Ignite On Tour Dubai
Jul 
22nd
RSVPs Closed
Text goes here
X
Palo Alto Networks
Register now
Text goes here
X
Agenda
Location
Speakers
Sponsors
Ignite On Tour Dubai

Museum of the Future
9th March 2023

Register Now
Text goes here
X

In Partnership with

Cybersecurity takes center stage

Catch all the highlights from the industry’s premier cybersecurity event at Ignite on Tour Dubai.


Hear from some of the biggest names and brightest minds in cybersecurity about how Palo Alto Networks can help you respond to major trends and challenges, including:


  • 65cbea0972faa1da63428aaae75b4e05.Checkmark.pngSecuring hybrid workforces consistently and at scale
  • 65cbea0972faa1da63428aaae75b4e05.Checkmark.pngProtecting cloud-native applications
  • 65cbea0972faa1da63428aaae75b4e05.Checkmark.pngEnabling Zero Trust
  • 65cbea0972faa1da63428aaae75b4e05.Checkmark.pngLeaning on AI and automation to run security operations
  • 65cbea0972faa1da63428aaae75b4e05.Checkmark.pngDefending mobile networks and IOT devices


Register now to secure your spot.

Please note, this event is exclusively for end users. We look forward to seeing you there!

Museum of the Future

Agenda

9:30 - 10:30

Registrations and Coffee

10:30 - 10:35

Welcome keynote

Ercan Aydin- Vice President, Emerging Markets

Location: Keynote Stage (back of the hall)

10:35 - 10:50

Transforming and Securing the Digital Next

Helmut Reisinger- CEO EMEA & LATAM

Location: Keynote Stage (back of the hall)

The digital economy has experienced accelerated transformation in the last three years. Organizations are harnessing cloud-based innovations to drive their digital initiatives, elevate the customer experience, create greater efficiencies, and break away from their competition. Where is Cloud computing heading and how should organizations be thinking about cybersecurity?

10:50 - 11:00

Interview with a Palo Alto Networks customer

Location: Keynote Stage (back of the hall)

11:00 - 11:20

Keynote from H.E. Dr. Mohamed Hamad Al Kuwaiti, Head of Cybersecurity of the UAE Government

Location: Keynote Stage (back of the hall)

11:20 - 11:50

Intelligence Driven. Response Ready.

Wendi Whitmore, Senior Vice President of Unit 42, Palo Alto Networks

Location: Keynote Stage (back of the hall)

There was a time when nation-state actors were the trendsetters in threat innovation. But times change, and there's a new bellwether now. The good news: Unit 42 knows what's next.
During this session, we will give you an insider's view into Unit 42's world-renowned threat intelligence and incident response. We will reveal the new tactics and techniques surfacing in the evolving threat landscape, so you can be better prepared for what's next.

11:50 - 12:10

Customer Panel Discussion

Marilyn Zakhour, CEO & Co-Founder, Cosmic Centaurus

Location: Keynote Stage (back of the hall)

12:10 - 12:40

Coffee Break

12:40 - 13:10

Out-Innovating the Attackers 

Lee Klarich, Chief Product Officer, Palo Alto Networks

Location: Keynote Stage (back of the hall)

 We've all heard it many times across many years: The threat landscape is getting increasingly challenging. With the highly motivated and innovative adversaries we face, it's likely this will always be true. But it is possible to beat them at their own game, no matter how quickly they move. Palo Alto Networks Chief Product Officer Lee Klarich deconstructs key elements of successful attacks and outlines a better approach to out-innovate cybercriminals.

13:10 - 13:30

Operational Resilience as a Business Differentiator

Haider Pasha, Chief Security Officer EMEA & LATAM, Palo Alto Networks

Location: Keynote Stage (back of the hall)

As CIO and CISO roles evolve in a post-pandemic world, we begin by highlighting their strategic business priorities based on region-specific CxO feedback. We then discuss an approach to move from reactive to proactive security, bringing together what has been discussed during the previous keynotes and combining it under one message; Operational Resilience. This session is a practical use-case of how organizations are using Operational Resilience to differentiate themselves from their competitors, and how Palo Alto Networks is helping them through this journey.

13:30 - 14:30

Lunch & Activation Area opens

12:30 - 13:30

Threat Intel & Security Operations

Location: Keynote Stage (back of the hall)

Zero Trust & Network Security

Location: Behind the Palo Alto Networks Networking area

Cloud Security

Location: Area on right side of the room

14:30 - 15:00

Threat Intel & Security Operations

14:30- 15:00

2022 Evolving Threat Landscape
Eric Semaan, Consulting Director

Ransomware attacks, supply chain attacks, state-sponsored advanced persistent threats (APTs), and other cybercrimes affect organizations worldwide, every minute. It's imperative to understand your adversaries, re-examine your security posture and make significant changes that would otherwise be difficult in relative peacetime. With our threat intelligence, incident response, and product development teams working together, Palo Alto Networks sees attacks from a unique perspective. During this discussion, we will share an inside view of the cyberthreat landscape while providing detailed intelligence and practical guidance on how we are evolving our technology so you can rethink your defenses.

15:00- 15:30

Stopping Attackers In Flight
Simon Willgoss, Head of Managed Cyber Security Services, Help AG

Help AG will share how customers are protected in near-real-time through curated cyber threat intelligence automatically integrated with PAN NGFW to rapidly stop attackers early in the kill-chain and relieve the burden on SecOps teams.

Zero Trust & Network Security

14:30- 15:00

Why Your SASE Deployment Should Start with ZTNA 2.0
Nicolas Warnier, VP SASE EMEA & LATAM

It's clear that it's no longer if you'll implement SASE, but when and how. Join this session to learn why your SASE deployment should start with ZTNA 2.0, and what to watch out for. Hear from Palo Alto Networks Experts on why current legacy ZTNA solutions fall short and the need for ZTNA 2.0 to secure your hybrid workforce.

15:00- 15:30

10 Best Practice Tips to stop Ransomware Attacks
John Harrison, Senior Product Marketing Manager, Strata

In this session we will map out how ransomware has evolved in 2023 and focus on 10 best practices and policy recommendations using the Palo Alto Networks NGFW, SASE, CDSS, Cortex and Prisma Cloud solutions for protection against Ransomware attacks. Palo Alto Networks Ignite rockstar, John Harrison, is back for his 7th Ignite session to share this update with you!

Cloud Security

14:30- 15:00

Simplifying and Securing Your Multi-Cloud Journey
Mark Govan, Senior Director, Prisma Cloud Solutions Architects

As you rapidly develop cloud native applications, adopt cloud infrastructure and service, it's critical that you can visualise and manage all vulnerabilities in a simple manner. During this session, we'll share our perspective on why a prevention-first platform can accelerate your journey to the cloud whilst minimising risk.

15:00- 15:30

Securing Business Transformation
Ben Fleming, Sr Strategic Alliance Manager – Security, Amazon Web Services

Organisations don’t have to choose between business agility and strong security when partnering with Palo Alto Networks and Amazon Web Services.

15:00 - 15:30

Threat Intel & Security Operations

15:00- 15:30

Stopping Attackers In Flight
Simon Willgoss, Head of Managed Cyber Security Services, Help AG

Help AG will share how customers are protected in near-real-time through curated cyber threat intelligence automatically integrated with PAN NGFW to rapidly stop attackers early in the kill-chain and relieve the burden on SecOps teams.

Zero Trust & Network Security

15:00- 15:30

10 Best Practice Tips to stop Ransomware Attacks
John Harrison, Senior Product Marketing Manager, Strata

In this session we will map out how ransomware has evolved in 2023 and focus on 10 best practices and policy recommendations using the Palo Alto Networks NGFW, SASE, CDSS, Cortex and Prisma Cloud solutions for protection against Ransomware attacks. Palo Alto Networks Ignite rockstar, John Harrison, is back for his 7th Ignite session to share this update with you!

Cloud Security

15:00- 15:30

Securing Business Transformation
Ben Fleming, Sr Strategic Alliance Manager – Security, Amazon Web Services

Organisations don’t have to choose between business agility and strong security when partnering with Palo Alto Networks and Amazon Web Services.

15:00 - 15:30

Sponsor session

15:30 - 15:45

Coffee Break

12:30 - 13:30

Threat Intel & Security Operations

Zero Trust & Network Security

Cloud Security

15:45 - 16:15

Threat Intel & Security Operations

15:45- 16:15

Why Palo Alto Networks Is Headed To SOC Supremacy
Ayman Mahmoud, Solutions Architect, Cortex

Data has allowed security operations centers (SOCs) to transform, but its volume and fragmentation is thwarting SOC efficiency, so threats can still dwell inside corporate networks for months. While triaging dozens of alerts daily, cyber analysts must leverage terabytes of data scattered across different sources and switch between different workflows to piece together the ‘story’ of an attack. The current SOC model is broken, and it’s time for a rethink. Based on a unified data model and an analytics-first approach, XSIAM provides the foundation for a modern, proactive, automation-driven SOC.

16:15- 16:45

Unearth advanced threats using your network and cloud data
Hamza Al-Qudah, Systems Engineering Specialist, Cortex

The truth is out there, hiding in your data. Whether you’re hunting for adversaries in your network or searching for compromised cloud assets, your mission is to detect and stop threats fast. By analyzing cloud and network data with machine learning, you can uncover active attacks anywhere in your organization, including advanced threats targeting cloud containers, VMs, and managed and unmanaged devices.

In this session, Palo Alto Networks experts will demonstrate how you can use XDR to hunt for stolen cloud tokens and stealthy network attacks, detect adversaries operating in your organization using analytics, machine learning, and rich data and ultimately stop sophisticated cloud and network attacks.

Zero Trust & Network Security

15:45- 16:15

Latest Innovations in Network Security
Walid Adlouni, Systems Engineer

Learn about the latest innovations in Network Security with the latest in PAN-OS releases including the recently announced PAN-OS® 11.0 Nova and latest fourth-generation ML-Powered NGFWs. With 50+ product updates and innovations, Nova is a leap forward in network security. Palo Alto Networks innovations help you to increase your security protection and compliance while reducing the operational cost and complexity and allowing you the speed and agility to secure your organisation. PAN-OS® 11.0 Nova innovations include new Advanced WildFire® and Proxy, and also innovations in Advanced Threat Prevention, CASB and AIOps. The NetSec Platform brings PAN-OS innovations to SASE, ML-Powered NGFW Hardware and Software Firewalls. Software Firewalls protect all clouds with agility covering your virtual lift-and-shift and cloud-native container applications.

16:15- 16:45

Never Trust, Always Verify: How to Secure IoT Devices using a Zero Trust Approach
Jihad Al-Ramahi, Senior Systems Engineer

The first half of 2021 saw 1.5 billion attacks on smart devices, more than 100% growth in cyberattacks against Internet-of-Things (IoT) devices. This session shares a set of best practices to help you with a closed-loop Zero Trust security strategy to protect your IoT, IoMT, and OT devices:
Understand the security risks to the enterprise, industrial and healthcare networks introduced by increasing digitization.
Learn about the key challenges in securing unmanaged IT, IoT, and OT devices and how to properly implement segmentation to limit risk.

Cloud Security

15:45- 16:15

Maximising the efficiency of your security operations in a multi-cloud world
David Maclean, Manager, Solution Architects - Prisma Cloud

74% of our customers state that multi-cloud is a reality today, not a problem for tomorrow. Maximising the effectiveness of your cloud and security operations teams available time and skills is critical. During this session, we'll outline how an integrated approach to managing cloud posture across multiple Cloud Service Providers can reduce the workload on your teams by standardising on one set of policies whilst improving security as a result of end to end visbility from the code, build, deploy, run approach of Prisma Cloud.

16:15- 16:45

Securing all aspects of your Cloud Workloads
Amjad Jabali, Prisma Cloud Solutions Architect UAE

The protection of application workloads has been gaining a lot of attention in recent years due to the move of modern applications to cloud-native environments and micro-service based architectures. In this session, we will cover the the best practices that all organizations need to secure application workloads as well as discuss the synergies and value that can be gained by combining workload protection with other layers of security as part of a Cloud Native Application Protection Platform.

16:15 - 16:45

16:15- 16:45

Unearth advanced threats using your network and cloud data
Hamza Al-Qudah, Systems Engineering Specialist, Cortex

The truth is out there, hiding in your data. Whether you’re hunting for adversaries in your network or searching for compromised cloud assets, your mission is to detect and stop threats fast. By analyzing cloud and network data with machine learning, you can uncover active attacks anywhere in your organization, including advanced threats targeting cloud containers, VMs, and managed and unmanaged devices.

In this session, Palo Alto Networks experts will demonstrate how you can use XDR to hunt for stolen cloud tokens and stealthy network attacks, detect adversaries operating in your organization using analytics, machine learning, and rich data and ultimately stop sophisticated cloud and network attacks.

16:15- 16:45

Never Trust, Always Verify: How to Secure IoT Devices using a Zero Trust Approach
Jihad Al-Ramahi, Senior Systems Engineer

The first half of 2021 saw 1.5 billion attacks on smart devices, more than 100% growth in cyberattacks against Internet-of-Things (IoT) devices. This session shares a set of best practices to help you with a closed-loop Zero Trust security strategy to protect your IoT, IoMT, and OT devices:
Understand the security risks to the enterprise, industrial and healthcare networks introduced by increasing digitization.
Learn about the key challenges in securing unmanaged IT, IoT, and OT devices and how to properly implement segmentation to limit risk.

16:15- 16:45

Securing all aspects of your Cloud Workloads
Amjad Jabali, Prisma Cloud Solutions Architect UAE

The protection of application workloads has been gaining a lot of attention in recent years due to the move of modern applications to cloud-native environments and micro-service based architectures. In this session, we will cover the the best practices that all organizations need to secure application workloads as well as discuss the synergies and value that can be gained by combining workload protection with other layers of security as part of a Cloud Native Application Protection Platform.

17:00 - 18:00

Private Tour - Museum of the Future

9:30 - 10:30

Departures

Location

Museum of The Future
Trade Centre 2
Dubai

Agenda

10:30–12:30

12:30–13:30

13:30–16:30

16:30–18:30

Keynotes

Lunch

Breakout Sessions

Museum Tour

10:30–12:30

Keynotes

 

12:30–13:30

Lunch

 

13:30–16:30

Breakout Sessions

 

16:30–18:30
Museum Tour

Location

Museum of The Future
Trade Centre 2
Dubai

Speakers who spark change

Ercan Aydin
Vice President, Emerging Markets

Palo Alto Networks

Helmut Reisinger
CEO EMEA & LATAM

Palo Alto Networks

Lee Klarich
Chief Product Officer

Palo Alto Networks

Wendi Whitmore
Senior Vice President of Unit 42

Palo Alto Networks

Haider Pasha
Chief Security Officer EMEA & LATAM

Palo Alto Networks

Zeynep Inanoglu Ozdemir
Chief Marketing Officer

Palo Alto Networks

SPONSORS

Ignite 22 Agenda

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod temp.

9:00 am | EDT

Session 1 - Keynotes
Room 1
Keynotes is Session 1, there will be more details soon.

  • SOC/Threat Intel - part 1 (open to all)
  • Zero Trust/NetSec - part 1 (open to all)
  • Cloud Security - part 1 (open to all)
  • SOC/Threat Intel - part 2 (open to all)
  • Zero Trust/NetSec - part 2 (open to all)
  • Cloud Security - part 2 (open to all)

10:00 am | EDT

Session 2 - Products
Room 2
Keynotes is Session 1, there will be more details soon.

  • SOC/Threat Intel - part 1 (open to all)
  • Zero Trust/NetSec - part 1 (open to all)
  • Cloud Security - part 1 (open to all)
  • SOC/Threat Intel - part 2 (open to all)
  • Zero Trust/NetSec - part 2 (open to all)
  • Cloud Security - part 2 (open to all)

11:00 am | EDT

Session 3 - Expo
Room 3
Keynotes is Session 1, there will be more details soon.

  • SOC/Threat Intel - part 1 (open to all)
  • Zero Trust/NetSec - part 1 (open to all)
  • Cloud Security - part 1 (open to all)
  • SOC/Threat Intel - part 2 (open to all)
  • Zero Trust/NetSec - part 2 (open to all)
  • Cloud Security - part 2 (open to all)

Register now

SAVE YOUR SEAT
NOW

Complete the details to register for Ignite on Tour Dubai 2023 and be ready for the industry’s premier cybersecurity event of the year!

If you have any specific dietary or access requirements, or for any other questions, please email us directly at igniteontour-emea@paloaltonetworks.com.

Copyright © 2023 Palo Alto Networks. All rights reserved

Privacy
Text goes here
X
Contact Us
Text goes here
X
Terms of Use
Text goes here
X
Link Text
Text goes here
X

Amazon Web Service Security

Speaker: Mary Smith

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Armis

Gold Sponsor

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Armis

Gold Sponsor

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

John Smith

SVP of Public Cloud Security Products

Palo Alto Networks

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Lorem ipsum dolor sit amet, consectetur adipiscing elit

Leslie Alexander

Nursing Assistant

Louis Vuitton

Est ac ac mauris arcu, vestibulum. Quam elementum risus duis amet. Magna quam sem vestibulum id senectus mauris. Ultrices amet id turpis sed integer libero in nunc morbi. Nisl, in nunc morbi turpis semper senectus at. Mauris, tincidunt nunc netus scelerisque et velit in. Ut tincidunt nullam gravida id urna, augue. Tempor vestibulum suspendisse faucibus ut elit. Hendrerit nec mattis tristique turpis sit. Aliquam interdum sed fames augue nec. Adipiscing erat sed nullam at vulputate amet. Semper vitae molestie nam ullamcorper gravida.

SPEAKER BIO

Michael Coden

Head of Cybersecurity Practice

BCG

Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.

SPEAKER BIO

Michael Coden

Head of Cybersecurity Practice

BCG

Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.

SPEAKER BIO

Michael Coden

Head of Cybersecurity Practice

BCG

Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.

SPEAKER BIO

Michael Coden

Head of Cybersecurity Practice

BCG

Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.

SPEAKER BIO

Michael Coden

Head of Cybersecurity Practice

BCG

Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.

SPEAKER BIO

Michael Coden

Head of Cybersecurity Practice

BCG

Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.

[confirmation_headline]
[confirmation_messaging]
Add to Calendar
Text goes here
X
[confirmation_headline]
[confirmation_messaging]
Add to Calendar
Text goes here
X
Share with Friends
Facebook
Twitter
LinkedIn
Link
CONTACT THE ORGANIZER
Google   Outlook   iCal   Yahoo
Registration for this event has now closed. If you have any questions, please contact igniteontour-emea@paloaltonetworks.com