Spark User Summit Atlanta: June 14

June 14, 2018 | Wyndham Atlanta Galleria, Atlanta GA

Spark User Summit Atlanta

At Spark User Summit Atlanta, attendees networked with fellow Palo Alto Networks users in the Greater Atlanta area, and heard the latest updates and threat research from Palo Alto Networks. 

Spark Atlanta featured sessions to enhance your skills, hands-on workshops and collaborative sessions. 

Spark User Summit Atlanta

Wyndham Atlanta Galleria 
6345 Powers Ferry Rd NW
Atlanta, GA 30339

Schedule at a Glance

9:15 a.m. - 9:30 a.m. Welcome and Opening Remarks

9:30 a.m. - 10:30 a.m. Opening Keynote

Breakthroughs at Palo Alto Networks 
Speaker: Tim Treat, Palo Alto Networks
One of the benefits of Fuel membership is early access to the latest developments from Palo Alto Networks. This session will discuss product updates and releases, including Traps, PAN-OS 8.1, and recent acquisitions that will help you expand prevention capabilities through enhanced analysis, automation and operational efficiencies. We'll cover topics including response time reduction, automated correlation of threats, and streamlined policy management, then leave time for audience Q&A. 
Download Presentation
Sponsored by: pan-logo-badge-green-dark-kick-up.jpg

10:30 a.m. - 10:40 a.m. Break

10:40 a.m. - 11:25 a.m. Networking Activity 

Shared Experiences
All attendees are encouraged to participate in our small group dialogue sessions, which will focus on topics selected by our attendees. In a small group setting, users will share ideas and best practices on topics including: Breaking Threats, Cloud, Endpoint & Network Security, Emerging Mobile Considerations and Analytics. This is a great way to connect with other local users.

11:25 a.m. - 11:35 a.m. Break

11:35 a.m. - 12:20 p.m. Session

Deploying Palo Alto Networks in the Public Cloud - A Technical Deep Dive
Speaker: Patrick Glynn, Palo Alto Networks
Defined as a ready-made compute, networking, and storage environment, the public cloud brings ubiquitous access to users, rapid scalability to address workload “bursts,” and infrastructure consistency. Learn how ensuring your applications and data are kept safe from attackers is your responsibility. We'll then cover how tools like application enablement policies can protect you against known and unknown threats.
Sponsored by: pan-logo-badge-green-dark-kick-up.jpg

12:20 p.m. - 1:20 p.m. Lunch with Partners

1:20 p.m. - 2:05 p.m. Breakout Sessions

Tracking Down all the Variables
Speaker: Taylor Mahany, Layer 3 Communications
Rapidly responding to potential threats is top of mind for all security professionals, but turning your mountains of data into actionable changes and responses requires you to bring together a large number of disparate data sources. Rather than relying on manual synthesis and response, a SIEM system helps organizations, read, react and respond to threat intelligence across all layers of infrastructure. Join us for a review of the key features of SIEM systems, how they are used by real-world organizations to identify and mitigate threats, and what your organization needs to plan for when considering a SIEM solution.
Sponsored by: L3Logochk.png

Traps - Everything You Need to Know, and Then Some
Speaker: Tim Treat, Palo Alto Networks
Join our Palo Alto Networks expert speaker for a review of what's new in advanced endpoint protection, including new features, how Traps works with your existing Palo Alto Networks deployment, and how you can prepare to implement a better endpoint protection strategy.
Sponsored bypan-logo-badge-green-dark-kick-up.jpg

2:15 p.m. - 3:00 p.m. Breakout Sessions

Segmentation for Seamless Security Integration
Speaker: Clint Perry, Arista
Data centers have increasingly virtualized and partitioned becoming more dynamic while accommodating on the fly deployment of new applications within shared private, public and hybrid clouds, but old security policy structures aren't as adaptable. Today's hybridized environments need a flexible approach to deploying security that adapts to constant workload changes with flexibility and scalability. Learn more about how network segmentation techniques improve security at all levels:

  • Adjust automatically for specific workloads and workflows across any network topology, including layer-2, layer-3 and overlay network virtualization frameworks
  • Securing inter-VM traffic based on application, workloads or other tags
  • How to address non-virtualized workloads

Sponsored by: Arista Logo - Blue Logo - White Background - Large.jpg

Continuous Security for the Hybrid Enterprise

Speaker: Ricardo Fierro, FireMon
Networks are expanding in all directions, transforming with varying segmentation, and changing their taxonomy with transient and fresh computing models: cloud, virtual, IoT, containers, etc. Security must be continuous because it must travel with the enterprise, forward in time and evolve with the enterprise as the attack surface (space) changes. Additionally, organizations will continue to utilize traditional infrastructure as well as adopt the latest resources that serves their business goals. Continuous security must meet both the heritage network technologies and security challenges embedded in the latest computing models. The enterprise is hybrid. Security must be the same. Join this session to learn how you can prepare for the challenges that enterprises will face in this new and shifting landscape.
Sponsored by:  firemon.png

3:00 p.m. - 3:05 p.m. Closing Comments


*subject to change.

THANK YOU TO OUR PARTNERS

Diamond

Platinum

firemon.png

Gold

L3Logochk.png

Silver

Arista Logo - Blue Logo - White Background - Large.jpg

duoLogo.png

Armis.jpg