September 24, 2019 | Sheraton Grand Sacramento Hotel
At Spark Sacramento, attendees had the opportunity to network with fellow Palo Alto Networks users in the Sacramento area and hear the latest updates and threat research from Palo Alto Networks.
Spark Sacramento featured sessions to enhance your skills, including hands-on workshops and collaborative sessions with actionable solutions and strategies for key security issues.
Spark User Summit Sacramento
Sheraton Grand Sacramento Hotel
1230 J St.
Sacramento, CA 95814 USA
SCHEDULE AT A GLANCE*
8:45 a.m. - 9:00 a.m. Welcome and Overview
9:00 a.m. - 9:45 a.m. Opening Keynote: Breakthroughs at Palo Alto Networks
Palo Alto Networks
One of the benefits of Fuel membership is early access to the latest developments from Palo Alto Networks. This session will discuss product updates and releases, including new features in PAN-OS, Prisma, Cortex, as well as an update on how recent acquisitions like TwistLock are extending public cloud security capabilities. This information will help you expand prevention capabilities through enhanced analysis, automation and operational efficiencies. We'll cover topics including achieving compliance, improving threat detection and response, and addressing mobile security considerations, then leave time for audience Q&A.
9:45 a.m. - 9:55 a.m. Break
9:55 a.m. - 10:40 a.m. Breakout Sessions
Breakout 1: Optimizing the Firewall Ruleset
Firemon
From the low hanging fruit of redundant rules to in-depth traffic summaries, we will discuss why an optimized ruleset is important and the five steps you can take to keep your organization's firewalls running efficiently and securely.
Breakout 2: Protect Your Keys or Don’t Waste Your Time Encrypting Your Data
nCipher
For over 2000 years, governments, armies, businesses and lovers have been encrypting messages. For the same amount of time, the keys used to perform the encryption have been the weakest link in the chain. After 2000 years, technology has advanced such that the keys can be protected but many companies don’t understand how important it really is. Mr. Beutlich will explain in an entertaining (and sometimes graphic) fashion why protecting the encryption key is more important than the encryption itself.
10:40 a.m. - 10:50 a.m. Break
10:50 a.m. - 11:35 a.m. Breakout Sessions
Breakout 1: Automate Everything: The Future of Security Automation
Indeni
As the set of products needed to manage an organization's security becomes more and more diverse, a bigger skills gap continues to open. Teams can't hire or train fast enough to manage threats at a human speed anymore, which makes automation a critical consideration. In this session, we'll dig into the details of what you can do with your current resources to see your organization clearly, report more accurately, and react faster with less manual work.
Topics covered include:
- Validating your visibility and proactive health checks
- Identifying high-impact automation changes
- Leveraging your existing tools within the firewall and cloud platforms
- Making notifications actionable
Breakout 2: Zingbox and Palo Alto Networks – the Next Step in IoT Security
Zingbox
The newest protection service from Palo Alto Networks joins us in Sacramento to share information on IoT security problems commonly seen in the enterprise, what IoT devices are more vulnerable, what types of attacks are common, and more.
11:35 a.m. - 11:45 a.m. Break
11:45 a.m. - 12:15 p.m. Fast and Furious - An Expert Competition
Get ready for a little friendly competition as we put our experts on the spot! Help us choose the questions you want answered, then hear our panel debate and discuss their best ideas. The most successful solution is the one that gets your vote!
Topics may include:
- Centralized change management
- Safe feature enablement
- Choosing a public cloud
12:15 p.m. - 1:15 p.m. Lunch with Partners
1:15 p.m. - 2:00 p.m. Breakout Sessions
Breakout 1: Intelligent Automation – Join the Revolution
BackBox
Join BackBox as we take a deep dive into intelligently automating the management and validation of your Palo Alto Networks device configurations, deep application monitoring as well as addressing the overwhelming task of upgrading these devices. Learn how implementing an Intelligent Automation solution will help to increase an organization’s operational efficiency, reliability and visibility while significantly reducing overall risk.
Breakout 2: A Threat Hunters Toolkit
Palo Alto Networks
While many organizations focus on developing a solid defensive cybersecurity plan and then hope the walls hold, this strategy is inevitably going to fail. It's just as important to be proactive in your approach to threat management. Join us for an examination of why it's important to make threat hunting an organizational priority, how to get started and how to develop your methodology for a successful hunt.
2:00 p.m. - 2:10 p.m. Break
2:10 p.m. - 2:55 p.m. Today's Threat Landscape
Unit 42, Palo Alto Networks
Hear the Unit 42 team discuss the current threat landscape. Unit 42 will highlight several campaigns and review advances in malware, ransomware, and cyber threats, that adversaries are using to breach modern enterprise networks.
2:55 p.m. - 3:00 p.m. Closing Comments: How to Leverage the Fuel Community to Become an Expert
Spark is only one day, but Fuel User Group is available to you 365 days a year! Learn more about the year-round benefits of membership, how you can access our online activities, and how you can be a part of the local Fuel chapter.
3:00 p.m. - 5:00 p.m. Networking Reception
*subject to change.
Diamond
Platinum
Gold
Silver