Spark User Summit New York: February 12

February 12, 2019 | AMA Executive Conference Center


Spark New York featured opportunities to network with fellow Palo Alto Networks users in the Greater New York area and hear the latest updates and threat research from Palo Alto Networks. 

At Spark New York, there were sessions to enhance your skills, including hands-on workshops and collaborative sessions so you will be able to take home actionable solutions and strategies for key security issues.


Spark User Summit New York


AMA Executive Conference Center
1601 Broadway
New York, NY 10019

Fuel with Friends!

Fuel events are all about connecting and collaborating with your cybersecurity peers. Invite a colleague to register online for Spark New York and have them enter your name in the "Referred By" registration field. If you and your friend both attend Spark New York on February 12, you'll be entered to win a $50 Amazon gift card each! *

*The $50 Amazon Gift card is limited to two individuals. Must be present to win. Prize cannot be exchanged or redeemed for cash value.

Schedule at a Glance

9:00 a.m. - 9:15 a.m.  Opening Remarks

9:15 a.m. - 10:00 a.m.  XDR: A New Approach to Detection and Response
Enterprises rely on Endpoint Detection and Response (EDR) as a means to respond to cybersecurity incidents. As cybercriminals and their tactics have become more sophisticated, the time to identify and time to contain breaches has only increased. It is becoming increasingly apparent that EDR has failed, and that we need a new approach to detection and response. XDR allows you to rapidly detect and respond to threats across your enterprise, spanning your network, cloud and endpoints.

10:00 a.m. - 10:15 a.m.  Break

10:15 a.m. - 11:00 a.m.  Breakout Sessions

Investigating Real World Breaches with Fast and Accurate Incident Response at Unprecedented Scale
As a security analyst, you are facing a relentless number of alarms and increasing complexity, including finding evidence hidden like a needle in a haystack across your entire network. Join this session if you:

  • Would like to resolve your incident alerts quicker and more definitively, including multi-data center environments.
  • Would like to stay in your PAN Panorama workflow and have immediate access to packets that correlate to alerts.
  • Are overwhelmed by the sheer volume of alarms to investigate them all thoroughly. 
  • Would like to solve your hardest security breaches in a third of the time.
  • Are concerned that you don't have the forensic evidence to report to your management exactly what damage was done.

In this session, we will examine some real-world breach examples and learn about the intricacies of today’s threats.

Three Deadly Dragons in the Cloud and How to Slay Them
Dragon #1 - Legacy Silos Between IT Ops and Security teams
Dragon #2 - Security Bias on Infrastructure vs. Applications Insights
Dragon #3 - Security as a Department of Shame/Blame vs. a Shared Measure of Quality
In this session, we will review how to quickly identify these potential dragons (current or future) and review how others have slain them to accelerate their migration to the cloud, break down traditional silos, integrated workflows (DevSecOps), and democratized security and compliance insights across the organization.

11:00 a.m. - 11:15 a.m.  Break

11:15 a.m. - 12:00 p.m.  Breakout Sessions

Seeing the Attacker's View: People Centric Protection
Today's security and compliance tools focus on safeguarding the perimeter. They help you manage endpoints and patch system vulnerabilities. But cybercriminals don’t target technical flaws. They target human weakness. To stop today’s advanced attacks, you need to focus on protecting your people. Join us for an overview of how to plan for people-centric security, including:

  • Understanding who is targeted and how
  • How to combat threats before they reach your users,
  • Resolving attacks (which are a matter of when, not if)

Optimizing the Firewall Ruleset
From the low hanging fruit of redundant rules, to in-depth traffic summaries, we will discuss why an optimized ruleset is important and the 5 steps you can take to keep your organization's firewalls running efficiently and securely.

12:00 p.m. - 1:00 p.m.  Lunch with Partners

1:00 p.m. - 2:15 p.m.  Are You AI Ready? The Future of Security Revealed
See how AI, machine learning and automation are transforming network security

We know securing your network needs to be simpler and more streamlined. So we’re innovating new ways for automation and analytics to save you time and improve your security. AI is everywhere; cybersecurity is no exception. Be the first to find out how our new machine learning-powered products are fundamentally changing the equation.

Join us for the live broadcast of the Palo Alto Networks digital event, to be followed by Q&A with experts from Palo Alto Networks.

2:15 p.m. - 2:30 p.m.  Break

2:30 p.m. - 3:15 p.m.  Unit 42 Presents: Today’s Threat Landscape
Hear Simon Conant, Unit 42's Senior Threat Intelligence Analyst, discuss the current threat landscape. Simon will highlight several campaigns and review advances in malware, ransomware, and cyber threats, that adversaries are using to breach modern enterprise networks.

3:15 p.m. - 3:30 p.m.  Closing Comments: How to Leverage Fuel Community to Become an Expert
Spark is only one day, but Fuel User Group is available to you 365 days a year! Learn more about the year-round benefits of membership, how you can access our online activities, and how you can be a part of the local Fuel chapter.

*subject to change.




Recorded Future.jpg







Nexum Logo.png

VANDIS_RGB cropped.png