Spark User Summit Boston: December 15

December 15, 2017 | Showcase Live, Foxborough, MA

PAN_SPARK_Boston_Logo.jpg

Spark User Summit Boston brought together Palo Alto Network users in the Greater Boston area for a day of networking and learning.

Spark Boston included hands-on workshops and collaborative sessions with actionable strategies for key security issues. As well as an exclusive look at the latest in threat research from Palo Alto Networks.

Spark User Summit Boston

Showcase Live 
23 Patriot Place
Foxborough, MA 02035

Schedule at a Glance

9:00 a.m. - 9:15 a.m.  Welcome and Opening Remarks

9:15 a.m. - 10:15 a.m.  Win the War with Zero Trust

John Kindervag, Palo Alto Networks

Zero Trust is revolutionizing network security architecture: it is data and device-centric and designed to stop data breaches while protecting critical infrastructure. In this session, Zero Trust creator John Kindervag will discuss the concept of Zero Trust and explain why it is the world's only true cybersecurity strategy. Zero Trust has been both adopted and advocated by Google and its adoption encouraged by the United States House of Representatives as a result of their OPM data breach investigation.

Zero Trust is strategically resonant to the highest levels of the business, but also practically and tactically implementable using commercial off-the-shelf technologies. Because Zero Trust focuses on providing granular protection around sensitive assets, this architectural model - which designs the network from the inside out - is perfectly positioned to solve the security challenges of modern digital business. Zero Trust innovations add a layer of agility to modern networks that is impossible to achieve in traditional network design. This means that your network can respond to the speed of business. These 21st-century networks have been adopted by large enterprises and government entities around the world. John will explain how a Zero Trust Network Strategy will achieve tactical and operational goals that make security organizations a business enabler, not a business inhibitor.

10:15 a.m. - 10:25 a.m.  Break

10:25 a.m. - 11:10 a.m.  Breakout Sessions

How Organizations Can Gain Infrastructure Efficiency by Automating Their Network Operations
Ravi Zvi, BackBox

Most IT professionals have a long list of projects they’d like to work on and upgrades they’d like to make, if only they had the time. Instead, we spend most of our days dealing with urgent issues and addressing our ever-growing to-do list. But how much more could we get done if we managed to reserve some time for some of these “wish list” items? Even more pressing, what if these items are really mission-critical “must-haves”? In this session we’ll discuss:

  • Why infrastructure efficiency is a critical requirement, and why organizations should not postpone this process
  • How automation can drive change within an organization
  • The essential steps to follow for new and existing implementations of Next-Generation Firewalls, featuring real world examples and demonstrations
  • An open Q&A session where we’ll work through issues together and figure out how you can begin implementing important changes in your infrastructure

Striking Oil - A Glimpse into the OilRig Group's Operations
Robert Falcone, Palo Alto Networks

OilRig is a threat group conducting espionage operations primarily in the Middle East since May 2016. Throughout other attack campaigns, we have observed threat actors continue to develop and add new tools to their toolset in attempts to remain undetected and retain efficacy. In this instance, we were presented with a rare opportunity to be able to directly observe development activities from the OilRig group. In this presentation, we will discuss the specifics of the observed development activity, as well as the overall operations of the OilRig group over the last two years.

11:10 a.m. - 11:20 a.m.  Break

11:20 a.m. - 12:05 p.m.  Breakout Sessions

Enterprise Data Security for Today's Challenges
Si Brantley, Thales

This session will examine the threat to existing interconnected business environments, and highlight best practices for data security. The focus will be on the critical role of cryptographic key management as the foundation for the deployment and enforcement of robust system security policies. We'll then walk through a customer case study to illustrate how the integration of Palo Alto Networks Next Generation Firewall and Thales nShield hardware security modules (HSMs) improved overall data security.

Stump the SE - Questions from the Community
Palo Alto Networks Local Team

Join this session where a team of local Palo Alto Networks engineers and industry experts will answer your most pressing questions, and share the information they wish every user knew. As a special bonus, we'll have a live demonstration of real world examples of malware identification and prevention, and how you can use tools like WildFire and Traps to protect your organization.

12:05 p.m. - 12:15 p.m.  Break

12:15 p.m. - 12:30 p.m.  Shared Experiences: Networking Activity

All attendees are encouraged to participate in these small group dialogue sessions, which will focus on topics selected by previous Spark attendees. In a small group setting, users will share ideas and best practices on topics including: Breaking Threats, Cloud, Endpoint & Network Security, Emerging Mobile Considerations and Analytics. This is a great way to connect with other local users and learn from your peers.

12:30 p.m. - 1:30 p.m. Lunch with Partners

1:30 p.m. - 2:15 p.m.  Breakout Sessions

Palo Alto Networks Next-Generation Security Platform with VMware NSX - Part 1
Bhavin Shah, Scott Sweeney & Maria Teigeiro, VMware

How do you accelerate the deployment of business-critical applications without compromising security? How do you define dynamic security policies to protect against advanced threats while keeping pace with data center virtualization? VMware and Palo Alto Networks have partnered to deliver a solution that combines fast provisioning of network and security services with next-generation security in the data center. In this lab, learn how to deploy the Palo Alto Networks virtualized next-generation firewall VM-1000-HV with VMware NSX to secure VM to VM communications.

Deploying Palo Alto Networks in the Public Cloud - A Technical Deep Dive
Richard Schunk, Palo Alto Networks

Defined as a ready-made compute, networking, and storage environment, the public cloud brings ubiquitous access to users, rapid scalability to address workload “bursts,” and infrastructure consistency. Learn how ensuring your applications and data are kept safe from attackers is your responsibility. We'll then cover how tools like application enablement policies can protect you against known and unknown threats.

2:15 p.m. - 2:25 p.m.  Break

2:25 p.m. - 3:10 p.m.  Breakout Sessions

Palo Alto Networks Next-Generation Security Platform with VMware NSX - Part 2
Bhavin Shah, Scott Sweeney & Maria Teigeiro, VMware

How do you accelerate the deployment of business-critical applications without compromising security? How do you define dynamic security policies to protect against advanced threats while keeping pace with data center virtualization? VMware and Palo Alto Networks have partnered to deliver a solution that combines fast provisioning of network and security services with next-generation security in the data center. In this lab, learn how to deploy the Palo Alto Networks virtualized next-generation firewall VM-1000-HV with VMware NSX to secure VM to VM communications.

A Hacker, a CIO, and an Amazon Echo Walk Into A Bar - Why IoT Security Is No Joke
Nadir Izrael, Armis

Welcome to the perfect storm of security exposure of the new endpoint – “smart” devices inundating the Enterprise that are accessible, vulnerable, unpatchable and unprotected. This session will cover the kinds of threats that currently exist in the IoT landscape, best practices for protecting corporate networks from both internal and external devices, inside and outside the perimeter, as well as examples of how you can address this new attack landscape with an integrated security strategy.

3:10 p.m. - 3:30 p.m.   Closing Remarks & Ticket Distribution

3:30 p.m. - 5:15 p.m.  Star Wars: The Last Jedi™

*subject to change.

 

 

 

Thank You to Our Partners

Diamond

tufin logo.png

Platinum

Gold

Armis.jpg

BackBox BB_logos_final_tagline_blueBblueA.jpg

Silver

Thales_LOGO_RGB.jpg

firemon.png

logrhythm.png

Nexum Logo.png

Gigamon-Orange-Box-Logo.jpg