March 4, 2020
Check back soon for more information about Spark User Summit Washington, D.C. At Spark Washington, D.C., you’ll network with fellow Palo Alto Networks users in the Washington, D.C., area and hear the latest updates and threat research from Palo Alto Networks.
Spark Washington, D.C., will feature sessions to enhance your skills, including hands-on workshops and collaborative sessions so you will be able to take home actionable solutions and strategies for key security issues.
Lunch and education sessions are provided free of charge.
UVA Darden Sands Family Grounds
1100 Wilson Blvd
Arlington, VA 22209
SCHEDULE AT A GLANCE*
8:45 a.m. - 9:00 a.m. Welcome and Overview
9:00 a.m. - 9:45 a.m. Opening Keynote: Breakthroughs at Palo Alto Networks
One of the benefits of Fuel membership is early access to the latest developments from Palo Alto Networks. This session will discuss product updates and releases, including new features in PAN-OS, Prisma, Cortex, as well as an update on how recent acquisitions like TwistLock are extending public cloud security capabilities. This information will help you expand prevention capabilities through enhanced analysis, automation and operational efficiencies; we'll cover topics including achieving compliance, improving threat detection and response, and addressing mobile security considerations, then leave time for audience Q&A.
9:45 a.m. - 9:55 a.m. Break
9:55 a.m. - 10:40 a.m. Breakout Sessions
From Security Bottleneck to Business Enabler with Automation
Cortex, Demisto and XDR: Oh My!
The recent acquisition of Demisto by Palo Alto Networks has a lot of users excited about the possibilities SOAR can provide their organization, but also confused about how Demisto and Cortex XDR fit together. In this session, we'll review the key features of each service, discuss how they work together, and what these services mean for your current Palo Alto Networks deployment. We'll cover ways to get better, faster response to incidents, how playbooks work, and how you can potentially save your organization some money!
10:40 a.m. - 10:50 a.m. Break
10:50 a.m. - 11:35 a.m. Breakout Sessions
Enabling a More Simplified NGFW Cloud Deployment
Deploying any next generation firewall in a public cloud environment is challenging, not because of the firewall itself but because of the public cloud networking services that practitioners must use. The job of understanding and problem-solving around cloud networking complexities to ensure a successfully configured and maintained firewall deployment is no small task. It’s a task that is definitely possible — though difficult — and it comes with performance, scale, and visibility tradeoffs that need to be considered closely. Through intelligent orchestration and control service it's possible to simplify the deployment of Palo Alto Networks VM-Series Firewalls and eliminate those tradeoffs.
11:35 a.m. - 11:45 a.m. Break
11:45 a.m. - 12:15 p.m. Fast and Furious - An Expert Competition
Get ready for a little friendly competition as we put our experts on the spot! Help us choose the questions you want answered, then hear our panel debate and discuss their best ideas. The most successful solution is the one that gets your vote!
Topics may include:
- Centralized change management
- Safe feature enablement
- Choosing a public cloud
12:15 p.m. - 1:15 p.m. Lunch with Partners
1:15 p.m. - 2:00 p.m. Breakout Sessions
Automate Everything: The Future of Security Automation
As the set of products needed to manage an organization's security becomes more and more diverse, a bigger skills gap continues to open. Teams can't hire or train fast enough to manage threats at a human speed anymore, which makes automation a critical consideration. In this session, we'll dig into the details of what you can do with your current resources to see your organization clearly, report more accurately, and react faster with less manual work.
Topics covered include:
- Validating your visibility and proactive health checks
- Identifying high-impact automation changes
- Leveraging your existing tools within the firewall and cloud platforms
- Making notifications actionable
Protect Your Keys or Don’t Waste Your Time Encrypting Your Data
For over 2000 years, governments, armies, businesses and lovers have been encrypting messages. For the same amount of time, the keys used to perform the encryption have been the weakest link in the chain. After 2000 years, technology has advanced such that the keys can be protected but many companies don’t understand how important it really is. Mr. Beutlich will explain in an entertaining (and sometimes graphic) fashion why protecting the encryption key is more important than the encryption itself.
2:00 p.m. - 2:10 p.m. Break
2:10 p.m. - 2:55 p.m. Today's Threat Landscape
Hear the Unit 42 team discuss the current threat landscape. Simon will highlight several campaigns and review advances in malware, ransomware, and cyber threats, that adversaries are using to breach modern enterprise networks.
2:55p.m. - 3:00 p.m. Closing Comments
*subject to change.