April 17, 2018 | Pantages Hotel
At Spark User Summit Toronto, attendees networked with fellow Palo Alto Networks users in the Greater Toronto area, and heard updates and threat research from Palo Alto Networks.
Spark Toronto featured sessions to enhance your skills, hands-on workshops and collaborative sessions.
Spark User Summit Toronto
200 Victoria St.
Toronto, ON M5B 1V8, Canada
Schedule at a Glance
9:15 a.m. - 9:30 a.m. Welcome and Opening Remarks
9:30 a.m. - 10:30 a.m. Opening Keynote
Disrupting How Cybersecurity is Consumed
The signs that the security market is ready for disruption are here. Join us to learn more about how the security market is evolving, maturing and ultimately, ready for disruption.
10:30 a.m. - 10:45 a.m. Break
10:45 a.m. - 11:30 a.m. Breakout Sessions
How to Avoid "Bring Your Own Disaster" with Strong Mobile Device Management
Do you remember the idea of being able to manage your life on something you could fit in your pocket? Your co-workers don’t, and they expect to have the same level of access to their personal and professional accounts and activities, and it can be difficult to convince them otherwise. If you have to support users and guests across multiple devices, it’s important to understand exactly how mobile devices threaten your security, and learn what you can do to lock them down. In this session, we’ll review the top five threats posed to organizations by mobile devices, talk about the potential challenges in ensuring a seamless protection policy that doesn’t slow down business and share some examples of how organizations have faced these challenges head-on. In particular, we’ll focus on the importance of integrating user and application-based permissions with wifi access, and how to identify these devices for Panorama reporting.
Deploying Palo Alto Networks in the Public Cloud - A Technical Deep Dive
Defined as a ready-made compute, networking, and storage environment, the public cloud brings ubiquitous access to users, rapid scalability to address workload “bursts,” and infrastructure consistency. Learn how ensuring your applications and data are kept safe from attackers is your responsibility. We'll then cover how tools like application enablement policies can protect you against known and unknown threats.
11:30 a.m. - 11:40 a.m. Break
11:40 a.m. - 12:25 p.m. Networking Activity
Shared Experiences: Networking Activity
All attendees are encouraged to participate in our small group dialogue sessions, which will focus on topics selected by our attendees. In a small group setting, users will share ideas and best practices on topics including: Breaking Threats, Cloud, Endpoint & Network Security, Emerging Mobile Considerations and Analytics. This is a great way to connect with other local users.
12:25 p.m. - 1:25 p.m. Lunch with Partners
1:25 p.m. - 2:10 p.m. Breakout Sessions
How to Organizations Can Gain Infrastructure Efficiency by Automating Their Network Operations
Most IT professionals have a long list of projects they’d like to work on and upgrades they’d like to make, if only they had the time. Instead, we spend most of our days dealing with urgent issues and addressing our ever-growing to-do list. But how much more could we get done if we managed to reserve some time for some of these “wish list” items? Even more pressing, what if these items are really mission-critical “must-haves”? In this session we’ll discuss:
- Why infrastructure efficiency is a critical requirement, and why organizations should not postpone this process
- How automation can drive change within an organization
- The essential steps to follow for new and existing implementations of Next-Generation Firewalls, featuring real world examples and demonstrations
- An open Q&A session where we’ll work through issues together and figure out how you can begin implementing important changes in your infrastructure
Progressive Protections: Security Iterations at SLC
Join us for a great case study on how St. Lawrence College is utilizing Palo Alto Networks products and services. They'll cover their progress to-date and planned activities.
2:10 p.m. - 2:15 p.m. Break
2:15 p.m. - 3:00 p.m. Breakout Sessions
Continuous Security for the Hybrid Enterprise
Networks are expanding in all directions, transforming with varying segmentation, and changing their taxonomy with transient and fresh computing models: cloud, virtual, IoT, containers, etc. Security must be continuous because it must travel with the enterprise, forward in time and evolve with the enterprise as the attack surface (space) changes. Additionally, organizations will continue to utilize traditional infrastructure as well as adopt the latest resources that serves their business goals. Continuous security must meet both the heritage network technologies and security challenges embedded in the latest computing models. The enterprise is hybrid. Security must be the same. Join this session to learn how you can prepare for the challenges that enterprises will face in this new and shifting landscape.
An Introduction to Palo Alto Networks Logging Service
Network security log analysis is an important cybersecurity practice that organizations perform to correlate potential threats and prevent successful cyber breaches. Managing logs from various security services, such as next-generation firewalls and cloud services, takes effort and resources. Palo Alto Networks Logging Service introduces a simpler approach, managing valuable security logs while enabling innovative security applications in concert with Palo Alto Networks Application Framework.
If you have wanted to get a more detailed look at how the Logging Service works but haven't had time, or you have questions about how it would work in your environment, this will be a great session for you!
3:00 p.m. - 3:10 p.m. Closing Comments
*subject to change.
Thank You to Our Partners