IMPORTANT: This event is not open to employees of competitive companies. If you register and are employed by a competitor, we reserve the right to remove you from the registration list or otherwise deny you entry to the event.

All of the following fields are mandatory and must be completed.

Attendee Information

PCNSE8 or PSE: Platform Professional
(Partner Requirement) Exam PCNSE Exam Description

CPE Credits

Additional Information

Information about the Fuel User Group can be found here.

Contact Information

The country you select will be represented on your badge.
Number to contact you onsite should any issues arise, please include country code.

Emergency Contact Information

Please include country code

Federal Ignite Mobile Site

A personalized, mobile-friendly website will launch in October to help you navigate Federal Ignite, including event announcements, maps and your personal agenda.

Please set a password now to simplify your mobile site log-in once it launches. You will be able to set or reset your password once the mobile site is released, but doing so now will streamline your experience.

Hotel Information

Located in the heart of Washington, D.C.'s Penn Quarter neighborhood, just steps away from downtown, the Grand Hyatt Washington will be the host venue for Federal Ignite '18.

Grand Hyatt Washington
1000 H Street NW
Washington, D.C., USA, 20001

Your registration confirmation will include a link the register for your hotel room at the Grand Hyatt. Submitting this form does not confirm a hotel room. You MUST book through the link in your registration confirmation in order to receive our negotiated group rates. The hotel confirms the following guest room rates: Single/Double $359, Triple $384, Quads $409. Hotel room rates are subject to applicable state and local taxes, currently 14.5%.

Labs – Monday, October 22

9:00 a.m. - 11:00 a.m.

Please select only one UTD and up to one of each HOW. We recommend you bring your own laptop to complete the UTD and/or HOW. A very limited supply of laptops will be available on a first come, first serve basis.
SOLD OUT – Ultimate Test Drive - Advanced Endpoint Protection (Traps)

Join us in this hands-on session to learn how to defeat the adversary at the endpoint with Palo Alto Networks Traps advanced endpoint protection. You’ll learn how to:

  • Break down the sophisticated cyberattack lifecycle and chain-like nature of exploits
  • Prevent file and network-based exploits originating from executable or data files
  • Leverage cloud intelligence to enhance zero-day threat protection

This session is filled to capacity.

SOLD OUT – Hands-On Workshop - Network Security Best Practices
A successful deployment of next-generation security requires careful consideration during the design and implementation phases. This session provides administrators with best practices and configuration guidelines to improve security posture and reduce exposure to potential risks. Attendees will also be able to exercise some of the recommended best practices in this hands-on session.

This session is filled to capacity.

No UTD/HOW

12:30 p.m. - 2:30 p.m.

Please select only one UTD and up to one of each HOW. We recommend you bring your own laptop to complete the UTD and/or HOW. A very limited supply of laptops will be available on a first come, first serve basis.
SOLD OUT – Hands-On Workshop - Amazon Web Services

In this lab-based session, our AWS product experts will lead a series of hands-on exercises to provide an introduction to AWS and how you can use the VM-Series on AWS to deploy next-generation security services. You’ll learn about:

  • Targeted use cases for the VM-Series firewall on AWS
  • Deploying VM-Series firewalls in AWS through CloudFormation templates
  • Protecting your data and service in AWS with a VM-Series firewall
  • Using Dynamic Address Group (DAG) to protect dynamic EC2 instances
  • Leveraging threat intelligence with External Dynamic List (EDL)

This session is filled to capacity.

SOLD OUT – Hands-On Workshop - Network Security Best Practices
A successful deployment of next-generation security requires careful consideration during the design and implementation phases. This session provides administrators with best practices and configuration guidelines to improve security posture and reduce exposure to potential risks. Attendees will also be able to exercise some of the recommended best practices in this hands-on session.

This session is filled to capacity.

No UTD/HOW

3:00 p.m. - 5:00 p.m.

Please select only one UTD and up to one of each HOW. We recommend you bring your own laptop to complete the UTD and/or HOW. A very limited supply of laptops will be available on a first come, first serve basis.
SOLD OUT – Ultimate Test Drive - Advanced Endpoint Protection (Traps)

Join us in this hands-on session to learn how to defeat the adversary at the endpoint with Palo Alto Networks Traps advanced endpoint protection. You’ll learn how to:

  • Break down the sophisticated cyberattack lifecycle and chain-like nature of exploits
  • Prevent file and network-based exploits originating from executable or data files
  • Leverage cloud intelligence to enhance zero-day threat protection

This session is filled to capacity.

SOLD OUT – Hands-On Workshop - Amazon Web Services

In this lab-based session, our AWS product experts will lead a series of hands-on exercises to provide an introduction to AWS and how you can use the VM-Series on AWS to deploy next-generation security services. You’ll learn about:

  • Targeted use cases for the VM-Series firewall on AWS
  • Deploying VM-Series firewalls in AWS through CloudFormation templates
  • Protecting your data and service in AWS with a VM-Series firewall
  • Using Dynamic Address Group (DAG) to protect dynamic EC2 instances
  • Leveraging threat intelligence with External Dynamic List (EDL)

This session is filled to capacity.

No UTD/HOW

Technical Breakouts – Tuesday, October 23

2:05 p.m. - 2:55 p.m.

WildFire and Threat Prevention: An Update on a Threat Approach to Stopping the Adversary
In this session you'll learn in depth about the technical inter-workings of features released over the last year from WildFire, Threat Prevention and URL Filtering services. You will also learn more about the future of WildFire support for US government customers.  
 
This talk will focus on:
  • How a Threat researcher approaches the problem of detecting and preventing the most common to the most evasive techniques observed in cybersecurity
  • New attack trends found with the extension of Wildfire to support Linux servers and IOT devices
  • Why SMB protocol support and advances in network pattern matching are enabling prevention in more areas of the network
  • Update on the WildFire cloud built to support US Government customers
Track  Technology / Architecture
Speakers  Garrett Hamilton, Product Line Manager, Palo Alto Networks
Win the Cyberwar with Zero Trust
Zero Trust is revolutionizing network security architecture: it is data-centric and designed to stop data breaches. Zero Trust also adds a layer of agility to modern networks that is impossible to do in traditional network designs. These 21st century networks have been adopted by government entities and large enterprises around the world. In this session, John will discuss the concept of Zero Trust and explain why Zero Trust is the world's only true cybersecurity strategy. He will show show a Zero Trust Strategy will achieve tactical and operational goals. This session will demonstrate how Zero Trust will not only transform network security but function as a business enabler, by focusing on the businesses grand strategic objectives.
Track  Technology / Architecture
Speakers  John Kindervag, Field CTO, Palo Alto Networks
Securing the Digital Transformation of Critical Infrastructure without Affecting Reliability
Federal organizations are introducing digital innovations into critical infrastructure and IT systems at an aggressive rate. The result is an ever-increasing attack surface of possible threat vectors. It is no longer feasible to simply air-gap networks or protect the perimeter as the primary security measure. It is critical to dynamically discover, segment and protect connected devices and respond to threats regardless of device type or network tier. Reduce your attack surface and prevent the spread of threats by learning how together ForeScout and Palo Alto Networks help streamline security operations, boost compliance and proactively combat threats.
Track  Technology Integration
Speakers  Tim Jones, Director of Systems Engineering – Public Sector (FEDCIV & SLED), ForeScout Technologies Inc.
No Session

3:10 p.m. - 4:00 p.m.

Best Practices for Centralized Firewall Management Using Panorama
Whether it's a handful or hundreds of firewalls, Panorama can help you maintain their security effectiveness and performance. This session will cover best practices for maintaining centralized configurations, tracking changes, and streamlining workflows using Panorama. We will also provide an overview of Panorama 8.1 features such as Rule Usage Analysis, Reusability of Templates, and Device Performance Metrics, which will help network practitioners to simplify operations and adopt next-generation security with confidence.
Track  Technology / Architecture
Speakers  Saurabh Pradhan, Sr Product Manager, Palo Alto Networks
Product Update: Protecting Government Workloads on AWS, Azure and Google Cloud
Whether your organization is deploying workloads and data in the standard or government specific regions, security remains of paramount concern. Each of the major cloud providers will emphasize that security is a shared responsibility – they protect the infrastructure, you protect your apps and data and that is where Palo Alto Networks can help. In this session, Jigar Shah, Product Line Manager for Public Cloud will provide product updates on how we can securely accelerate your move to the cloud with consistent protection for cloud infrastructure (VM-Series), platform (Evident) and workloads (Traps). These security capabilities can be integrated into your cloud app development lifecycle making cloud security frictionless for the development and security teams.
Track  Technology / Architecture
Speakers  Jigar Shah, Product Line Manager, Palo Alto Networks
Identify and Defeat Adversaries Using the Security Operating Platform with Splunk Integration
Find out if sophisticated adversaries those nation-state actors and well-funded cybercriminal organizations possessing the ability to execute cyber campaigns are operating in your network. Enable your SOC to prioritize actions against those "most dangerous to the mission or business" and to determine in real-time if you are winning or losing the fight against them by integrating Threat Intelligence from AutoFocus with context-rich log data from Palo Alto Networks Next-Generation Firewalls and Advanced EndPoint Protection using the Palo Alto App for Splunk.
Track  Technology Integration
Speakers  Mark Harman, Federal Solutions Architect, Palo Alto Networks
No Session

4:10 p.m. - 5:00 p.m.

A Unified Approach to Detection and Response Across Network, Endpoint and Cloud
Detection and response has yet to reach its full potential where it can be central to security operations and be useful for any threat type, not just endpoint related attacks.  Join us as we walk through how Traps advanced endpoint protection and Secdo, the latest acquisition by Palo Alto Networks, apply a prevention-first strategy, reduce the opportunity for attack, and enable any security analyst to rapidly determine root cause and business impact of even the most complicated of attacks.
Track  Technology / Architecture
Speakers  Mitchell Bezzina, Dir, Product Marketing, Palo Alto Networks
Securing your Private Cloud: Lessons Learned from Real-World Customer Deployments
Over the last five years, we have seen many organizations take the challenging journey to secure their private clouds. The choice of software-defined data center infrastructure (VMware NSX, Cisco ACI et al) and varied security deployment models available within them, requires planning, to help achieve an effective security design within your private cloud. We discuss them in detail and provide real-world examples of how organizations are leveraging software-defined networking and Palo Alto Networks firewalls to operationalize security within your private cloud.
Track  Technology / Architecture
Speakers  Jaimin Patel, Sr Product Manager, Palo Alto Networks
The Coming Convergence of NatSec and CyberSec: A National Cyber Moonshot
Cyber security is converging with key aspects of national security, and that interlock is only getting stronger.  It is therefore imperative that as a nation, we approach our cybersecurity with the same foresight, effort and intensity once reserved for national security.  This talk will discuss a new whole of nation effort currently being considered at the highest levels of Government and industry that seeks to change the risk dynamics for critical infrastructure, and establish safe and secure environments for Americans to conduct critical services on the Internet.  
Track  Technology Integration
Speakers  Tom Patterson, Chief Trust Officer, Unisys
No Session

IMPORTANT: If you do not receive a REGISTRATION CONFIRMATION screen and instant confirmation email after completing and submitting your registration form, YOU ARE NOT REGISTERED.

By submitting this registration form, you are authorizing Federal Ignite ‘18 Registration Headquarters to make all of the necessary reservations on your behalf.

By submitting this form, you agree to our Terms
View our Privacy Statement

Agenda Overview

(Subject to change)

MONDAY, OCTOBER 22, 2018

Registration

PCNSE/PSE Exams

Ultimate Test Drives (UTDs)

Hands-On Workshops (HOWs)

TUESDAY, OCTOBER 23, 2018

Registration

Networking Breakfast with Exhibits

General Session

Networking Lunch with Exhibits

General Session Continues

Technical Breakouts

Networking Reception