February 18, 2020
Check back soon for more information about Spark User Summit Cleveland. At Spark Cleveland, you’ll network with fellow Palo Alto Networks users in the Cleveland area and hear the latest updates and threat research from Palo Alto Networks.
Spark Cleveland will feature sessions to enhance your skills, including hands-on workshops and collaborative sessions so you will be able to take home actionable solutions and strategies for key security issues.
Lunch and education sessions are provided free of charge.
Corporate College East
4400 Richmond Rd
Warrensville Heights, OH 44128
SCHEDULE AT A GLANCE*
8:45 a.m. - 9:00 a.m. Welcome and Overview
9:00 a.m. - 9:45 a.m. Opening Keynote: Breakthroughs at Palo Alto Networks
One of the benefits of Fuel membership is early access to the latest developments from Palo Alto Networks. This session will discuss product updates and releases, including new features in PAN-OS, Prisma, Cortex, as well as an update on how recent acquisitions like TwistLock and Aporeto are extending public cloud security capabilities. This information will help you expand prevention capabilities through enhanced analysis, automation and operational efficiencies; we'll cover topics including achieving compliance, improving threat detection and response, and addressing mobile security considerations, then leave time for audience Q&A.
9:45 a.m. - 9:55 a.m. Break
9:55 a.m. - 10:40 a.m. Breakout Sessions
Enabling a More Simplified NGFW Cloud Deployment
Deploying any next-generation firewall in a public cloud environment is challenging, not because of the firewall itself but because of the public cloud networking services that practitioners must use. The job of understanding and problem-solving around cloud networking complexities to ensure a successfully configured and maintained firewall deployment is no small task. It’s a task that is definitely possible — though difficult — and it comes with performance, scale, and visibility tradeoffs that need to be considered closely. Through intelligent orchestration and control service, it's possible to simplify the deployment of Palo Alto Networks VM-Series Firewalls and eliminate those tradeoffs.
Cortex, Demisto and XDR: Oh My!
The recent acquisition of Demisto by Palo Alto Networks has a lot of users excited about the possibilities SOAR can provide their organization, but also confused about how Demisto and Cortex XDR fit together. In this session, we'll review the key features of each service, discuss how they work together, and what these services mean for your current Palo Alto Networks deployment. We'll cover ways to get better, faster response to incidents, how playbooks work, and how you can potentially save your organization some money!
10:40 a.m. - 10:50 a.m. Break
10:50 a.m. - 11:35 a.m. Breakout Sessions
Automate Everything: The Future of Security Automation
As the set of products needed to manage an organization's security becomes more and more diverse, a bigger skills gap continues to open. Teams can't hire or train fast enough to manage threats at a human speed anymore, which makes automation a critical consideration. In this session, we'll dig into the details of what you can do with your current resources to see your organization clearly, report more accurately, and react faster with less manual work.
Topics covered include:
- Validating your visibility and proactive health checks
- Identifying high-impact automation changes
- Leveraging your existing tools within the firewall and cloud platforms
- Making notifications actionable
Developing a Secure Edge Design (SASE)
Learn how to bring together CASB, SD-WAN, DLP and Security as a Service to protect your organization no matter where its people or data reside.
11:35 a.m. - 11:45 a.m. Break
11:45 a.m. - 12:15 p.m. Fast and Furious - An Expert Competition
Get ready for a little friendly competition as we put our experts on the spot! Help us choose the questions you want answered, then hear our panel debate and discuss their best ideas. The most successful solution is the one that gets your vote!
Topics may include:
- Centralized change management
- Safe feature enablement
- Choosing a public cloud
12:15 p.m. - 1:15 p.m. Lunch with Partners
1:15 p.m. - 2:00 p.m. Protect Your Keys or Don’t Waste Your Time Encrypting Your Data
For over 2000 years, governments, armies, businesses and lovers have been encrypting messages. For the same amount of time, the keys used to perform the encryption have been the weakest link in the chain. After 2000 years, technology has advanced such that the keys can be protected but many companies don’t understand how important it really is. Mr. Beutlich will explain in an entertaining (and sometimes graphic) fashion why protecting the encryption key is more important than the encryption itself.
2:00 p.m. - 2:10 p.m. Break
2:10 p.m. - 2:55 p.m. Next Generation Firewall Masterclass Intro
We will review some more advanced use cases and custom signatures to gain additional visibility, identify vulnerable web applications, set up "Homenets" for local networks, determine which threat feeds are the most valuable and create a "canary in the coal mine" to determine if data exfiltration is occurring.
2:55p.m. - 3:00 p.m. Break
3:00 p.m. - 3:50 p.m. Today's Threat Landscape
Hear the Unit 42 team discuss the current threat landscape. Simon will highlight several campaigns and review advances in malware, ransomware, and cyber threats, that adversaries are using to breach modern enterprise networks.
3:50 p.m. - 4:00 p.m. Closing Comments: How to Leverage the Fuel Community to Become an Expert
*subject to change.