February 18, 2020
Check back soon for more information about Spark User Summit Cleveland. At Spark Cleveland, you’ll network with fellow Palo Alto Networks users in the Cleveland area and hear the latest updates and threat research from Palo Alto Networks.
Spark Cleveland will feature sessions to enhance your skills, including hands-on workshops and collaborative sessions so you will be able to take home actionable solutions and strategies for key security issues.
Lunch and education sessions are provided free of charge.
Corporate College East
4400 Richmond Rd
Warrensville Heights, OH 44128
SCHEDULE AT A GLANCE*
8:45 a.m. - 9:00 a.m. Welcome and Overview
9:00 a.m. - 9:45 a.m. Opening Keynote: Breakthroughs at Palo Alto Networks
One of the benefits of Fuel membership is early access to the latest developments from Palo Alto Networks. This session will discuss product updates and releases, including new features in PAN-OS, Prisma, Cortex, as well as an update on how recent acquisitions like TwistLock and Aporeto are extending public cloud security capabilities. This information will help you expand prevention capabilities through enhanced analysis, automation and operational efficiencies; we'll cover topics including achieving compliance, improving threat detection and response, and addressing mobile security considerations, then leave time for audience Q&A.
9:45 a.m. - 9:55 a.m. Break
9:55 a.m. - 10:25 a.m. Breakout Sessions
Orchestration and Automation in the Trenches
Customer stories from day to day usage of Demisto to implement automation in a real world environment.
10:25 a.m. - 10:35 a.m. Break
10:35 a.m. - 11:20 a.m. Breakout Sessions
Enabling a More Simplified NGFW Cloud Deployment
Deploying any next-generation firewall in a public cloud environment is challenging, not because of the firewall itself but because of the public cloud networking services that practitioners must use. The job of understanding and problem-solving around cloud networking complexities to ensure a successfully configured and maintained firewall deployment is no small task. It’s a task that is definitely possible — though difficult — and it comes with performance, scale, and visibility tradeoffs that need to be considered closely. Through intelligent orchestration and control service, it's possible to simplify the deployment of Palo Alto Networks VM-Series Firewalls and eliminate those tradeoffs.
Detecting Targeted Attacks with Machine Learning
Examine advanced attacks and how Machine Learning is productized to help the human in the machine fight.
11:20 a.m. - 11:30 a.m. Break
11:30 a.m. - 12:15 p.m. Breakout Sessions
Protect Your Keys or Don’t Waste Your Time Encrypting Your Data
For over 2000 years, governments, armies, businesses and lovers have been encrypting messages. For the same amount of time, the keys used to perform the encryption have been the weakest link in the chain. After 2000 years, technology has advanced such that the keys can be protected but many companies don’t understand how important it really is. Mr. Beutlich will explain in an entertaining (and sometimes graphic) fashion why protecting the encryption key is more important than the encryption itself.
Developing a Secure Edge Design (SASE)
Learn how to bring together CASB, SD-WAN, DLP and Security as a Service to protect your organization no matter where its people or data reside.
12:15 p.m. - 1:15 p.m. Lunch with Partners
1:15 p.m. - 2:00 p.m. MineMeld, What's Next
In this 45-minute talk we will be presenting the steps necessary to build a MineMeld server through the creation of the first Miner-aggregator-output workflow. Participants leave with the information necessary to start their journey using MineMeld as a tool to reduce their attack surface.
2:00 p.m. - 2:10 p.m. Break
2:10 p.m. - 2:55 p.m. Breakout Sessions
From Security Bottleneck to Business Enabler with Automation
Next Generation Firewall Masterclass Intro
We will review some more advanced use cases and custom signatures to gain additional visibility, identify vulnerable web applications, set up "Homenets" for local networks, determine which threat feeds are the most valuable and create a "canary in the coal mine" to determine if data exfiltration is occurring.
3:00 p.m. - 3:50 p.m. Threat Landscape and the State of the SoC
A look at current threat trends and how the SoC needs to evolve to stay ahead.
3:50 p.m. - 4:00 p.m. Closing Comments
*subject to change.