Ignite Security Conference June 12 – 15 Vancouver, Canada
scroll down

IGNITE ‘17 TRACKS

Next-Generation Security PlatformUsing the Next-Gen Security Platform for maximum visibility, control and protection.

Tuesday, 6/13

  • Innovations in Next-Generation Firewall Architectures
  • Applying a Next-Generation Platform Approach to Evolving Service Provider Network Ecosystems

Wednesday, 6/14

  • Selecting, Evaluating and Deploying a Next Generation Security Platform Across 23 California State University Campuses
  • The Math Behind True Prevention
  • How Native Threat Intelligence Drives Automated Detection and Prevention Across the Platform
  • Cracking the Code: Conquering OPEX in Security Operations
  • Next-Generation SOC: From Concept to Reality
  • Palo Alto Networks Extensible Technology Platform for Technology Integrations

Thursday, 6/15

  • Next-Generation Security Platform as a Remote Access VPN Gateway
  • A Platform Approach to Preventing Sophisticated Attacks
  • Cyber, EDR, Cloud, BYOD, Machine Learning … Why an Automated Platform Beats Your Subconscious Buzzword Thinking
  • Next-Generation Security for the Education Sector
  • How Native Threat Intelligence Drives Automated Detection and Prevention Across the Platform

Threat Prevention Strategies & Unit 42 Research The latest in threat prevention, plus research into new and emerging threats from Unit 42.

Threat Prevention

Tuesday, 6/13

  • Miscreants Colonizing Free Hosting Services
  • Securing Mobile Workforce with GlobalProtect

Wednesday, 6/14

  • Securing the Internet of Things and Protecting Against Infected Things
  • Incident Detection on Critical Infrastructure
  • Preventing Attacks at Machine Speed with WildFire
  • How Innovative LightCyber Technology Stops Active Attackers as Part of the Palo Alto

Networks Platform

  • Outcome-Driven Threat Intelligence with AutoFocus
  • WildFire and Threat Prevention Updates
  • You Have a Problem and You Know It: Preventing Credential Threat and Abuse

Thursday, 6/15

  • DevOps or Security? Moving to "AND"
  • Architecting Detection to Outpace Emerging Cyber Threats
  • The Importance of Predictive Technology, Holistic Threat Intelligence and Automated Action
  • Better Detection for Better Prevention
  • Shedding the Light on Threats to Critical Infrastructure with Advanced Incident Detection

Unit 42

Tuesday, 6/13

  • Threat Intelligence: Crafting a Program and Operationalizing Outcomes
  • Hands-On with AutoFocus: Threat Hunting with Unit 42

Wednesday, 6/14

  • Unit 42 Story Time, Shamoon 2: Return of the Disttrack Wiper
  • How-To: Discovering and Preventing the Mamba Ransomware Across the Platform
  • Internet-of-Things (IoT) Threat Landscape: What to Look for Now and in the Future
  • Driving the Cyber Threat Alliance Forward: How Every Major Security Vendor Came Together for the Common Good
  • The Pragmatic Adversary: The Criminal Ecosystem and How to Stop Them with Playbooks
  • Mobile Malware Evolution: Profiling Attacks Against iOS and Android Devices
  • Data Isn’t Enough – Developing Intelligence Processes for Enterprise

Thursday, 6/15

  • The Art of the Cyber Attack, View From the Incident Response Trenches
  • All-Source Threat Intelligence Analysis to Identify and Act on Remote Access Toolkits (RATs)
  • Responding to Malicious Scenarios: Lessons Learned from Cyber Range
  • Hands-On with AutoFocus: Threat Hunting with Unit 42
  • Shedding the Light on Threats to Critical Infrastructure with Advanced Incident Detection

Advanced Endpoint Protection Learn why Traps is the answer for advanced endpoint protection.

Tuesday, 6/13

  • Replace AV Effectively – Best Practices for Deploying and Administrating Traps
  • Traps – New Features and Functionality

Wednesday, 6/14

  • Network-Based Threat Prevention With GlobalProtect for Mobile Workforce
  • A New You to Manage Endpoint Security: Introduction to Traps Managed Services Offering
  • Replacing Legacy AV with Traps in Manufacturing to Protect Virtual and Non-Virtual Systems
  • Our Experience Securing Production Environments without Legacy Antivirus
  • Deploying Traps in Europe – A Successful Case Study
  • Technical Learnings from Deploying Traps in a Complex Environment

Thursday, 6/15

  • How We Deployed Traps to Protect a Large Healthcare Environment
  • Advanced Endpoint Protection with Traps at VakifBank
  • The Attacker Mindset – Insights into Interesting Advanced Attacks, Exploit Kits and Malware Campaigns
  • Demystifying Machine Learning (“Artificial Intelligence”) Use in Endpoint Security Products
  • Next-Generation Endpoint Security – Confused?

Cloud and SaaS SecurityProtecting public cloud (AWS and Azure), private cloud (data center) and SaaS.

Public Cloud - AWS

Tuesday, 6/13

  • AWS Security Best Practices
  • Automating AWS Deployments with Ansible

Wednesday, 6/14

  • CME Group: Building a Dynamic Secure Hybrid Cloud on AWS
  • GlobalProtect in the Cloud
  • Ask the AWS Expert
  • What’s New for the VM-Series on AWS
  • Gigamon: Automating Secure Application Development Deployments on AWS
  • How Verge Health Deployed a 24 x 7 Healthcare System on AWS

Thursday, 6/15

  • Firewall Services VPC Architecture
  • AWS Hack-a-Thon Contest Results
  • Putting VM-Series Automation Tools to Use
  • Ask the AWS Expert
  • Extending Networks into the AWS Cloud

Public Cloud - Azure

Tuesday, 6/13

  • Securing Workloads on Microsoft Azure
  • Delivering the Trusted Cloud with Microsoft Azure and Palo Alto Networks

Wednesday, 6/14

  • How Intel Developed a Public Cloud Security Strategy
  • Secure Infrastructure as Code
  • What's New for the VM-Series on Azure
  • Addressing Failover and High Availability on Microsoft Azure
  • Architecting GlobalProtect on Azure
  • Azure Architecture Whiteboarding and Brainstorming

Thursday, 6/15

  • Using PAN-OS to Its Potential to Protect Azure Deployments
  • Cyber Convergence 2025, NOW!
  • Azure Architecture Whiteboarding and Brainstorming
  • Azure Hack-a-Thon Contest Results
  • Using Native Microsoft Azure Capabilities to Deliver High Availability

Private Cloud

Tuesday, 6/13

  • Securing the Host for Sensitive Applications: Running Your VMs and Containers Safely
  • SDWAN, NFV, Virtualization and Security – A Panel Discussion

Wednesday, 6/14

  • How WestJet is Transforming Its Network Segmentation to Simplify and Strengthen Security Using
  • Service Oriented Segmentation
  • Migrating Data Center Security from Legacy to Cloud Architectures
  • Effective Network Segmentation with GlobalProtect
  • Automation Magic Makes Data Center Security Predictable and Reliable
  • Data Center Optimization Improves Security at a Multinational Financial Institution
  • Operationalizing Micro-Segmentation with NSX and Advanced Service Insertion

Thursday, 6/15

  • Micro-Segmentation Cybersecurity Benchmark
  • Deep Dive: Advancements in Security for the Private Cloud
  • Automated Analytics and Remediation for Cloud-Based Security Services
  • Integration of Palo Alto Networks and VMware NSX as Part of a Wider Datacenter Solution
  • Defining Cybersecurity Posture for Your Software Defined Data Center: An Architect’s View

SaaS

Tuesday, 6/13

  • Best Practices for Safely Enabling SaaS Applications
  • Best Practices for Secure Content Management and Collaboration in Box

Wednesday, 6/14

  • Somebody Downloaded All My Files!
  • A Day in the Life of a SaaS Security Administrator
  • The Future of Enterprise Security for SaaS Applications and Services
  • Secure Access to the Cloud for Remote Users
  • Aperture and Data Privacy
  • Rethink Security for SaaS – Power of the Platform

Thursday, 6/15

  • Why a Simple Architecture for SaaS Security Is a Winner
  • SaaS Trends, Threats, and Risks, by the Numbers
  • Securely Enabling SaaS Adoption – A Customer Panel
  • What’s New in SaaS Security
  • Best Practices for Safely Enabling SaaS Applications

Integration Technologies with Palo Alto Networks How Palo Alto Networks seamlessly integrates with technology partners and MSPs.

Tuesday, 6/13

  • Compliance Best Practices for DevOps
  • Know Your IoT Security Risk – How Hackable Is Your Smart Enterprise?

Wednesday, 6/14

  • Intrusive Monitoring: The Nuclear Option for Third Party Risk
  • Address Security Incidents from Beginning to End
  • From Perimeter Security to Pervasive Security Using VMware vRealize Network Insight
  • Palo Alto and Splunk: A Use-Case Approach
  • Financial CISO on Why Proofpoint and WildFire Integration Are a Critical Part of His Offensive Email and Network Security Strategy
  • How to Ensure the Security of the Disaster Recovery Process

Thursday, 6/15

  • Next-Gen Security Teaming Together to Prevent Attacks and Protect Your Data
  • Enhanced Security for IP-Based Communications Systems
  • How to Optimize Next-Gen Properties of Palo Alto Networks Firewalls for More Effective Security and Response
  • Real World Perspectives on Implementing and Operationalizing Software-Defined Security and Micro-Segmentation in Data Center and Cloud

Best Practices for the Advanced Practitioner Giving Palo Alto Networks experts the tools to get the most out of our technology.

Tuesday, 6/13

  • The Age of IIOT: Challenges, Risks, and Cybersecurity Best Practices
  • Are You Utilizing the Full Power of User-ID to Defeat Cyberattacks?

Wednesday, 6/14

  • Ensure Detection and Prevention Throughout the Attack Life Cycle: Implement Best Practices at Your Internet Gateway
  • Secure Your Most Sensitive Assets, Stop Lateral Movement, and Identify Attackers: Apply Data Center Best Practices
  • Employ Panorama to Boost Your Cyberattack Defenses: Instant Visibility, Workflow Automation and More
  • Stop Operating in Darkness – Let Decryption Light the Way
  • Build a Solid Foundation for Your House – Learnings From a Real-Life Implementation of Best Practices in a Healthcare Organization
  • Safe Networking: Raising the Security Posture of the Service Provider Network to Protect Customers and Drive Security Revenues

Thursday, 6/15

  • Use Panorama for Configuration Management Lifecycle: Maximize Granular Control, Minimize Errors
  • GlobalProtect Deployment Best Practices
  • Leveraging Enterprise Security in a SCADA Redesign
  • Ensure Detection and Prevention Throughout the Attack Life Cycle: Implement Best Practices at Your Internet Gateway
  • Secure Your Most Sensitive Assets, Stop Lateral Movement, and Identify Attackers: Apply Data Center Best Practices

Ultimate Test Drives

Sign up before they’re gone! Last year’s UTDs filled up in a day. This year we’ve doubled the number of sessions, but (hurry and) grab your spot as soon as you can, because they’ll still go fast! Ignite ‘17’s UTD topics include: Next-Generation Security Platform, Next-Generation Firewall, Threat Prevention, Virtual Data Center, Migration Process, Traps (Advanced Endpoint Protection), and Network Security Management with Panorama.

Learn more

Monday, 6/12

1:00 p.m. – 3:00 p.m.

  • Next-Generation Firewall
  • Threat Prevention
  • Virtual Data Center
  • Migration Process

3:30 p.m. – 5:30 p.m.

  • Advanced Endpoint Protection
  • Network Security Management (Panorama)
  • Next-Generation Security Platform

Tuesday, 6/13

1:00 p.m. – 3:00 p.m.

  • Advanced Endpoint Protection
  • Network Security Management (Panorama)
  • Next-Generation Security Platform

3:30 p.m. – 5:30 p.m.

  • Next-Generation Firewall
  • Threat Prevention
  • Virtual Data Center
  • Migration Process

Wednesday, 6/14

9:30 a.m. – 11:30 a.m.

  • Next-Generation Firewall
  • Threat Prevention
  • Virtual Data Center
  • Migration Process

1:00 p.m. – 3:00 p.m.

  • Advanced Endpoint Protection
  • Network Security Management (Panorama)
  • Next-Generation Security Platform

3:30 p.m. – 5:30 p.m.

  • Next-Generation Firewall
  • Threat Prevention
  • Virtual Data Center
  • Migration Process

Thursday, 6/15

9:30 a.m. – 11:30 a.m.

  • Advanced Endpoint Protection
  • Network Security Management (Panorama)
  • Next-Generation Security Platform

Hands-On Workshops

You’ve got the security your organization needs, but are you configured for ultimate security value and optimization? Our technical experts will fill in any gaps you might have and show you the features, capabilities, automation and reporting capabilities you might not even know about. Learn how to move some or all of your organization into the cloud with AWS or Microsoft Azure, discover the ins and outs of PAN-OS XML API, drive action on Threat Intelligence with AutoFocus and MineMeld, enable your SaaS applications with Aperture, and better enable migration and customization with App-ID, among others.

Learn more

Monday, 6/12

1:00 p.m. – 3:00 p.m.

  • Amazon Web Services
  • Protecting OpenStack Cloud
  • Security Best Practices
  • Enable Mobile Security Through GlobalProtect
  • Safely Enable Your SaaS Applications With Aperture

3:30 p.m. – 5:30 p.m.

  • PAN-OS XML API
  • Microsoft Azure
  • Drive Action on Threat Intelligence With AutoFocus and MineMeld
  • App-ID Migration and Customization
  • Industrial Cybersecurity
  • Advanced Next-Generation Firewall Deployment

Tuesday, 6/13

1:00 p.m. – 3:00 p.m.

  • PAN-OS XML API
  • Microsoft Azure
  • Drive Action on Threat Intelligence With AutoFocus and MineMeld
  • App-ID Migration and Customization
  • Industrial Cybersecurity
  • Advanced Next-Generation Firewall Deployment

3:30 p.m. – 5:30 p.m.

  • Amazon Web Services
  • Palo Alto Networks Next-Generation Security Platform With VMware NSX
  • Security Best Practices
  • Enable Mobile Security Through GlobalProtect
  • Safely Enable Your SaaS Applications With Aperture

Wednesday, 6/14

9:30 a.m. – 11:30 a.m.

  • Amazon Web Services
  • Protecting OpenStack Cloud
  • Security Best Practices
  • Enable Mobile Security Through GlobalProtect
  • Safely Enable Your SaaS Applications With Aperture

1:00 p.m. – 3:00 p.m.

  • PAN-OS XML API
  • Microsoft Azure
  • Drive Action on Threat Intelligence With AutoFocus and MineMeld
  • App-ID Migration and Customization
  • Industrial Cybersecurity
  • Advanced Next-Generation Firewall Deployment

3:30 p.m. – 5:30 p.m.

  • Amazon Web Services
  • Protecting OpenStack® Cloud
  • Security Best Practices
  • Enable Mobile Security Through GlobalProtect
  • Safely Enable Your SaaS Applications With Aperture

Thursday, 6/15

9:30 a.m. – 11:30 a.m.

  • PAN-OS XML API
  • Microsoft Azure
  • Drive Action on Threat Intelligence With AutoFocus and MineMeld
  • App-ID Migration and Customization
  • Palo Alto Networks Next-Generation Security Platform With VMware NSX
  • Advanced Next-Generation Firewall Deployment
Cyber Range

Cyber Range

Develop innovative solutions to secure public cloud workloads using our VM-Series firewalls by creating scripts or templates to streamline deployment workflows and secure apps and data on AWS or Azure. Great prizes and bragging rights! Find out more!

Learn more >

Get Certified

Register before May 1 and you can sign up to take any one exam for $0. Whether you’re looking to take the PCNSE7, PSE: Platform, PSE: Endpoint or PSE: Data Center test, any one of these exams is FREE if you register now. But hurry ­­– this offer is only good with conference registrations made before May 1.

Learn more >
get certify
Virtual Hackathon

Virtual Hackathon

Develop innovative solutions to secure public cloud workloads using our VM-Series firewalls by creating scripts or templates to streamline deployment workflows and secure apps and data on AWS or Azure. Great prizes and bragging rights! Find out more!

Learn more >
scroll up