Sessions

Click on one or more of your preferred subject matter keywords on the left and scroll down to see the related sessions that are offered. If you are registered for Ignite '19 Europe, you can build your person agenda by using the link that was sent to you by email or click here to start.

By Day
Keywords
Session Type
Session Topic
Industry Specific Content
"Get Certified” PCNSE Preparation Sessions
These 90-minute certification preparation sessions cover the critical topics and issues that you might expect to be tested on in the PCNSE exam. Within these interactive sessions, you will review sample questions designed to focus your preparation on the relevant content.

The approach used will be as follows:

  1. Introductory lecture – setting the scene and talking about some of the basics of the exam
  2. Spend time focusing on the type of questions you will get:
    1. Ask the question – participants use quiz-system to submit their answers
    2. Discuss the answers and why certain answers are right, and others are not correct
Offered  Tuesday, 1:00 pm – 2:30 pm
Tuesday, 2:30 pm – 4:00 pm
Wednesday, 10:00 am – 11:30 am
Keywords  Hands-on Trainings
Securing the Cloud and Mobile Users: Real-World Experiences (Luncheon)
Cloud computing and mobility are transforming how organizations protect their users and data. These trends are forcing security teams to safeguard apps and data hosted in the cloud and mobile users located anywhere in the world. The network perimeter is not disappearing; it is extending to every digital asset an organization owns. Attend this panel to learn from security leaders how they are protecting cloud apps and mobile users. Our panelists will talk about the unique risks introduced by the cloud and how they have embraced DevOps principles like automation to streamline security operations.
Offered  Tuesday, 12:15 pm – 1:30 pm
Speakers  Janet Matsuda, Sr. VP Product Marketing, Palo Alto Networks
Laura Penhallow, Security Engineer, Financial Services Institution
Stan Lee, Director, Security Infrastructure, Palo Alto Networks
Keywords  Management
“Get Certified” PCNSE Preparation Sessions Half Day Session
These 4-hour certification preparation workshop sessions will cover the critical topics and issues that you might expect to be tested on in the PCNSE exam. Within these interactive sessions, you will review the PCNSE exam domain areas, and take sample questions designed to focus your preparation on the relevant content.

The approach used will be as follows:

  1. Introductory lecture – sets the scene with an overview of exam logistics
  2. PAN-OS lecture - explores key topics covered by the exam blueprint
  3. Interactive sample questions – experience sample questions through multiple-choice quizzes
    • Access quiz via web browser
    • Participate anonymously
    • Discuss questions and answers as a group

Instructor will share correct answers and the reasons behind them.

Offered  Monday, 9:00 am – 1:00 pm
Monday, 1:30 pm – 5:30 pm
Keywords  Hands-on Trainings
A Deep Dive into VM-Series Firewall Deployment Across Multiple NSX Environments
Organizations are deploying multiple NSX environments within and across data centers to address use cases such as workload mobility, disaster recovery and resource pooling within their virtual infrastructure. This design approach introduces new challenges while deploying consistent security and scaling security across all NSX locations.

In this session you will learn about simplifying your security deployments across multiple NSX environments with recent Panorama and VM-Series enhancements. We will walk through detailed demos that showcase the advantages of leveraging Panorama NSX plugin and VM-Series firewall to secure your multiple NSX environments.

Offered  Wednesday, 8:00 am – 8:50 am
Speakers  Thomas Benoit, Consulting Engineer, Palo Alto Networks
Sudeep Padiyar, Sr. Product Manager, Palo Alto Networks
Keywords  Best Practices/Troubleshooting, PAN-OS 8.1, Private Cloud/Datacenter, Technical Session, Technology Integration
Accenture and Palo Alto Networks Find Joint Success on a Large GDPR Driven Security Transformation Programme in Italy
Accenture and Palo Alto Networks teamed up in Italy to help a large Pharmaceutical and Retail Manufacturer meet General Data Protection Regulation (GDPR) legislation through Security Transformation. In this scenario, Accenture acted as the trusted advisor for long term strategic growth and Palo Alto Networks provided a comprehensive platform solution to address key GDPR requirements.
Offered  Tuesday, 4:00 pm – 4:50 pm
Speakers  Joshua Anthony Monteiro, Security Consulting Manager, Accenture
Keywords  Overview Session, Compliance, Technology Integration, Data Privacy
Advanced Mobile Network Security for Industrie 4.0:   Network-Security Plus Advanced Analytics (UEBA) in Private-LTE and MVNO Networks
With the expansion of Industrial IoT, many companies are now leveraging Private-LTE networks and MVNOs to help transform their operations and enable them to evolve into "smart companies" as referenced by Industrie 4.0. These “new” wireless technologies—Private LTE & MNVO— are creating new ways of connectivity and awareness, but also opening up new ways for cybercriminals.

This session will be conducted jointly by Nokia and Palo Alto Networks. We will discuss how security challenges can be addressed in packet core networks, which are the foundation for Private-LTE and MVNO. Companies like Utilities, Mining, Railways or Manufacturers may be unaware that security violations are often the root cause of periodic outages and are increasingly responsible for costly operational disruption.

We will discuss how Private-LTE and MVNO networks can be secured and how user behavior security analytics (UEBA) techniques can accelerate the detection and response to threats targeting critical infrastructure. Palo Alto Networks and Nokia have evolved security to the next level by combining network security with user and entity behaviour analytics (UEBA) and as such not only block or allow access but also have an in-depth insight about access to and from certain source and destination as well as threshold and activities.

Offered  Wednesday, 9:10 am – 10:00 am
Speakers  Leonid Burakovsky, Senior Director PM, Palo Alto Networks
Nils Ahrlich, Head of Security Portfolio Management, Nokia
Keywords  Network Security, Security Operating Platform, Service Providers, Technology Integration, Threat Detection and Prevention, ICS/SCADA, Case Study/Use Case
Amazon Web Services Security, Palo Alto Networks, and You
As more enterprises adopt Amazon Web Services (AWS), they want to know what tools and best practices exist in the cloud and how their existing security controls and compliance frameworks can be applied. AWS offers a wide range of security features and services that enable customers to operate in the security model that best fits their use case. In this session we will help you understand the key AWS security features that are relevant to Palo Alto Networks users as part of their AWS strategy. We will dive into AWS networking components, features that enable you to be able to secure your overall AWS account, and detail common hybrid and all-in AWS architectures customers are using with Palo Alto Networks. Finally, we will spend some time talking about compliance and how customers are able to achieve the necessary compliance profiles with Evident while running on AWS.
Offered  Wednesday, 1:30 pm – 2:20 pm
Speakers  Rob Hale, EMEA Security Ecosystem Partner Lead, Amazon
Keywords  AWS, Google Cloud, Public Cloud, Technical Session
Architecting for the Future in Azure
As Zurich Financial Group moves more of its workloads to Azure, they are faced with the challenge of building an architecture that addresses current and future needs; a challenge exacerbated by the speed of the cloud. In this session, Palo Alto Networks Architecture team will focus on how Zurich has designed an Azure architecture addresses their initial Phase I deployment, but also identifies and accommodates future adaptability and scalability requirements such as:
• Inbound Architecture
• Outbound Architecture (Transit VNet)
• Access control
• Centralized management, logging and reporting
• Deployment of redundant regions
Offered  Monday, 1:00 pm – 1:50 pm
Speakers  Torsten Stern, Professional Service Engineer, Palo Alto Networks
Joshua Hanst, Global Solutions Architect, Palo Alto Networks
Keywords  Azure, Best Practices/Troubleshooting, Case Study/Use Case, Public Cloud
Are Applications Running in the Wild in Your Network?
Understand how to use the power of App-ID to protect your network. The session will showcase how the new content update structure streamlines APP-ID adoption while improving your security posture. We will explore best practices based recommendations for SaaS application control, like how to up the ante against malicious risky SaaS applications using new capabilities like SaaS characteristic-based controls, and how to manage consumer versus enterprise versions of SaaS applications with HTTP header insertion.
Offered  Monday, 3:30 pm – 4:20 pm
Speakers  Mandeep Singh Sandhu, Product Manager, Palo Alto Networks
Keywords  Security Operating Platform, Management, Network Security, Technical Session
Best Practices for Secure Deployments in Google Cloud
As organizations migrate existing applications and simultaneously build new cloud-native applications on Google Cloud Platform (GCP), security needs to be consistent across the underlying application infrastructure (VMs or containers). With the understanding that security and compliance in the public cloud is a shared responsibility, Palo Alto Networks and Google have collaborated to address these security challenges. In this session, subject matter experts from Google, Palo Alto Networks will share their approach and best practices for securing virtualized workloads and Kubernetes managed workloads running on Google Cloud Platform.
Offered  Monday, 2:00 pm – 2:50 pm
Speakers  Vineet Bhan, Head of Security Partnerships, Google
Jaime Franklin, NA, Palo Alto Networks
Keywords  Public Cloud, Google Cloud, Technology Integration, Technical Session
Best Practices for Testing Endpoint Protection
Learn what to look for when testing and evaluating endpoint products to ensure you’re effectively balancing prevention with usability and enabling your teams for success.
Offered  Wednesday, 8:00 am – 8:50 am
Speakers  Liat Hayun, Product Line Manager, Palo Alto Networks
Keywords  Best Practices/Troubleshooting, Endpoint/Traps, Technical Session
Best Practices for the Centralized Firewall Management Using Panorama
Whether it's a handful or hundreds of firewalls, Panorama can help you maintain their security effectiveness and performance. This session will cover best practices for maintaining centralized configurations, tracking changes, and streamlining workflows using Panorama. We will also provide an overview of Panorama 8.1 features such as Rule Usage Analysis, Reusability of Templates, and Device Performance Metrics, which will help network practitioners to simplify operations and adopt next-generation security with confidence.
Offered  Wednesday, 10:20 am – 11:10 am
Speakers  Saurabh Pradhan, Sr. Product Manager, Palo Alto Networks
Keywords  Best Practices/Troubleshooting, Management, NGFW, Network Security, Technical Session
Best Practices in Detecting and Preventing Cyber-Attacks with AutoFocus
What is AutoFocus? What are its benefits? How can it detect and prevent attacks on my corporate IT assets? These questions, and others will be answered in this technical session as we show you how AutoFocus helps you research, prioritize and mitigate threats in the digital age. We’ll outline AutoFocus best practices and how they can have a real-world impact in preventing attacks.

We’ll cover best practices for using AutoFocus to:

  • Gain a comprehensive threat summary report
  • Search for ransomware tag groups
  • Get information about sessions and indicators
  • Discover highly suspect malware attacking your network
  • Create a MineMeld miner node
  • Send the indicators to an External Dynamic List, and block those indicators on a next generation firewall by writing policy rules.
Offered  Wednesday, 4:00 pm – 4:50 pm
Speakers  Erik Yunghans, Consulting Engineer-Threat Prevention, Palo Alto Networks
Vish Hulikal, Technical Course Developer, Palo Alto Networks
Keywords  Overview Session, Best Practices/Troubleshooting, Threat Detection and Prevention
Best Practices to Protect Your Endpoints
Learn the “secret sauce” behind Traps default policy and the security profiles introduced in Traps 5.0, that enable your teams to quickly protect different users, departments, and groups as well as add new profiles to fit the needs of your organization.
Offered  Wednesday, 9:10 am – 10:00 am
Speakers  Liat Hayun, Product Line Manager, Palo Alto Networks
Keywords  Best Practices/Troubleshooting, Endpoint/Traps, Technical Session
Beyond GDPR - Protecting Data in Highly Regulated Industries Through Cloud Services
Various countries have strict data privacy rules that limit data processing, beyond GDPR. Countries also often have strong regulations on service providers, financial institutions, hospitals and government agencies.

Regulated industries may not be allowed to use public cloud based solutions or may be limited in using them, because they cannot transfer data outside their country or because the cloud cannot meet specific regulatory requirements. While this helps to protect data privacy, it may impact the ability to adopt appropriate security.

Companies may not be able to build their own APT protection for their cybersecurity, because this presents high costs and requires specific skills that companies may not have. This can create a high risk for critical companies . When companies build their own solution, such solutions are isolated and attacks may be successful because there is no threat intelligence sharing.

Join this session to learn how government agencies, large service providers and hospitals in Europe have built compliant cloud based service offerings which deliver unmatched prevention and protection against known and unknown threats. Our speakers will share first hand insight on successfully implemented solutions leveraging Palo Alto Networks both on-premise and cloud based offerings.

Offered  Wednesday, 2:40 pm – 3:30 pm
Speakers  Ozcan Savran, Head Of Sales Department, BNT PRO
Keywords  Case Study/Use Case, Network Security, Service Providers, Technical Session, Threat Detection and Prevention, Data Privacy
Building Advanced Threat Intelligence Operations
As security professionals, we’re often guilty of focusing our attention on the cybersecurity topic du jour. Whether it’s a new technology, vulnerability, or attack, the latest, shiniest theme inevitably catches our attention. And often, to our detriment, basic housekeeping tasks and simple preventative policy measures are deprioritized in pursuit of the “Next Big Thing.” In this session, we’ll demonstrate how mastering those building blocks can enable defenders to keep pace with the evolving security landscape. Attendees will learn how they can leverage both internal and external threat data to implement a true intelligence-driven security operation.

Offered  Wednesday, 9:10 am – 10:00 am
Speakers  Bryan Lee, Threat Intelligence Analyst, Unit 42, Palo Alto Networks
Keywords  Technical Session, Threat Research/Unit 42
Compliance – NIS, GDPR (Luncheon)
In 2018, both the NIS Directive and GPDR went into effect across the EU. How have these impacted your cybersecurity program? What challenges do you face in complying with these mandates? What are you actually responsible for? Share your stories and experiences in meeting the requirements put forth by the NIS Directive and GDPR. Hear what your peers across various industries have done so far, and what remains to be done. Bring compliance questions for your peers and the experts from Palo Alto Networks.
Offered  Wednesday, 11:30 am – 1:00 pm
Keywords  Roundtables, Data Privacy, Security Operating Platform, Compliance
Container Security -- An Introduction
As container technology continues to mature, organizations are accelerating their adoption for increased application deployment speed and development efficiencies. But, security remains a top concern impacting container technology adoption. We will review these security challenges and key considerations you should plan for addressing container security in public, private and hybrid cloud deployments. We will also discuss in detail and demo practical examples of securing google kubernetes engine (GKE) deployment with your existing investments in VM-Series virtual firewalls.
Offered  Wednesday, 10:20 am – 11:10 am
Speakers  Sudeep Padiyar, Sr. Product Manager, Palo Alto Networks
Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks
Keywords  Containers, NGFW, Private Cloud/Datacenter, Segmentation, Technical Session
Continuous Security for the Cloud to Protect Your Data and Workloads
While organizations are migrating to Amazon Web Services, Microsoft Azure and Google Cloud Platform, they are trying to overcome the lack of security visibility in the cloud. Application and security teams want to take an inside-out approach for their public cloud deployments, looking beyond logs to protect against insider threats while maintaining regulatory compliance. This presentation will provide information on how you can continuously monitor these cloud environments to ensure your data and workloads are secure without compromising on the speed of application development.
Offered  Monday, 3:30 pm – 4:20 pm
Speakers  Anuj Sawani, Senior Product Marketing Manager, Palo Alto Networks
Keywords  AWS, Overview Session, Azure, Public Cloud, Google Cloud
Cryptocurrency (In)Security
Blockchain and cryptocurrency - what do they mean, how do they work and how does it impact you? We'll break down the basics of what these things are and then dive into the security concerns around them including:

  • Android malware stealing cryptocurrency wallet credentials
  • IoT botnets used to mine cryptocurrency
  • Coinhive javascript being covertly loaded in users' browsers by websites to mine cryptocurrency
  • Unauthorized spinning up of AWS EC2 instances for Bitcoin mining
  • How crypto miners are getting hacked remotely to divert funds

Attendees will leave this session with an understanding of how blockchain and cryptocurrency function, the associated security risks, and an understanding of basic mitigations and how to practically apply the Palo Alto Networks platform to mitigate risks.

Offered  Wednesday, 8:00 am – 8:50 am
Speakers  Jamie Brummell, SE, Palo Alto Networks
Alex Hinchliffe, Unit42, EMEA, Palo Alto Networks
Keywords  Endpoint/Traps, Network Security, Overview Session, Threat Detection and Prevention, Threat Research/Unit 42, Security Operating Platform
Cyber Range Level I
Cyber Range Level I: Hands-on, interactive exercise environment: come show off yours and learn more network security best practices using the NGFW and subscriptions. Level I has Instructor guidance and is a required class for all subsequent levels. If you plan to attend future Cyber Range classes, now is the time to qualify!

Prerequisite: regular hands-on firewall experience or completion of an NGFW UTD.

Offered  Tuesday, 1:00 pm – 5:00 pm
Wednesday, 8:00 am – 12:00 pm
Wednesday, 1:00 pm – 5:00 pm
Keywords  Hands-on Trainings
CyberSecurity for Industrial Process Industries and Discrete Manufacturing
IT Security for Industrial Automation and Control Systems is on the rise due to prominent incidents based on WannaCry, Shamoon or Trises/Triton. Learnings from these incidents and from recent regulations show that it is a must to implement a holistic security concept for the production environment that captures all relevant aspects: People, Processes and Technology. This presentation from one of the largest industrial manufacturing companies in Europe will guide you through this process and show how IEC 62443 and the defense in depth concept can be applied for an Industrial Automation and Control System.
Offered  Wednesday, 1:30 pm – 2:20 pm
Speakers  Stefan Woronka, Director - Customer Services Digital Factory Process Industries & Drives, Siemens AG
Keywords  Network Security, Overview Session, ICS/SCADA, Case Study/Use Case
Data Center Security Transformation in a European Bank
Instead of simply replacing their existing data center firewalls, Yapi Kredi Bank seized the opportunity to increase their visibility into applications, further segment the network, and also re-allocate responsibilities among the network and security teams according to their core competencies. Logical firewall instances were created for separate administrative boundaries in support of different business units or applications. Hear about the bank’s journey with the Palo Alto Networks next-generation firewall from proof-of-concept testing through implementation including the use of threat prevention and App-ID technology in firewall policies for granular control of traffic in their data center.
Offered  Wednesday, 9:10 am – 10:00 am
Speakers  Ihsan Cakmakli, Security Architect, Yapi Kredi Bank
Fuat Kılıc, Systems Engineer, Palo Alto Networks
Cagri Tugriceri, Sales Engineer, TBD
Keywords  Network Security, NGFW, Case Study/Use Case, Segmentation, Private Cloud/Datacenter
Data Loss Prevention Strategies for Cloud Applications
SaaS apps are now extensively adopted by organizations – some procured by IT, others adopted by the users themselves. You’re already likely witnessing large amounts of data being transferred between users and these apps. As corporate data moves to the cloud, the risk of a data leakage increases with users accessing enterprise apps on unmanaged devices or storing corporate data on risky, unsanctioned apps.

Join this session to learn how to prevent data exposure and maintain compliance by protecting your data within enterprise SaaS apps and blocking unsanctioned apps. You’ll learn about:

  • A real-world customer journey for complete data security in SaaS.
  • Common threats leading to data leaks from popular SaaS apps.
  • Discuss benefits of DLP tools built for the cloud.
Offered  Wednesday, 4:00 pm – 4:50 pm
Speakers  Megha Tamvada, Product Manager, Palo Alto Networks
Keywords  Data Privacy, Compliance, Overview Session, SaaS/Aperture
Delivering the Platform from the Cloud: GlobalProtect Cloud Service
Proxies/Secure Web Gateways, VPNs, Secure DNS and MPLS are losing their relevance in today's world. With many applications shifting to the cloud, organizations are looking for a modern take on how to build the security infrastructure necessary to meet requirements today.

In this session, learn about a better approach using cloud-delivered security using GlobalProtect cloud service. This session will take a look at the problems that organizations need to solve, and introduce the fundamental concepts behind deploying GlobalProtect cloud service as the security infrastructure for protecting remote networks and mobile users.

Offered  Wednesday, 9:10 am – 10:00 am
Speakers  Brian Tokuyoshi, N/A, Palo Alto Networks
Keywords  Security Operating Platform, GlobalProtect, Overview Session
DevOps and Security (Luncheon)
Are you rolling out applications without security for speed? DevOps and Security teams respective processes aren’t naturally in sync with one another. Minimize the discrepancy in the time it takes to define, test, and implement firewall changes in IaaS environments versus DevOps expectations. Hear how your peers are enabling security in their development life-cycle management in the age of CI/CD. Come share your experiences with aligning people, processes, and technology to accommodate security policy changes at cloud speed for a secure DevOps environment.

Sponsored by

Offered  Tuesday, 12:00 pm – 1:30 pm
Keywords  App Developers, Roundtables, AWS, Azure, Google Cloud, Automation, Public Cloud
Effectively Detecting & Preventing Threats to Your ICS/SCADA Network
As digitalization and IIoT drive increased connectivity between IT and Operational Technology (OT) networks, the risk of production downtime and large-scale safety failures — due to targeted attacks and destructive malware such as TRITON and NotPetya — has dramatically increased.

First Quality, a leading global manufacturer, chose Palo Alto Networks’ next-generation firewalls to protect and segment its OT network.

They also deployed CyberX’s industrial cybersecurity platform to provide continuous real-time visibility into ICS/SCADA assets, vulnerabilities, and threats.

In this session with the CISO of First Quality, you’ll learn about:

  • The organizational and technological challenges of integrating IT and OT security in the corporate SOC.
  • How First Quality modified its SOC workflows and trained its SOC analysts to address the crucial differences between IT and OT environments.
  • How First Quality is using the seamless integration of CyberX and Palo Alto Networks to both detect and prevent attacks against their critical industrial infrastructure. Specifically, the integration enables security teams to rapidly change policies and immediately block sources of malicious ICS/SCADA traffic whenever these sources are identified by the CyberX platform.

Ariel will also share his approach to creating tighter segmentation in the OT network, leveraging some of the latest technology from Palo Alto Networks.

Finally, he’ll describe how CyberX’s integration with the Application Framework helps you leverage your existing Palo Alto Networks infrastructure to continuously capture and analyze contextual information about ICS/SCADA assets and threats.

Offered  Wednesday, 10:20 am – 11:10 am
Speakers  Ariel Litvin, CISO, First Quality Enterprises
Nir Krumer, Head of Product Management, CyberX-Labs
Keywords  Application Framework, Network Security, Segmentation, Threat Detection and Prevention, ICS/SCADA, Case Study/Use Case, Management
End-to-End Cloud Security Automation with Terraform & Ansible
In public cloud deployments, automation is allowing customers to use the cloud to move towards more rapid and iterative application development methodologies. From a security perspective, automation can be used to eliminate the bottleneck that infrastructure security change control best practices can inject, allowing you to embed security into your application development framework.

Using a combination of the Terraform Provider for PAN-OS and Ansible Playbooks, you can fully automate the creation of your cloud environment along with the deployment and configuration of the VM-Series firewall.

In this session, we will walk through how you can use an existing Provider for AWS, Azure or Google Cloud, to automate the infrastructure creation on AWS, Google Cloud, or Azure, complete with a VM-Series firewall. Then, using the Terraform Provider for PAN-OS and Ansible, security teams can fully automate the configuration of the (deployed) VM-Series virtualized firewall, effectively performing end-to-end deployment automation and embedding security into the application development framework.

Offered  Wednesday, 2:40 pm – 3:30 pm
Speakers  Vinay Venkataraghavan, Solutions Architect, Palo Alto Networks
Ivan Bojer, Solutions Architect, Palo Alto Networks
Keywords  AWS, App Developers, Automation, Azure, Google Cloud, Public Cloud, Technical Session
Endpoint Protection (Luncheon)
Compromised endpoints continue to play a prominent role in data breaches. What challenges do you still face in protecting your laptops, desktops, and servers – physical and virtual? What else can be done to better defend these endpoints against malware and exploits? How can your endpoint protection supplement your firewall controls? Join your peers for a discussion on endpoint security, and hear what’s working for them and what concerns remain. Seize the opportunity to ask questions of your peers and a Palo Alto Networks endpoint expert.
Offered  Tuesday, 12:00 pm – 1:30 pm
Keywords  Roundtables, Endpoint/Traps
Experiences with Behavior Analytics (Luncheon)
Behavior analytics offers cybersecurity professionals another tool to ward off malicious attacks. Come hear about experiences with cloud-based behavior analytics and machine learning during and after customer adoptions of Magnifier. Learn about the threats found, the benefits realized, and have your questions answered about these initial deployments of Magnifier, which is part of the Palo Alto Networks Application Framework.
Offered  Wednesday, 11:30 am – 1:00 pm
Keywords  Roundtables, Security Operating Platform, Application Framework
Express Lab Demo: Advanced Next-Generation Firewall Deployment
Designed for security and network engineers, this demonstration session dives deep into Palo Alto Networks security policies and network configuration. It is designed to enhance your understanding of how to configure and manage some of the more advanced features of Palo Alto Networks next-generation firewalls.

This demonstration session is based on the lab in the Advanced Next-Generation Firewall Deployment Hands-On Workshop.

Offered  Monday, 4:30 pm – 5:20 pm
Wednesday, 10:20 am – 11:10 am
Keywords  Express Lab Demos, NGFW
Express Lab Demo: Deep Dive With SSL Decryption
More and more enterprise traffic is being obscured with SSL, including some of the applications and sites that introduce the most risk for your business. Palo Alto Networks firewalls provide the capability to decrypt and inspect traffic for visibility, control and granular security.

This session demonstrates how to setup up SSL decryption for a forward proxy with deployment best practices. The session will navigate you through understanding the various features available to support SSL decryption.

This demonstration session is based on the lab in the Deep Drive with SSL Decryption Hands-On Workshop.

Offered  Monday, 2:00 pm – 2:50 pm
Wednesday, 8:00 am – 8:50 am
Keywords  Express Lab Demos
Express Lab Demo: Drive Action on Threat Intelligence With AutoFocus and MineMeld
Learn how to bridge the gap between machine-generated threat data and security operations professionals with AutoFocus contextual threat intelligence and MineMeld syndication engine. In this demonstration session, you will learn how to use integrated threat intelligence from Autofocus to improve existing security workflows and how to enable aggregation of any third-party threat intelligence feed with MineMeld.

This demonstration session is based on the lab in the Autofocus and MineMeld Hands-On Workshop.

Offered  Tuesday, 2:30 pm – 3:20 pm
Wednesday, 2:40 pm – 3:30 pm
Keywords  Express Lab Demos
Express Lab Demo: Network Security Best Practices
A successful deployment of next-generation security requires careful consideration during the design and implementation phases. This session demonstrates how best practices and configuration guidelines helps to improve security posture and reduce exposure to potential risks.

This demonstration session is based on the lab in the Networks Security Best Practices Hands-On Workshop.

Offered  Monday, 1:00 pm – 1:50 pm
Tuesday, 4:00 pm – 4:50 pm
Keywords  Best Practices/Troubleshooting, Express Lab Demos
Express Lab Demo: Network Security Management (Panorama)
This demonstration session provides insight into Panorama network security management for the Next-Generation Security Platform. You’ll learn some of the unique features of Panorama that can help you manage and deploy Palo Alto Networks firewalls more effectively.

This demonstration session is based on the lab in the Network Security Management Ultimate Test Drive.

Offered  Monday, 3:30 pm – 4:20 pm
Wednesday, 9:10 am – 10:00 am
Keywords  Network Security, Express Lab Demos
Express Lab Demo: Preventing Credential Theft
Credential theft and abuse is one of the oldest attacks in the book, yet it remains highly effective. In this demonstration session, you’ll see a real-life phishing kit in action and implement policies to prevent credential theft. Additionally, you’ll learn how to enforce multi-factor authentication, or MFA, through the firewall to neutralize an attacker's ability to use stolen credentials for lateral movement.

This demonstration session is based on the lab in the Preventing Credential Theft Hands-On Workshop.

Offered  Tuesday, 1:00 pm – 1:50 pm
Wednesday, 1:30 pm – 2:20 pm
Keywords  Express Lab Demos
Extending Zero Trust the Endpoint - Traps + GlobalProtect
The terms “never trust, always verify” rings a familiar tune to those focused on securing the network. However, as security technologies have advanced to necessitate cross-communication between network and endpoints, Zero Trust principles must also extend from the network to the endpoints. Join us as we discuss why endpoints need to talk and integrate with other security technologies, and provide a framework as to why and how to extend Zero Trust to the endpoint.
Offered  Wednesday, 4:00 pm – 4:50 pm
Speakers  Lieuwe Jan Koning, CTO, ON2IT
John Kindervag, Field CTO, Palo Alto Networks
Keywords  Case Study/Use Case, Endpoint/Traps, GlobalProtect, Overview Session, Segmentation
Financial Services – Birds of a Feather (Luncheon)
Join your peers and a Palo Alto Networks financial services expert for a discussion about cybersecurity topics relevant to the sector. Share stories about your current and upcoming security projects, the impact of regulatory changes, recent threats, and any other areas of concern for the industry. Some potential discussion topics include PSD2 implications, SWIFT customer security controls, ATM security, and cloud adoption. Bring your questions, network with industry peers, and learn about deployments of Palo Alto Networks solutions at other financial institutions too!
Offered  Tuesday, 12:00 pm – 1:30 pm
Keywords  Roundtables
Financial and Insurance Services: Moving to the Cloud with Confidence (Luncheon)
According to a 2018 Palo Alto Networks survey, 70% of cybersecurity professionals working in large organizations across the EMEA region expressed concerns that a rush to the cloud isn’t fully accounting for the associated cloud security risks. IT and security teams are recognizing the need to do more to match the speed and agility of the cloud by maintaining consistent security across all their environments. Too many organizations still see security as a business inhibitor when, in fact, the right security serves to accelerate business innovation, growth and success. Join the discussion to secure the cloud and the changing model of cybersecurity consumption in the Financial and Insurance Services industries.
Offered  Wednesday, 11:30 am – 1:00 pm
Keywords  Private Cloud/Datacenter, Azure, AWS, Roundtables, Public Cloud, SaaS/Aperture, Google Cloud
GlobalProtect Best Practices
GlobalProtect has many deployment options that are available to support your remote networks and mobile users. In this session, get technical advice on how to implement GlobalProtect and GlobalProtect cloud service.
Offered  Wednesday, 1:30 pm – 2:20 pm
Speakers  Joby Menon, Product Line Manager, Palo Alto Networks
Keywords  Best Practices/Troubleshooting, GlobalProtect, Network Security, Technical Session
Hands-On Workshop: Advanced Next-Generation Firewall Deployment
Designed for security and network engineers, this session dives deep into Palo Alto Networks security policies and network configuration. It is designed to enhance your understanding of how to configure and manage some of the more advanced features of Palo Alto Networks next-generation firewalls.

This session will focus on firewall and Panorama features useful for deployments in large and complex networks.

Required: Participants must bring a laptop with an HTML5-compatible browser. External display with HDMI connection will be provided, please bring the appropriate dongle for your laptop.

Prerequisites: Must have prior knowledge of Palo Alto Networks next-generation firewalls and Panorama.

Offered  Monday, 1:00 pm – 3:00 pm
Tuesday, 1:00 pm – 3:00 pm
Tuesday, 3:30 pm – 5:30 pm
Wednesday, 1:00 pm – 3:00 pm
Keywords  Hands-on Trainings, Management, NGFW, Technology Integration, Threat Detection and Prevention
Hands-On Workshop: Automating Multi-Cloud Security Using Terraform and Ansible
Automation greatly simplifies the onboarding of new applications, virtual networks as well as managing configurations across different cloud platforms such as Google Cloud Platform or Microsoft Azure. Automation can also help ensure security keeps pace with application innovation and deployment. You can use the cloud-native security capabilities of VM-Series firewalls together with third-party automation tools, such as Terraform and Ansible, to fully automate and accelerate cloud adoption.

In this session, we’ll present the techniques and give you a chance to try the tools developed for cloud-native application architectures using Terraform and Ansible, in conjunction with the VM-Series firewall, on cloud platforms such as Google Cloud Platform and Microsoft Azure. We’ll discuss real-world use cases that address cloud-native architectural patterns and paradigms, the requirements for a strong security architecture, and using automation to ensure application deployments are agile and secure.

Required: Participants must bring a laptop with an HTML5-compatible browser. External display with HDMI connection will be provided, please bring the appropriate dongle for your laptop.

Offered  Monday, 3:30 pm – 5:30 pm
Wednesday, 1:00 pm – 3:00 pm
Wednesday, 3:30 pm – 5:30 pm
Keywords  Automation, Hands-on Trainings, NGFW, PAN-OS 8.1, Public Cloud, Technology Integration
Hands-On Workshop: Cloud Security for Amazon Web Services (AWS)
In this lab-based session, our AWS product experts will lead a series of hands-on exercises to provide an introduction to AWS and how you can use the VM-Series on AWS to deploy next-generation security services. You’ll learn about:

  • Targeted use cases for the VM-Series firewall on AWS
  • Deploying VM-Series firewalls in AWS through CloudFormation templates
  • Protecting your data and service in AWS with a VM-Series firewall
  • Using Dynamic Address Group (DAG) to protect dynamic EC2 instances
  • Leveraging threat intelligence with External Dynamic List (EDL)

Required: Participants must bring a laptop with an HTML5-compatible browser. External display with HDMI connection will be provided, please bring the appropriate dongle for your laptop.

Offered  Monday, 1:00 pm – 3:00 pm
Tuesday, 1:00 pm – 3:00 pm
Wednesday, 3:30 pm – 5:30 pm
Keywords  AWS, Hands-on Trainings, NGFW, Network Security, Public Cloud
Hands-On Workshop: Deep Dive With SSL Decryption
More and more enterprise traffic is being obscured with SSL, including some of the applications and sites that introduce the most risk for your business. Palo Alto Networks firewalls provide the capability to decrypt and inspect traffic for visibility, control and granular security.

This session will guide you in setting up SSL decryption for a forward proxy with deployment best practices. The lab will navigate you through understanding the various features available to support SSL decryption. Additionally, you’ll go through a troubleshooting exercise to learn how to overcome challenges you may face.

Required: Participants must bring a laptop with an HTML5-compatible browser. External display with HDMI connection will be provided, please bring the appropriate dongle for your laptop.

Offered  Monday, 3:30 pm – 5:30 pm
Tuesday, 1:00 pm – 3:00 pm
Wednesday, 9:10 am – 11:10 am
Wednesday, 1:00 pm – 3:00 pm
Keywords  Best Practices/Troubleshooting, Hands-on Trainings, NGFW
Hands-On Workshop: Drive Action on Threat Intelligence With AutoFocus and MineMeld
Learn how to bridge the gap between machine-generated threat data and security operations professionals with AutoFocus contextual threat intelligence and MineMeld syndication engine. Enriched with context from WildFire service, the Unit 42 threat research team and third-party feeds, AutoFocus enables you to identify and act against the most critical threats facing your organization. This industry-first threat operations approach allows native workflows between intelligence generation, verification and prevention enforcement through the Next-Generation Security Platform. You’ll learn:

  • How to use integrated threat intelligence to improve existing security workflows
  • The value of adding real-time context to security events
  • How to enable aggregation of any third-party threat intelligence feed with MineMeld
  • How to drive automated prevention enforcement for highly targeted attacks

Required: Participants must bring a laptop with an HTML5-compatible browser. External display with HDMI connection will be provided, please bring the appropriate dongle for your laptop.

Offered  Monday, 3:30 pm – 5:30 pm
Tuesday, 3:30 pm – 5:30 pm
Wednesday, 3:30 pm – 5:30 pm
Keywords  Hands-on Trainings, NGFW, Technology Integration
Hands-On Workshop: Improve Firewall Security Policy with Expedition
In this session, we’ll make use of Expedition, a tool that facilitates complex device configuration tasks and analyzes configuration and log data to make recommendations on firewall policy improvements. We’ll retrieve a PAN-OS device configuration and perform analyses against best practices to identify weak aspects and points for improvement.

Some security rules may be considered too permissive. We’ll apply data analysis and learning techniques on your traffic logs to improve the existing security policy. Additionally, we’ll show you how to replace specific security rules with new ones automatically generated via machine learning techniques.

Required: Participants must bring a laptop with an HTML5-compatible browser. External display with HDMI connection will be provided, please bring the appropriate dongle for your laptop.

Offered  Tuesday, 3:30 pm – 5:30 pm
Wednesday, 1:00 pm – 3:00 pm
Wednesday, 3:30 pm – 5:30 pm
Keywords  Application Framework, Automation, Hands-on Trainings, NGFW
Hands-On Workshop: Network Security Best Practices
A successful deployment of next-generation security requires careful consideration during the design and implementation phases. This session provides administrators with best practices and configuration guidelines to improve security posture and reduce exposure to potential risks. Attendees will also be able to exercise some of the recommended best practices in this hands-on session.

Required: Participants must bring a laptop with an HTML5-compatible browser. External display with HDMI connection will be provided, please bring the appropriate dongle for your laptop.
Offered  Monday, 1:00 pm – 3:00 pm
Monday, 3:30 pm – 5:30 pm
Tuesday, 3:30 pm – 5:30 pm
Wednesday, 9:10 am – 11:10 am
Keywords  Best Practices/Troubleshooting, Hands-on Trainings, Management, NGFW, Threat Detection and Prevention
Hands-On Workshop: Preventing Credential Theft
Credential theft and abuse is one of the oldest attacks in the book, yet it remains highly effective. With stolen credentials, an adversary can impersonate a valid user to bypass the entire attack lifecycle, move uninterrupted throughout an organization's network and shift to the abuse of credentials from within.

In this session, you’ll see a real-life phishing kit in action and implement policies to prevent credential theft. Additionally, you’ll learn how to enforce multi-factor authentication, or MFA, through the firewall to neutralize an attacker's ability to use stolen credentials for lateral movement.

Required: Participants must bring a laptop with an HTML5-compatible browser and will have the option to use a phone and mobile number for the MFA lab exercise. External display with HDMI connection will be provided, please bring the appropriate dongle for your laptop.

Offered  Monday, 1:00 pm – 3:00 pm
Wednesday, 9:10 am – 11:10 am
Wednesday, 3:30 pm – 5:30 pm
Keywords  Hands-on Trainings, NGFW, Threat Detection and Prevention
Hands-On Workshop: Security With GlobalProtect Cloud Service
GlobalProtect cloud service reduces the operational burden associated with securing your remote networks and mobile users by leveraging a cloud-based security infrastructure managed by Palo Alto Networks. In this shared ownership model, administrators can manage GlobalProtect cloud service with Panorama and extend protections from the Palo Alto Networks Next-Generation Security Platform to remote networks and mobile users with two deployment options.

This session will demonstrate deployment of consistent security policies from corporate to all locations and users. You’ll learn how to onboard and secure remote networks as well as secure mobile users’ traffic to the internet and remote access to data center resources using GlobalProtect cloud service.

Required: Participants must bring a laptop with an HTML5-compatible browser. External display with HDMI connection will be provided, please bring the appropriate dongle for your laptop.

Offered  Tuesday, 1:00 pm – 3:00 pm
Wednesday, 9:10 am – 11:10 am
Wednesday, 3:30 pm – 5:30 pm
Keywords  GlobalProtect, Hands-on Trainings, Management, NGFW
Helping DevOps & Security Teams Work Collaboratively
Cloud security conversations increasingly revolve around the time it takes to determine, define, test, approve and implement firewall changes in IaaS environments when contrasted with the speed of deployment / cadence of change that DevOps engineers expect. Multi-million dollar projects have failed, or taken far longer than necessary, due to delays introduced by security industry change control best practices. Firewall change requests are often based on spreadsheets, are poorly or incorrectly defined by developers that do not fully understand how their apps are communicating on the network, compounded by the time it takes to security team to test, approve and implement the resulting security policy.

During this session, we will demonstrate how we can help reduce security induced friction by using the machine learning capabilities of our Expedition firewall migration tool in the developer build environment and process to automate the generation of VM-Series firewall policies. Expedition machine learning to observe your actual cloud traffic and, of course based on apps not ports & protocols, then build a firewall security policy dynamically and automatically. The result is a security policy that the developer understands, is not overly permissive (i.e. only allows what is necessary), is dynamic (i.e. able to change as the developer adds new apps) and is easy for the security team to audit, approve and implement. We will also explore how Evident gives DevOps & InfoSec teams confidence that the configurations of their Iaas/PaaS environments are secure.

Offered  Tuesday, 4:00 pm – 4:50 pm
Speakers  Justin Harris, Consulting Engineer, Palo Alto Networks
Jamie Brummell, SE, Palo Alto Networks
Daniel Hurst, Practice Director, Enterprise DevOps Transformation, Contino
Keywords  Public Cloud, App Developers, Automation, AWS, Azure, Google Cloud
How Machine Learning and Automation Simplifies Policy Rollout - Reducing Costs and Time-to-Market While Improving Security
How do you realize a fully-operational and thorough next-generation firewall policy when there is no authoritative information on the traffic your business requires? You may have found yourself in this situation when told to improve or create a new security policy. By applying machine learning and data analytics techniques on your firewall traffic logs, Expedition can automate the creation of the security policies including App-ID and User-ID. However, this is just the tip of the iceberg when both firewall traffic logs and machine learning are available.

Analytics of this data opens up other possibilities that can offer significant added value to customers. In this session, we will showcase new Expedition capabilities, describe how customers can use it to automate firewall policy creation and shorten the time to deployment yet increase value and security controls at no additional cost.

Offered  Wednesday, 8:00 am – 8:50 am
Keywords  Case Study/Use Case, Management, NGFW, Network Security, Overview Session
How to Develop Advanced Adversary Playbooks
When your boss forwards you the latest intelligence report with an urgent flag set and the message “What are we doing about this,” what do you say? To be confident in your answer, you need to understand how that adversary operates, or what’s in their Playbook. In this session we’ll walk through tactics used by advanced adversaries and show you how to build a structured copy of their offensive plays, so you can better prepare your defensive line.
Offered  Tuesday, 4:00 pm – 4:50 pm
Speakers  Ryan Olson, Sr. Director, Threat Intelligence, Unit 42, Palo Alto Networks
Robert Falcone, Threat Intelligence Analyst, Palo Alto Networks
Keywords  Overview Session, Threat Research/Unit 42
How to Test, Implement, and Manage NGFW - Lessons Learned by a Former CISO
In this session, a former CISO and his technical security engineer will share experiences about acquiring, implementing and managing next-generation firewalls. We will cover how we tested different firewalls, what implementation challenges we faced, and what lessons we learned. We will also discuss what worked to address DevOps team's concerns with respect to SSL decryption, and share details about a real security incident that we experienced during the implementation and how we tackled it effectively.
Offered  Wednesday, 9:10 am – 10:00 am
Speakers  Fred Streefland, Sr. Product Marketing Manager EMEA, Palo Alto Networks
Jovan Aleksov, Security Engineer, Undisclosed
Keywords  Best Practices/Troubleshooting, Case Study/Use Case, NGFW, Network Security, Technical Session
IT-OT Collaboration and Cybersecurity Implications of Convergence (Luncheon)
The integration of information technology's (IT) data-centric systems with operational technology's (OT) process control systems is a major challenge for the industries integrating them. One overarching problem is the collision of two worlds that have traditionally operated in silos. Join our roundtable discussion as we look at ways for IT and OT teams to collaborate and move beyond the challenges of convergence and its attendant security concerns. In our conversation, we’ll look at:

  • Ways to define IT/OT accountability
  • Outdated systems and how to decrease their related security risks
  • Mitigating barriers to productivity
Offered  Tuesday, 12:00 pm – 1:30 pm
Keywords  ICS/SCADA, Roundtables, Network Security
Identifying and Responding to Security Threats on Azure
How to use Azure native tools to quickly identify and isolate a threat on Azure? We’ll discuss, Azure Security Center, Azure Security Graph, as well as other tools and features in addition to best practices for responding to security threats on Azure. Learn how Microsoft and Palo Alto Networks have partnered and what it means to security.
Offered  Wednesday, 10:20 am – 11:10 am
Speakers  Sean Dastouri, Principle Security Architect, Microsoft
Denver McKelheer, Microsoft Global Partner Development Manager, Microsoft
Keywords  Overview Session, Public Cloud, Technology Integration
Implementing Palo Alto Networks Products in the Era of GDPR
Security professionals are tasked with protecting user privacy while adopting appropriate security for their organization. Palo Alto Networks offers built-in feature sets to help achieve both objectives: security and privacy. Come to learn from Palo Alto Networks product managers and privacy experts how to manage and configure Palo Alto Networks products to address privacy risks and requirements, as required by GDPR
Offered  Wednesday, 4:00 pm – 4:50 pm
Speakers  Paola Zeni, Sr. Director, Sr Privacy Counsel, Palo Alto Networks
Garrett Hamilton, Product Manager, Palo Alto Networks
Keywords  Security Operating Platform, Best Practices/Troubleshooting, Compliance, Overview Session, Data Privacy
Incident Response from the Endpoint – Best Practices from Palo Alto Networks SOC
Learn from our own SOC team the strategies, techniques, and integration between Traps, AutoFocus, and WildFire that help them tackle IR behind our own walls including configurations to enable Traps to collect data useful in the IR process.
Offered  Wednesday, 2:40 pm – 3:30 pm
Keywords  Best Practices/Troubleshooting, Endpoint/Traps, Technical Session, Threat Detection and Prevention
Inside the Mind of a Hacker: Track Every Step of an Attack with Behavioral Analytics
Do you want to know how attackers operate? Most highly-motivated adversaries use well-known tools and tricks to carry out their attacks. Join Giora Engel, VP of Product Management at Palo Alto Networks, as he describes how attackers infiltrate networks, expand their realm of control, and locate and steal or destroy sensitive information.

With Magnifier Behavioral Analytics, organizations now have a powerful defense to shutdown advanced threats. During this session, Engel will describe attackers’ methods and reveal how Magnifier detects every stage in the post-intrusion attack lifecycle. He will explain how Magnifier interrogates suspicious endpoints to determine which process initiated an attack, analyzes the endpoint process using WildFire, and integrates with the Next-Generation Firewall to disrupt the attack before the damage is done.

Attend this session to learn:

  • The latest tactics, techniques, and procedures of malicious actors
  • A hacker’s step-by-step attack playbook
  • How to hunt down and eradicate advanced threats with Magnifier Behavioral Analytics, a cloud-based application for the Palo Alto Networks Application Framework
Offered  Wednesday, 1:30 pm – 2:20 pm
Speakers  Tamar Shafler, Sr. Product Manager - Magnifier, Palo Alto Networks
Keywords  Application Framework, Technical Session
Intelligent Automation for Security Operations
Most IT professionals have an overwhelming list of projects and upgrades they’d like to complete, if only they had the time. Instead, we spend most of our days dealing with urgent issues and addressing our ever-growing to-do list. But how much more could we get done if we managed to automate some of these “to-do” items? Even more pressing, what if these items are really mission-critical “must-haves”?

With all that is expected of IT and Security departments in today’s world, how can anyone be sure that the tasks required to be completed by their teams cannot be automated to save time, money and resources? In this discussion, we will show you how to improve efficiencies by automating a large number of your disaster recovery procedures, while validating that the procedures were completed correctly, and proactively automating many other additional tasks that might appear in the future.

Offered  Wednesday, 8:00 am – 8:50 am
Speakers  Rafi Zvi, CEO, BackBox
Keywords  Management, Network Security, Technology Integration
IoT On the Move (Luncheon)
Technologies like the Internet of Things (IoT) are changing the game for many industries. Using IoT, the aviation industry is transforming the passenger’s entire flying experience. The automotive industry is revolutionizing the fundamental concept of what a vehicle is, creating a new mode of completely connected transportation. Meanwhile, Industrial IoT is revolutionizing manufacturing – providing cost savings from predictive maintenance, improved safety, and other operational efficiencies. Still, security issues may be the greatest obstacle to IoT growth and adoption. Join the conversation, share your experiences and learn from peers from these industries and Palo Alto Networks.
Offered  Wednesday, 11:30 am – 1:00 pm
Keywords  Roundtables
Is Your Office 365 Data Protected?
SaaS applications like Microsoft Office 365 are wildly popular, and adoption across enterprises continues to grow, but so do the hidden threats lying within these offerings, such as:

  • Accidental data exposure with SharePoint
  • Uncontrolled use of personal OneDrive accounts
  • Data security violations in Exchange

Yes, even trusted SaaS applications like Office 365 can increase your risk of breaches and noncompliance.

In this session, you will learn what you need to meet your CASB needs as well as secure your cloud-based data against malware and accidental exposure.

You’ll also find out how to achieve complete visibility and reporting, data classification, and fine-grained enforcement across users, folders and file activities to protect your business-critical data in Office 365.

Offered  Wednesday, 2:40 pm – 3:30 pm
Speakers  Megha Tamvada, Product Manager, Palo Alto Networks
Keywords  Overview Session, SaaS/Aperture
Journey from Network Segmentation to Zero Trust (Luncheon)
Flat, wide-open networks are an ideal playground for cyberattackers, allowing them to explore the environment for high value targets. How much network segmentation have you deployed for security? What’s your experience been with network segmentation? What hurdles did you encounter, and how did you overcome them? Is Zero Trust within reach? Zero Trust answers two questions about network segmentation. 1. “Why am I segmenting?” and 2. “How will I enforce this segmentation?” Come join your peers and a Palo Alto Networks expert to share experiences with Zero Trust network segmentation, and don’t forget to bring your questions too!
Offered  Tuesday, 12:00 pm – 1:30 pm
Keywords  Roundtables, Segmentation, Network Security
Logging Service - A Key Component of Application Framework, GlobalProtect Cloud Service, and Traps
Learn about our cloud-based log collection product: The Logging Service. In this session you will learn architecture, how easy it is to deploy and manage and how it fits with our cloud-delivered services such as GlobalProtect cloud service and Traps Management Solution. Also, how it’s a foundation of Palo Alto Networks Application Framework, which will help companies consume security innovations without having to deploy anything new.
Offered  Wednesday, 2:40 pm – 3:30 pm
Speakers  Jamie Fitz-Gerald, Sr. Product Manager, Palo Alto Networks
Keywords  Application Framework, Security Operating Platform, Technical Session
Next Generation Security for your Cisco ACI Powered Data Center
What are the key requirements for security when your organization is considering Cisco Application Centric Infrastructure (ACI) for your data center? How is Palo Alto Networks solving the data center security challenges in a Cisco ACI fabric? If you seek answers to these questions, this session is for you. We will provide an overview of Cisco ACI concepts every security team should be aware of. You will also learn how Palo Alto Networks firewalls can be integrated with Cisco ACI fabric, different design considerations for firewall insertion, real-world deployment use cases and best practices to follow for security when migrating your data center to a Cisco ACI enabled network fabric.
Offered  Monday, 1:00 pm – 1:50 pm
Speakers  Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks
Christer Swartz, Consulting Engineer, Palo Alto Networks
Keywords  Automation, Case Study/Use Case, Private Cloud/Datacenter, Segmentation, Technical Session, Technology Integration
Operationalizing GDPR: A Practical Privacy & Security Roadmap
The new era of privacy regulation is upon us, and with the potential for hefty fines, companies are forced to pay attention. As a result, security and compliance professionals are making GDPR a top priority. When building a GDPR program, it is essential to build a roadmap with both privacy and security in mind. In this session, we’ll provide some background on key GDPR areas and discuss the importance of privacy management within the context of existing security and compliance ecosystems and how it fits into the larger puzzle. We’ll also address how privacy management can be seamlessly integrated as a function among the information security, information technology, risk management, audit and compliance and legal functions within your organization. We’ll address the importance of demonstrating ongoing compliance with privacy regulations like GDPR, and how privacy management software and security products can support security and GRC teams. Palo Alto Networks will share highlights of its own GDPR readiness journey as a use case.
Offered  Wednesday, 1:30 pm – 2:20 pm
Speakers  David Sinclair, Privacy Consultant, OneTrust
Cynthia Cox, GRC Principal, Palo Alto Networks
Lourdes Turrecha, Senior Privacy Counsel, Palo Alto Networks
Keywords  Automation, Best Practices/Troubleshooting, Case Study/Use Case, Compliance, Technical Session, Threat Detection and Prevention, Data Privacy
Planning and Deploying SSL/TLS Decryption
As a consumer of the Decryption feature in PAN-OS, Palo Alto Networks security team will discuss the rationale behind enabling Decryption in its Campus, metrics that were used to scale Decryption, features/functions available for SSL/TLS decryption, and why some were enabled and others were not.

Palo Alto Networks Sr. Director of IT Security and its Decryption Product Manager alleviate concerns around how to effectively plan and deploy Decryption.

  1. Review SSL decrypt features and options in PAN-OS
  2. Discuss logistics and legal considerations
  3. Discuss their strategy and planning to deploy Decryption
  4. Discuss the Decryption best practices guidelines
  5. Steps taken to troubleshoot Decryption issues
  6. Lessons learn, and security visibility changes before and after Decryption
Offered  Monday, 2:00 pm – 2:50 pm
Speakers  Arun Kumar, Product Line Manager, Palo Alto Networks
Stan Lee, Director, Security Infrastructure, Palo Alto Networks
Keywords  Case Study/Use Case, Management, NGFW, Network Security, Technical Session
Preventing Known and Unknown Command-and-Control with the Next-Generation Firewall
Not all exploitations or malware infections can be stopped at the firewall level, especially if the technique or malware used is unknown and unique as with some targeted attacks. In addition, command-and-control, or C2, is at the heart of much of the modern malware we see, often using encryption as a means to obfuscate activity. In this session we'll take a look at some of the latest techniques attackers are using to establish C2 and how to use the Next-Generation Firewall to employ basic and advanced techniques to more effectively detect and prevent command-and-control traffic from exploited and infected hosts.
Offered  Tuesday, 4:00 pm – 4:50 pm
Speakers  Martin Walter, Product Line Manager, Palo Alto Networks
Bryan Lee, Threat Intelligence Analyst, Unit 42, Palo Alto Networks
Keywords  Network Security, Technical Session, Threat Detection and Prevention, Security Operating Platform
Product Update: Protecting Apps and Data on AWS, Azure and Google Cloud
Whether your organization is well along in the journey to the cloud or just getting started, protecting your applications and data remains a top concern. Each of the major cloud providers will emphasize that security is a shared responsibility – they protect the infrastructure, you protect your apps and data. In this session, Jigar Shah, Product Line Manager for Public Cloud will provide product updates on how Palo Alto Networks can help you protect your applications and data with inline (VM-Series), API-based (Evident) and Workload-based security.
Offered  Wednesday, 10:20 am – 11:10 am
Speakers  Jigar Shah, Sr. Product Manager, Public Cloud, Palo Alto Networks
Keywords  AWS, Azure, Public Cloud, Google Cloud, Technical Session
Protecting Mobile Workforces and Securing Access with GlobalProtect
Even when users are off-premise, network security is a critical requirement. The majority of attacks such as phishing, social engineering, exploits, and malware are delivered over the network and target end users, so stopping the attack from reaching the user is the first step in prevention. If the attacker succeeds in compromising a device, the escalation of the attack typically leverages the network to establishing communication the attacker’s C&C servers. Join this session to learn about how to build a GlobalProtect deployment suitable for delivering 24x7 advanced protection for your organization.
Offered  Wednesday, 10:20 am – 11:10 am
Speakers  Joby Menon, Product Line Manager, Palo Alto Networks
Keywords  GlobalProtect, Network Security, Technical Session, Threat Detection and Prevention
Rapidly Reveal and Stop Threats with the Application Framework
The Palo Alto Networks Application Framework enables you to consume security innovations quickly and efficiently. The Application Framework establishes a different model to adopt apps for detection, analytics, automated prevention, and rapid response. It eliminates the need to provision new sensors and enforcement points, extending the value of your existing investment in the Security Operating System. Teams can adopt apps from an ecosystem of security innovators and gain actionable insight from a wealth of security data built for analytics. The cloud-delivered approach lets you focus on using new capabilities, instead of spending time deploying and operating them. You can prevent successful cyberattacks by continually improving security with natively coordinated apps, without adding infrastructure.
Offered  Wednesday, 10:20 am – 11:10 am
Speakers  Kasey Cross, Senior Product Marketing Manager, Palo Alto Networks
Eric Moret, Senior Technical Marketing Engineer, Palo Alto Networks
Keywords  Application Framework, Overview Session
Retail – Birds of a Feather (Luncheon)
Whether you’re in e-commerce, brick and mortar retail, or a combination of both, come join your retail peers for an open discussion on all things security. Share upcoming projects, war stories, successes and challenges and hear from peers about how they’re utilizing Palo Alto Networks technologies to secure their networks. Bring your security conundrums and questions for your industry peers and a Palo Alto Networks expert.
Offered  Tuesday, 12:00 pm – 1:30 pm
Keywords  Roundtables
Rise of the Miners
Over the past year, we've witnessed a shift in malware used by both the common criminal and targeted actor alike. While ransomware was the belle of the ball in the past, it has been replaced with the up-and-coming cryptocurrency miner. In this session, we’ll explore cryptocurrency trends and the rising popularity of cryptocurrency miners being used and deployed by criminals. We'll talk about how and why the crypto mining-to-ransomware transition has occurred, as well as interesting case studies about how this malware winds up on a victim's machine. Finally, we'll also discuss the most popular cryptocurrencies being mined today, and strategies you can take to mitigate this threat.
Offered  Wednesday, 10:20 am – 11:10 am
Speakers  Alex Hinchliffe, Unit42, EMEA, Palo Alto Networks
Josh Grunzweig, Threat Intelligence Analyst, Palo Alto Networks
Keywords  Overview Session, Threat Research/Unit 42
Scaling the VM-Series with Transit Architectures
Applications deployed on AWS, Azure and Google often require outbound connectivity to applications housed in other VPCs, to resources located on the corporate network, or on the web. As the deployment expands, managing the many individual connections and security becomes complex and cumbersome, oftentimes slowing deployments.

Rather than deploy many firewalls across your deployment, or backhaul traffic through your corporate firewall, organizations are using transitive architectures to help simplify management and reduces cost. Transit architectures use a shared services approach to centralize connectivity and security through a hub and spoke architecture. Connectivity from VPC or VNet spokes to corporate locations or web resources will “Transit” the hub, sharing services such as secure outbound connectivity, and protection from advanced cyberattacks provided by the VM-Series next-generation firewall.

In this session, Jigar Shah, Product Line Manager for the VM-Series will walk through a technical discussion of how you can use Transit architectures with the VM-Series on AWS, Azure and Google Cloud to allow application developers and spoke owners to add and remove applications as needed without being slowed by corporate security processes or change control requirements

Offered  Wednesday, 4:00 pm – 4:50 pm
Speakers  Jigar Shah, Sr. Product Manager, Public Cloud, Palo Alto Networks
Keywords  Public Cloud, AWS, Azure, Technical Session, Google Cloud
Secure User Access and Prevent Credential Abuse Attacks
The theft and use of stolen credentials remain a highly effective attack vector. In this session, you will learn about how user credentials get compromised and its implication on your network. You will also learn how to secure your network against the theft of and use stolen credentials, without compromising on the user experience. Join us to learn how PAN-OS makes it easy for you to prevent users from getting phished, safely enable user access to protected resources, and prevent the attacker from moving laterally within the network with stolen credentials.
Offered  Wednesday, 4:00 pm – 4:50 pm
Speakers  Andrew Silliker, Consulting Engineer, Palo Alto Networks
Keywords  Management, NGFW, Network Security, PAN-OS 8.1, Technical Session, Threat Detection and Prevention
Securing Multi-Cloud (Luncheon)
More and more workloads are moving to the public cloud. To provide greater diversity (both geographic and vendor), satisfy data residency, or to leverage distinctly native features, organizations are adopting the use of multiple cloud service providers. How are you reconciling differing local security capabilities across the CSPs? What security automation have you been able to achieve across your various cloud workloads? Come share your cloud adoption stories and how you’ve implemented security for each. Bring your questions, and join your peers and a Palo Alto Networks expert for a discussion on the journey to multi-cloud security.
Offered  Wednesday, 11:30 am – 1:00 pm
Keywords  Roundtables, Automation, AWS, Azure, Public Cloud, Google Cloud
Securing Remote Office Networks (Luncheon)
Brick and mortar branch offices are still quite commonplace in retail, banking, insurance, etc. Efforts to optimize costs have led to the widespread adoption of internet connections at these remote locations. Are you fully protecting your remote sites – and the whole enterprise? What additional security challenges are these branch office environments presenting? Come share your branch office and network experiences with your peers, and bring your questions for a Palo Alto Networks expert too.
Offered  Wednesday, 11:30 am – 1:00 pm
Keywords  Network Security, Roundtables
Securing the Public Cloud at the Speed of DevOps
Security and DevOps are at odds: one team wants to be right, the other team wants to go fast. But organizations don’t have to sacrifice either security or speed to be secure and compliant in the cloud. By clearly articulating through code the guardrails and policies necessary for operational environments, organizations can gain superior awareness and actionability. When security becomes a part of your DevOps pipeline, you move beyond just monitoring and into holistic cloud security, including automated response, auto-remediation and one-click reporting for compliance and attribution.

Learn how hundreds of organizations have woven security into the fabric their DevOps teams using Evident, and how you, too, can secure your cloud without compromise.

Offered  Monday, 4:30 pm – 5:20 pm
Speakers  Anuj Sawani, Senior Product Marketing Manager, Palo Alto Networks
Keywords  Overview Session, Public Cloud, Compliance
Security Best Practices for Common Cloud Architectures
Getting the public cloud architecture “right” is a critical step in your digital transformation. The challenge some organizations face is that the architecture development process overshadows or minimizes the security best practices conversation. In this session, members of the Cloud Architecture and Threat Research team will walk through security best practices for an internet facing application/service cloud architecture. With the ultimate goal of ensuring your cloud deployment is secure, best practices recommendations will include both the use of native cloud security capabilities and Palo Alto Networks next-generation security capabilities.
Offered  Wednesday, 9:10 am – 10:00 am
Speakers  Jaime Franklin, Consulting Engineer, Palo Alto Networks
Keywords  AWS, Azure, Best Practices/Troubleshooting, Google Cloud, Public Cloud, Technical Session
Security Policy Automation as a Service, a Deep Dive
How do you enable your DevOps teams to use your firewalls without long processes and a lot of paperwork? In close collaboration with ON2IT, we as ING have broken down the corporate security principles and best practices into understandable chunks that can be used through a self-made API. By exposing this API with a GUI we’ve enabled our internal end-users to become in-control of their own security. This was only possible by finding the sweet spot between the security requirements and technical possibilities in a manner that our end-users can understand. Even though they don’t (fully) understand security…
Offered  Tuesday, 4:00 pm – 4:50 pm
Speakers  Johan Bogema, Security Architect, ON2IT BV
Keywords  Network Security, Automation, Case Study/Use Case, Private Cloud/Datacenter, Segmentation, Technical Session, Technology Integration
Seeing the Attacker’s View: People-Centric Protection with Proofpoint and Palo Alto Networks Wildfire
It’s no secret that modern attackers have pivoted to targeting people, largely via phishing emails. A simple internet search can tell them all they need to know about who has access to the system or data they are targeting.

Join this break-out session to learn how organisations have integrated Palo Alto Networks Wildfire with Proofpoint Targeted Attack Protection to identify their most attacked and riskiest users and leveraged that intelligence to stop sophisticated targeted email phishing and malware threats.

Offered  Wednesday, 9:10 am – 10:00 am
Speakers  Werner Thalmeier, Sr. Director Systems Engineering EMEA, Proofpoint
Chris Montgomery, Principal Solution Architect, Proofpoint
Keywords  Overview Session, Technology Integration, Threat Detection and Prevention
Self-Paced Labs
For ultimate flexibility, we are offering a limited number of self-paced lab seats, so you can run the lab of your choice at the time you want. Most of our workshops will be available in the Self-Paced Lab Room so you can get the hands-on experience of instructor-led labs at your own pace. Combine the self-paced lab with an Express Lab Demo to get the full workshop experience.
Offered  Tuesday, 1:00 pm – 3:00 pm
Tuesday, 3:30 pm – 5:30 pm
Wednesday, 9:10 am – 11:10 am
Wednesday, 1:00 pm – 3:00 pm
Wednesday, 3:30 pm – 5:30 pm
Keywords  Hands-on Trainings
Step by Step Guide: Transformation to a Prevention-based Architecture
Clearly, an updated approach to security is necessary. A true transformation of the industry will require both an architectural shift and a parallel shift in operations. Join Kerry in exploring what this transformation looks like in a step by step, prioritized guide to achieving this transformation through feature adoption and the accompanying operations changes that need to occur. Understand the benefits of each step for the business including risk reduction outcomes as well as business and operations outcomes. A change is needed. Let's make it happen.
Offered  Tuesday, 4:00 pm – 4:50 pm
Speakers  Kerry Matre, Sr. PMM Professional Services, Palo Alto Networks
Keywords  Security Operating Platform, Application Framework, Best Practices/Troubleshooting, Overview Session
Stop the Breach without Stopping Business: Proper Tuning of Rulesets and Security Profiles
Proper implementation of Palo Alto Networks products requires all our Next-Generation features to be properly implemented and complementing each other. This includes properly tuned Security Policies and Security Profiles working in combination. When moving from a combination of port-based firewalls, IPS, and URL filtering products to the Palo Alto Networks Security Operating Platform, customers often have a hard time tuning the ruleset and the security profiles to get the required security posture confidently and without effect on business. Often the result is an overcomplicated ruleset and security profile architecture that is impossible to maintain and never reaches the best prevention possible.

This class, taught by the Global Practice Lead for Threat for Professional Services will show you practical ways to accomplish this.

Offered  Wednesday, 2:40 pm – 3:30 pm
Speakers  Suzanne VanPatten, Global Practice Lead - Threat, Professional Services, Palo Alto Networks
Keywords  Security Operating Platform, Best Practices/Troubleshooting, NGFW, Network Security, Technical Session, Threat Detection and Prevention
Strengthen Your Internet Gateway – Understand Your Adversaries’ Tactics; Defend Your Networks and Endpoints
See your network from the vantage point of an attacker and learn what attackers do to achieve their objectives. Learn how to map the specific steps an attacker takes to prevention technologies available on a next-generation firewall. Based on this understanding, you will know how to defend your networks using App-ID, User-ID, Decryption, Threat Prevention and WildFire.
Offered  Tuesday, 2:30 pm – 3:30 pm
Speakers  Mandeep Singh Sandhu, Product Manager, Palo Alto Networks
Arun Kumar, Product Line Manager, Palo Alto Networks
Keywords  Security Operating Platform, Best Practices/Troubleshooting, Management, Network Security, Technical Session, Threat Detection and Prevention
Take Your Knowledge to the Next Level: Develop an App for Application Framework
Palo Alto Networks Application Framework is a powerful technology that lets customers and partners build solutions able to analyze, enrich and process security information, achieving unprecedented levels of protection.

On the Application Framework, customers can quickly enable 3rd party services to securely access their own data lake, or feed it with additional information. APIs are also provided to allow clients to build their own security controls and processes around Palo Alto Networks Application Framework.

Multiple integrations become possible through the services made available by the Application Framework: this session describes its components and interfaces, and presents many of the most relevant existing and future partner integration use cases across multiple security areas, such as Security Analytics, Threat Intelligence, Security Operations and Orchestration.

Offered  Wednesday, 4:00 pm – 4:50 pm
Speakers  Steven Serrata, Solutions Architect, Palo Alto Networks
Francesco Vigo, Partner Architect, Palo Alto Networks
Keywords  App Developers, Application Framework, Technical Session
Telefonica’s Threat Intel Feed Service Using MineMeld
As the threat landscape evolves, new threat intelligence feeds continually emerge to mitigate the latest threats. Organizations need an efficient way to collect threat intelligence from multiple sources and publish these feeds to all their enforcement layers—including next-generation firewalls, endpoint protection agents, proxies, and SIEMs. MineMeld, an open source threat intelligence sharing application, streamlines the management of threat intelligence data. With MineMeld, organizations can automatically aggregate, manage and distribute indicators of compromise (IoCs) and other types of threat intelligence to their enforcement points.

Attend this session to:

  • Learn best practices, lessons learned and whitelisting strategies for MineMeld
  • Understand how Telefonica automates security operations with MineMeld
  • Find out how Telefonica uses MineMeld to route millions of IoCs grabbed from many sources to hundreds of different consumers
Offered  Wednesday, 8:00 am – 8:50 am
Speakers  Miguel Angel de Castro, Cyber Threat Analyst, Telefonica-ElevenPaths
Keywords  Application Framework, Case Study/Use Case, Technical Session
The Rise of Proactive Prevention, Introducing Secdo’s Approach to EDR
While most EDR solutions focus on providing basic visibility into malware, Palo Alto Networks’ latest acquisition, Secdo, combines thread-level visibility with automation to simplify the investigation, resolution and hunting of any threat type. This unique approach empowers security analysts of any skill level to rapidly identify the root cause and business impact of even the most complicated of attacks.

Attendees will discover how endpoint visibility can be applied to force-multiply existing security operations, reduce the attack surface area with threat hunting using attack behaviors, and walk away with an effective evaluation criteria for EDR solutions.

Offered  Wednesday, 1:30 pm – 2:20 pm
Speakers  Or Cohen, Sr. Technical Marketing Engineer, Palo Alto Networks
Keywords  Endpoint/Traps
The Value of Attribution Beyond Law Enforcement Action
For years, there has been a long-held belief that attacker attribution is unrealistic – hard at best, risky if incorrect, and devoid of any real business purpose. Attribution, some say, is an effort best left to law enforcement. In this session, Unit 42 researchers Jen Miller-Osborn and Simon Conant will turn this attitude around. Using real-world examples, they will demonstrate effective attribution techniques, and explain how knowing your attacker is a fundamental component in assessing your exposure.
Offered  Wednesday, 2:40 pm – 3:30 pm
Speakers  Jen Miller-Osborne, Threat Intelligence Analyst, Palo Alto Networks
Keywords  Overview Session, Threat Research/Unit 42
Threat Actor Oops and Bloops!
Cybercriminals are often seen as anonymous, international, hacker masterminds, who are nearly impossible to identify, understand, or capture. Despite the lore, adversaries are human too and as a result, are just as vulnerable to mistakes as others. Every day, Unit 42 researchers analyze attack campaigns and monitor adversaries as they carry out their operations. Sometimes we come across interesting situations that make us laugh, cringe, or scratch our heads. In this presentation, we will showcase examples of OPSEC mistakes, operational missteps and poor coding practices – all while having some fun at the expense of those responsible.
Offered  Wednesday, 4:00 pm – 4:50 pm
Speakers  Mike Harbison, Threat Intelligence Analyst, Palo Alto Networks
Robert Falcone, Threat Intelligence Analyst, Palo Alto Networks
Keywords  Technical Session, Threat Research/Unit 42
Threat Hunting and Automated Enforcement for Service Providers with AutoFocus and MineMeld
Service Providers require new tools and approaches to address the increasing security challenges that are impacting their networks and their revenue producing customers. With expanding threat vectors and massive growth in usage of digital services, Service Providers need new ways to most effectively automate and leverage the vast amount of threat intelligence at their disposal, and quickly turn this information into actionable security outcomes that enables them to protect their customers and business operations.

During this session we will demonstrate how the combination of Palo Alto Networks AutoFocus and MineMeld can be used by Service Providers to drastically simplify threat hunting and significantly increase the speed and effectiveness of applying security enforcements with true “no-touch” automation.

Offered  Wednesday, 8:00 am – 8:50 am
Speakers  John Newsome, Systems Engineer, Palo Alto Networks
Keywords  Automation, Overview Session, Service Providers
Today’s Threats – What’s New and How to Stop them with the Palo Alto Networks Platform
What are the latest real-world threats we see targeting our customers? Are you utilizing the Palo Alto Networks Security Operating Platform (Next Generation Security Platform) to its full potential to stop those threats? John and Erik are back with new material for 2018 highlighting some of the best techniques within the platform. This must-attend session will highlight some of the latest attack, command and control and exfiltration techniques, provide in-depth policy recommendations and offer many more "top tips" to simplify the job of stopping adversaries and using the platform in ways you never expected. Whether you're a veteran or new to Palo Alto Networks, you'll leave this fast-paced presentation with practical ways to better protect your organization.
Offered  Tuesday, 1:00 pm – 2:00 pm
Speakers  John Harrison, Sr. Product Manager, Palo Alto Networks
Erik Yunghans, Consulting Engineer-Threat Prevention, Palo Alto Networks
Keywords  Security Operating Platform, Best Practices/Troubleshooting, Network Security, Technical Session, Threat Detection and Prevention
Traps Overhauled - New Look, New Feel, New Capabilities for Endpoint Protection
The recent release of Traps 5.0 brings a brand new user experience focused on reducing complexity and improving team efficiency across the platform. With a new cloud-based management console to simplify deployment, proactive scanning and Linux support, come find out what the buzz is about and the impact it has had on our customers. Toyota Motors Europe will also share their experiences and journey implementing Traps advanced endpoint protection.
Offered  Tuesday, 4:00 pm – 4:50 pm
Speakers  Hein Vandenabeele, Security Engineer, Toyota Motor Europe
Ofir Monza, Product Manager, Palo Alto Networks
Keywords  Case Study/Use Case, Endpoint/Traps
Ultimate Test Drive - Network Security Management (Panorama)
This hands-on session provides insight into Panorama network security management for the Next-Generation Security Platform. You’ll learn some of the unique features of Panorama that can help you manage and deploy Palo Alto Networks firewalls more effectively. Topics include:

  • How to utilize templates, device groups, and pre-, local- and post-policies
  • Import existing configurations into Panorama
  • Updating PAN-OS and subscription content on a group of firewalls
  • Enabling and managing Logging Service

Required: Participants must bring a laptop with an HTML5-compatible browser. External display with HDMI connection will be provided, please bring the appropriate dongle for your laptop.

Prerequisites: Must have some knowledge of Palo Alto Networks next-generation firewall.

Offered  Monday, 3:30 pm – 5:30 pm
Tuesday, 1:00 pm – 3:00 pm
Wednesday, 1:00 pm – 3:00 pm
Keywords  Hands-on Trainings, Management, NGFW, PAN-OS 8.1
Ultimate Test Drive – Advanced Endpoint Protection
Join us in this hands-on session to learn how to defeat the adversary at the endpoint with Palo Alto Networks Traps advanced endpoint protection. You’ll learn how to:

  • Break down the sophisticated cyberattack lifecycle and chain-like nature of exploits
  • Prevent file- and network-based exploits originating from executable or data files
  • Leverage cloud intelligence to enhance zero-day threat protection

Required: Participants must bring a laptop with an HTML5-compatible browser. External display with HDMI connection will be provided, please bring the appropriate dongle for your laptop.

Offered  Monday, 1:00 pm – 3:00 pm
Tuesday, 3:30 pm – 5:30 pm
Wednesday, 9:10 am – 11:10 am
Keywords  Endpoint/Traps, Hands-on Trainings, NGFW
Ultimate Test Drive – Security Operating Platform (Next Generation Security Platform)
Palo Alto Networks Next-Generation Security Operating Platform protects our digital way of life by safely enabling applications as well as preventing known and unknown threats across networks, clouds and endpoints. This workshop demonstrates how the natively integrated Next-Generation Security Platform delivers a prevention architecture that can provide superior security and reduce the likelihood of successful cyberattacks.

Required: Participants must bring a laptop with an HTML5-compatible browser. External display with HDMI connection will be provided, please bring the appropriate dongle for your laptop.

Offered  Monday, 1:00 pm – 3:00 pm
Tuesday, 3:30 pm – 5:30 pm
Wednesday, 9:10 am – 11:10 am
Keywords  Hands-on Trainings, Security Operating Platform
Ultimate Test Drive – Virtual Data Center
This session provides data center managers and security administrators an opportunity to deploy Palo Alto Networks virtualized next-generation firewall in a virtualized data center. You’ll learn how to integrate the VM-Series on NSX firewall together with VMware standard networking functions and the NSX network virtualization and security platform. You’ll learn how to:

  • Enable application visibility and threat prevention in a virtualized environment
  • Experience the seamless integration between Palo Alto Networks and VMware NSX
  • Apply Palo Alto Networks Panorama network security management to manage both virtual and physical appliances
  • Deploy multi-tenancy solutions to secure more than one tenant, such as a customer or organization, with VMware NSX
  • Quarantine devices using automated security actions based on data center event triggers

Required: Participants must bring a laptop with an HTML5 compatible browseri. External display with HDMI connection will be provided, please bring the appropriate dongle for your laptop.

Prerequisite: Must have some experience with VMware vCenter and ESXi.

Offered  Monday, 3:30 pm – 5:30 pm
Tuesday, 1:00 pm – 3:00 pm
Wednesday, 1:00 pm – 3:00 pm
Keywords  Hands-on Trainings, NGFW, Private Cloud/Datacenter, Segmentation, Technology Integration
Understanding CASB to Secure your SaaS Applications
For SaaS security, organizations are typically overwhelmed with many options in the market today. CASB vendors offer various architectural approaches and options such as forward proxy, reverse proxy and API-based offerings. This session will deep-dive on the ideal architecture and provide a comprehensive view of these approaches along with their pros and cons. After attending this session, you will have a good understanding of the overall CASB market and have all the information you need to build a short-term and long-term SaaS security strategy.
Offered  Wednesday, 1:30 pm – 2:20 pm
Speakers  Hajer Dlame, Product Manager, Palo Alto Networks
Keywords  Best Practices/Troubleshooting, Compliance, Overview Session, SaaS/Aperture
Using Best Practices to Prevent Successful Cyber Attacks
This session covers our approach for gaining full visibility and reducing your attack surface to prevent successful cyber attacks across all areas of architecture. We discuss the best way to protect against cyber threats and build confidence that you are reducing risk. The session includes how to implement best practices without interrupting business continuity. We use three case studies as examples to show how we use the approach with customers.

Due to popular demand, this session is being offered twice over Ignite '18 Europe.

Monday 8 October 2018: 16:30-17:20 & Wednesday 10 October 2018: 08:00-08:50
Offered  Monday, 4:30 pm – 5:20 pm
Wednesday, 8:00 am – 8:50 am
Speakers  Tim De Boeck, Customer Success Architect, Palo Alto Networks
Keywords  Security Operating Platform, Best Practices/Troubleshooting, Management, NGFW, Network Security, Overview Session
Visualize and Analyze Threat Data from Service Provider Networks - Drive Effective Security Outcomes
Managed Security Service Providers (MSSPs) and enterprises are challenged to create effective security feedback loops with the evolution of complex, uncorrelated, and poorly integrated security deployments that also are producing significant amounts of data that requires rapid analysis. This session will showcase how information generated by our NGFW can be used programmatically. We’ll illustrate some of the different ways to capture information from the firewall and how to use modern tools like the ElasticStack to easily visualize the data. We’ll show how MSSPs can deliver greater value to their customers, and how enterprises can achieve better security outcomes with more effective analysis of data.
Offered  Tuesday, 4:00 pm – 4:50 pm
Speakers  Edward Arcuri, Consulting Engineer, Service Provider Technology, Palo Alto Networks
Keywords  Security Operating Platform, NGFW, Overview Session, Service Providers
WildFire and Threat Prevention: An Update On a Threat Approach to Stopping the Adversary
In this session you’ll learn in depth about some of the technical inter-workings of features released over the last year from WildFire, Threat Prevention and URL Filtering services. This talk will focus include:

  • New attack trends found with the extension of Wildfire to support Linux servers and IOT devices
  • Why SMB protocol support and advances in network pattern matching are enabling prevention in more areas of the network
Offered  Wednesday, 1:30 pm – 2:20 pm
Speakers  Garrett Hamilton, Product Manager, Palo Alto Networks
Keywords  Security Operating Platform, Network Security, Overview Session, PAN-OS 8.1, Threat Detection and Prevention
Zero Trust (in the Cloud) with Zero Touch
A zero trust approach to security can enforce separation of apps and data for regulatory compliance and threat prevention. The challenge you face is how best to ensure this premise extends to the development team without slowing the business. The answer: use automation to implement a zero touch approach that embeds security into your application development workflows. In this session, Cloud Security Architects will review the concepts and benefits of taking a Zero Trust approach followed by a deep dive (& demo) into how you can achieve zero trust with zero touch.
Offered  Wednesday, 2:40 pm – 3:30 pm
Speakers  James Holland, Systems Engineer, Palo Alto Networks
Keywords  AWS, Azure, Public Cloud, Technical Session, Google Cloud
Register Now