SPARK USER SUMMIT Chicago: OCTOBER 1, 2019

October 1, 2019 | TechNexus

PAN_SPARK_Chicago_Logo.png

At Spark Chicago, attendees had the opportunity to network with fellow Palo Alto Networks users in the Chicago area and hear the latest updates and threat research from Palo Alto Networks. 

Spark Chicago featured sessions to enhance your skills, including hands-on workshops and collaborative sessions with actionable solutions and strategies for key security issues. 

Spark User Summit Chicago

TechNexus
20 N Upper Wacker Dr #1200
Chicago, IL 60606

 

SCHEDULE AT A GLANCE*

8:45 a.m. - 9:00 a.m.  Welcome and Overview

9:00 a.m. - 9:45 a.m.  Demisto and the Top 10 SOAR Use Cases

The job of the SOC is getting more complicated every day, with increasing numbers of alerts, a serious resource shortage, and the long timeline for resolution. But instead of giving up hope, organizations are implementing SOAR solutions to help orchestrate workflows, automate repeatable tasks and manage incident response across the entire ecosystem. Join us for an overview of one of the most recent additions to Palo Alto Networks - Demisto - and learn about the best opportunities in your organization to leverage SOAR.

9:45 a.m. - 9:55 a.m.  Break

9:55 a.m. - 10:40 a.m.  Breakout Sessions

Breakout 1: From Security Bottleneck to Business Enabler
Firemon

Security’s influence on organizational structure is accelerating exponentially. In today’s network security environment, moving to a hybrid cloud infrastructure is a critical step needed to drive innovation and ensure a competitive advantage. As application development takes the driver’s seat, security cannot stall progress it must come along for the ride.

During this presentation, we'll discuss how thought leaders are migrating to the hybrid cloud and how they leverage Palo Alto firewalls and automation to streamline flexibility, scalability, centralized policy management, and automation.

Breakout 2: Protect Your Keys or Don’t Waste Your Time Encrypting Your Data
nCipher

For over 2000 years, governments, armies, businesses and lovers have been encrypting messages. For the same amount of time, the keys used to perform the encryption have been the weakest link in the chain. After 2000 years, technology has advanced such that the keys can be protected but many companies don’t understand how important it really is. This session will explain in an entertaining (and sometimes graphic) fashion why protecting the encryption key is more important than the encryption itself.

10:40 a.m. - 10:50 a.m.  Break

10:50 a.m. - 11:35 a.m.  Breakout Sessions

Breakout 1: Automate Everything: The Future of Security Automation
Indeni

As the set of products needed to manage an organization's security becomes more and more diverse, a bigger skills gap continues to open. Teams can't hire or train fast enough to manage threats at a human speed anymore, which makes automation a critical consideration. In this session, we'll dig into the details of what you can do with your current resources to see your organization clearly, report more accurately, and react faster with less manual work.

Topics covered include:

  • Validating your visibility and proactive health checks
  • Identifying high-impact automation changes
  • Leveraging your existing tools within the firewall and cloud platforms
  • Making notifications actionable

Breakout 2: Enabling a More Simplified NGFW Cloud Deployment
Aviatrix

Deploying any next-generation firewall in a public cloud environment is challenging, not because of the firewall itself but because of the public cloud networking services that practitioners must use. The job of understanding and problem-solving around cloud networking complexities to ensure a successfully configured and maintained firewall deployment is no small task. It’s a task that is definitely possible — though difficult — and it comes with performance, scale, and visibility tradeoffs that need to be considered closely. Through intelligent orchestration and control service, it's possible to simplify the deployment of Palo Alto Networks VM-Series Firewalls and eliminate those tradeoffs.

11:35 a.m. - 11:45 a.m. Break 

11:45 a.m. - 12:15 p.m.  Fast and Furious - An Expert Competition

Get ready for a little friendly competition as we put our experts on the spot! Help us choose the questions you want answered, then hear our panel debate and discuss their best ideas. The most successful solution is the one that gets your vote!

Topics may include:

  • Centralized change management
  • Safe feature enablement
  • Choosing a public cloud

12:15 p.m. - 1:15 p.m.  Lunch with Partners

1:15 p.m. - 2:00 p.m.  Breakout Sessions

Breakout 1: MineMeld, Getting Started
Nexum
In this 45-minute talk, we will be presenting the steps necessary to build a MineMeld server through the creation of the first Miner-aggregator-output workflow. Participants leave with the information necessary to start their journey using MineMeld as a tool to reduce their attack surface.

Breakout 2: Zingbox and Palo Alto Networks – the Next Step in IoT Security
Zingbox
The newest protection service from Palo Alto Networks joins us in Sacramento to share information on IoT security problems commonly seen in the enterprise, what IoT devices are more vulnerable, what types of attacks are common, and more.

2:00 p.m. - 2:10 p.m. Break

2:10 p.m. - 2:55 p.m. Today's Threat Landscape

Hear the Unit 42 team discuss the current threat landscape. Unit 42 will highlight several campaigns and review advances in malware, ransomware, and cyber threats, that adversaries are using to breach modern enterprise networks.

2:55 p.m. - 3:00 p.m.  Closing Comments: How to Leverage the Fuel Community to Become an Expert

Spark is only one day, but Fuel User Group is available to you 365 days a year! Learn more about the year-round benefits of membership, how you can access our online activities, and how you can be a part of the local Fuel chapter.


*subject to change.

Diamond

Gold

logo-aviatrix.png

firemon.png

nCipher-EDC-logo-rgb.png

Nexum Logo.png

Indeni_2017_Logo_Web.png

Silver

Critical-Start.png

idaptive_2color.png

Endpoint