M+E Connections

MESA Member Webinar Week Ahead: Feb. 21-25

MESA members descend on the Palm Springs area for the HPA Tech Retreat 2022, Palo Alto Networks discusses the drawbacks of VPNs, and ME-ISAC — an initiative within the Content Delivery & Security Association (CDSA) — will hold a discussion around the Log4Shell Vulnerability.

Those are just a couple of the events from the MESA community the week of Feb. 21-25, according to MESA’s global member e-calendar.

Here’s a look at what’s ahead:

Monday:

• More than two dozen MESA members will descend on the Palm Springs area Feb. 21-24 for the HPA Tech Retreat 2022, back in person for the first time since the beginning of the pandemic.

And along with MESA members taking the stage and highlighting their solutions, MESA itself will be represented in the HPA Innovation Zone, — the event’s showcase for new industry solutions — with presentations about (and in) the MESAverse, MESA’s virtual work environment for its members and communities to watch live presentations, network, and step on the stage to share opinions.

Tuesday:

• “Frustrated With VPN? Meet ZTNA. A Conversation Featuring David Holmes, Forrester Research” will be presented by Palo Alto Networks. Today’s hybrid work model has forced organisations to take a hard look at traditional remote access approaches, turning to zero trust network access (ZTNA) as the replacement for legacy remote access VPN.

Wednesday:

• “Streamline Your eSignature Workflows with Adobe and Microsoft” will see the two companies discuss how our hybrid world demands smart digital workflows for every process—including how documents get signed. When trusted global leaders like Adobe and Microsoft come together, securing signatures becomes a seamless step within the apps you’re already using.

Thursday:

• ME-ISAC — an initiative within the Content Delivery & Security Association (CDSA) — will host the discussion “Log4Shell Vulnerability Overview.” Log4Shell is a critical vulnerability in Log4J found on a wide variety of Internet-facing web apps. It is still being used to attack new victims. Our partners at SecurityScorecard have a summary of what this vulnerability is, what it means to your org, and how to find out if you are vulnerable. To register, click here.