<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Threat Vector | War Room Best Practices in Threat Vector</title>
    <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-war-room-best-practices/ta-p/616206</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat Vector_War-Room-Best-Practices_palo-alto-networks.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/63820i6195A7FA5512B04C/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Threat Vector_War-Room-Best-Practices_palo-alto-networks.jpg" alt="Threat Vector_War-Room-Best-Practices_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In this episode of &lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Threat Vector&lt;/STRONG&gt;&lt;/FONT&gt;, host David Moulton, &lt;EM&gt;Director of Thought Leadership&lt;/EM&gt; at Unit 42, is joined by cybersecurity experts Kyle Wilhoit, &lt;EM&gt;Director of Threat Research&lt;/EM&gt;, and Michal Goldstein, &lt;EM&gt;Director of Security Architecture and Research&lt;/EM&gt; at Palo Alto Networks. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 id="toc-hId-1367122179"&gt;&lt;FONT color="#FF6600"&gt;&lt;SPAN&gt;What You'll Learn&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN&gt;Together, they explore the critical role of war rooms in responding to major security incidents. The conversation delves into best practices for real-time threat intelligence collection, the evolving threat landscape, and how automation can streamline incident response. This episode is essential listening for anyone looking to enhance their organization's resilience against emerging cyber threats. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Tune in to learn how to master war room strategies and prepare for the next big security challenge.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 id="toc-hId--1206280664"&gt;&lt;FONT color="#FF6600"&gt;&lt;SPAN&gt;Join the conversation on our social media channels:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN&gt;Website: ⁠⁠⁠⁠&lt;A href="https://www.paloaltonetworks.com/unit42%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://www.paloaltonetworks.com/unit42⁠&lt;/A&gt;⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Threat Research: ⁠⁠⁠⁠&lt;A href="https://unit42.paloaltonetworks.com/%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://unit42.paloaltonetworks.com/⁠&lt;/A&gt;⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Facebook: ⁠⁠⁠⁠&lt;A href="https://www.facebook.com/LifeatPaloAltoNetworks/%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://www.facebook.com/LifeatPaloAltoNetworks/⁠&lt;/A&gt;⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;LinkedIn: ⁠⁠⁠⁠&lt;A href="https://www.linkedin.com/company/unit42/%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://www.linkedin.com/company/unit42/⁠&lt;/A&gt;⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;YouTube: ⁠⁠⁠⁠@PaloAltoNetworksUnit42⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Twitter: ⁠⁠⁠⁠&lt;A href="https://twitter.com/PaloAltoNtwks%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://twitter.com/PaloAltoNtwks⁠&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;IFRAME src="https://playlist.megaphone.fm/?e=CYBW5794174357" width="100%" height="200" frameborder="0" scrolling="no"&gt;&lt;/IFRAME&gt;&lt;/DIV&gt;</description>
    <pubDate>Thu, 07 Nov 2024 17:28:57 GMT</pubDate>
    <dc:creator>dmoulton</dc:creator>
    <dc:date>2024-11-07T17:28:57Z</dc:date>
    <item>
      <title>Threat Vector | War Room Best Practices</title>
      <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-war-room-best-practices/ta-p/616206</link>
      <description>&lt;P&gt;&lt;SPAN&gt;In this episode of &lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Threat Vector&lt;/STRONG&gt;&lt;/FONT&gt;, host David Moulton, &lt;EM&gt;Director of Thought Leadership&lt;/EM&gt; at Unit 42, is joined by cybersecurity experts Kyle Wilhoit, &lt;EM&gt;Director of Threat Research&lt;/EM&gt;, and Michal Goldstein, &lt;EM&gt;Director of Security Architecture and Research&lt;/EM&gt; at Palo Alto Networks.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat Vector_War-Room-Best-Practices_palo-alto-networks.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/63821i6E039DB23A7CCA5F/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Threat Vector_War-Room-Best-Practices_palo-alto-networks.jpg" alt="Threat Vector_War-Room-Best-Practices_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2024 17:28:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-war-room-best-practices/ta-p/616206</guid>
      <dc:creator>dmoulton</dc:creator>
      <dc:date>2024-11-07T17:28:57Z</dc:date>
    </item>
  </channel>
</rss>

