Catch all the highlights from the industry’s premier cybersecurity event at Ignite on Tour Dubai.
Hear from some of the biggest names and brightest minds in cybersecurity about how Palo Alto Networks can help you respond to major trends and challenges, including:
Securing hybrid workforces consistently and at scale
Protecting cloud-native applications
Enabling Zero Trust
Leaning on AI and automation to run security operations
Defending mobile networks and IOT devices
Register now to secure your spot.
The digital economy has experienced accelerated transformation in the last three years. Organizations are harnessing cloud-based innovations to drive their digital initiatives, elevate the customer experience, create greater efficiencies, and break away from their competition. Where is Cloud computing heading and how should organizations be thinking about cybersecurity?
There was a time when nation-state actors were the trendsetters in threat innovation. But times change, and there's a new bellwether now. The good news: Unit 42 knows what's next.
During this session, we will give you an insider's view into Unit 42's world-renowned threat intelligence and incident response. We will reveal the new tactics and techniques surfacing in the evolving threat landscape, so you can be better prepared for what's next.
 We've all heard it many times across many years: The threat landscape is getting increasingly challenging. With the highly motivated and innovative adversaries we face, it's likely this will always be true. But it is possible to beat them at their own game, no matter how quickly they move. Palo Alto Networks Chief Product Officer Lee Klarich deconstructs key elements of successful attacks and outlines a better approach to out-innovate cybercriminals.
As CIO and CISO roles evolve in a post-pandemic world, we begin by highlighting their strategic business priorities based on region-specific CxO feedback. We then discuss an approach to move from reactive to proactive security, bringing together what has been discussed during the previous keynotes and combining it under one message; Operational Resilience. This session is a practical use-case of how organizations are using Operational Resilience to differentiate themselves from their competitors, and how Palo Alto Networks is helping them through this journey.
Ransomware attacks, supply chain attacks, state-sponsored advanced persistent threats (APTs), and other cybercrimes affect organizations worldwide, every minute. It's imperative to understand your adversaries, re-examine your security posture and make significant changes that would otherwise be difficult in relative peacetime. With our threat intelligence, incident response, and product development teams working together, Palo Alto Networks sees attacks from a unique perspective. During this discussion, we will share an inside view of the cyberthreat landscape while providing detailed intelligence and practical guidance on how we are evolving our technology so you can rethink your defenses.
It's clear that it's no longer if you'll implement SASE, but when and how. Join this session to learn why your SASE deployment should start with ZTNA 2.0, and what to watch out for. Hear from Palo Alto Networks Experts on why current legacy ZTNA solutions fall short and the need for ZTNA 2.0 to secure your hybrid workforce.
Simplifying and Securing Your Multi-Cloud Journey
Mark Govan, Senior Director, Prisma Cloud Solutions Architects
As you rapidly develop cloud native applications, adopt cloud infrastructure and service, it's critical that you can visualise and manage all vulnerabilities in a simple manner. During this session, we'll share our perspective on why a prevention-first platform can accelerate your journey to the cloud whilst minimising risk.
10 Best Practice Tips to stop Ransomware Attacks
John Harrison, Senior Product Marketing Manager, Strata
In this session we will map out how ransomware has evolved in 2023 and focus on 10 best practices and policy recommendations using the Palo Alto Networks NGFW, SASE, CDSS, Cortex and Prisma Cloud solutions for protection against Ransomware attacks. Palo Alto Networks Ignite rockstar, John Harrison, is back for his 7th Ignite session to share this update with you!
Data has allowed security operations centers (SOCs) to transform, but its volume and fragmentation is thwarting SOC efficiency, so threats can still dwell inside corporate networks for months. While triaging dozens of alerts daily, cyber analysts must leverage terabytes of data scattered across different sources and switch between different workflows to piece together the ‘story’ of an attack. The current SOC model is broken, and it’s time for a rethink. Based on a unified data model and an analytics-first approach, XSIAM provides the foundation for a modern, proactive, automation-driven SOC.
Learn about the latest innovations in Network Security with the latest in PAN-OS releases including the recently announced PAN-OS® 11.0 Nova and latest fourth-generation ML-Powered NGFWs. With 50+ product updates and innovations, Nova is a leap forward in network security. Palo Alto Networks innovations help you to increase your security protection and compliance while reducing the operational cost and complexity and allowing you the speed and agility to secure your organisation. PAN-OS® 11.0 Nova innovations include new Advanced WildFire® and Proxy, and also innovations in Advanced Threat Prevention, CASB and AIOps. The NetSec Platform brings PAN-OS innovations to SASE, ML-Powered NGFW Hardware and Software Firewalls. Software Firewalls protect all clouds with agility covering your virtual lift-and-shift and cloud-native container applications.
Maximising the efficiency of your security operations in a multi-cloud world
David Maclean, Manager, Solution Architects - Prisma Cloud
74% of our customers state that multi-cloud is a reality today, not a problem for tomorrow. Maximising the effectiveness of your cloud and security operations teams available time and skills is critical. During this session, we'll outline how an integrated approach to managing cloud posture across multiple Cloud Service Providers can reduce the workload on your teams by standardising on one set of policies whilst improving security as a result of end to end visbility from the code, build, deploy, run approach of Prisma Cloud.
Unearth advanced threats using your network and cloud data
Hamza Al-Qudah, Systems Engineering Specialist, Cortex
The truth is out there, hiding in your data. Whether you’re hunting for adversaries in your network or searching for compromised cloud assets, your mission is to detect and stop threats fast. By analyzing cloud and network data with machine learning, you can uncover active attacks anywhere in your organization, including advanced threats targeting cloud containers, VMs, and managed and unmanaged devices.
In this session, Palo Alto Networks experts will demonstrate how you can use XDR to hunt for stolen cloud tokens and stealthy network attacks, detect adversaries operating in your organization using analytics, machine learning, and rich data and ultimately stop sophisticated cloud and network attacks.
Never Trust, Always Verify: How to Secure IoT Devices using a Zero Trust Approach
Jihad Al-Ramahi, Senior Systems Engineer
The first half of 2021 saw 1.5 billion attacks on smart devices, more than 100% growth in cyberattacks against Internet-of-Things (IoT) devices. This session shares a set of best practices to help you with a closed-loop Zero Trust security strategy to protect your IoT, IoMT, and OT devices:
Understand the security risks to the enterprise, industrial and healthcare networks introduced by increasing digitization.
Learn about the key challenges in securing unmanaged IT, IoT, and OT devices and how to properly implement segmentation to limit risk.
The protection of application workloads has been gaining a lot of attention in recent years due to the move of modern applications to cloud-native environments and micro-service based architectures. In this session, we will cover the the best practices that all organizations need to secure application workloads as well as discuss the synergies and value that can be gained by combining workload protection with other layers of security as part of a Cloud Native Application Protection Platform.
Complete the details to register for Ignite on Tour Dubai 2023 and be ready for the industry’s premier cybersecurity event of the year!
If you have any specific dietary or access requirements, or for any other questions, please email us directly at igniteontour-emea@paloaltonetworks.com.
Est ac ac mauris arcu, vestibulum. Quam elementum risus duis amet. Magna quam sem vestibulum id senectus mauris. Ultrices amet id turpis sed integer libero in nunc morbi. Nisl, in nunc morbi turpis semper senectus at. Mauris, tincidunt nunc netus scelerisque et velit in. Ut tincidunt nullam gravida id urna, augue. Tempor vestibulum suspendisse faucibus ut elit. Hendrerit nec mattis tristique turpis sit. Aliquam interdum sed fames augue nec. Adipiscing erat sed nullam at vulputate amet. Semper vitae molestie nam ullamcorper gravida.
Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.
Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.
Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.
Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.
Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.
Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.