Spark User Summit Chicago: 2016

November 1, 2016 | The Westin O'Hare, Rosemont IL

PAN_SPARK_Chicago_Logo.png

Spark User Summit Chicago

The Westin O'Hare
6100 N River Rd
Rosemont, IL 60018

Click here to download the Spark Chicago agenda. 

Click here to download the Migration Tool. 

 

Schedule at a Glance

Click on the session title to view details. 


9:30 a.m. - 10:15 a.m.

Next Generation Threat Prevention >>

Taylor Ettema, Director of Product Management, Threat Prevention, Palo Alto Networks

Start your morning with an overview of the current state of threat prevention technologies, and then dig into how cyber security professionals are "weaponizing" their threat intelligence to stop attacks in their tracks

10:15 a.m. - 10:20 a.m.
Break

10:20 a.m. - 10:45 a.m.

Shared Experiences: Networking Activity >> 

All attendees are encouraged to participate in our small group dialogue sessions, which will focus on topics selected by our attendees. In a small group setting, users will share ideas and best practices on topics including: Breaking Threats, Cloud, Endpoint & Network Security, Emerging Mobile Considerations and Analytics.This is a great way to connect with other local users.

10:45 a.m - 10:55 a.m.
Break

10:55 a.m. - 11:30 a.m. 

Breakout Sessions >>  

Migration to Palo Alto Networks Migration Tool Hands-on Lab, Part 1

Jeff Talkington, Systems Engineer, Palo Alto Networks

Bring your laptop and plug in for an in-depth look at best practices for migrating your current policies to utilize your next-generation firewall to the fullest. The Palo Alto Networks Migration tool 3.0 is a new release that helps automate and accelerate the migration from third-party firewall vendors to Palo Alto Networks next-generation firewalls, as well as the migration from port-based security policies to an application-based approach with App-ID. This hands-on session will train you to utilize the many capabilities of this new tool as we demonstrate a migration from a Cisco ASA environment to a Palo Alto Networks next-generation firewall. We'll demonstrate how you can get the most value from your next-generation firewall while reducing your attack surface, and regaining visibility and control over your organization through the use of App-ID. Prerequisites: Familiarity with firewalls and their configuration in general. Bring VMPlayer 6 or higher, workstation, or Fusion. Palo Alto Networks will provide a copy of the migration tool and a Cisco sample configuration to migrate during the session.

Securing the Public Cloud

David Spears, Systems Engineer, Palo Alto Networks

In this session we will show how the Palo Alto Networks firewall deployment architectures for both AWS and Azure. Since this breakout session is very limited on time, it is important that attendees have a basic understanding of AWS and Azure.

11:30 a.m - 11:35 a.m.
Break

11:35 a.m. - 12:35 p.m.

Breakout Sessions >>  

Migration to Palo Alto Networks Migration Tool Hands-on Lab, Part 2

Jeff Talkington, Systems Engineer, Palo Alto Networks

Bring your laptop and plug in for an in-depth look at best practices for migrating your current policies to utilize your next-generation firewall to the fullest. The Palo Alto Networks Migration tool 3.0 is a new release that helps automate and accelerate the migration from third-party firewall vendors to Palo Alto Networks next-generation firewalls, as well as the migration from port-based security policies to an application-based approach with App-ID. This hands-on session will train you to utilize the many capabilities of this new tool as we demonstrate a migration from a Cisco ASA environment to a Palo Alto Networks next-generation firewall. We'll demonstrate how you can get the most value from your next-generation firewall while reducing your attack surface, and regaining visibility and control over your organization through the use of App-ID. Prerequisites: Familiarity with firewalls and their configuration in general. Bring VMPlayer 6 or higher, workstation, or Fusion. Palo Alto Networks will provide a copy of the migration tool and a Cisco sample configuration to migrate during the session.

Fuel Fireside Chats - Sharing the Firewall Migration Experience

Moderator: Michelle Malcher, Fuel User Group Presenters: Michael Boucher, FTD, Rodney Przyborowski, CTC Trading Group, Ben Regimand, Capco

A small group of Fuel members will share their stories of migrating to Palo Alto Networks. If you want to learn more about the differences in migrating from different firewalls, how the next-generation firewall changed policy planning and management, and what other users are considering as additional layers of their cyber security strategy, this is a can't miss session.

12:35 p.m - 1:35 p.m.
Lunch with Partners

1:35 p.m. - 2:20 p.m.

Breakout Sessions >>  

Become a Threat Intelligence Expert - Correlation, Analytics and Remediation Hands-on Lab, Part 1 >>

LogRhythm Lab Team

During this hands-on workshop, you will have the opportunity to design security policies in a live environment, learn techniques to gain better visibility to potential cyber activity and detect, block and respond to cyber threats. This will include “how to” instruction on: • Investigating compromised user accounts • Researching security events and advanced persistent threats in a SIEM (security information and event management) environment • Automating immediate response to cyber incidents to reduce the risk of experiencing a material breach

Threat Ready: The Benefits of Segmentation

Justin Flynn, SE Manager, Burwood Group

Our presenter will discuss evolving threats to Process Control systems, where defense through traditional segmentation of business and process control networks is no longer sufficient. He will discuss how next-generation segmentation can help IT leaders, namely in the manufacturing industry, prevent today's increasingly sophisticated cyberattacks.

2:20 p.m - 2:30 p.m.
Break

2:30 p.m. - 3:15 p.m.

Breakout Sessions >>  

Become a Threat Intelligence Expert - Correlation, Analytics and Remediation Hands-on Lab, Part 2

LogRhythm Lab Team

During this hands-on workshop, you will have the opportunity to design security policies in a live environment, learn techniques to gain better visibility to potential cyber activity and detect, block and respond to cyber threats. This will include “how to” instruction on: • Investigating compromised user accounts • Researching security events and advanced persistent threats in a SIEM (security information and event management) environment • Automating immediate response to cyber incidents to reduce the risk of experiencing a material breach

Enriched Threat Intelligence: Protection and Prevention Across the Enterprise

Jim Cox, Director of Sales, Proofpoint

New forms of sophisticated cybersecurity threats continually emerge to target enterprises in new ways, utilizing multiple attack vectors. In this session, learn how to protect your organization from and gain intelligence on the sophisticated attacks targeting your people and data. Learn how an enriched blend of threat intelligence spanning network, endpoint, cloud, email, and social media platforms, can make the difference in your cybersecurity strategy.

3:15 p.m - 3:20 p.m.

Closing Comments


*subject to change.

Thank You to Our Partners

Diamond

pan-logo-badge-green-dark-kick-up.jpg

 

Gold

 

logrhythm.png

Proofpoint-logo-K.jpg

Silver

tufin logo.png