○
Palo Alto Networks
Defining the next-generation of security as IT and OT converge
Join Us
Text goes here
X
Link Text
Text goes here
X

John Smith

SVP of Public Cloud Security Products Palo Alto Networks

More
Text goes here
X

John Smith

SVP of Public Cloud Security Products Palo Alto Networks

John Smith

SVP of Public Cloud Security Products Palo Alto Networks

More
Text goes here
X

John Smith

SVP of Public Cloud Security Products Palo Alto Networks

More
Text goes here
X
Palo Alto Networks
Register Now
Text goes here
X
About
Defining the next-generation of security as IT and OT converge
08
/
30
 – 
08
/
31
Register
Text goes here
X

On-Demand Webinar

If you have already registered for this event and would like to view the recording, please visit the event page.


The convergence of information technology (IT) and operational technology (OT) environments is creating new opportunities in manufacturing. Rapid adoption of Cloud, remote access and connected devices has paved the way for Industrial IoT (IIot) as a fixture for future business.  With this modernization, however, comes undesired vulnerabilities and other attack vectors, which are increasingly being exploited by malicious actors.

 

The OT threat landscape has escalated and legacy technologies are no longer effective at stopping modern cyberthreats. As the lines of distinction between IT and OT continue to fade, today’s requirements call for a new approach. 

 

Join Palo Alto Networks and IDC in discussion that explores modern security trends in manufacturing. Gain perspective and learn about different approaches for extending consistent security across the organization. 

 

Hosted by:

  • Kevin Prouty, Vice President, Energy and Manufacturing Insights at IDC

 

With Palo Alto Networks:

  • Del Rodillas, Director of Industrial Solutions
  • Xu Zou, VP of Network Security (IoT)
  • John Kindervag, Field CTO


Join us!

A Palo Alto Networks webinar moderated by IDC


Moderated by:


Kevin Prouty,  

Group Vice President, Energy and Manufacturing Insights

Kevin Prouty is Group Vice President for IDC Energy and Manufacturing Insights. He is responsible for managing a group of analysts that provide research-based advisory and consulting services that will enable energy executives in oil and gas and utilities to maximize the business value of their technology investments and minimize technology risk through accurate planning. Kevin's research specialties are Utilities, Manufacturing, Enterprise Applications, and Product Innovation research. 

 

John Kindervag, 

Field CTO, Palo Alto Networks

John Kindervag joined Palo Alto Networks as Field CTO in 2017 after eight and one half years at Forrester Research where he was a Vice President and Principal Analyst on the Security and Risk Team. John is considered one of the world’s foremost cybersecurity experts. He is best known for creating the revolutionary Zero Trust Model of Cybersecurity.

 

Del Rodillas, 

Director of ICS/OT Industry Solutions, Palo Alto Networks

Del leads a global team of security architects focused on developing and evangelizing OT security architectures and solutions. His over 24 years of industry experience spans OT Cybersecurity, Networking, Aerospace & Defense, and High Tech Manufacturing with roles in strategic marketing and engineering. Del holds a Masters in Electrical Engineering from Santa Clara University, an MBA from the Wharton School of the University of Pennsylvania, and has been certified as a Global Industrial Cyber Security Professional.

 

Xu Zou, 

VP of Products, IoT Security at Palo Alto Networks

Xu Zou joined Palo Alto Networks via the acquisition of Zingbox, the IoT security startup he co-founded in 2014. Prio to ZingBox, Xu held many senior positions including director of Aerohive Networks, senior director at Aruba Networks, where he managed their industrial and carrier product line.  Xu was a founding member and VP of Software at Azalea networks and he was a senior engineer at Airespace.  Xu has an Executive MBA from Wharton School, University of Pennsylvania, holds an M.S. in Computer Science from Michigan State University and B.S. in Computer Science from Tsinghua University. Xu also holds ten international patents on security and networking.

Kevin Prouty

Group Vice President, Energy and Manufacturing Insights

More
Text goes here
X

John Kindervag

Field CTO, Palo Alto Networks

More
Text goes here
X

Del Rodillas

Director of ICS/OT Industry Solutions, Palo Alto Networks

More
Text goes here
X

Xu Zou

VP of Products, IoT Security at Palo Alto Networks

More
Text goes here
X

Thank You

[confirmation_headline]
[confirmation_messaging]
Add to Calendar
Text goes here
X

Thank You

[confirmation_headline]
[confirmation_messaging]
Access Webinar
Text goes here
X
Webinar Link
Text goes here
X
Register
Text goes here
X

We look forward to seeing you in

The Final Countdown!
Time left for the event days hours minutes seconds
The countdown doesn't work if the event start date is set to TBD

We look forward to seeing you in

The Final Countdown!
Time left for the event days hours minutes seconds
The countdown doesn't work if the event start date is set to TBD

Speakers

John Smith

SVP of Public Cloud Security Products Palo Alto Networks

More
Text goes here
X

John Smith

SVP of Public Cloud Security Products Palo Alto Networks

More
Text goes here
X

Mary Smith

SVP of Public Cloud Security Products Palo Alto Networks

More
Text goes here
X

John Smith

SVP of Public Cloud Security Products Palo Alto Networks

More
Text goes here
X

John Smith

SVP of Public Cloud Security Products Palo Alto Networks

Mary Smith

SVP of Public Cloud Security Products Palo Alto Networks

© 2021 Palo Alto Networks, Inc. All Rights Reserved.

Privacy
Text goes here
X
Contact Us
Text goes here
X
Terms of Use
Text goes here
X

Self-parking validation tickets available at event registration upon check-in

Registration is complimentary for all attendees. Justification Letter for Cloud Security Summit. Palo Alto Networks, Inc.'s internal policies strictly limit the types of amenities it can provide to federal, state and local government, and education customers. These policies are in place to ensure that all business sectors are undertaken with the utmost respect to the applicable laws and regulations surrounding the provision of amenities to those customers. By accepting any item of value in connection with this event, you are specifically representing that Palo Alto Networks' offering and your acceptance of it is in copmliance with your organizations' legal and ethical guidelines. This event is not open to K-12 or Library customers. Should you ahve any questions in regard to this event, please contact your Palo Alto Networks sales representative.

Self-parking validation tickets available at event registration upon check-in

Registration is complimentary for all attendees. Justification Letter for Cloud Security Summit. Palo Alto Networks, Inc.'s internal policies strictly limit the types of amenities it can provide to federal, state and local government, and education customers. These policies are in place to ensure that all business sectors are undertaken with the utmost respect to the applicable laws and regulations surrounding the provision of amenities to those customers. By accepting any item of value in connection with this event, you are specifically representing that Palo Alto Networks' offering and your acceptance of it is in copmliance with your organizations' legal and ethical guidelines. This event is not open to K-12 or Library customers. Should you ahve any questions in regard to this event, please contact your Palo Alto Networks sales representative.

Kevin Prouty is Group Vice President for IDC Energy and Manufacturing Insights. He is responsible for managing a group of analysts that provide research-based advisory and consulting services that will enable energy executives in oil and gas and utilities to maximize the business value of their technology investments and minimize technology risk through accurate planning. Kevin's research specialties are Utilities, Manufacturing, Enterprise Applications, and Product Innovation research. 

Self-parking validation tickets available at event registration upon check-in

Registration is complimentary for all attendees. Justification Letter for Cloud Security Summit. Palo Alto Networks, Inc.'s internal policies strictly limit the types of amenities it can provide to federal, state and local government, and education customers. These policies are in place to ensure that all business sectors are undertaken with the utmost respect to the applicable laws and regulations surrounding the provision of amenities to those customers. By accepting any item of value in connection with this event, you are specifically representing that Palo Alto Networks' offering and your acceptance of it is in copmliance with your organizations' legal and ethical guidelines. This event is not open to K-12 or Library customers. Should you ahve any questions in regard to this event, please contact your Palo Alto Networks sales representative.

John Kindervag joined Palo Alto Networks as Field CTO in 2017 after eight and one half years at Forrester Research where he was a Vice President and Principal Analyst on the Security and Risk Team. John is considered one of the world’s foremost cybersecurity experts. He is best known for creating the revolutionary Zero Trust Model of Cybersecurity.

Self-parking validation tickets available at event registration upon check-in

Registration is complimentary for all attendees. Justification Letter for Cloud Security Summit. Palo Alto Networks, Inc.'s internal policies strictly limit the types of amenities it can provide to federal, state and local government, and education customers. These policies are in place to ensure that all business sectors are undertaken with the utmost respect to the applicable laws and regulations surrounding the provision of amenities to those customers. By accepting any item of value in connection with this event, you are specifically representing that Palo Alto Networks' offering and your acceptance of it is in copmliance with your organizations' legal and ethical guidelines. This event is not open to K-12 or Library customers. Should you ahve any questions in regard to this event, please contact your Palo Alto Networks sales representative.

Del leads a global team of security architects focused on developing and evangelizing OT security architectures and solutions. His over 24 years of industry experience spans OT Cybersecurity, Networking, Aerospace & Defense, and High Tech Manufacturing with roles in strategic marketing and engineering. Del holds a Masters in Electrical Engineering from Santa Clara University, an MBA from the Wharton School of the University of Pennsylvania, and has been certified as a Global Industrial Cyber Security Professional.


Xu Zou joined Palo Alto Networks via the acquisition of Zingbox, the IoT security startup he co-founded in 2014. Prio to ZingBox, Xu held many senior positions including director of Aerohive Networks, senior director at Aruba Networks, where he managed their industrial and carrier product line.  Xu was a founding member and VP of Software at Azalea networks and he was a senior engineer at Airespace.  Xu has an Executive MBA from Wharton School, University of Pennsylvania, holds an M.S. in Computer Science from Michigan State University and B.S. in Computer Science from Tsinghua University. Xu also holds ten international patents on security and networking.

Self-parking validation tickets available at event registration upon check-in

Registration is complimentary for all attendees. Justification Letter for Cloud Security Summit. Palo Alto Networks, Inc.'s internal policies strictly limit the types of amenities it can provide to federal, state and local government, and education customers. These policies are in place to ensure that all business sectors are undertaken with the utmost respect to the applicable laws and regulations surrounding the provision of amenities to those customers. By accepting any item of value in connection with this event, you are specifically representing that Palo Alto Networks' offering and your acceptance of it is in copmliance with your organizations' legal and ethical guidelines. This event is not open to K-12 or Library customers. Should you ahve any questions in regard to this event, please contact your Palo Alto Networks sales representative.

CONTACT THE ORGANIZER
Google   Outlook   iCal   Yahoo

RSVP

Add to my Calendar
  • Google  Outlook  iCal  Yahoo