An inside look at our approach to threat intel
As the threat landscape continues to evolve, enterprises need to modernize security and automate security systems to stay ahead of threat actors.
To learn about threat intelligence from experts, join us for a panel discussion, “Unlocking the Power of Threat Intelligence,” a LinkedIn Live event on June 15 at 10 a.m. PDT. Get perspectives and insights on:
We’ll round up the discussion with a quick demo of the latest features of our Threat Intelligence Management solution.
We look forward to having you join us online for a lively and informative session covering best practices in automating threat intel management.
![]() |
Josh Zelonis is a Field CTO and Evangelist for Palo Alto Networks where he works closely with organizations to help them adapt their architecture, policies, and processes to stay ahead of evolving threats and limit the potential impact of incidents. As a former Forrester analyst and cybersecurity tech founder, Josh has spoken at major conferences around the world and published on subjects ranging from security analytics, cyber intelligence, vulnerability management, SOC operations, and incident response. Above all, he prides himself on a mission to secure the data of the people we’re entrusted to protect. |
---|---|
![]() |
Neelima Rustagi serves as Sr. Director of Product Management and joined Palo alto Networks through Demisto's acquisition in 2019. Neelima and her team's primary focus is to serve Palo Alto Networks' global customers security needs in Cortex XSOAR. Prior to Demisto, Neelima spent 15+ years at Symantec and McAfee growing next-gen endpoint security business in her product management, customer success and kernel development roles. |
![]() |
Ryan Olson is the Vice President of Threat Intelligence for Unit 42, a cybersecurity consulting group that brings together world-class threat researchers and elite incident responders to protect enterprises against the latest cyberthreats. His area of expertise is detecting and identifying actors and groups conducting cyber-crime and cyber-espionage operations. Ryan is a contributing author to the book Cyber Fraud: Tactics, Techniques and Procedures, and primary author of Cyber Security Essentials.
|