Spark User Summit Houston

December 8, 2016 | The Westin Houston, Memorial City 

PAN_SPARK_LOGO.png
Join Fuel at Spark User Summit Houston where you’ll meet fellow Palo Alto Networks users in the Houston area and exclusively hear the latest updates and threat research from Palo Alto Networks. 

Spark Houston will feature sessions to enhance your skills, including hands-on workshops and collaborative sessions so you will be able to take home actionable solutions and strategies for key security issues. 

Breakfast, lunch and all education sessions are provided free of charge. Get out of the office to invest in growing your network and security skills! 

Spark User Summit Houston

The Westin Houston
945 Gessner Road
Houston, TX 77024

 Click here to download the agenda. 

 Download the migration tool. 

 

Schedule at a Glance

Click on the session title to view details. 


9:45 a.m. - 10:30 a.m.
Anatomy of Modern Advance Threats and Mitigation Techniques

Zoltan Deak, Palo Alto Networks

Start your morning with an overview of the current state of threat prevention technologies, and then dig into how cyber security professionals are "weaponizing" their threat intelligence to stop attacks in their tracks

10:30 a.m. - 10:35 a.m.
Break

10:35 a.m. - 11:20 a.m.

Breakout Sessions

Migration to Palo Alto Networks Migration Tool Hands-on Lab, Part 1

Chad Raggio, Palo Alto Networks

Bring your laptop and plug in for an in-depth look at best practices for migrating your current policies to utilize your next-generation firewall to the fullest. The Palo Alto Networks Migration tool 3.0 is a new release that helps automate and accelerate the migration from third-party firewall vendors to Palo Alto Networks next-generation firewalls, as well as the migration from port-based security policies to an application-based approach with App-ID. This hands-on session will train you to utilize the many capabilities of this new tool as we demonstrate a migration from a Cisco ASA environment to a Palo Alto Networks next-generation firewall. We'll demonstrate how you can get the most value from your next-generation firewall while reducing your attack surface, and regaining visibility and control over your organization through the use of App-ID. Prerequisites: Familiarity with firewalls and their configuration in general. Bring VMPlayer 6 or higher, workstation, or Fusion. Palo Alto Networks will provide a copy of the migration tool and a Cisco sample configuration to migrate during the session.

Customer Case Studies - Next-Generation Security Platform across Multiple Industries

Jason Cross, Marathon Oil, Martinien Betwa, RR Donnelly, Angelica Benavides, Workforce Solutions Capital Area

Join us for an inside look at how Fuel's members are using the Next-Generation Firewall, as well as some of the Palo Alto Networks subscription offerings to secure and defend their organizations. From the decision to migrate to Palo Alto Networks, through the lessons learned and the changes to their cybersecurity strategy, this session will give you a chance to consider how other organizations are centralizing and standardizing security infrastructure, gaining network visibility, and moving towards user- and data-oriented policy management.

11:20 a.m - 11:25 a.m.
Break

11:25 a.m - 12:10 p.m.

Breakout Sessions

Preventing and Hunting Threats with Traps and AutoFocus

David Falcon, Palo Alto Networks

Cyber attackers have become highly automated, delivering increasingly sophisticated attacks in higher volume than ever before and traditional anti-virus can no longer stop today’s threats. Learn how Trap advanced endpoint protection is the only product offering that replaces AV with “multi-method prevention.” Also, experience first-hand how you can devote your limited time hunting for the small number of truly advanced, targeted attacks using AutoFocus.

Cyber Security Strategies over Software Defined WAN (SD-WAN)

Paul Kohler, Viptela

Hybrid networking architectures are a foundation for IT transformation projects. As a result, more applications are now moving to the Cloud with a majority of the enterprise traffic heading to the Internet. This session will help you understand the impact of such drastic changes for both application and infrastructure elements. We'll discuss a comprehensive approach to understanding the vulnerabilities within the hybrid infrastructure. Additionally, we will outline some strategies to mitigate these vulnerabilities. .

12:10 p.m. - 1:15 p.m.
Lunch with Partners & Networking Activity

1:15 p.m - 2:00 p.m.

Breakout Sessions

Become a Threat Intelligence Expert - Correlation, Analytics and Remediation Hands-on Lab Part 1

Dan Geisler, LogRhythm

During this hands-on workshop, you will have the opportunity to design security policies in a live environment, learn techniques to gain better visibility to potential cyber activity and detect, block and respond to cyber threats. This will include “how to” instruction on: • Investigating compromised user accounts • Researching security events and advanced persistent threats in a SIEM (security information and event management) environment • Automating immediate response to cyber incidents to reduce the risk of experiencing a material breach

Beat Ransomware with Traps

Alon Levin, Palo Alto Networks

The session revolves around the most noticeable malware vector in the last few years. The session describes the ransomware business, from creation, distribution and actual infection. We will focus on Traps as the endpoint solution to prevent ransomware infection as part of the Palo Alto Networks Security Platform. This includes the best practices – default Traps policies and content updates, as well as advanced security rules reducing the attack surface.

2:00 p.m. - 2:05 p.m.
Break

2:05 p.m - 2:50 p.m.

Breakout Sessions

Become a Threat Intelligence Expert - Correlation, Analytics and Remediation Hands-on Lab Part 2

Dan Geisler, LogRhythm

During this hands-on workshop, you will have the opportunity to design security policies in a live environment, learn techniques to gain better visibility to potential cyber activity and detect, block and respond to cyber threats. This will include “how to” instruction on: • Investigating compromised user accounts • Researching security events and advanced persistent threats in a SIEM (security information and event management) environment • Automating immediate response to cyber incidents to reduce the risk of experiencing a material breach

The Security of Infrastructure - ICS/SCADA Customer Panel

Our panelists will engage in a best practices “lightning round” where they will each help to define the major challenges facing ICS/SCADA professionals, and how they are addressing these issues. Audience members will also be encouraged to share their stories and questions. Even if you're not an ICS professional, you'll gain valuable insight and ideas for protecting your organization.

2:50 p.m. - 3:00 p.m.
Closing Comments

Thank You to Our Partners

Diamond

pan-logo-badge-green-dark-kick-up.jpg

 

Platinum

 

aruba.jpg

Gold

logrhythm.png

Logo Viptela MASTER.png