Spark User Summit Sacramento: September 24

September 24, 2019 | Sheraton Grand Sacramento Hotel


At Spark Sacramento, attendees had the opportunity to network with fellow Palo Alto Networks users in the Sacramento area and hear the latest updates and threat research from Palo Alto Networks. 

Spark Sacramento featured sessions to enhance your skills, including hands-on workshops and collaborative sessions with actionable solutions and strategies for key security issues. 

Spark User Summit Sacramento 

Sheraton Grand Sacramento Hotel
1230 J St.
Sacramento, CA 95814 USA


8:45 a.m. - 9:00 a.m.  Welcome and Overview

9:00 a.m. - 9:45 a.m.  Opening Keynote: Breakthroughs at Palo Alto Networks
Palo Alto Networks

One of the benefits of Fuel membership is early access to the latest developments from Palo Alto Networks. This session will discuss product updates and releases, including new features in PAN-OS, Prisma, Cortex, as well as an update on how recent acquisitions like TwistLock are extending public cloud security capabilities. This information will help you expand prevention capabilities through enhanced analysis, automation and operational efficiencies. We'll cover topics including achieving compliance, improving threat detection and response, and addressing mobile security considerations, then leave time for audience Q&A.

9:45 a.m. - 9:55 a.m.  Break

9:55 a.m. - 10:40 a.m.  Breakout Sessions

Breakout 1: Optimizing the Firewall Ruleset

From the low hanging fruit of redundant rules to in-depth traffic summaries, we will discuss why an optimized ruleset is important and the five steps you can take to keep your organization's firewalls running efficiently and securely.

Breakout 2: Protect Your Keys or Don’t Waste Your Time Encrypting Your Data

For over 2000 years, governments, armies, businesses and lovers have been encrypting messages. For the same amount of time, the keys used to perform the encryption have been the weakest link in the chain. After 2000 years, technology has advanced such that the keys can be protected but many companies don’t understand how important it really is. Mr. Beutlich will explain in an entertaining (and sometimes graphic) fashion why protecting the encryption key is more important than the encryption itself. 

10:40 a.m. - 10:50 a.m.  Break

10:50 a.m. - 11:35 a.m.  Breakout Sessions

Breakout 1: Automate Everything: The Future of Security Automation

As the set of products needed to manage an organization's security becomes more and more diverse, a bigger skills gap continues to open. Teams can't hire or train fast enough to manage threats at a human speed anymore, which makes automation a critical consideration. In this session, we'll dig into the details of what you can do with your current resources to see your organization clearly, report more accurately, and react faster with less manual work.

Topics covered include:

  • Validating your visibility and proactive health checks
  • Identifying high-impact automation changes
  • Leveraging your existing tools within the firewall and cloud platforms
  • Making notifications actionable

Breakout 2: Zingbox and Palo Alto Networks – the Next Step in IoT Security

The newest protection service from Palo Alto Networks joins us in Sacramento to share information on IoT security problems commonly seen in the enterprise, what IoT devices are more vulnerable, what types of attacks are common, and more.

11:35 a.m. - 11:45 a.m. Break 

11:45 a.m. - 12:15 p.m.  Fast and Furious - An Expert Competition 

Get ready for a little friendly competition as we put our experts on the spot! Help us choose the questions you want answered, then hear our panel debate and discuss their best ideas. The most successful solution is the one that gets your vote!

Topics may include:

  • Centralized change management
  • Safe feature enablement
  • Choosing a public cloud

12:15 p.m. - 1:15 p.m.  Lunch with Partners

1:15 p.m. - 2:00 p.m.  Breakout Sessions

Breakout 1: Intelligent Automation – Join the Revolution

Join BackBox as we take a deep dive into intelligently automating the management and validation of your Palo Alto Networks device configurations, deep application monitoring as well as addressing the overwhelming task of upgrading these devices. Learn how implementing an Intelligent Automation solution will help to increase an organization’s operational efficiency, reliability and visibility while significantly reducing overall risk.

Breakout 2: A Threat Hunters Toolkit 
Palo Alto Networks

While many organizations focus on developing a solid defensive cybersecurity plan and then hope the walls hold, this strategy is inevitably going to fail. It's just as important to be proactive in your approach to threat management. Join us for an examination of why it's important to make threat hunting an organizational priority, how to get started and how to develop your methodology for a successful hunt.

2:00 p.m. - 2:10 p.m. Break

2:10 p.m. - 2:55 p.m. Today's Threat Landscape
Unit 42, Palo Alto Networks

Hear the Unit 42 team discuss the current threat landscape. Unit 42 will highlight several campaigns and review advances in malware, ransomware, and cyber threats, that adversaries are using to breach modern enterprise networks.

2:55 p.m. - 3:00 p.m.  Closing Comments: How to Leverage the Fuel Community to Become an Expert

Spark is only one day, but Fuel User Group is available to you 365 days a year! Learn more about the year-round benefits of membership, how you can access our online activities, and how you can be a part of the local Fuel chapter.

3:00 p.m. - 5:00 p.m. Networking Reception

*subject to change.





BackBox BB_logos_final_tagline_blueBblueA.jpg

ENS Logo NO tagline_MED_1000x374.png