December 16, 2016 | Showcase Live, Foxborough MA
Spark User Summit Boston
23 Patriot Place
Foxborough, MA 02035
Download the Spark Boston agenda.
Schedule at a Glance
Click on the session title to view details.
8:00 a.m. - 8:45 a.m. Morning Coffee
8:45 a.m. - 9:00 a.m. Opening Remarks
9:00 a.m. - 10:00 a.m.
Unit 42 Story Time
Robert Falcone, Palo Alto Networks
This presentation will tell an interesting story of the recent resurfacing of Shamoon, which is a threat group that was involved in one of the most notorious and damaging cyber attacks in history.
10:00 a.m. - 10:10 a.m.
10:10 a.m. - 10:50 a.m.
All attendees are encouraged to participate in our small group dialogue sessions, which will focus on topics selected by our attendees. In a small group setting, users will share ideas and best practices on topics including: Breaking Threats, Cloud, Endpoint & Network Security, Emerging Mobile Considerations and Analytics.This is a great way to connect with other local users.
10:50 a.m - 11:00 a.m.
11:00 a.m - 12:00 p.m.
Will Howerton, Palo Alto Networks
This session will provide an overview of the Palo Alto Networks Next-Generation Firewall and using its enhanced features.
12:00 p.m. - 1:00 p.m.
Lunch with Partners
1:00 p.m - 2:00 p.m.
Palo Alto Networks Next-Generation Security Platform with VMware NSX**
VMware Lab Team
How do you accelerate the deployment of business-critical applications without compromising security? How do you define dynamic security policies to protect against advanced threats while keeping pace with data center virtualization? VMware and Palo Alto Networks have partnered to deliver a solution that combines fast provisioning of network and security services with next-generation security in the data center. In this lab, learn how to deploy the Palo Alto Networks virtualized next-generation firewall VM-1000-HV with VMware NSX to secure VM to VM communications.
**If you plan on attending this session, please bring your own personal laptop or iPad.
Enriched Threat Intelligence: Protection and Prevention Across the Enterprise
Salim Scafuto, Proofpoint
New forms of sophisticated cybersecurity threats continually emerge to target enterprises in new ways, utilizing multiple attack vectors. In this session, learn how to protect your organization from and gain intelligence on the sophisticated attacks targeting your people and data. Learn how an enriched blend of threat intelligence spanning network, endpoint, cloud, email, and social media platforms, can make the difference in your cybersecurity strategy.
2:00 p.m. - 2:10 p.m.
2:10 p.m - 3:10 p.m.
Become a Threat Intelligence Expert - Correlation, Analytics and Remediation Hands-on Lab
LogRhythm Lab Team
During this hands-on workshop, you will have the opportunity to design security policies in a live environment, learn techniques to gain better visibility to potential cyber activity and detect, block and respond to cyber threats. This will include “how to” instruction on: • Investigating compromised user accounts • Researching security events and advanced persistent threats in a SIEM (security information and event management) environment • Automating immediate response to cyber incidents to reduce the risk of experiencing a material breach
How Organizations Can Gain Infrastructure Efficiency by Automating Their Network Operations
Rafi Zvi, BackBox
Most IT professionals have a long list of projects they’d like to work on and upgrades they’d like to make, if only they had the time. Instead, we spend most of our days dealing with urgent issues and addressing our ever-growing to-do list. But how much more could we get done if we managed to reserve some time for some of these “wish list” items? Even more pressing, what if these items are really mission-critical “must-haves”? In this session we’ll discuss: • Why infrastructure efficiency is a critical requirement, and why organizations should not postpone this process. • How can automation drive change within an organization. • Understanding the essential steps to follow for new and existing implementations of Next-Generation Firewalls, featuring real world examples and demonstrations • An open Q&A session where we’ll work through issues together and figure out how you can begin implementing important changes in your infrastructure.
3:10 p.m. - 3:20 p.m.
3:20 p.m. - 3:30 p.m.
3:30 p.m. - 3:45 p.m.
Sponsored by VMware
You must receive your event ticket from a staff member before leaving Spark Summit Boston. Tickets will not be available at the theater.
Thank You to Our Partners