Click on one or more of your preferred subject matter keywords on the left and scroll down to see the highlighted related sessions that are offered. If you are registered for Ignite '18 USA, you can build your person agenda by using the link that was sent to you by email or click here to start.
Offered | Wednesday, 10:30 am 11:20 am |
Speakers | Sandra Wenzel, Sr. Systems Engineer, Palo Alto Networks |
Keywords | Threat Detection and Prevention, Overview Session, Network Security |
To put an end to breaches, we need to make it easier to consume, use and share threat intelligence. If we have established trust with someone, why would you share? Once you know the benefit, then what?
This session will provide you with the answers to WHY and also HOW you can start this today. We are dealing with an automated adversary; therefore, we need to automate our responses to prevent a successful cyberattack.
Offered | Thursday, 11:30 am 12:00 pm |
Keywords | Threat Research/Unit 42, Overview Session |
Offered | Thursday, 12:15 pm 12:45 pm |
Speakers | Franck Chabert, Professional Services Global Practice Lead, Palo Alto Networks |
Keywords | Public Cloud, Best Practices/Troubleshooting, Overview Session |
Offered | Thursday, 9:10 am 10:00 am |
Keywords | App Framework Partners, Application Framework, Next Generation Security Platform, Technical Session |
Attackers have shifted tactics, leveraged nation-state leaked tools and are leveraging ransomware to monetize their attacks. Cloud networks are prime targets; the DMZ is gone, the firewall doesn't exist and customers may not realize they've exposed insecure services to the internet until it's too late.
In this talk I'll discuss hunting, finding and remediating compromised customer systems in Azure - a non-trivial task with 1.59 million exposed hosts and counting. Remediating system compromise is only the first stage so I'll also cover how we applied the lessons learned to proactively secure Azure Marketplace and research I've done into the default security stance of Marketplace images.
Offered | Thursday, 10:30 am 11:20 am |
Speakers | Nate Warfield, Sr. Security Program Manager, Microsoft |
Keywords | Technical Session, Threat Research/Unit 42, Azure |
Offered | Tuesday, 4:20 pm 5:10 pm |
Keywords | SaaS/Aperture, Best Practices/Troubleshooting, Case Study/Use Case, Technical Session |
Allstate’s lead Network Security Engineer and their Palo Alto Networks Systems Engineer will discuss and review Allstate’s journey to SSL decryption on a large scale while alleviating any performance concerns.
Offered | Wednesday, 10:30 am 11:20 am |
Speakers | Patrick Rufener, Security Engineer, Allstate David Guretz, Systems Engineer, Palo Alto Networks |
Keywords | Network Security, Case Study/Use Case, Technical Session, Management, NGFW |
Offered | Thursday, 9:10 am 10:00 am |
Keywords | AWS, Cloud Partner, Public Cloud, Technical Session |
Bechtel is one of the largest private construction and civil engineering companies in the United States. Like most large enterprises, Bechtel has a large technology footprint spread across multiple data centers globally as well as remote project sites with limited bandwidth. During the course of this presentation we will cover why we went with Palo User-ID, our approach, stumbling blocks and successes.
We will cover the 3-tiered user-id/attribution architecture that we implemented. We will also share some helpful technical content including scripts for performing Kerberos Authentication on Unix/Linux systems and performing domain controller discovery to communicate with the closest collection agents.
Finally, we will discuss the challenges we faced as we tested and transitioned to Palo Alto’s user-id solution in our environment. We hope that by sharing our experiences it will provide sound advice to others that wish to follow in our footsteps.
Offered | Thursday, 7:45 am 8:15 am |
Speakers | Randy Collins, IT Security Senior, Bechtel |
Keywords | Management, Overview Session, Case Study/Use Case, Network Security |
Offered | Wednesday, 7:00 am 7:30 am |
Keywords | App Framework Partners, Application Framework, Overview Session |
Offered | Wednesday, 11:30 am 12:00 pm |
Keywords | App Framework Partners, Application Framework, Overview Session |
Offered | Thursday, 7:00 am 7:30 am |
Keywords | App Framework Partners, Application Framework, Overview Session |
Offered | Thursday, 7:45 am 8:15 am |
Keywords | App Framework Partners, Application Framework, Overview Session |
Offered | Tuesday, 7:30 am 8:00 am |
Keywords | App Framework Partners, Application Framework, Overview Session |
Offered | Thursday, 8:00 am 8:50 am |
Speakers | Scott Simkin, Director Threat Intelligence, Palo Alto Networks |
Keywords | App Developers, Application Framework, Next Generation Security Platform, Overview Session |
Offered | Thursday, 10:30 am 11:20 am |
Keywords | App Developers, Application Framework, Next Generation Security Platform, Overview Session |
Offered | Wednesday, 4:00 pm 4:50 pm |
Speakers | Francesco Vigo, Partner Architect, Palo Alto Networks |
Keywords | App Framework Partners, Application Framework, Next Generation Security Platform, Overview Session |
In modern data center environments, embedded security in hypervisors addresses inter-VM communication and physical firewalls addresses protection of north-south traffic. However, no solution exists to secure east-west traffic between application clusters and non-virtualized workloads, or attached legacy applications running on bare metal servers. This poses a challenge for security architects to gain visibility into flow information for the east-west traffic flows as well as compromised assets from within.
In this session we present Macro-Segmentation Service, which implements cloud principles of open & programmable, scale-out and automation to address the growing gap in security deployments. Specifically aimed at securing traffic between physical-to-physical (P-to-P) and physical to virtual (P-to-V) workloads, It provides a scale-out model of integration of network and security systems and logically inserts security devices to secure east-west traffic flows and gain visibility as well. It provides complete flexibility on placement of service devices and workloads and leverages automation capabilities offered in firewall and modern network operating systems, to provide integration and application of security policies. By applying the cloud principle of open and programmable, it drives operational efficiencies to eliminate errors while seamlessly implementing corporate security rules in the modern data centers
Offered | Wednesday, 12:15 pm 12:45 pm |
Speakers | Shyam Kota, Principal Product Manager, Arista Networks |
Keywords | Network Security, Overview Session, Private Cloud/Datacenter |
Offered | Tuesday, 11:30 am 1:00 pm |
Keywords | Management |
Offered | Wednesday, 1:30 pm 2:20 pm |
Speakers | Mandeep Singh Sandhu, Product Manager, Palo Alto Networks |
Keywords | Network Security, Technical Session, Management, Next Generation Security Platform |
Offered | Wednesday, 2:40 pm 3:30 pm |
Speakers | Nithin Varam, Product Manager, Palo Alto Networks |
Keywords | Management, Network Security, Technical Session, NGFW |
Offered | Wednesday, 2:40 pm 3:30 pm |
Speakers | Jason Meurer, Consulting Engineer, Palo Alto Networks Jaime Franklin, Consulting Engineer, Palo Alto Networks |
Keywords | AWS, Public Cloud, Technical Session, Best Practices/Troubleshooting |
Offered | Thursday, 8:00 am 8:50 am |
Speakers | Keith Blackstone, Consulting Engineer, Cloud, Palo Alto Networks Kambiz Kazemi, Consulting Engineer, Cloud, Palo Alto Networks |
Keywords | Azure, Public Cloud, Technical Session, Best Practices/Troubleshooting |
Offered | Wednesday, 11:30 am 1:00 pm |
Keywords | ICS/SCADA, Best Practices/Troubleshooting, Segmentation, Industry Roundtables |
Offered | Thursday, 8:00 am 8:50 am |
Keywords | Management, Network Security, Best Practices/Troubleshooting, Technical Session, NGFW |
Offered | Wednesday, 8:00 am 8:50 am |
Speakers | Shahar Razon, Product Manager, Palo Alto Networks |
Keywords | Best Practices/Troubleshooting, Endpoint/Traps, Technical Session |
Offered | Wednesday, 10:30 am 11:20 am |
Speakers | Liat Hayun, Product Line Manager, Palo Alto Networks |
Keywords | Best Practices/Troubleshooting, Endpoint/Traps, Technical Session |
What are your company’s security controls outside of the perimeter? Do you use global protect and back haul all traffic to the datacenter or the main branch? Do you use split tunneling or full tunneling? How is the latency and user experience? What are your company’s security controls for corporate SaaS applications such as Dropbox, Box.net, Office 365, Salesforce, and so forth? Does your organization have an AWS or Azure environment? How do you know it is secure?
We want to share our story on how we used PaloAlto Next-gen firewall, Global Protect Cloud Services, Logging Services and Aperture to achieve unified security controls that are independent of device type, application type and location. Come hear our lessons learned, including the challenges we experienced and the policy we ended up creating to unify + improve security posture.
Offered | Thursday, 7:00 am 7:30 am |
Keywords | Network Security, Overview Session, Next Generation Security Platform, Case Study/Use Case |
Offered | Thursday, 10:30 am 11:20 am |
Speakers | William Hewlett, Sr. Manager, Data Science, Palo Alto Networks |
Keywords | Technical Session, Threat Detection and Prevention, Network Security, Next Generation Security Platform |
Offered | Thursday, 8:00 am 8:50 am |
Speakers | Bryan Lee, Threat Intelligence Analyst, Unit 42, Palo Alto Networks |
Keywords | Threat Research/Unit 42, Technical Session |
Offered | Thursday, 8:00 am 8:50 am |
Keywords | Case Study/Use Case, Technical Session |
The Zero Trust architecture is the foundation of the future of public cloud security. The ability to authenticate and secure communication without relying on the location of the endpoints or the security of the network means that our clients can adopt the cloud paradigm and embrace its benefits of cost and flexibility while maintaining control of their data and compliance in virtual environments.
By the end of this session, attendees will
• Understand how Palo Alto Networks and Stealth enable the Zero-Trust model within the cloud.
• Understand Palo Alto Networks and Stealth Zero-Trust segmentation platform.
• Understand how this solution can accelerate cloud adoption.
• Understand methods and metrics by which the next generation of CISO's can define and deliver success in the public cloud.
Offered | Thursday, 9:10 am 10:00 am |
Speakers | Salvatore Sinno, Chief Security Architect, Unisys John Kindervag, Field CTO, Palo Alto Networks |
Keywords | Case Study/Use Case, Public Cloud, Segmentation, Technical Session, AWS, Azure, Google Cloud |
Luckily, the Palo Alto Networks VM-Series firewall deployment and configuration can be fully automated. This session will cover how Chevron has automated the VM-Series deployment on Azure, eliminating manual processes that could slow scaling and policy creation. Using processes that work with Ansible and Azure functions and utilize API calls to build out VM-Series change management processes that are automated and agile, Chevron is securing outgoing, and incoming traffic in a highly automated fashion. The combination of API calls and easily deployable firewalls built from ARM templates allow us to ensure that security can adapt and keep pace with the fast-moving Azure cloud environment.
Offered | Wednesday, 1:30 pm 2:20 pm |
Speakers | Jeremy Haynes, Network Security Engineer, Chevron |
Keywords | Public Cloud, Automation, Case Study/Use Case, Technical Session, App Developers, Azure |
Offered | Wednesday, 11:30 am 1:00 pm |
Keywords | PAN-OS 8.1, NGFW, Best Practices/Troubleshooting, Industry Roundtables |
Session is ideal for technical professionals who are planning or have already deployed applications that must meet industry compliance.
Offered | Wednesday, 10:30 am 11:20 am |
Keywords | Cloud Partner, Public Cloud, Technical Session, AWS, Azure, Best Practices/Troubleshooting, Segmentation |
Offered | Wednesday, 9:10 am 10:00 am |
Keywords | Private Cloud/Datacenter, Containers, Technical Session, NGFW, Segmentation |
Offered | Thursday, 10:30 am 11:20 am |
Keywords | SaaS/Aperture, Technical Session, Public Cloud |
Offered | Wednesday, 7:45 am 8:15 am |
Keywords | Overview Session, NGFW, Next Generation Security Platform, Service Providers |
Offered | Wednesday, 11:30 am 1:00 pm |
Keywords | Best Practices/Troubleshooting, Industry Roundtables |
Attendees will leave this session with an understanding of how blockchain and cryptocurrency function, the associated security risks, and an understanding of basic mitigations and how to practically apply the Palo Alto Networks platform to mitigate risks.
Offered | Wednesday, 2:40 pm 3:30 pm |
Speakers | Jamie Brummell, SE, Palo Alto Networks Alex Hinchliffe, Unit42, EMEA, Palo Alto Networks |
Keywords | Overview Session, Threat Detection and Prevention, Network Security, Next Generation Security Platform, Endpoint/Traps, Threat Research/Unit 42 |
Prerequisite: Cyber Range Level I requires daily hands-on NGFW experience or completion of the NGFW UTD.
Offered | Tuesday, 1:30 pm 5:30 pm Wednesday, 8:00 am 12:30 pm |
Keywords | Hands-on Trainings |
Prerequisite: Cyber Range Level II/Advanced requires completion of Cyber Range Level I.
Offered | Wednesday, 1:00 pm 5:00 pm Thursday, 8:00 am 12:00 pm |
Keywords | Hands-on Trainings |
Offered | Wednesday, 8:00 am 8:50 am |
Speakers | Dale Badore, Datacenter Operations Supervisor, Rancho California Water District |
Keywords | Overview Session, Case Study/Use Case |
The Transit VPC solution uses a hub and spoke architecture to centralize connectivity and security. It is a fully automated solution that manages the connectivity and application of VM-Series next generation security for subscribing VPCs (spokes) that may originate in any pre-authorized AWS account. This session describes how the solution was implemented using AWS capabilities and the Palo Alto Networks VM-Series platform.
Offered | Tuesday, 4:20 pm 5:10 pm |
Speakers | John Plishker, Solution Architect, REAN Cloud |
Keywords | AWS, Cloud Partner, Technical Session, Public Cloud |
Offered | Wednesday, 1:30 pm 2:20 pm |
Keywords | AWS, Public Cloud, Technical Session, App Developers, Best Practices/Troubleshooting |
Offered | Wednesday, 4:00 pm 4:50 pm |
Keywords | Public Cloud, Google Cloud, Technical Session, App Developers, Best Practices/Troubleshooting |
Offered | Wednesday, 10:30 am 11:20 am |
Keywords | Azure, Public Cloud, Technical Session, Best Practices/Troubleshooting |
In this session, learn about a better approach using cloud-delivered security using GlobalProtect cloud service. This session will take a look at the problems that organizations need to solve, and introduce the fundamental concepts behind deploying GlobalProtect cloud service as the security infrastructure for protecting remote networks and mobile users.
Offered | Thursday, 8:00 am 8:50 am |
Speakers | Nicole Powell, Systems Engineer, Palo Alto Networks |
Keywords | Next Generation Security Platform, Overview Session, GlobalProtect |
Offered | Thursday, 11:30 am 1:00 pm |
Keywords | Public Cloud, App Developers, Automation, Industry Roundtables |
On the Application Framework, customers can quickly enable 3rd party services to securely access their own data lake, or feed it with additional information. APIs are also provided to allow clients to build their own security controls and processes around Palo Alto Networks Application Framework.
Multiple integrations become possible through the services made available by the Application Framework: this session describes its components and interfaces, and presents many of the most relevant existing and future partner integration use cases across multiple security areas, such as Security Analytics, Threat Intelligence, Security Operations and Orchestration.
Offered | Wednesday, 9:10 am 10:00 am |
Keywords | App Developers, Application Framework, Technical Session |
In this session, we will walk through how you can use an existing provider for AWS, Azure or Google Cloud, to automate the creation of a VPC on AWS or Google Cloud, or a Resource Group in Azure, complete with a VM-Series firewall. Then, using the Terraform Provider for PAN-OS, security teams can fully automate the configuration of the (deployed) VM-Series virtualized firewall, effectively performing end-to-end deployment automation and embedding security into the application development framework.
Offered | Wednesday, 10:30 am 11:20 am |
Speakers | Vinay Venkataraghavan, Solutions Architect, Palo Alto Networks |
Keywords | Public Cloud, Technical Session, App Developers, AWS, Azure, Google Cloud, Automation |
Offered | Wednesday, 11:30 am 1:00 pm |
Keywords | Endpoint/Traps, Industry Roundtables |
Learn how hundreds of organizations have woven security into the fabric their DevOps and DevSecOps teams using Evident, and how you, too, can secure your cloud without compromise.
Offered | Wednesday, 10:30 am 11:20 am |
Speakers | John Martinez, Director, Technical Support, Palo Alto Networks |
Keywords | Overview Session, Public Cloud, SaaS/Aperture, Compliance |
Offered | Wednesday, 11:30 am 1:00 pm |
Keywords | Application Framework, Next Generation Security Platform, Industry Roundtables |
Offered | Tuesday, 4:20 pm 5:10 pm |
Speakers | Renato Marinho, Researcher, Morphus Labs |
Keywords | Technical Session, Threat Research/Unit 42, Case Study/Use Case |
Offered | Tuesday, 4:20 pm 5:10 pm |
Speakers | Lieuwe Jan Koning, CTO, ON2IT John Kindervag, Field CTO, Palo Alto Networks |
Keywords | Case Study/Use Case, Endpoint/Traps, GlobalProtect, Segmentation, Overview Session |
Offered | Wednesday, 10:30 am 11:20 am |
Speakers | Aaron Schubert, Senior Infrastructure Specialist, Missouri Office of Cyber Security Isaac Hayes, Infrastructure Team Lead, Missouri Office of Cyber Security |
Keywords | AWS, Case Study/Use Case, Technical Session |
Offered | Wednesday, 7:00 am 7:30 am |
Speakers | Peter Silberman, Director of Innovation and Integrations, Expel |
Keywords | Threat Detection and Prevention, Overview Session |
Offered | Tuesday, 4:00 pm 8:00 pm |
Keywords | Network Security |
Offered | Wednesday, 8:00 am 8:50 am |
Speakers | Stanley Karunditu, Solutions Engineer, Ansible (Red Hat) |
Keywords | Public Cloud, Automation, App Developers, AWS, Azure, Google Cloud, Technical Session |
Offered | Wednesday, 1:30 pm 2:20 pm |
Speakers | Anthony Gravanda, Director, Security Architecture and Engineering, Fiserv |
Keywords | Private Cloud/Datacenter, Overview Session, Case Study/Use Case, Automation, Segmentation, NGFW |
Offered | Wednesday, 1:30 pm 2:20 pm |
Speakers | Anthony Kasza, Principal Threat Researcher, Palo Alto Networks |
Keywords | Technical Session, Threat Research/Unit 42 |
Offered | Wednesday, 9:10 am 10:00 am |
Speakers | David Cumbow, Systems Engineering Manager, Palo Alto Networks |
Keywords | Overview Session, Case Study/Use Case, Technical Session |
In this session, Motorola Mobility CISO Richard Rushing will present what he learned from protecting a global organization with more than 25,000 employees and 10 subsidiaries. He has built an infrastructure that includes Palo Alto Network Firewalls to block threats on premises, integrated with a cloud-based network detection and response tool to accelerate analysis and remediation which also integrates with a SIEM serving as a central logging tool. Rushing will explain how he’s able to stay ahead of the attackers and seamlessly transition between the integrated solutions for better incident response resulting from network visibility at the packet level, contextual understanding of security events, identification of users and apps associated with threats via User-ID and App-ID, and automated threat mitigation.
Offered | Thursday, 9:10 am 10:00 am |
Speakers | Richard Rushing, CISO, Motorola Mobility |
Keywords | Network Security, Best Practices/Troubleshooting, Case Study/Use Case, Technical Session, NGFW |
Offered | Thursday, 9:10 am 10:00 am |
Speakers | Cynthia Cox, GRC Principal, Palo Alto Networks Paola Zeni, Sr. Director, Sr Privacy Counsel, Palo Alto Networks |
Keywords | Next Generation Security Platform, Overview Session, Best Practices/Troubleshooting, Compliance |
Offered | Wednesday, 1:30 pm 2:20 pm |
Keywords | SaaS/Aperture, Case Study/Use Case, Best Practices/Troubleshooting, Technical Session |
Offered | Wednesday, 4:00 pm 4:50 pm |
Keywords | Network Security, Best Practices/Troubleshooting, GlobalProtect, Technical Session |
Offered | Wednesday, 9:10 am 10:00 am |
Keywords | SaaS/Aperture, GlobalProtect, Best Practices/Troubleshooting, Technical Session |
Offered | Tuesday, 4:20 pm 5:10 pm |
Speakers | Scott Sumner, Consulting Engineer, Cloud, Palo Alto Networks |
Keywords | Public Cloud, Google Cloud, Technical Session, Best Practices/Troubleshooting |
Required: Participants must bring a laptop with an HTML5-compatible browser.
Offered | Monday, 1:00 pm 3:00 pm Tuesday, 3:30 pm 5:30 pm Wednesday, 9:30 am 11:30 am Wednesday, 3:30 pm 5:30 pm |
Keywords | Network Security, AWS, Hands-on Trainings, NGFW, Public Cloud |
This session will guide you in setting up SSL decryption for a forward proxy with deployment best practices. The lab will navigate you through understanding the various features available to support SSL decryption. Additionally, you’ll go through a troubleshooting exercise to learn how to overcome challenges you may fac
Required: Participants must bring a laptop with an HTML5-compatible browser.
Offered | Monday, 3:30 pm 5:30 pm Tuesday, 1:00 pm 3:00 pm Wednesday, 1:00 pm 3:00 pm Thursday, 9:30 am 11:30 am |
Keywords | Hands-on Trainings, NGFW, Best Practices/Troubleshooting |
We’ll retrieve a PAN-OS device configuration and perform analyses against best practices to identify weak aspects and points for improvement.
Some security rules may be considered too permissive. We’ll apply data analysis and learning techniques on your traffic logs to improve the existing security policy. Additionally, we’ll show you how to replace specific security rules with new ones automatically generated via machine learning techniques.
Required: Participants must bring a laptop with an HTML5-compatible browser.
Offered | Monday, 3:30 pm 5:30 pm Tuesday, 1:00 pm 3:00 pm Wednesday, 1:00 pm 3:00 pm Thursday, 9:30 am 11:30 am |
Keywords | Hands-on Trainings, Application Framework, Automation, NGFW |
You’ll complete ICS-specific lab exercises for:
An overview of the new ruggedized next-generation firewall for industrial applications, the PA-220R, will also be provided.
Required: Participants must bring a laptop with an HTML5-compatible browser.
Offered | Monday, 3:30 pm 5:30 pm Tuesday, 1:00 pm 3:00 pm Wednesday, 1:00 pm 3:00 pm Thursday, 9:30 am 11:30 am |
Keywords | Hands-on Trainings, Network Security, NGFW, PAN-OS 8.1, Endpoint/Traps |
In this workshop, you’ll learn about beginner- and intermediate-level features of the API as well as perform sample operational and configuration use cases.
The command-line program panxapi.py, part of the pan-python package, will be introduced. You’ll get access to your own PAN-OS VM-Series and Ubuntu environment for the hands-on labs.
Required: Participants must bring a laptop with an HTML5-compatible browser and SSH client (e.g., Mac laptop with Terminal, Windows laptop with SecureCRT or PuTTY, or Linux laptop)
Prerequisites: Previous experience using APIs and using the PAN-OS CLI and using panxapi.py from pan-python:
https://github.com/kevinsteves/pan-python/blob/master/doc/panxapi.rst
Offered | Monday, 1:00 pm 3:00 pm Tuesday, 3:30 pm 5:30 pm Wednesday, 9:30 am 11:30 am Wednesday, 3:30 pm 5:30 pm |
Keywords | Hands-on Trainings, App Developers, Automation |
Offered | Monday, 1:00 pm 3:00 pm Tuesday, 3:30 pm 5:30 pm Wednesday, 9:30 am 11:30 am Wednesday, 3:30 pm 5:30 pm |
Keywords | Hands-on Trainings, Best Practices/Troubleshooting, Management, NGFW, Threat Detection and Prevention |
In this session, you’ll see a real-life phishing kit in action and implement policies to prevent credential theft. Additionally, you’ll learn how to enforce multi-factor authentication, or MFA, through the firewall to neutralize an attacker's ability to use stolen credentials for lateral movement.
Required: Participants must bring a laptop with an HTML5-compatible browser and will have the option to use a phone and mobile number for the MFA lab exercise.
Offered | Monday, 3:30 pm 5:30 pm Tuesday, 1:00 pm 3:00 pm Wednesday, 1:00 pm 3:00 pm Thursday, 9:30 am 11:30 am |
Keywords | Hands-on Trainings, NGFW, Threat Detection and Prevention |
This session will show you how to safely enable today's important business SaaS applications with the next-generation firewall and Aperture SaaS security service on Palo Alto Networks Next-Generation Security Platform.
Required: Participants must bring a laptop with an HTML5-compatible browser.
Offered | Monday, 1:00 pm 3:00 pm Tuesday, 3:30 pm 5:30 pm Wednesday, 9:30 am 11:30 am Wednesday, 3:30 pm 5:30 pm |
Keywords | SaaS/Aperture, NGFW, Public Cloud, Threat Detection and Prevention, Hands-on Trainings |
Required: Participants must bring a laptop with an HTML5-compatible browser.
Offered | Monday, 3:30 pm 5:30 pm Tuesday, 1:00 pm 3:00 pm Wednesday, 1:00 pm 3:00 pm Thursday, 9:30 am 11:30 am |
Keywords | Hands-on Trainings, NGFW, Public Cloud, Google Cloud, Network Security |
Required: Participants must have a Microsoft Azure account and bring a laptop with an HTML5-compatible browser.
Offered | Monday, 1:00 pm 3:00 pm Tuesday, 3:30 pm 5:30 pm Wednesday, 9:30 am 11:30 am Wednesday, 3:30 pm 5:30 pm |
Keywords | Azure, Hands-on Trainings, Network Security, NGFW, Public Cloud |
This session will demonstrate deployment of consistent security policies from corporate to all locations and users. You’ll learn how to onboard and secure remote networks as well as secure mobile users’ traffic to the internet and remote access to data center resources using GlobalProtect cloud service.
Required: Participants must bring a laptop with an HTML5-compatible browser.
Offered | Monday, 1:00 pm 3:00 pm Tuesday, 3:30 pm 5:30 pm Wednesday, 9:30 am 11:30 am Wednesday, 3:30 pm 5:30 pm |
Keywords | Management, Hands-on Trainings, GlobalProtect, NGFW, Next Generation Security Platform |
During this session, we will demonstrate how we can help reduce security induced friction by using the machine learning capabilities of our Expedition firewall migration tool in the developer build environment and process to automate the generation of VM-Series firewall policies. Expedition machine learning to observe your actual cloud traffic - and of course based on apps not ports & protocols – to then build a firewall security policy dynamically and automatically. The result is a security policy that the developer understands, is not overly permissive (i.e. only allows what is necessary), is dynamic (i.e. able to change as the developer adds new apps) and is easy for the security team to audit, approve and implement. We will also explore how Evident gives DevOps & InfoSec teams confidence that the configurations of their Iaas/PaaS environments are secure.
Offered | Wednesday, 7:45 am 8:15 am |
Speakers | Jamie Brummell, SE, Palo Alto Networks |
Keywords | Public Cloud, Overview Session |
Analytics of this data opens up other possibilities that can offer significant added value to customers. In this session, Palo Alto Networks will discuss the new capabilities of Expedition, and a special guest from a major financial institution will describe how they used it to automate firewall policy creation and shorten the time to market, while providing increased value and security controls at no additional cost.
Offered | Thursday, 8:00 am 8:50 am |
Speakers | Didac Gil, Solutions Architect, Palo Alto Networks |
Keywords | NGFW, Network Security, Overview Session, Case Study/Use Case, Management |
With all that is expected of IT and Security departments in today’s world, how can anyone be sure that the tasks required to be completed by their teams cannot be automated to save time, money and resources? In this discussion, we will show you how to improve efficiencies by automating a large number of your disaster recovery procedures, while validating that the procedures were completed correctly, and proactively automating many other additional tasks that might appear in the future.
Offered | Tuesday, 12:45 pm 1:15 pm |
Speakers | Rafi Zvi, CEO, BackBox |
Keywords | Automation |
This presentation will be conducted by Paul M. Smith, MBA, CISSP, Assistant Director of Network Security at Temple University. Paul is the lead engineer behind the implementation and operations of the Palo Alto platform at Temple University. In addition to 20 + years of networking and security experience, Paul is also an Adjunct Professor for both the School of Business and the College of Engineering at Temple University. The role of adjunct professor allows Paul to bridge his day-to-day experiences in Network Security into the classroom and security related conferences. (https://www.linkedin.com/in/paulmatthewsmith/)
Offered | Wednesday, 4:00 pm 4:50 pm |
Speakers | Paul Smith, Assistant Director, Network Security, Temple University |
Keywords | Next Generation Security Platform, Case Study/Use Case, Technical Session |
Offered | Wednesday, 1:00 pm 1:30 pm |
Speakers | Nate Bitting, Sr Mgr, Customer Success Automation & Analytics, Palo Alto Networks |
Keywords | Network Security, Management, Automation, Overview Session |
Offered | Thursday, 10:30 am 11:20 am |
Speakers | Anubhav Gupta, Product Manager, Palo Alto Networks |
Keywords | Management, Network Security, Technical Session, NGFW, Best Practices/Troubleshooting, Threat Detection and Prevention |
Offered | Thursday, 10:30 am 11:20 am |
Speakers | Jovan Aleksov, Security Engineer, ING Bank |
Keywords | Network Security, Best Practices/Troubleshooting, Case Study/Use Case, Technical Session, NGFW |
Offered | Wednesday, 1:00 pm 1:30 pm |
Keywords | GlobalProtect, Overview Session |
Offered | Tuesday, 4:20 pm 5:10 pm |
Speakers | Alex Waitkus, Security Architect, Securicon, LLC |
Keywords | ICS/SCADA, Network Security, Case Study/Use Case, Technical Session, Management, NGFW |
Offered | Thursday, 11:30 am 1:00 pm |
Keywords | ICS/SCADA, Network Security, Industry Roundtables |
Offered | Tuesday, 4:20 pm 5:10 pm |
Keywords | Case Study/Use Case |
Using GlobalProtect, AccountsWorld also enabled remote users with secure access to their environment. It not only simplified AccountsWorld environment it also improved security, and reduced the time to deploy and address deployment errors.
Offered | Wednesday, 4:00 pm 4:50 pm |
Keywords | Network Security, Overview Session, Private Cloud/Datacenter, Public Cloud |
Offered | Thursday, 9:10 am 10:00 am |
Keywords | Threat Detection and Prevention, Best Practices/Troubleshooting, Endpoint/Traps, Technical Session |
The primary delivery mechanism for this is via Recorded Future's Intel Cards, which summarize all the threat intelligence gathered around a specific entity such as an IP address or domain. With the new Application Framework extension, analysts can query their firewall logs with a single click from within the Intel Card. Analysts can quickly see if the entity has been observed already within their network and under what circumstances, thus connecting threat intelligence directly with their network analysis.
During this session we'll review the integration architecture and expected use cases. We'll also demonstrate the app in action and provide information on how customers can enable and utilize this in their own security environments.
Offered | Wednesday, 2:40 pm 3:30 pm |
Keywords | App Framework Partners, Application Framework, Next Generation Security Platform, Overview Session |
With Magnifier Behavioral Analytics, organizations now have a powerful defense to shutdown advanced threats. During this session, Engel will describe attackers’ methods and reveal how Magnifier detects every stage in the post-intrusion attack lifecycle. He will explain how Magnifier interrogates suspicious endpoints to determine which process initiated an attack, analyzes the endpoint process using WildFire, and integrates with the Next-Generation Firewall to disrupt the attack before the damage is done.
Attend this session to learn:
Offered | Tuesday, 4:20 pm 5:10 pm |
Speakers | Giora Engel, VP, Product Management, Palo Alto Networks |
Keywords | Application Framework, Technical Session |
Offered | Monday, 2:00 pm 4:00 pm |
Keywords | Management, Overview Session |
Offered | Wednesday, 11:30 am 1:00 pm |
Speakers | John Kindervag, Field CTO, Palo Alto Networks |
Keywords | Segmentation, Network Security, Industry Roundtables |
Offered | Wednesday, 1:30 pm 2:20 pm |
Keywords | Application Framework, Next Generation Security Platform, Technical Session |
Offered | Wednesday, 10:30 am 11:20 am |
Speakers | Christer Swartz, Consulting Engineer, Palo Alto Networks |
Keywords | Private Cloud/Datacenter, Technical Session, Network Security, NGFW, Segmentation |
Palo Alto Networks will co-present with Moody’s, the techniques and tools adopted to address the security needs of their cloud native application architectures, which ensures that they remain a leader in the highly competitive financial sector. Together, they will describe numerous real-world use cases which address: cloud native architectural patterns and paradigms, the requirements for a strong security architecture, and the ability to use automation to ensure applications are deployed with agility and security, and lastly, the ability to package security in a highly re-usable and distributable manner.
Offered | Wednesday, 9:10 am 10:00 am |
Speakers | Vinay Venkataraghavan, Solutions Architect, Palo Alto Networks Shankar Chandrasekhar, Assistant Vice President, Cyber Security, Moodys Corporation |
Keywords | Public Cloud, Case Study/Use Case, Technical Session, AWS, Azure, Automation |
Offered | Wednesday, 2:40 pm 3:30 pm |
Speakers | Eric Brumm, Deputy Chief Information Officer, City of Glendale |
Keywords | Network Security, Overview Session, Case Study/Use Case, Segmentation, Technical Session |
In this session we will present one use case of large financial services that is moving their entire on-premise infrastructure to AWS, the challenges they faced, the process they went through to integrate their security requirements into the new infrastructure, and why they eventually had to bring the different groups to the table, security included, to make choices about the entire design. We will also discuss how the move to the cloud for this organization has provided some capabilities for scaling in a very cost effective and timely manner using orchestration and automation tools to automatically deploy new environments, security components included, as new services are provisioned, and as additional capacity is required.
Specific attention will paid to the dependencies between DNS, load balancing, NGFW, and network design.
There will be a live/video demo of the AWS console, and how a new “pod” including load balancing, servers, and VM-Series firewalls can be deployed in minutes with automation tools like Ansible and AWS CloudFormation Templates.
Offered | Wednesday, 8:00 am 8:50 am |
Speakers | Chris Yates, Senior Security Architect, Critical Start Chris Russell, SOC Engineering Manager, Critical Start |
Keywords | Public Cloud, Overview Session, Cloud Partner, App Developers, AWS, Azure |
Offered | Thursday, 10:30 am 11:20 am |
Speakers | Rinki Sethi, Sr. Director, Information Security, Palo Alto Networks |
Keywords | Next Generation Security Platform, Technical Session |
Offered | Wednesday, 4:00 pm 4:50 pm |
Speakers | Karthik Prakash, Technical Leader, E-TAC, Palo Alto Networks |
Keywords | NGFW, Private Cloud/Datacenter, Technical Session, Best Practices/Troubleshooting |
PAN-OS 8.0, introduced new features such as blocking the submission of corporate credentials to insecure sites and API-based Multi-Factor Authentication integrations with leading vendors in the Identity arena. This session provides technical guidance on different authentication capabilities available in the platform and when and how to use them in order to minimize the impact Credential Abuse attacks in your organization.
Offered | Wednesday, 8:00 am 8:50 am |
Speakers | Francesco Vigo, Partner Architect, Palo Alto Networks Nithin Varam, Product Manager, Palo Alto Networks |
Keywords | Network Security, PAN-OS 8.1, Technical Session, Threat Detection and Prevention, Management, NGFW |
In this session, members of the Palo Alto Networks IT team will discuss how they are applying CI/CD principles to support the Palo Alto Networks Campus on the Cloud where all offices and locations are connected and protected with the VM-Series next generation firewall. The speakers will walk through how they are using a combination of native cloud tools, Python, Ansible, Terraform and VM-Series features to fully automate the following tasks:
• Infrastructure creation including the basic networking infrastructure.
• VM-Series deployment.
• Firewall configuration and ongoing policy updates to accommodate the addition of new workloads.
By having a dynamic (infrastructure as) code base that can be deployed out to many environments, in a consistent, rapid and repeatable manner greatly eliminates the chance of human mistypes and allows one to spin up multiple full suite configurations within seconds for different regions within the Campus on The Cloud. The source of truth in version control and combining it with Continuous Integration allows developers to provision environments that can dramatically reduce setup time and eliminate possible configuration errors with a consistent, repeatable methodology.
Offered | Thursday, 9:10 am 10:00 am |
Speakers | Patrick Ryan, Site Reliability Engineer, Palo Alto Networks |
Keywords | Public Cloud, Technical Session, App Developers, AWS, Case Study/Use Case |
Join this session to learn:
Offered | Tuesday, 12:45 pm 1:15 pm |
Speakers | Jane Wasson, Product Marketing Manager, Area 1 Security |
Keywords | Threat Detection and Prevention, Overview Session |
In this educational and entertaining talk, Mohamad Qayoom will share: (1) how users are reacting to sophisticated phishing attacks, (2) results from a simulated phishing campaign engagement with the Department of Homeland Security (DHS), and (3) best practices to protect users from phishing attacks
Offered | Thursday, 9:10 am 10:00 am |
Speakers | Mohamad Qayoom, IT Network Security Consultant, Louisiana State University Health Sceinces Center New Orleans |
Keywords | Overview Session, Next Generation Security Platform, Case Study/Use Case |
Offered | Thursday, 9:10 am 10:00 am |
Speakers | Pradeep Singh, Sr Dir, Infrastructure & Operations, Palo Alto Networks Satwant Jakher, Dir, Site Reliability Engineer, Palo Alto Networks |
Keywords | Management, Network Security, Technical Session, NGFW |
Offered | Thursday, 9:10 am 10:00 am |
Speakers | Martin Walter, Product Line Manager, Palo Alto Networks |
Keywords | Technical Session, Threat Detection and Prevention, Network Security, Next Generation Security Platform |
Offered | Wednesday, 1:30 pm 2:20 pm |
Speakers | Nicole Ayubi, Systems Engineer, Palo Alto Networks Matt Harmon, Sr. Network Engineer, Yardi |
Keywords | GlobalProtect, Technical Session, Threat Detection and Prevention, Network Security |
Offered | Tuesday, 4:20 pm 5:10 pm |
Keywords | Private Cloud/Datacenter, Segmentation, GlobalProtect, Technical Session |
Offered | Wednesday, 11:30 am 1:00 pm |
Keywords | Best Practices/Troubleshooting, Industry Roundtables |
Offered | Wednesday, 4:00 pm 4:50 pm |
Speakers | Alex Hinchliffe, Unit42, EMEA, Palo Alto Networks Josh Grunzweig, Threat Intelligence Analyst, Palo Alto Networks |
Keywords | Threat Research/Unit 42, Overview Session |
Google Cloud Platform is known for performance and compute power, but how do we get advanced security protections in an environment where so many low-level functions have been abstracted away? Continuing with the theme of right tool for the job the VM-Series next-generation firewalls seemed like a good fit.
In this session, Jason Hrncir, perimeter security engineer will discuss Schlumberger’s experience in deploying the VM-Series on GCP including an architectural overview, and how they have addressed routing, networking resiliency and deployment challenges.
Offered | Wednesday, 2:40 pm 3:30 pm |
Keywords | Public Cloud, Case Study/Use Case, Technical Session, Best Practices/Troubleshooting, Google Cloud |
Offered | Wednesday, 10:30 am 11:20 am |
Speakers | Ryan Olson, Sr. Director, Threat Intelligence, Unit 42, Palo Alto Networks Robert Falcone, Threat Intelligence Analyst, Palo Alto Networks |
Keywords | Threat Research/Unit 42, Overview Session |
Offered | Wednesday, 4:00 pm 4:50 pm |
Keywords | AWS, Azure, Public Cloud, Technical Session, Overview Session |
Offered | Thursday, 10:30 am 11:20 am |
Speakers | Stan Lee, Director, Security Infrastructure, Palo Alto Networks |
Keywords | AWS, Public Cloud, GlobalProtect, Technical Session, Azure, Case Study/Use Case, Google Cloud |
Offered | Wednesday, 11:30 am 1:00 pm |
Speakers | Jason Meurer, Consulting Engineer, Palo Alto Networks |
Keywords | Automation, Public Cloud, AWS, Azure, Google Cloud, Industry Roundtables |
Offered | Thursday, 11:30 am 1:00 pm |
Keywords | Network Security, Industry Roundtables |
Offered | Wednesday, 8:00 am 8:50 am |
Keywords | Overview Session, PAN-OS 8.1, Private Cloud/Datacenter |
Offered | Thursday, 11:30 am 1:00 pm |
Keywords | Automation, Next Generation Security Platform, Industry Roundtables |
Offered | Wednesday, 8:00 am 8:50 am |
Keywords | Overview Session, Threat Detection and Prevention, Network Security, Next Generation Security Platform, Endpoint/Traps |
In this session, members of the Cloud Architecture and Threat Research teams will walk through security best practices for common cloud architectures such as hybrid (data center to cloud), inbound web applications, and outbound/internet facing. With the ultimate goal of ensuring your cloud deployment is secure, best practices recommendations will include both the use of native cloud security capabilities and Palo Alto Networks next-generation security capabilities.
Offered | Thursday, 8:00 am 8:50 am |
Speakers | Adrian Culley, Consulting Engineer, Palo Alto Networks Jaime Franklin, Consulting Engineer, Palo Alto Networks |
Keywords | Public Cloud, Best Practices/Troubleshooting, Technical Session, AWS, Azure, Google Cloud |
Offered | Thursday, 11:30 am 1:00 pm |
Keywords | Application Framework, Automation, Industry Roundtables |
In this session we will cover a new paradigm of thinking around Realm Management, the ability to manage multi-cloud infrastructure security from one central point of management and start collapsing the cloud providers down to a mission critical cloud fabric. Using the VM-Series and Panorama as the core elements of Realm Management, we are able to bring to life a single pane of glass management initiative that allows for central security, control and management of Microsoft Azure and Amazon AWS.
We will review the driving principles and technical architecture of Realm Management and how it can centralize security once, allowing you to push policy and updates across multiple cloud providers at scale.
Offered | Wednesday, 9:10 am 10:00 am |
Speakers | Peter Meister, Sr. Director - Product Strategy, 2nd Watch |
Keywords | Cloud Partner, Public Cloud, NGFW, Technical Session, AWS, Azure, Best Practices/Troubleshooting |
Offered | Tuesday, 12:00 pm 12:30 pm |
Speakers | Kerry Matre, Sr. PMM Professional Services, Palo Alto Networks |
Keywords | Application Framework, Best Practices/Troubleshooting, Overview Session, Next Generation Security Platform |
Offered | Thursday, 10:30 am 11:20 am |
Speakers | John Kindervag, Field CTO, Palo Alto Networks |
Keywords | Overview Session, Private Cloud/Datacenter, Segmentation, NGFW, Threat Detection and Prevention |
This class, taught by the Global Practice Lead for Threat for Professional Services will show you practical ways to accomplish this.
Offered | Wednesday, 9:10 am 10:00 am |
Speakers | Suzanne VanPatten, Global Practice Lead - Threat, Prrofessional Services, Palo Alto Networks |
Keywords | Best Practices/Troubleshooting, Technical Session, Threat Detection and Prevention, Network Security, Next Generation Security Platform, NGFW |
Offered | Tuesday, 3:00 pm 4:00 pm |
Keywords | Network Security, Next Generation Security Platform, Best Practices/Troubleshooting, Technical Session, Management, Threat Detection and Prevention |
* Decrypt overview
* Details on CAs
* Project planning
Offered | Wednesday, 1:30 pm 2:20 pm |
Speakers | Jon Robinson, President, Digital Scepter |
Keywords | Case Study/Use Case, Technical Session |
Offered | Wednesday, 2:40 pm 3:30 pm |
Speakers | Rick Howard, Chief Security Officer, Palo Alto Networks |
Keywords | Technical Session, Threat Research/Unit 42 |
Offered | Wednesday, 2:40 pm 3:30 pm |
Speakers | Luke Teeters, Information Security Analyst, Materion Corporation |
Keywords | Overview Session, Case Study/Use Case, Endpoint/Traps |
Offered | Thursday, 10:30 am 11:20 am |
Speakers | Gil Azar, Principal Staff Engineer, Palo Alto Networks |
Keywords | Threat Detection and Prevention, Endpoint/Traps, Technical Session |
Offered | Wednesday, 4:00 pm 4:50 pm |
Speakers | Elliott Abraham, Senior Security Architect, Hewlett Packard Enterprise |
Keywords | Cloud Partner, Public Cloud, Best Practices/Troubleshooting, App Developers, AWS, Azure, Overview Session |
Offered | Wednesday, 10:30 am 11:20 am |
Speakers | Scott Simkin, Director Threat Intelligence, Palo Alto Networks |
Keywords | Application Framework, Overview Session |
Offered | Wednesday, 2:40 pm 3:30 pm |
Speakers | Michael Bachman, Manager, Network Security / Content Delivery / Web Security, Nordstrom |
Keywords | Next Generation Security Platform, Private Cloud/Datacenter, Management, Network Security, Overview Session, Case Study/Use Case, NGFW |
Offered | Wednesday, 1:30 pm 2:20 pm |
Speakers | Bret Lopeman, IT Security Engineer, Ada County |
Keywords | Case Study/Use Case, Endpoint/Traps, Technical Session |
Offered | Wednesday, 8:00 am 8:50 am |
Speakers | Simon Conant, Threat Intelligence Analyst, Palo Alto Networks Jen Miller-Osborne, Threat Intelligence Analyst, Palo Alto Networks |
Keywords | Threat Research/Unit 42, Overview Session |
Other domains get treated as being effectively "disposable." Those domains get registered, quickly abused for cybercrime-related purposes (such as spamming or phishing), and are then abandoned after becoming unusable due to being blocklisted or "held" by registrar action.
In this new study, we've obtained an ongoing feed of "Newly Observed Domains" from Farsight Security's SIE, and then periodically actively probed those names from global measurement points to determine:
-- What fraction of new domain names "die a premature death" due to being blocklisted or suspended?
-- What causes the "death" of those domains? Do they mostly get blocklisted? Or do they "die" due to action
by registrars or others?
-- What does the survival curve for those names look like over time?
-- Are there differences between the traditional gTLDs, ccTLDs and ICANN's new gTLDs?
Farsight Security CEO Dr. Paul Vixie will address these topics and make recommendations how to reduce domain name abuse.
Offered | Tuesday, 4:20 pm 5:10 pm |
Speakers | Paul Vixie, CEO, Cofounder, Farsight Security, Inc. |
Keywords | Technical Session, Threat Detection and Prevention, Network Security |
Offered | Wednesday, 9:10 am 10:00 am |
Speakers | Mike Harbison, Threat Intelligence Analyst, Palo Alto Networks Robert Falcone, Threat Intelligence Analyst, Palo Alto Networks |
Keywords | Threat Research/Unit 42, Technical Session |
During this session we will demonstrate how the combination of Palo Alto Networks AutoFocus and Minemeld can be used by Service Providers to drastically simplify threat hunting and significantly increase the speed and effectiveness of applying security enforcements with true “no-touch” automation.
Offered | Tuesday, 7:30 am 8:00 am Thursday, 12:15 pm 12:45 pm |
Speakers | John Newsome, Systems Engineer, Palo Alto Networks |
Keywords | Overview Session, Automation, Service Providers |
Although there are many Threat Intelligence platforms available this presentation will focus on MineMeld, an open source threat intelligence framework provided by Palo Alto Networks. This presentation will describe the components that make up the MineMeld framework, how the components interact with one another, configuration suggestions, lessons learned and some use cases.
The intention of this presentation is to introduce the community to MineMeld, share lessons learned and provide some working examples to further streamline existing incident response processes and network monitoring and enforcement capabilities.
Offered | Wednesday, 8:00 am 8:50 am |
Speakers | Sean Engelbrecht, Informaion Security Administrator, Devon Energy Chad Bailey, Information Security Professional, Deven Energy Xavier Homs, Solutions Architect, Palo Alto Networks |
Keywords | Application Framework, Case Study/Use Case, Technical Session, ICS/SCADA |
Offered | Tuesday, 1:30 pm 2:30 pm |
Keywords | Threat Detection and Prevention, Best Practices/Troubleshooting, Technical Session, Network Security, Next Generation Security Platform |
Offered | Wednesday, 4:00 pm 4:50 pm |
Speakers | Ofir Monza, Product Manager, Palo Alto Networks |
Keywords | Endpoint/Traps, Technical Session |
Required: Participants must bring a laptop with an HTML5-compatible browser.
Prerequisites: Must have some knowledge of Palo Alto Networks next-generation firewall.
Offered | Monday, 3:30 pm 5:30 pm Tuesday, 1:00 pm 3:00 pm Wednesday, 1:00 pm 3:00 pm Thursday, 9:30 am 11:30 am |
Keywords | Hands-on Trainings, Management, NGFW, PAN-OS 8.1 |
Required: Participants must bring a laptop with an HTML5-compatible browser.
Offered | Monday, 1:00 pm 3:00 pm Tuesday, 3:30 pm 5:30 pm Wednesday, 9:30 am 11:30 am Wednesday, 3:30 pm 5:30 pm |
Keywords | Endpoint/Traps, Hands-on Trainings, NGFW |
Required: Participants must bring a laptop with an HTML5-compatible browser.
Offered | Monday, 1:00 pm 3:00 pm Tuesday, 3:30 pm 5:30 pm Wednesday, 9:30 am 11:30 am Wednesday, 3:30 pm 5:30 pm |
Keywords | Next Generation Security Platform, Hands-on Trainings |
Offered | Wednesday, 8:00 am 8:50 am |
Keywords | SaaS/Aperture, Best Practices/Troubleshooting, Overview Session, Compliance |
1) securing the AWS environment prior to migration activities;
2) extending current, on-premises capabilities across operational security domains;
3) on-premises and AWS security architecture as a means to enable the secure operation of business; and
4) architecting Palo Alto Networks security products and services in the Cloud for enhanced protections.
The technical guidance is aimed toward the security professional, practitioner, and architect and draws upon a growing body of engagements and research that match the rate of innovation driving organizations to the Cloud. It has been observed that an “order of operations”, or layered approach, for securing the AWS environment not only reduces overall exposure and subsequent risk, but also provides organizations with a greater understanding of the costs associated with conducting secure Cloud migrations and operations. With unified understanding, organizations will be preconditioned to succeed in securing their AWS environments by replacing reactionary maneuvers with business enablement.
Offered | Wednesday, 1:30 pm 2:20 pm |
Speakers | Erick Sanz, Principal Cloud Security Architect, Set Solutions, Inc. Lance Grover, Sr. Security Solutions Architect, Set Solutions, Inc. |
Keywords | AWS, Cloud Partner, Technical Session, Public Cloud, Best Practices/Troubleshooting, Segmentation |
Offered | Thursday, 11:30 am 1:00 pm |
Keywords | NGFW, Automation, Case Study/Use Case, Industry Roundtables |
When having a business level conversation about risk and the appetite an organisation has, there are four fundamental pieces to consider. When it comes to cloud, it isn’t always a binary ‘yes’ or ‘no’ discussion. This session will discuss what these pieces are and how you can start framing your cloud conversation accordingly:
Offered | Thursday, 10:30 am 11:20 am |
Speakers | Sean Duca, Vice President, Regional Chief Security Officer - Asia Pacific, Palo Alto Networks |
Keywords | Public Cloud, Overview Session, AWS, Azure, Segmentation, Google Cloud |
Offered | Wednesday, 9:10 am 10:00 am |
Speakers | Scott Johanson, Customer Success Architect, Palo Alto Networks |
Keywords | Network Security, Management, Next Generation Security Platform, Overview Session, NGFW, Best Practices/Troubleshooting |
Offered | Thursday, 9:10 am 10:00 am |
Speakers | Stijn Vanveerdeghem, Sr. Technical Product Manager, VMware Jaimin Patel, Senior Product Manager, Palo Alto Networks |
Keywords | Case Study/Use Case, Private Cloud/Datacenter, Segmentation, Technical Session, Automation, NGFW |
Offered | Thursday, 11:30 am 1:00 pm |
Keywords | Industry Roundtables |
Offered | Thursday, 8:00 am 8:50 am |
Speakers | Liat Hayun, Product Line Manager, Palo Alto Networks |
Keywords | Endpoint/Traps, Overview Session |
Offered | Wednesday, 9:10 am 10:00 am |
Keywords | Public Cloud, Google Cloud, Technical Session, Overview Session |
Offered | Thursday, 9:10 am 10:00 am |
Speakers | Alireza Salimi, Sr. Security Principal - Lead Resercher, Accenture Secutity | iDefense |
Keywords | Technical Session, Threat Research/Unit 42 |
• Prevent unauthorized access to GlobalProtect VPN services with an integrated MFA solution (Okta)
• Optimize your security strategy and automate support workflows (ServiceNow)
Unifying and adding key security solutions can improve your security posture and reduce your TCO. Join us as we explore how key partners can elevate your Palo Alto solution to provide a robust security posture against the latest threats.
Offered | Wednesday, 11:30 am 12:00 pm |
Speakers | Alex Vasquez, Security Practice Manager, Accudata Systems |
Keywords | Private Cloud/Datacenter, Overview Session, Case Study/Use Case |
You’ll leave the session with an understanding of the latest and greatest features and capabilities in our threat services and how they can help protect your organization.
Offered | Wednesday, 4:00 pm 4:50 pm |
Keywords | Overview Session, PAN-OS 8.1, Threat Detection and Prevention, Network Security, Next Generation Security Platform |
Offered | Wednesday, 9:10 am 10:00 am |
Keywords | Endpoint/Traps |
The approach used will be as follows:
Offered | Monday, 10:00 am 10:45 am Tuesday, 10:00 am 10:45 am Wednesday, 10:00 am 10:45 am |
Keywords | Hands-on Trainings |
Offered | Thursday, 11:30 am 12:00 pm |
Keywords | Service Providers, Overview Session, Next Generation Security Platform |