in the DOMPOST
<form novalidate="" method="post" enctype="multipart/form-data"><label for="avatar-upload" data-bdd="attendees-add-button" class="AttendeesItem_AttendeesItem-Add__fngNj AttendeesItem_AttendeeItem-Add-Disabled__Rt_lf"><svg aria-hidden="true"
focusable="false" data-prefix="fas" data-icon="camera" class="svg-inline--fa fa-camera getColorClass_text-white__FAWAD AttendeesItem_AttendeesItem-Big-Camera__F7wIA" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"
data-bdd="attendees-add-icon">
<path fill="currentColor"
d="M149.1 64.8L138.7 96H64C28.7 96 0 124.7 0 160V416c0 35.3 28.7 64 64 64H448c35.3 0 64-28.7 64-64V160c0-35.3-28.7-64-64-64H373.3L362.9 64.8C356.4 45.2 338.1 32 317.4 32H194.6c-20.7 0-39 13.2-45.5 32.8zM256 192a96 96 0 1 1 0 192 96 96 0 1 1 0-192z">
</path>
</svg><span class="globalStyle_hnb__WOuPu">Add photo</span></label><input type="file" class="AttendeesItem_AttendeesItem-Input___pZLk" name="profile_photo_upload" data-ga-action="My BrightTALK photo uploaded"
ga-click-tracker-action="My BrightTALK upload photo" ga-click-tracker-category="Social" accept="image/*" id="avatar-upload" data-bdd="attendees-add-input" disabled=""></form>
Text Content
Watch later Viewing Certificate Related topics: Threat Intelligence Threat Detection Threat Hunting Security Operations Center Cloud Cloud Security Amazon Web Services Public Cloud Cloud Platform Cloud Visibility NETWORK WITH LIKE-MINDED ATTENDEES More attendees Add photo Ahmed Al Shehri Director - IT Systems management Bank Muscat Saudi Arabia Kate Scott Professional Services Agent BrightTALK United States Derek Rogerson Sr Product Marketing Manager, Prisma Cloud, CSPs Palo Alto Networks United States Keith Hartranft Principal Security Architect Enlyte United States Hide me from other attendees MORE FROM THIS CHANNEL Palo Alto Networks and AWS Upcoming talks (0) On-demand talks (41) Subscribers (13231) Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate.… Level-up Cloud Security with Palo Alto Networks’ VM-Series for AWS Graviton… 3 months ago25 mins Secure Financial Services: Palo Alto Networks & NETSCOUT integrated in AWS… 3 months ago26 mins Effectively Managing Security Posture in the Cloud… 1 year ago41 mins Shifting Security Left with Prisma Cloud… 1 year ago39 mins Extend Network Security with CN-Series Container Firewall on AWS Marketplace… 1 year ago42 mins 10 Lessons from a CTO: Financial Services in the Cloud… 1 year ago29 mins 10 Lessons from a CTO: Financial Services in the Cloud… 2 years ago29 mins 10 Lessons from a CTO: Financial Services in the Cloud… 2 years ago29 mins Extend Network Security with CN-Series Container Firewall on AWS Marketplace… 2 years ago42 mins Securing Cloud Applications with AWS and Palo Alto Networks… 2 years ago36 mins How Financial Services can Shift Left to Achieve Security and Agility… 2 years ago35 mins Deploying Palo Alto Networks VM-Series Firewalls at Scale on AWS… 2 years ago32 mins The Amazing Way You Can Improve Your Threat Response… 2 years ago38 mins How To Automate Security in the Application Development Pipeline… 2 years ago21 mins The Power of a Least Privilege Architecture in AWS… 2 years ago1 hr 1 min How to Plan an Effective Investigation Strategy in AWS… 2 years ago53 mins How to Plan an Effective Investigation Strategy in AWS… 2 years ago53 mins RECOMMENDED FOR YOU Gen AI and Cloud: A Symbiotic Relationship?… David Terrar - Cloud Industry Forum,…… 5 months ago57 mins Harnessing AI in the Cloud Era: Transforming Finance with Gen AI… Eugina Jordan, Chief Marketing Offic…… Aug 21 20248:00pm How to Use AI to Drive Value in Insurance: Lessons From Zurich In…… Jonathan Davis, Head of Data Scien…… Aug 20 20241:00pm Transforming Finance in the Cloud Era: What are the Stresses and Reli…… Steve Yates FBCI, CBCP, FICPEM, M…… Aug 20 20246:00pm Modernizing Your vSAN Infrastructure for Next-Gen Worklo…… David Iparraguirre (VMware), Simon …… 9 months ago32 mins Optimize Decision-Making Outcomes in Financial Services wit…… Youssouf Traore, Deep Tech Investo…… Aug 21 202411:00am The Global Impact of AI: Differences in Adoption & Application Across C…… Ramesh Dontha, Digital Transformat…… Sep 24 20247:00pm Achieve Unprecedented Trading Efficiency with FIX Connector… Enoch Chandayengerwa… 1 month ago8 mins The Big Ruse… Renée Burton, Maël Le Touz, Jacque…… Aug 14 20248:00pm Complete Cloud Sustainability: What You Need to Know… David Terrar - Cloud Industry Forum,…… 2 months ago62 mins The Strategic 8: How to Navigate the Current State of Cloud Security… Jo Peterson, Clarify360… Sep 18 20247:00pm Decentralising WAAPaaS with Customer Edge - Ep 6… Philippe Cloup, Senior Solutions Arc…… Sep 12 202412:00pm Applying the Easy Button for API Security - Ep 3… Matthieu Dierick, Solutions Architect…… Aug 22 202412:00pm Getting to Know the F5 Distributed Cloud Platform - Ep 1… Raffaele D'Albenzio Manager Solutio…… Aug 08 202412:00pm Blocking Automated Threats and Smart Bots - Ep 5… Patrick Zoller, Security Solutions Arc…… Sep 05 202412:00pm Risk Registers: The Most important Thing You're Not Doing… Diana Kelley, Protect AI and Guests… Sep 18 20247:00pm Creating the New WAF Boundary - Ep 2… Mohamed Shaath, Solutions Archite…… Aug 15 202412:00pm Protecting Applications against DDoS Attacks - Ep 4… Patrick Zoller, Security Solutions Arc…… Aug 29 202412:00pm Cyber Risk Series: To Be, or Not To Be? Patch is the Question… Qualys… 6 days ago202 mins Defending the Ballot Box: What It Takes to Digitally Protect an Election… Dan Lohrmann, Presidio; Earl Duby, …… Sep 10 20246:00pm Keeping Pace: Managing the risks of AI-generated code… Patrick Carey, Executive Director - G…… 19 days ago33 mins Vulnerability Scoring 101… Lauren Fearon, Vulnerability Analyst,…… 1 month ago27 mins How to Score an A+ on C++ in Open Source Security… John O'Zemko, Synopsys… 2 months ago28 mins How to Prioritize the Software You Diligence in Software Due Diligence… Anthony Decicco, GTC Law Group & …… 6 days ago59 mins It’s Time for AppSec to Evolve… Patrick Carey, Product Marketing | K…… 2 months ago32 mins Managing Software Risks in the Age of AI-Generated Code… John Lynn & Laila Paszti, Kirkland & …… Aug 14 20247:00pm Embracing the Future of Cybersecurity with NIST CSF 2.0… John Waller, Cybersecurity Practice …… 1 month ago18 mins Best Practices for Using AI in Software Development… Anthony Decicco, GTC Law Group a…… 27 days ago65 mins Generative AI, Training Data, Open Source, and GitHub Copilot, Oh My!… Lena and Andrew Hall, Hall Law & M…… 1 month ago60 mins Secure Your Frontline: Start Continuous DAST in Production… Vishrut Iyengar, Chris Burleson, Pete…… 1 month ago36 mins Deep Dive: Software Supply Chain Threats… Danil Panache, ReversingLabs AND …… 26 days ago59 mins The Evolution of Pen Testing… Thomas Richards, Principal Consult…… 26 days ago28 mins Black Duck: Unveiling the power of SCA scan and CI/CD pipeline… Steven Susanto, Applications Engine…… 2 months ago60 mins DevSecOps in the Wild: Examining Global Security Factors in 2023… Steven Zimmerman, Synopsys… 2 months ago59 mins AppSec Optimized! A Guide to AppSec Tool Consolidation… John Delmare Global AppSec Lead …… 2 months ago44 mins Shift Left to Shift Everywhere: Continuous Development's Impact …… Chris Edmundson, SANS Associate I…… Aug 29 202412:00pm PCI-DSS 4.0 Explained: Enhancements, Challenges, and A…… John Waller, Cybersecurity Practice …… 28 days ago20 mins Cloud-native and Generative AI Implications in DevSecOps… Kimm Yeo, Senior Manager, Platfor…… Aug 08 202412:00pm Unleash AI Innovation Across the Enterprise with Teradata and AWS… Dr. Bogdan Vrusius, AWS / Dr. Chris …… 15 days ago44 mins VMware Private AI with Intel: Unlocking AI Everywhere… Intel: Abhay Chitral; Broadcom: Shob…… 6 months ago50 mins Keys to the Modern SOC - What You Need, Why it Matters, and How to …… Fortinet's Anthony Giandomenico, D…… 14 days ago57 mins What's on the Horizon for SASE in 2024… Nirav Shah, VP Products and Solutio…… 1 month ago53 mins Fighting Ransomware from Network to Endpoint with Unified NDR, EDR, …… Peter Steyaert, Sr. Solution Architect…… Sep 03 202412:00pm AI-Driven Prevention, Detection, Investigation, and Response… Brook Chelmo, Director of Product, E…… Sep 05 202412:00pm Outsmart & Outpace Attackers: Strategies for Effective Security Op…… Max Zeumer, Director of Product, Se…… Sep 17 202412:00pm OT Security: It Takes A Platform… Richard Springer, Director Marketing,…… Sep 19 202412:00pm The Unseen Dangers of Evasive Malware and How to Prevent This …… Brook Chelmo, Director of Product …… Sep 24 202412:00pm Can You Secure OT Without SASE?… Daniele Mancini, EMEA Field CISO, F…… 1 month ago53 mins What the O-PAS Standard means for Oil & Gas… Aasef Iqbal, Sr. Director, Product Ma…… 7 days ago55 mins Back to the Future: The Next-Gen Firewall Re-visited… Patrick Grillo, Senior Director, Solutio…… 21 days ago46 mins