SPARK USER SUMMIT Cleveland: February 18, 2020

February 18, 2020

PAN_SPARK_Cleveland_Logo.jpg

Spark Cleveland featured sessions to enhance your skills, including hands-on workshops and collaborative sessions with actionable solutions and strategies for key security issues. 

Lunch and education sessions are provided free of charge. 

Venue

Corporate College East
4400 Richmond Rd 
Warrensville Heights, OH 44128

SCHEDULE AT A GLANCE*

8:45 a.m. - 9:00 a.m. Welcome and Overview

9:00 a.m. - 9:45 a.m. Opening Keynote: Breakthroughs at Palo Alto Networks
Palo Alto Networks

One of the benefits of Fuel membership is early access to the latest developments from Palo Alto Networks. This session will discuss product updates and releases, including new features in PAN-OS, Prisma, Cortex, as well as an update on how recent acquisitions like TwistLock and Aporeto are extending public cloud security capabilities. This information will help you expand prevention capabilities through enhanced analysis, automation and operational efficiencies; we'll cover topics including achieving compliance, improving threat detection and response, and addressing mobile security considerations, then leave time for audience Q&A.

9:45 a.m. - 9:55 a.m. Break

9:55 a.m. - 10:25 a.m. Breakout Sessions

Orchestration and Automation in the Trenches
Customer stories from day to day usage of Demisto to implement automation in a real world environment.

10:25 a.m. - 10:35 a.m. Break

10:35 a.m. - 11:20 a.m. Breakout Sessions

Enabling a More Simplified NGFW Cloud Deployment

Aviatrix
Deploying any next-generation firewall in a public cloud environment is challenging, not because of the firewall itself but because of the public cloud networking services that practitioners must use. The job of understanding and problem-solving around cloud networking complexities to ensure a successfully configured and maintained firewall deployment is no small task. It’s a task that is definitely possible — though difficult — and it comes with performance, scale, and visibility tradeoffs that need to be considered closely. Through intelligent orchestration and control service, it's possible to simplify the deployment of Palo Alto Networks VM-Series Firewalls and eliminate those tradeoffs.

Detecting Targeted Attacks with Machine Learning

Palo Alto Networks
Examine advanced attacks and how Machine Learning is productized to help the human in the machine fight.

11:20 a.m. - 11:30 a.m.  Break

11:30 a.m. - 12:15 p.m.  Breakout Sessions

Protect Your Keys or Don’t Waste Your Time Encrypting Your Data

nCipher

For over 2000 years, governments, armies, businesses and lovers have been encrypting messages. For the same amount of time, the keys used to perform the encryption have been the weakest link in the chain. After 2000 years, technology has advanced such that the keys can be protected but many companies don’t understand how important it really is. Mr. Beutlich will explain in an entertaining (and sometimes graphic) fashion why protecting the encryption key is more important than the encryption itself.

Developing a Secure Edge Design (SASE)

Palo Alto Networks
Learn how to bring together CASB, SD-WAN, DLP and Security as a Service to protect your organization no matter where its people or data reside.

12:15 p.m. - 1:15 p.m.  Lunch with Partners

1:15 p.m. - 2:00 p.m. MineMeld, What's Next

Nexum
In this 45-minute talk we will be presenting the steps necessary to build a MineMeld server through the creation of the first Miner-aggregator-output workflow. Participants leave with the information necessary to start their journey using MineMeld as a tool to reduce their attack surface.

Driving Software Quality in Critical Infrastructure Systems

Arista

2:00 p.m. - 2:10 p.m. Break

2:10 p.m. - 2:55 p.m. Breakout Sessions

From Security Bottleneck to Business Enabler with Automation

Firemon

Next Generation Firewall Masterclass Intro

Palo Alto Networks
We will review some more advanced use cases and custom signatures to gain additional visibility, identify vulnerable web applications, set up "Homenets" for local networks, determine which threat feeds are the most valuable and create a "canary in the coal mine" to determine if data exfiltration is occurring.

3:00 p.m. - 3:50 p.m. Threat Landscape and the State of the SoC

Palo Alto Networks
A look at current threat trends and how the SoC needs to evolve to stay ahead.

3:50 p.m. - 4:00 p.m.  Closing Comments


*subject to change.

Diamond

Platinum

firemon.png

logo-aviatrix.png

Gold

Nexum Logo.png

Arista Logo - Blue Logo - White Background - Large.jpg

Indeni_2017_Logo_Web.png

Silver

elastic-logo-h-full-color-5do6e.png

nCipher-EDC-logo-rgb.png

algo2.png

Trustwave_logo_Color.png