Spark User Summit Denver: January 18

January 18, 2018 | Sports Authority Field, Denver, CO
PAN_SPARK_Denver_Logo.jpg

At Spark User Summit Denver, attendees networked with fellow Palo Alto Networks users in the Greater Denver area, and heard the latest updates and threat research from Palo Alto Networks. 

Spark Denver featured sessions to enhance your skills, hands-on workshops and collaborative sessions. 

Spark User Summit Denver

Sports Authority Field
1701 Bryant St.
Denver, CO 80204

 

Schedule at a Glance

9:15 a.m. - 9:30 a.m. Welcome and Opening Remarks

9:30 a.m. - 10:30 a.m. Opening Keynote

Disrupting How Cybersecurity is Consumed

The signs that the security market is ready for disruption are here. Join us to learn more about how the security market is evolving, maturing and ultimately, ready for disruption.

10:30 a.m. - 10:45 a.m. Break

10:45 a.m. - 11:30 a.m. Group Session

Deploying Palo Alto Networks in the Public Cloud - A Technical Deep Dive
Defined as a ready-made compute, networking, and storage environment, the public cloud brings ubiquitous access to users, rapid scalability to address workload “bursts,” and infrastructure consistency. Learn how ensuring your applications and data are kept safe from attackers is your responsibility. We'll then cover how tools like application enablement policies can protect you against known and unknown threats.

11:30 a.m. - 11:40 a.m. Break

11:40 a.m. - 12:25 p.m. Networking Activity 

Shared Experiences: Networking Activity
All attendees are encouraged to participate in our small group dialogue sessions, which will focus on topics selected by our attendees. In a small group setting, users will share ideas and best practices on topics including: Breaking Threats, Cloud, Endpoint & Network Security, Emerging Mobile Considerations and Analytics. This is a great way to connect with other local users.

12:25 p.m. - 1:25 p.m. Lunch with Partners

1:25 p.m. - 2:10 p.m. Breakout Sessions

Under Lock, Key and Biometrics: Preventing Credential Theft
By now, you are familiar with all the ways that users try to avoid, circumvent or bypass your security protections. This leaves you not only vulnerable to attacks, but can compromise your ability to meet security and compliance requirements. How can you enhance your defenses with identity management without making for your users to move at the speed of business?

Join Roger Renecke, Sales Engineer at Okta, as he details the reasons most organizations fail to successfully implement multi-factor authentication, how to address these challenges through better integrations and new authentication factor options, how to get users bought into your plans (or make it impossible for them to avoid). This session will conclude with a plan for what you can do to optimize credential protection in PAN-OS 8.0. Roger will share stories from Okta’s customers on how having a successful MFA strategy has impacted their organizations. Bring your questions!

An Introduction to Palo Alto Networks Logging Service
Network security log analysis is an important cybersecurity practice that organizations perform to correlate potential threats and prevent successful cyber breaches. Managing logs from various security services, such as next-generation firewalls and cloud services, takes effort and resources. Palo Alto Networks Logging Service introduces a simpler approach, managing valuable security logs while enabling innovative security applications in concert with Palo Alto Networks Application Framework.

If you have wanted to get a more detailed look at how the Logging Service works but haven't had time, or you have questions about how it would work in your environment, this will be a great session for you!

2:10 p.m. - 2:15 p.m. Break

2:15 p.m. - 3:00 p.m. Breakout Sessions

Nowhere to Hide: How Automating Threat Detection Gives You the High Ground
Many organizations are currently struggling to manage the number of alerts they are receiving from their known networks and devices, but you can't address the threat you don't know about. If you're still managing and mitigating threats manually, you're giving your organizations' enemies too many opportunities to find and exploit blind spots and gaps before you can address them. Join Kelly Brazil, Vice President of Systems Engineers at ProtectWise, to learn where and why you should be utilizing automated threat intelligence, what the impact is of automation by looking at real world examples, and how to expand your visibility beyond your organization and into the cloud. Get ready to give your organization the advantage in the fight to protect your organization!

Fuel Fireside Chats - From Disruption to Innovation
A small group of Fuel members will share their stories and detail how they took potential moments of disruption and changed them into opportunities to develop a stronger cybersecurity posture. If you want to learn more about how other users are adapting to the impact of public cloud, developing threat mitigation strategies, and getting better and faster insight from their data, this is a can't miss session.

3:00 p.m. - 3:10 p.m. Closing Comments


*subject to change.

Thank You to Our Partners

Diamond

Gold

Protectwise.jpg

Okta_Logo_BrightBlue_Medium.png