We just sent you a verification email. Please verify your account to gain access to
Navigating the Road to Cyber Resiliency Summit. If you don’t think you received an email check your
spam folder.
Sign in to Navigating the Road to Cyber Resiliency Summit.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Register For Navigating the Road to Cyber Resiliency Summit
Please fill out the information below. You will recieve an email with a verification link confirming your registration. Click the link to automatically sign into the site.
You’re almost there!
We just sent you a verification email. Please click the verification button in the email. Once your email address is verified, you will have full access to all event content for Navigating the Road to Cyber Resiliency Summit.
I want my badge and interests to be visible to all attendees.
Checking this box will display your presense on the attendees list, view your profile and allow other attendees to contact you via 1-1 chat. Read the Privacy Policy. At any time, you can choose to disable this preference.
Select your Interests!
add
Upload your photo
Uploading..
OR
Connect via Twitter
Connect via Linkedin
EDIT PASSWORD
Share
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
Navigating the Road to Cyber Resiliency Summit. If you don’t think you received an email check your
spam folder.
Sign in to Navigating the Road to Cyber Resiliency Summit.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Sign in to gain access to Navigating the Road to Cyber Resiliency Summit
Please sign in with LinkedIn to continue to Navigating the Road to Cyber Resiliency Summit. Signing in with LinkedIn ensures a professional environment.
Are you sure you want to remove access rights for this user?
Details
Manage Access
email address
Community Invitation
Wendi Whitmore | Palo Alto Networks
Wendi Whitmore, senior vice president of Unit 42 at Palo Alto Networks Inc., joins theCUBE industry analysts John Furrier and Dave Vellante as they talk about how threat actor tactics are changing and the impact on the need for backups and recovery.
play_circle_outlineChanges in the threat landscape over the past 12 months: scale, speed, and sophistication
replyShare Clip
play_circle_outlineComparison between nation state actors and cyber criminals in terms of sophistication
replyShare Clip
play_circle_outlineProtecting Your Organization: Prioritizing Vulnerability Identification and Valuing Backup and Recovery amidst Extortion Campaigns
replyShare Clip
play_circle_outlineThe Shifting Landscape of Cyber Attacks: Examining Chinese and Russian Nation State Actors, Complex Hacks, and Impact on Businesses and Consumers