Ignite 2016 Sessions  Download Agenda

Palo Alto Networks Ignite 2016 breakout session registration is now open!

Ignite registrants, click here to select your sessions.

*Agenda is subject to change

Breakout Sessions Sneak Peek!

Breakout Sessions are subject to change!

Please click on the track names below to take a sneak peek into our Ignite 2016 breakout sessions.

Cyber attacks take advantage of network resources and endpoint vulnerabilities in order to implement their attacks, evade detection and to persist despite efforts to shut them down. The tools used by the attacker include a malicious mix of exploits, targeting methods, and evasion techniques to support persistent, coordinated attacks. Hear all about the latest techniques used in real-world attacks and the cutting-edge research Palo Alto Networks researchers are developing to combat them. In this track you'll hear from experts on how to incorporate innovative threat-prevention techniques into a comprehensive cyber attack prevention strategy.

Breakouts:

4 Steps to an Intelligence-Led Security Program

Security programs that aren't driven from an intelligence platform are guessing. What's worse, anecdotal evidence in the media tells us they're guessing poorly. An intelligence-led approach to planning, building and running an enterprise security program promises to provide more accurate direction on budget, process, staffing and technology. But the problem is getting there from where you are. Using an insightful process adopted from studying successful intelligence-led enterprise security programs, this session will give a security leader the tools to effectively orient themselves and their security strategy to combat modern threats and serve the company mission effectively. The power of this process is in the simplicity and clarity it provides, and every new and seasoned security leader should try this out.

Heath Nieddu, Senior Research Analyst, Office of the CISO, Optiv Inc.
A Disruptive Endpoint Protection Ecosystem: How We Successfully Displaced Multiple Endpoint Security Agents with Traps

This session chronicles a customer journey deploying the Palo Alto Networks platform using Traps, Wildfire, and the next-gen firewalls. The session will provide a real-world example of how an organization removed four different endpoint security agents (including AV removal); decreasing costs while increasing security and employee satisfaction. Challenges including regulatory compliance, ROI analysis, and operational/deployment issues will be examined using this biotech customer case study.

Abe Smith, InfoSec Architect, Cepheid
Can You Achieve PCI Compliance in AWS

PCI compliance is a steep enough challenge, but what happens when your entire infrastructure is in AWS? Do the same concepts of segmentation and seperation apply, and if so how? This session will cover how a customer is using AWS and the VM-Series to maintain seperation of data and traffic for better security and PCI compliance.

Matt McLimans, Network Security Engineer, Warren Rogers Associates
Critical Infrastructure Security - Addressing IT-OT Integration and Regulatory Compliance in the Utilities Sector

Cybersecurity is an increasingly important factor in ensuring resiliency, reliability, and safety of the electricity system. In this session, learn what Southern California Edison is doing to secure critical electric infrastructure by incorporating innovative security technologies into our grid, developing a next-generation Smart Grid architecture, and actively engaging with government agencies to share information on threats and protection measures.

Phil Carey, IT Chief Architect, Operational Technology Integration, SCE’s Grid Modernization, Southern California Edison
George Williams, Systems Engineer, Palo Alto Networks
Cybersecurity Best Practices Part 1 - Preventing Opportunistic Attacks in 5 Easy Steps
Last year you voted with your attendance, making our threat prevention best practices session one of the most attended sessions at Ignite 2015. We listened… and  this year we’re providing you with a new 2-hour threat-packed session of real-life attacks in real time and the best practices to counter them. In part 1 Erik Yunghans executes live threats demonstrating the latest "spray-and-pray" techniques attackers are using to infect your enterprise, and how you can leverage your Next-Generation Security Platform to prevent them from compromising your organization, including advanced tips and tricks from John Harrison.
John Harrison, Sr. Product Manager, Palo Alto Networks
Erik Yunghans, Consulting Engineer, Palo Alto Networks
Cybersecurity Best Practices Part 2 -Preventing Targeted Attacks in 5 Easy Steps

Last year you voted with your attendance, making our threat prevention best practices session one of the most attended sessions at Ignite 2015. We listened… and  this year we’re providing you with a new 2-hour threat-packed session of real-life attacks in real time and the best practices to counter them. In part 2, Eric Yunghans executes live threats demonstrating the latest targeted attack techniques and how you can leverage your Palo Alto Networks Platform to outsmart them, including advanced tips and  tricks from John Harrison.

John Harrison, Sr. Product Manager, Palo Alto Networks
Erik Yunghans, Consulting Engineer, Palo Alto Networks
Endpoint Protection Beyond AV: Opportunities & Challenges

While many organizations have experimented with or deployed various "next generation" endpoint protection products, few have completely removed their anti-virus software. In this presentation we will explore a real world example of overhauling endpoint protection across the enterprise that involved decommissioning AV solutions, both servers and workstations, physical and virtual, on-premise and remote, with the up and downsides involved. We will examine ways to (bi-directionally) integrate multiple solutions, namely Traps, Carbon Black, Splunk, Palo Alto Networks NGFW, and other solutions to increase the overall resilience and effectiveness of endpoint protection.

Ody Lupescu, Head of Information Security & Compliance, Medivation
Taylor Merry, Senior Manager, Information Security, Medivation
Abdul Khan, Security Engineer, Medivation
From 0 to 60 - Threat Prevention in a Global Manufacturing Company

In recent years, the VELUX Group's approach to security has transitioned from a traditional point solution approach to an integrated next-generation security strategy heavily utilizing Palo Alto Networks technology. The journey has been fruitful but also included both concerns and doubt. During this presentation we will tell our story, explain what drove us to make the choices we made, talk about design, implementation, and operations and of course of why we find the whole journey a great success. ELUX is a global manufacturing and sales company with approximately 10,000 employees. The company is based out of Copenhagen, Denmark.

Henrick Lei, Head of Information Security, Velux
Thomas Anker Nielsen, Security Architect, Velux
Lasse Nielsen, Network Architect, Velux
How Malware Eats Cookies - An Empirical Study of Cookies in Malware Communication

HTTP Cookies are commonly used by websites to store user information while the user is browsing the website. As an efficient mechanism to store unique identity for each user, cookies play a fundamental role for user tracking, user authentication and anti-spoofing. While the cookies are so prevalent in normal http traffic, how about their use in underground traffic. Does the malicious server employ cookies to uniquely identify its evil peer? What is the concealing information between evil peers? In this presentation, we conduct an empirical study to answer the aforementioned questions. We study malware, the malicious entities that spawn millions of cookies every day, and their below-the-surface logic of using cookies. In particular, we monitor malware's running behaviors of generating cookies for their communication. With the reference of malware behaviors, we extract the potential encoding and decoding schemes for cookies and discover the underlying meaning of each malicious cookie. Based on that, we propose a set of effective heuristics and real-time detection approaches for identifying malicious traffic among high volume of live traffic. Our study is conducted on a dataset containing over 10,000 http sessions generated by confirmed malware samples. The evaluation shows our scheme can detect the malicious traffic among our test dataset with higher accuracy in comparison with traditional detection methods.

Zhaoyan Xu, Senior Research Engineer, Palo Alto Networks
Kyle Sanders, Director, Malware Research, Palo Alto Networks
Integration & Automation Key to Achieving Cyber Resilience

The volume and velocity of cyberattacks continues to increase. One driver of this is the ease with which attackers can architect and execute attacks leveraging automated capabilities. This has put pressure on many organizations' cyber defense efforts. These pressures are often exacerbated by a reliance on traditional security controls and scarce security resources (people, time, money). Leading security organizations are making moves to improve cyber defenses by not only deploying next-generation security controls but also by increasing their focus on security integration and the use of automation to be a force multiplier to cyber defense efforts.

Todd Weller, VP Corporate Development, Hexis Cyber Solutions
Steve Donald, Chief Technology Officer, Hexis Cyber Solutions
Tony Rowan, CTO, Exclusive Networks
The Need for Speed: Innovations in Threat Intelligence Protect Faster Than Ever Before
This one-hour, innovation-packed session will provide you with unique access to brand new features and enhancements to PAN-OS and our threat intelligence cloud that span WildFire, URL Filtering, Threat Prevention and AutoFocus. Get the information you need to immediately start using and benefiting from our accelerated threat intelligence and learn how it can help prevent the adversary from compromising your organization.
Taylor Ettema, Director Product Management, Palo Alto Networks
Colt Blackmore, Sr. Product Manager and Technical Lead, WildFire, Palo Alto Networks
Transform Threat Intelligence into Actionable Context

Attack vectors and detection methods are entangled in an ever-faster co-evolution. Determined criminals have access to defense tools and increasingly invest in methods to evade them. Defenders, on the other hand, do not yet take an equally proactive stance, which would require access to the latest attacker tools or – short thereof – a service to retrace the evolution of attack capabilities. This talk will show how driven by real world examples / attacks that are not detected in the first place drive to establish a self-organized vendor-agnostic eco-system raising the bar for attackers. Following our research we will also outline trends of the future importance of endpoint centric security. This renaissance of endpoint based security without old fashioned signature-based technologies will become a major effort for security teams to decide what is needed to stay ahead.

Dr. Andreas Rohr, CTO, DCSO - Deutsche Cyber-Sicherheitsorganisation
Traps for Critical Server Protection: A Customer Case Study from Amadeus

As the world leading service provider for travel and tourism, Amadeus has taken on a lot of responsibility. Part of this responsibility includes security and privacy for the travelers' personal data and financial information. Over quite some years Amadeus has successfully mastered these challenges. Recently, it became quite hard to keep up with the newest tricks of the attackers. In order to secure its infrastructure services even better, Amadeus has deployed the endpoint protection provided by Traps. This talk will firstly introduce you to Amadeus, its business and some of its security challenges. It will give some insights to the decision to look at Traps and how the proof-of-concept was prepared and performed. We will also cover design and setup details which are important for roll-out in the entire data center. The last part of the presentation will outline the next steps and plans for the future. Some lessons learned and things to be considered for other IT landscapes will close the talk.

Udo Seidel, Chief Architect and Digital Evangelist, Amadeus Data Processing

Are you fully utilizing your next-generation security platform? Palo Alto Networks Enterprise Security Platform is currently helping more than 19,000 organizations, including 75 of the Fortune 100, protect their most valuable assets from sophisticated cyber attacks. Many of the new technologies that we've brought to market are the direct result of input from you. In this next-generation security innovations track you'll learn about the latest features and products added to our platform, practical ways to address your latest security imperatives, and insights into what's coming on the horizon.

Breakouts:

Bring Order to Threat Intelligence Feeds with New Open Source Tool

More sources of threat intelligence exist than ever before, but organizations struggle to make use of this volume of threat data in practical ways. A new way to collect, aggregate, and surface high-value indicators across multiple sources is required—one that can also easily share new protections with peers and other security devices. With these challenges in mind, Palo Alto Networks developed an innovative open source tool, MineMeld. Early adopters of MineMeld have called it the “swiss army knife” of threat intelligence feeds, built on an incredibly flexible engine, and freely available to modify in true open source fashion. This session will introduce MineMeld, including an in-depth demo of how you can use the tool in your organization. Highlights include:

-Aggregating multiple feeds and determination of their efficacy
Consuming TAXII feeds
-Sharing high-value indicators with peer groups and partners
-Pushing new security controls to Palo Alto Networks devices, including IP addresses, URLs and domain names.
-Extending the functionality with an easy to use, flexible platform.

Luigi Mori, Solutions Architect, Palo Alto Networks
Marc Benoit, Vice President of Technical Business Development, Palo Alto Networks
Do Next-Generation Firewalls Add a New Generation of Challenges?

No one will argue that the threat landscape is constantly growing and evolving. Next-generation firewalls have advanced our defenses, but the industry still faces difficulties managing the existing generation of firewalls. So can we best prepare to manage this next-generation of defense?

Tim Woods, VP Customer Technology Services, FireMon
Efficient Security Management – Streamlining Your Network Operations Doesn’t Require a PhD!
Keep your firewalls running in top shape, minimize configuration clutter, reduce duplication of work, and streamline the UI experience. This wish list applies to managers of small and large security deployments, to managed service providers and retail businesses alike. If your security deployment is turning into an unmanageable monster, untangle the mess by organizing policies and objects and avoid duplications. See how best to harness the efficiency Panorama offers by providing features such as device group hierarchy, template stacking, tag browser and dynamic address groups. Learn how to enhance operational efficiencies through features such as importing configurations, moving and cloning rules, objects, templates.
Achieve operational Nirvana so great that even the auditor will be happy!!
Saurabh Pradhan, Sr. Product Manager, Palo Alto Networks
Victor Carpetto, Head of Enterprise Architecture, Take-Two Interactive Software Inc.
Evolving to Adaptive Security Intelligence

TIP is in its infancy. Just a year ago, Gartner analyst Anton Chuvakin lamented in his blog that he couldn't characterize the new category without breaching non-disclosure agreements. But he credited Facebook with breaking the TIP ice, characterizing the new genre of point solutions as comprising three high-level parts: threat feeds, big data analytics and real-time response. One area where TIP breaks new ground is its focus on community data sharing, and the concomitant requirement to ensure that threat indicators are standardized and exchangeable between various tools and systems. For example, many APT vendors can report information about indicators of compromise (IOC) but that data isn't easily used outside of the product generating the information. The TIP vendors are working to deepen the utility of threat data interchange. But TIP is not the best solution to knit together all data exchange across disparate point solutions and enable real-time response. If we take a look at the tools commonly deployed in the security ecosystem, we find firewalls, next-gen antivirus, spam filters, data loss prevention solutions, network access control (NAC) systems, disk encryption, etc. All of these systems perform specific functions that could be augmented if they could learn from other tools or share what they know with other tools. Continuous monitoring and mitigation systems are already positioned to enable all of these security components to talk to one another, expand where they can gather and exchange information and automate the response to threats, one of the key challenges facing IT security.

Robert McNutt, Director, Strategic Engineering, ForeScout Inc.
Guardrails for Rapidly Evolving Threats to Process Control Environments: Next-Generation Segementation

Process Control systems face threats so advanced that traditional segmentation of business and process control networks is insufficient. To prevent today's attacks, networks must be further segmented and secured from threats, users, and applications.

Justin Flynn, Sales Engineering Manager, Burwood Group
How to Deploy Application-Based Security Policies

A Palo Alto Networks Professional-Services led discussion of field-tested methodologies in deploying application-based security policies in production. Migrating a legacy firewall policy to Palo Alto Networks, but leaving it in layer-4 mode is not sufficient. This discussion goes through the recommended process of deploying next-generation policies with minimal risk or user-impact.

Mike Weber, Manager, Architecture, Palo Alto Networks
Internet Gateway Best Practices

Next-generation firewalls and threat intelligence have the power to secure the applications and users that run your business, but only if integrated and configured appropriately. In this session, learn "best practices" around configuring NGFW in Internet Gateway or perimeter deployments. In this session, you will learn: how to understand and assess relevant business risk, understand models of compromise from the Internet, best practices to reduce attack surface and block threats, best practices to identify the presence of attackers in your network, a pragmatic policy model for defining and refining security policies, the role of whitelisting, blacklisting, and positive enforcement, strategies for dealing with encrypted traffic, drill-down best practices for: Application and User-based enablement, URL Filtering, DNS, file transfer, vulnerability protection, C&C, and malware. This session will teach you how to take advantage of advanced next-generation capabilities, and more importantly why those advanced capabilities are critical to achieving a strong security posture in today's IT environments.

Tim Treat, Customer Success Architect, Palo Alto Networks
Junk Domains: It's What's for Dinner

Dr. Paul Vixie, an Internet pioneer and world-renowned DNS expert, will discuss how rampant domain name abuse is fueling cyberattacks and outline practical tools and steps security analysts can take to protect their organization. Vixie founded the first anti-spam and network reputation company (MAPS) in 1996, and later went on to invent DNS Response Rate Limiting (RRL) and DNS Response Policy Zones (RPZ), which are open technologies meant to protect DNS from us, and to protect us from DNS.

Paul Vixie, CEO, Farsight Security
Panorama Context-Based Visibility and Operational Effectiveness: Advanced ACC, Correlation Engine, and Management Best Practices
In this session one will learn how to navigate all of the advanced features of the Application Command Center (ACC) including customization, workflows, and other advanced features.  Additionally, there will be a deep dive into the correlation engine, what it is, and how it works. There will be detailed examples that will help one operationalize these tools in order to visualize, understand, and most importantly, protect the network.  Finally, there will be a set of management best practices that every administrator should be taking advantage of to improve their day-to-day interaction with the firewalls and Panorama.
Jamie Fitz-Gerald, Product Manager, Palo Alto Networks
Ramp Up Your Security Like A Boss

Healthcare security is tough; How do you lock down hospital PCs on the network without upsetting too many doctors? Join this session led by two Security Engineers from hospitals in the US for some "how tos" and creative ideas for using your NGFW to ramp up your security programs in complex networks, like a boss.

Dwight Hobbs, Security Services Engineer
Josh Kinsler, Security Engineering Manager
Matthew Mellen, Security Architect, Palo Alto Networks
Security and Connectivity for Evolving Networks: In-Between Next-Gen Firewalls and Cloud Platforms

As your organization migrates applications to the cloud, it becomes increasingly challenging to monitor and maintain network security. Join this session to learn how you can preserve centralized visibility, control and compliance of security policies in the evolving enterprise network.

Maya Malevich, Product Marketing Director, Tufin
Why Your Branch Security Strategy Might Be Like a Day Glow Jacket From the 80's

Branch offices have become the new attack point but many are using security solutions that are stuck in the past. Like the person who still wears an old day glow jacket skiing, they may think they are covered but instead are just hot and sweaty. At Columbia Sportswear, we believe in innovation. We've created an award winning adaptable jacket that keeps you warm and dry. Now we have partnered with VMWare, Palo Alto Networks and CloudGenix to create a virtualized, dynamic security perimeter for the branch office. This software-defined branch solution delivers Columbia a new preventative model for securing remote offices that rapidly adapts to the changing threat landscape. The design also provides Columbia with business agility while coming in at a lower price point. The presentation will include how the solution was designed, a demo of how it works and why the enterprise needs to think differently about the branch! (Warning, this presentation will include several 80s and 90s popular references).

John Spiegel, Global IT Communications Manager, Columbia Sportswear Company
Nick Ellson, Network Engineer, Columbia

Organizations continue to turn to virtualization and cloud-based computing to reduce costs and optimize the delivery of applications. As these turns are made, the implications for security must be matched with agility to operate within an increasingly fluid environment. And security efficacy must also increase to protect organizations from increasingly sophisticated cyber attacks. In this track you will learn valuable insights into how to architect a data center to satisfy tomorrow's requirements and new security innovations that extend into the public cloud for mixed and hybrid environments.

Breakouts:

Advancements in Private Cloud Security Integrations
In this session, product experts will highlight some of the latest and greatest new features and how you can use them to protect your private cloud deployment.
Sudeep Padiyar, Sr. Product Manager, Palo Alto Networks
Aperture Customer Panel

Customers talking about securing SaaS and how Aperture solves the problems.

Megha Tamvada, Senior Product Manager, Palo Alto Networks
David Tyburski, Chief Information Security Officer, Wynn Resorts
Ask the AWS Expert

You've poked around in AWS, or maybe your already there and are now puzzled as to which of the many options AWS offers you should take. Hosted by experts from both AWS and Palo Alto Networks, this session will allow you to ask, how do I architect my environment in AWS? Expect heavy white-boarding and brainstorming. 

Scott Ward, Solutions Architect, Amazon Web Services
Warby Warburton, Manager, Technical Marketing, Palo Alto Networks
Data Center Best Practices

Learn how to combat the latest threats to your datacenter leveraging the Palo Alto Networks Next Generation Security Platform. We will analyze the techniques attackers use in the datacenter and show how to mitigate them with proper segmentation strategy and the use of best practices across all of the prevention-focused capabilities offered by our security platform.

Vincent Kelley, Customer Success Architect, Palo Alto Networks
Department of Water Resources: Journey to Automate Security as Part of Service Delivery

Leveraging state-of-art network virtualization platform and best-in-class firewall capabilities the Department of Water secures IT service delivery while monitoring key metrics and performance indicators that form the foundation of any sound security strategy.

Joel Rich, Systems Software Specialist, State of California, Department of Water Resources
Reza Namin, Cloud Architect, State of California, Department of Water Resources
Don't Blame the Users, Make Their Life Easier

The growing demand for firewall rule changes in the datacenter perimeters made CaixaBank embrace a new project to build a software compiler that could automate correct security policy creation out of the business processes data stores and push it out to the firewalls using open API calls.

In this session, CaixaBank CISO, Carles Sole, will talk about how CaixaBank met compliance requirements, reduce attack surface area, ease audit processes and automate firewall operations with their new approach towards compiling business data store information into firewall security policies.

Carles Sole, CISO, CaixaBank
Next-Generation Security Integrations with NetScaler SDX and XenMobile

In this session, Anoop will talk about how Citrix NetScaler and Palo Alto Networks Next-Gen Firewall are integrated to enhance customer’s security posture. Anoop will walk through specific use cases:
·         Enforce user specific security policies on Palo Alto Next-Generation Firewall based on user information provided by Citrix NetScaler
·         Automate updates to host-profiles on Palo Alto Next-Generation Firewall based on End Point Analysis (EPA) scans from Citrix NetScaler
·         Trigger extended authentication on Citrix NetScaler based on content inspection results from Palo Alto Next-Generation firewall

Nivedita will cover various aspects of security within Citrix XenMobile Enterprise Mobility Management (EMM) solution. Nivedita will talk about Citrix’s partnership with key security vendors such as Palo Alto Networks and other CASB providers in fortifying the EMM solution. This session will cover the gamut of security capabilities available within the Citrix XenMobile EMM solution.

Nivedita Ojha, Sr. Director, Product Management, Citrix
Anoop Reddy, Director, Products at Citrix, Citrix
Peer Pressure - Real World Perspectives and Approaches to Securing the Software Defined Data Center - Customer Panel

Does your current data center security posture give you sleepless nights? Listen to these trailblazers share their perspectives on key considerations, technologies, and challenges they had to overcome as they secured their software defined data center.

Mahesh Kumar, Head of Marketing, Arkin Inc.
Joel Rich, Systems Software Specialist, State of California, Department of Water Resources
John Spiegel, Global IT Communications Manager, Columbia Sportswear Company
James Bell, Technical Architect, Security, USAA
Secure Office365 and Protect Your Data

The migration to Office365 is presenting new security challenges within the organization. While not all companies are using cloud services yet, most are using Microsoft applications within their organization. With the move to Office365 any company using these applications is suddenly using the cloud. With that comes the advantages of the agility and collaboration of cloud services but it also brings the dangers. In this session we will go over how you can protect your data while safely enabling office365.

Megha Tamvada, Senior Product Manager, Palo Alto Networks
Securing AWS with the VM-Series

In this session, we will highlight upcoming features that will enhance how the VM-Series for AWS can protect your applications and data.

Jigar Shah, Senior Product Manager, Palo Alto Networks
Securing Your Public Cloud with the VM-Series

In this session, will focus on new features and products designed to protect your public cloud deployment.

Jigar Shah, Senior Product Manager, Palo Alto Networks
Transforming Security for OpenStack Clouds

Significant challenges exist in enforcing a holistic security posture for OpenStack clouds. Legacy security technologies fail to address these challenges. The joint integration between Mirantis and Palo Alto Networks is intended to secure production-grade OpenStack clouds. In this session we will discuss about the key drivers for implementing next-generation security within OpenStack clouds and share use-cases that can be addressed with our joint integration.

Eric Ji, Sr. Manager, Mirantis
Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks
Vinay Mamidi, Senior Product Manager, Palo Alto Networks
Hari Krishnan, Sr. Director of Product Management for Security, Nuage Networks
Utilizing VMware NSX and Palo Alto Networks for Next-Generation Security

Ever wondered how unimaginable security threats could destroy business integrity, cause revenue loss, increase regulatory cost and potentially lead to loss of customers? This is exactly what we have seen in the high profile security breaches recently. A fundamental shift in traffic patterns, application usage and user behavior has resulted in an evolved threat landscape that makes it imperative for companies to rethink their approach to data center security. Software Defined Data Center (SDDC) architectures with VMware NSX network virtualization enables a fundamentally more secure data center network where security is architected into the network itself and best-in-class security services are dynamically inserted for advanced threat protection.

The integration of VMware NSX and Palo Alto Networks VM-Series automates the provisioning and distribution of next-generation firewall and advanced threat prevention as services to protect your applications and data. The NSX and VM-Series integration provides a turn-key security software solution that protects East-West traffic with the same security features that customers are using in a physical form-factor to protect their networks.

In this session we will review the integrated VMware NSX and Palo Alto Networks solution including solution features, review deployment scenarios, and highlight customer success stories. 

Brian Lazear, Product Management, NSX Security, VMware
Zero-Touch Data Center Automation: A Case Study in Automating Next-Generation Security for OpenStack Clouds
OpenStack is seeing increasing adoption among enterprises and service providers for building private and hybrid clouds. There is significant interest in network function virtualization and container technologies within OpenStack users. In this session, 
Michael will talk about deployment considerations for implementing a secure OpenStack cloud including,
• Leveraging API to automate deployment of security services
• Achieving higher performance with application based policies (AppID)
• Securing containers with next-generation firewalls
Richard will talk about Verizon’s journey towards implementing an end-to-end devops enabled network and security automation within their OpenStack cloud
Michael Clark, Service Provider Systems Engineer, Palo Alto Networks
Richard Foltak, Distinguished Engineer, Verizon

No matter where they go, users want access to key applications and data on any device. What dangers do users face when they travel outside of your office? Which scenarios should you prepare for? In this track we will take an in-depth look at the techniques used to attack mobile devices and wireless networks, and explain the principles behind how and why they succeed. Our experts will outline a set of best practices that reduce risk and ensure your organization's data is safe regardless of where your employees work and what devices they use.

Breakouts:

Airwatch Integration: Security Considerations for Enabling Enterprise Mobility In Your Organization

In this presentation, AirWatch will discuss important considerations for ensuring a successful mobile deployment in the enterprise. We'll highlight many of the lessons learned on how to protect both corporate data and intellectual property along with the privacy requirements that employees in the enterprise workforce are now demanding. You'll leave with a deep understanding of the challenges and risks associated with mobility, the ways to resolve those challenges, an understanding of how AirWatch can enable a successful mobility program, and how your investment in Palo Alto Networks can provide an extra layer of security.

Christopher Campbell, Director, Product Marketing, VMware
Aruba Integration: Policy Management for the Extended Perimeter

As the lines between personal and corporate traffic blur, it challenges the idea of traditional IP address, application, and data protection. In this session we will discuss new IT challenges as a result of mobile devices and emerging threats. We will also talk about how to best leverage user, device, and application level context for end-to-end policy enforcement — regardless of location, user role, or access method.

Jon Garside, Senior Product Manager, Aruba, a Hewlett Packard Enterprise Company
Best Practices: Internal Network Segmentation with GlobalProtect

Getting the necessary granularity to make network segmentation effective can be a difficult challenge. In this session, learn about how organizations use GlobalProtect to establish precise user and device-based access policies on an internal network.

Joby Menon, Senior Product Manager, Palo Alto Networks
Christopher Beyer, CTO, SYNACKTEK, LLC
Del Rodillas, Sr. Product Marketing Manager, Palo Alto Networks
Best Practices: Principles and Practices for Security SaaS Apps

With SaaS, applications and data shift to points outside of the network perimeter. In a world where users and the apps have left the building, how do organizations stay in control to make sure applications are used safely and appropriately? In this session, learn about applying the platform with Aperture and GlobalProtect to address SaaS scenarios.

Jon Farkas, Consulting Engineer-SaaS Security, Palo Alto Networks
Best Practices: Secure Internet Gateways for Mobile Threat Prevention

As organizations move beyond remote access and look at how to protect the mobile workforce from malicious content at all times, new requirements emerge. This session covers technical details for establishing secure internet gateways to protect the user from known and unknown threats.

Joby Menon, Senior Product Manager, Palo Alto Networks
Ahmed Tharwat, Product Manager, Mideast Communication Systems
Best Practices: Spotlight on User-ID - Architectures and Answers for Identifying Users

User-ID provides a number of methods for mapping identity repositories throughout the enterprise to an IP addresses for the enforcement of security policy. In this session, get practical advice on how to apply the right User-ID methods to meet your requirements.

Ashwath Murthy, Product Line Manager, Palo Alto Networks
Best Practices: The End of Traditional VPN - GlobalProtect for Remote Access

As organizations look to protect the workforce that is working away from the office, it becomes necessary to think about securing network traffic in entirely different ways. In this session, get the details on understanding GlobalProtect.

Sarvesh Rao, Sr. Product Manager, Palo Alto Networks
Christopher Beyer, CTO, SYNACKTEK, LLC
Best Practices: Under the Hood - Implementation and Administration with GlobalProtect

Get the insider's view on how to deploy GlobalProtect. In this session, learn about how GlobalProtect works and how to solve common scenarios for administration. In addition, learn about using GlobalProtect with enterprise directories, certificate authorities and authentication servers.

Sivasekharan Rajasekaran, Technical Marketing Engineer, Palo Alto Networks
Andy Fischbach, Consulting Systems Engineer for GlobalProtect, Palo Alto Networks
Ashwath Murthy, Product Line Manager, Palo Alto Networks
Learn: The Challenges and Benefits of SaaS Applications and How to Secure Them

SaaS is disrupting the notion of where applications and data live, while also introducing new threat vectors. In order to get an understanding of what the precise security issues are, join this session to learn about SaaS security issues such as sanctioned/unsanctioned apps, cloud-based threats, and shadow IT. This session provides an introduction to SaaS security with Palo Alto Networks next-generation security platform with Aperture. For further content on SaaS security, join the sessions "Best Practices: Principles and Practices for Securing SaaS apps" and "Learn: The evolution of SaaS security" as well.

Nick Piagentini, Consulting Systems Engineer, Palo Alto Networks
Moinul Khan, Director, Product Management, Mobility, Palo Alto Networks
Learn: The Evolution of SaaS Security

As organizations evaluate options for deploying business SaaS applications, it becomes clear that there are many different types of security concerns. Securing SaaS requires a look at how to implement a number of different types of security policies, including ones based on preventing the accidental spillage of sensitive data as well as stopping dangerous content. Approaches to address SaaS security to date have taken a partial view of the issues. For example, the rise in cloud access security brokers (CASB) may look at access policy, but overlook the threat vectors such as malware. In this session, learn about where evolution in SaaS security is happening, and get perspectives on why SaaS must be secured with a platform approach.

Nick Piagentini, Consulting Systems Engineer, Palo Alto Networks
Moinul Khan, Director, Product Management, Mobility, Palo Alto Networks
Learn: Your Perimeter is Secure, but What About Your Mobile Workforce? Understanding GlobalProtect

As organizations look to protect the workforce that is working away from the office, it becomes necessary to think about securing network traffic in entirely different ways. In this session, get the details on understanding GlobalProtect.

Brian Tokuyoshi, Sr. Product Marketing Manager, Palo Alto Networks
Moinul Khan, Director, Product Management, Mobility, Palo Alto Networks
Roundtable: The Mobile Security Practitioner's Panel

Do you have burning questions on how to provide protection to your mobile workforce? In this session, hear from our guest panelists on the decision points for today's critical security issues.

Brian Tokuyoshi, Sr. Product Marketing Manager, Palo Alto Networks
Fred Streefland, CISO of LeaseWeb, Ocom Global Services
Sean Duca, VP, Regional Chief Security Officer - Asia-Pacific, Palo Alto Networks
Jason Reverri, Security Engineer, CompuNet
Ahmed Tharwat, Product Manager, Mideast Communication Systems
Security Innovations: Mobile Workforce Security in a Cloud-First World - GlobalProtect in AWS

The cloud provides elasticity and coverage around the world, making it an ideal platform for deploying GlobalProtect. Learn about security innovations for automating GlobalProtect rollouts in support of cloud first initiatives for securing mobile workforces.

Warby Warburton, Manager, Technical Marketing, Palo Alto Networks
Sivasekharan Rajasekaran, Technical Marketing Engineer, Palo Alto Networks

Our Unit 42 team of cybersecurity researchers gather, analyze and provide insights into the latest cyber threats, sharing them with Palo Alto Networks customers and the broader community to help protect computing environments. In this track, Unit 42 members will present recent findings and outline the tools and practices they use to gather intelligence. This track will help you better understand the type of threats your organization is facing and learn how to put into action for yourself proven intelligence gathering tips and tricks.

Breakouts:

AutoFocus Innovations: Becoming an Advanced Threat Hunter

The AutoFocus service provides the intelligence, context and global correlation of threats to transform any organization into an advanced threat hunter. This session will highlight core AutoFocus capabilities, new innovation in the latest release, and provide an in-depth demonstration with our Unit 42 experts.

Scott Simkin, Sr. Manager, Threat Intelligence, Palo Alto Networks
Defeating the Pragmatic Adversary

Advanced attacks have become so common that many have adopted the attitude that breaches are inevitable. Your organization is not threatened by super­human robots out to destroy your Friday night, but real ­life human beings with a family, a boss and a job to get done. The Pragmatic Adversary's tactics are often straightforward or even mundane but are overshadowed by news of more clever attacks.

Ryan Olson, Director, Threat Intelligence, Palo Alto Networks
Field Guide to Adversary Profiling and Protecting with the Platform

Unit 42 will take you through an advanced attack campaign, starting with how they unearthed the adversary, profiled their methods, and brought to light their malicious operations. This session will provide actionable lessons for understanding the attackers targeting your company, how they operate, and how the Palo Alto Networks platform prevents their actions across the attack lifecycle.

Robert Falcone, Cyber Threat Intelligence Analyst, Palo Alto Networks
Jen Miller-Osborn, Cyber Threat Intelligence Analyst, Palo Alto Networks
How To Do Cyberthreat Intelligence Sharing Right

What if you could see, and prevent, threats before they breach your organization? Cyber threat intelligence sharing has the promise of bringing organizations together, creating a community that is able to stay ahead of adversaries, as they deploy attacks across whole industries. While many leading organizations are adopting this practice, it can be fraught with both technical and policy challenges. We will share best practices, gathered from experts in the field, helping you take the first steps and share threat intelligence with your peers.

Rick Howard, CSO, Palo Alto Networks

As cybersecurity discussions become more strategic, so too does the role of the Chief Information Security Officer (CISO). From keeping track of recent government policy developments, to engaging with the Board of Directors, to staying on top of the most recent attack trends and operationalizing the Security Operations Center, the job of the CISO has never been more pivotal, or more demanding. In this track, designed specifically for the CISO, hear from experts on each of these topics as they share valuable insight on how to make security a business enabler.

Breakouts:

A C-Level View of the Latest Attack Vectors

As high-profile breaches continue to make the front pages, cyberattacks are an increasingly important topic in C-Suite discussions. During this session, hear from leading incident response professionals about how to strategically respond to the most recent attack vectors and how to communicate about these attacks with non-technical executive management.

Erin Nealy Cox, Executive Managing Director, Stroz Friedberg LLC
Rick Howard, CSO, Palo Alto Networks
Gus Coldebella, Principal, Fish & Richardson P.C.
Sean Duca, VP, Regional Chief Security Officer - Asia-Pacific, Palo Alto Networks
Boardroom-Level Cyber Security

2015 saw a definitive shift in boardroom-level attention being paid to cybersecurity, bringing with it a new set of responsibilities to the CISO. During this session, hear about what makes for a strong CISO/Board relationship from both perspectives.

Richard Clarke, CEO, Good Harbor Security Risk Management
Erin Nealy Cox, Executive Managing Director, Stroz Friedberg LLC
John Davis, VP, Chief Security Officer-Federal, Palo Alto Networks
Sean Duca, VP, Regional Chief Security Officer - Asia-Pacific, Palo Alto Networks
How to Make the SOC Work for the CISO: Threat Prevention, Intelligence, and Marketing to Executives and Customers

As Security Operations Centers continue to evolve in maturity to play an increasingly important role in managing organizational cybersecurity risk, it will be important for CISOs to ensure proper operationalization on one hand and to effectively communicate outcomes on the other. In this session hear from experienced practitioners on how to best organize this relationship in order to ensure effective management of cybersecurity risk.

Rick Howard, CSO, Palo Alto Networks
Lucas Moody, VP & CISO, Palo Alto Networks
Monzy Merza, Director of Cyber Research, Chief Security Evangelist, Splunk
How Will Global Cybersecurity Policy Developments Impact Your Job?

Governments the world over are making cybersecurity a top policy priority, and many recent developments will have an impact on how organizations manage their own cybersecurity risks. During this session, hear from cybersecurity policy experts, including former US Cybersecurity Czar Richard Clarke, on what policy developments every CISO should be prepared for moving forward.

William Saito, Vice Chairman - Japan, Palo Alto Networks
Richard Clarke, CEO, Good Harbor Security Risk Management
Ryan Gillis, Vice President, Cybersecurity Strategy & Global Policy, Palo Alto Networks

ULTIMATE TEST DRIVES

Interested in kicking the tires on the latest security innovations? Buckle your seatbelt and join us for a series of hands-on workshops, where you'll be given the opportunity to test out some of our latest innovations. These multihour labs will expose you to advanced capabilities within our next-generation firewall, new threat protection techniques, endpoint protection, and the latest concepts in building a software-defined data center based on Palo Alto Networks and VMware NSX architecture. You'll be guided through a series of exercises aimed at introducing you to an exciting array of new concepts and ideas.

HANDS-ON WORKSHOPS

Join us for a series of mini (two-hour) and half-day, hands-on workshops on next-generation security platform deployment practices and migration techniques that will help accelerate your Palo Alto Networks installation, configuration and management.