February 12, 2019 | Palo Alto Networks, Santa Clara, CA
Spark Bay Area featured opportunities to network with fellow Palo Alto Networks users in the Bay Area and the latest updates and threat research from Palo Alto Networks.
At Spark Bay Area, there were sessions to enhance your skills, including hands-on workshops and collaborative sessions so you will be able to take home actionable solutions and strategies for key security issues.
Spark User Summit Bay Area
Palo Alto Networks
3000 Tannery Way
Santa Clara, CA 95054
Fuel with Friends!
Fuel events are all about connecting and collaborating with your cybersecurity peers. Invite a colleague to register online for Spark Bay Area and have them enter your name in the "Referred By" registration field. If you and your friend both attend Spark Bay Area on February 12, you'll be entered to win a $50 Amazon gift card each! *
*The $50 Amazon Gift card is limited to two individuals. Must be present to win. Prize cannot be exchanged or redeemed for cash value.
Schedule at a Glance*
8:45 a.m. - 9:00 a.m. Welcome and Overview
9:00 a.m. - 9:45 a.m. Is Your Office 365 Data Protected?
SaaS applications like Microsoft® Office 365® are wildly popular, and adoption across enterprises continues to grow, but so do the hidden threats lying within these offerings, such as:
- Accidental data exposure with SharePoint®
- Uncontrolled use of personal OneDrive® accounts
- Data security violations in Exchange
Yes, even trusted SaaS applications like Office 365 can increase your risk of breaches and noncompliance. Join this session to learn what you need to meet your CASB needs as well as secure your cloud-based data against malware and accidental exposure. You’ll also find out how to achieve complete visibility and reporting, data classification, and fine-grained enforcement across users, folders and file activities to protect your business-critical data in Office 365.
9:45 a.m. - 10:00 a.m. Break - CyberRange and EBC Tours
10:00 a.m. - 11:15 a.m. Are You AI Ready? The Future of Security Revealed
See how AI, machine learning and automation are transforming network security.
We know securing your network needs to be simpler and more streamlined. So we’re innovating new ways for automation and analytics to save you time and improve your security. AI is everywhere; cybersecurity is no exception. Be the first to find out how our new machine learning-powered products are fundamentally changing the equation.
Join us for the live broadcast of this digital event, to be followed by Q&A with experts from Palo Alto Networks.
11:15 a.m. - 11:30 a.m. Break - CyberRange and EBC Tours
11:30 a.m. - 12:15 p.m. Breakout Sessions
Optimizing the Firewall Ruleset
From the low hanging fruit of redundant rules, to in-depth traffic summaries, we will discuss why an optimized ruleset is important and the 5 steps you can take to keep your organization's firewalls running efficiently and securely.
Investigating Real-World Breaches with Fast and Accurate Incident Response at Unprecedented Scale
As a security analyst, you are facing a relentless number of alarms and increasing complexity, including finding evidence hidden like a needle in a haystack across your entire network. Join this session if you:
- Would like to resolve your incident alerts quicker and more definitively, including multi-data center environments.
- Would like to stay in your PAN Panorama workflow and have immediate access to packets that correlate to alerts.
- Are overwhelmed by the sheer volume of alarms to investigate them all thoroughly.
- Would like to solve your hardest security breaches in a third of the time.
- Are concerned that you don't have the forensic evidence to report to your management exactly what damage was done.
In this session, we will examine some real-world breach examples and learn about the intricacies of today’s threats.
12:15 p.m. - 1:00 p.m. Lunch with Partners
1:00 p.m. - 1:45 p.m. Breakout Sessions
Finding What Matters in Your Palo Alto Networks Logs
Proactively finding actionable incidents in Palo Alto Networks (PAN) logs is incredibly challenging with the volume of data we experience today. It requires time, context and significant processing power. In this session, we'll walk you through the intrusion analysis of common types of PAN logs (Network IPS, Traps and URL Filtering) so that you can identify actionable incidents. We’ll discuss the current challenges security teams face when analyzing high-volume data feeds, how you can gather and contextualize your data across multiple data sources with emerging technologies and how to automate the monitoring and triage of your PAN deployments to provide you actionable incidents.
Three Deadly Dragons in the Cloud and How to Slay Them
Dragon #1 - Legacy Silos Between IT Ops and Security teams
Dragon #2 - Security Bias on Infrastructure vs. Applications Insights
Dragon #3 - Security as a Department of Shame/Blame vs. a Shared Measure of Quality
In this session, we will review how to quickly identify these potential dragons (current or future) and review how others have slain them to accelerate their migration to the cloud, break down traditional silos, integrated workflows (DevSecOps), and democratized security and compliance insights across the organization.
1:45 p.m. - 2:00 p.m. Break - CyberRange and EBC Tours
2:00 p.m. - 2:45 p.m. Fast and Furious - An Expert Competition
Get ready for a little friendly competition as we put our experts on the spot! Help us choose the questions you want answered, then hear our panel debate and discuss their best ideas. The most successful solution is the one that gets your vote!
Topics may include:
- Centralized change management
- Safe feature enablement
- Choosing a public cloud
2:45 p.m. - 3:00 p.m. Closing Comments: How to Leverage Fuel Community to Become an Expert
Spark is only one day, but Fuel User Group is available to you 365 days a year! Learn more about the year-round benefits of membership, how you can access our online activities, and how you can be a part of the local Fuel chapter.
3:00 p.m. Spark Happy Hour
*subject to change.