Ignite on Tour London
Jul 
22nd
RSVPs Closed
Text goes here
X
Palo Alto Networks
Register now
Text goes here
X
Agenda
Location
Speakers
Sponsors
Ignite on Tour London

133 Houndsditch
30th March 2023

Register Now
Text goes here
X

Cybersecurity takes center stage

Catch all the highlights from the industry’s premier cybersecurity event at Ignite on Tour London 2023.


Hear from some of the biggest names and brightest minds in cybersecurity about how Palo Alto Networks can help you respond to major trends and challenges, including:


  • 65cbea0972faa1da63428aaae75b4e05.Checkmark.pngSecuring hybrid workforces consistently and at scale
  • 65cbea0972faa1da63428aaae75b4e05.Checkmark.pngProtecting cloud-native applications
  • 65cbea0972faa1da63428aaae75b4e05.Checkmark.pngEnabling Zero Trust
  • 65cbea0972faa1da63428aaae75b4e05.Checkmark.pngLeaning on AI and automation to run security operations
  • 65cbea0972faa1da63428aaae75b4e05.Checkmark.pngDefending mobile networks and IOT devices


 

Register now to secure your spot.

Please note, this event is exclusively for end users. We look forward to seeing you there!

133 Houndsditch

133 Houndsditch

Catch all the highlights from the industry’s premier cybersecurity event at Ignite on Tour London 2023.


Hear from some of the biggest names and brightest minds in cybersecurity about how Palo Alto Networks can help you respond to major trends and challenges, including:


  • 65cbea0972faa1da63428aaae75b4e05.Checkmark.pngSecuring hybrid workforces consistently and at scale
  • 65cbea0972faa1da63428aaae75b4e05.Checkmark.pngProtecting cloud-native applications
  • 65cbea0972faa1da63428aaae75b4e05.Checkmark.pngEnabling Zero Trust
  • 65cbea0972faa1da63428aaae75b4e05.Checkmark.pngLeaning on AI and automation to run security operations
  • 65cbea0972faa1da63428aaae75b4e05.Checkmark.pngDefending mobile networks and IOT devices


Register now to secure your spot.

Catch all the highlights from the industry’s premier cybersecurity event at Ignite on Tour London 2023.


Hear from some of the biggest names and brightest minds in cybersecurity about how Palo Alto Networks can help you respond to major trends and challenges, including:


  • 65cbea0972faa1da63428aaae75b4e05.Checkmark.pngSecuring hybrid workforces consistently and at scale
  • 65cbea0972faa1da63428aaae75b4e05.Checkmark.pngProtecting cloud-native applications
  • 65cbea0972faa1da63428aaae75b4e05.Checkmark.pngEnabling Zero Trust
  • 65cbea0972faa1da63428aaae75b4e05.Checkmark.pngLeaning on AI and automation to run security operations
  • 65cbea0972faa1da63428aaae75b4e05.Checkmark.pngDefending mobile networks and IOT devices


Register now to secure your spot.

Please note, this event is exclusively for end users. We look forward to seeing you there!

133 Houndsditch

Agenda

9:30 - 10:15

Registrations and Coffee

10:15 - 10:20 

Welcome keynote

Gavin Mee, VP & General Manager, Western & Northern Europe

Location: Enterprise 1 & 2

10:20 - 10:35

Transforming and Securing the Digital Next

Helmut Reisinger, CEO EMEA & LATAM

Location: Enterprise 1 & 2

The digital economy has experienced accelerated transformation in the last three years. Organizations are harnessing cloud-based innovations to drive their digital initiatives, elevate the customer experience, create greater efficiencies, and break away from their competition. Where is Cloud computing heading and how should organizations be thinking about cybersecurity?

10:35 - 10:45

Interview with Palo Alto Networks Customer, David Stevens, CIO, Kantar

10:45 - 11:15

AI in Cybersecurity

Nir Zuk, Founder and Chief Technology Officer, Palo Alto Networks

Location: Enterprise 1 & 2

Palo Alto Networks founder and CTO Nir Zuk explores the future of cybersecurity and the fast-moving evolution of cyber defense. In addition, Nir will describe Palo Alto Network’s vision for cybersecurity in a data-driven world.

11:15 - 11:45

Break

Location: Galleria

11:45 - 12:05

How to be Human in the Age of the Machine

Hannah Fry, Professor in the Mathematics of Cities. She is a mathematician, a best-selling author, an award winning science presenter and the host of numerous popular podcasts and television shows.

Location: Enterprise 1 & 2

12:05 - 12:35

Out-Innovating the Attackers

Thierry Karsenti, VP, Systems Engineering EMEA & LATAM

Location: Enterprise 1 & 2

We've all heard it many times across many years: The threat landscape is getting increasingly challenging. With the highly motivated and innovative adversaries we face, it's likely this will always be true. But it is possible to beat them at their own game, no matter how quickly they move. Palo Alto Networks VP Systems Engineering, Thierry Karsenti deconstructs key elements of successful attacks and outlines a better approach to out-innovate cybercriminals.

12:35 - 12:55

The Need for Cybersecurity Consolidation

Haider Pasha, Chief Security Officer EMEA & LATAM, Palo Alto Networks

Location: Enterprise 1 & 2

As CIO and CISO roles evolve in a post-pandemic world, strategic business initiatives focused on cost consolidation, better cybersecurity outcomes and improved resilience stay top of mind even during a difficult economic period. Unfortunately, due to the highly fragmented cybersecurity market, businesses continue to stay challenged due to a high number of vendor products which impacts risk, inefficiencies, and maintenance overheads. Vendor consolidation is no longer optional and during this session, we will review the positive business outcomes of a platform-based strategy, including lowered risk and cost with improved cyber posture and business agility.

12:20 - 12:40

Retour d’expérience client -  ZTNA 2.0 : La clé pour commencer son déploiement SASE ?

Paul Renard, Global Network Director - Michelin & Nicolas Warnier, Regional Vice President - SASE EMEA

13:00 - 14:00

Lunch & Activation Area opens

Location: Galleria

12:30 - 13:30

Breakout 2: Threat Intel & Security Operations

Location: Enterprise 2

Breakout 1: Zero Trust & Network Security

Location: Enterprise 1

Breakout 3: Cloud Security

Location: Interact

14:00 - 14:25

Breakout 2: Threat Intel & Security Operations

Location: Enterprise 2

14:00- 14:25

The Evolving Threat Landscape
Chris George, Senior Consulting Director, Unit 42

There was a time when nation-state actors were the trendsetters in threat innovation. But times change, and there's a new bellwether now. The good news: Unit 42 knows what's next.
During this session, we will give you an insider's view into Unit 42's world-renowned threat intelligence and incident response. We will reveal the new tactics and techniques surfacing in the evolving threat landscape, so you can be better prepared for what's next.

14:25 - 14:45

How the Access Group Approach Incident Response
Chris George, Senior Consulting Director, Unit 42 and Alex Jeffery, Operations Director, Cloud Hosting Services, Access Group

Hear how the Access Group's security operations were supported by Unit 42 to enhance their incident response capabilities. and how they work with Unit 42 to stop a live cyber attack.

Breakout 1: Zero Trust & Network Security

Location: Enterprise 1

14:00- 14:25

Why Your SASE Deployment Should Start with ZTNA 2.0
Joe Bombagi, Director, Systems Engineering

It's clear that it's no longer if you'll implement SASE, but when and how. Join this session to learn why your SASE deployment should start with ZTNA 2.0, and what to watch out for.

14:25 - 14:45

The Aptiv ZTA Strategy with ZTNA 2.0
Joe Bombagi, Director, Systems Engineering and Luis Cunha, Director of Engineering & Architecture, Aptiv

Palo Alto Networks Expert Joe Bombagi and Luis Cunha from Aptiv discuss why current legacy ZTNA solutions fall short and the need for ZTNA 2.0 to secure your hybrid workforce.

Breakout 3: Cloud Security

Location: Interact

14:00- 14:25

Simplifying and Securing Your Multi-Cloud Journey
Mark Govan, Senior Director, Prisma Cloud Solutions Architect

As you rapidly develop cloud native applications, adopt cloud infrastructure and service, it's critical that you can visualise and manage all vulnerabilities in a simple manner. During this session, we'll share our perspective on why a prevention-first platform can accelerate your journey to the cloud whilst minimising risk

14:25 - 14:45

How Deliveroo secure Cloud Native Applications at Scale
Mark Govan, Senior Director, Prisma Cloud Solutions Architect and Lee Thurlow, Head of Product Security, Roofoods Ltd

Deliveroo face many complexities of managing the security of cloud native applications in a fast moving environment. Join us in this fireside chat to learn how Lee approaches cloud security at Deliveroo and how he has addressed the challenging topic of cloud transformation in previous organisations.

14:25 - 14:45

14:25 - 14:45

How the Access Group Approach Incident Response
Chris George, Senior Consulting Director, Unit 42 and Alex Jeffery, Operations Director, Cloud Hosting Services, Access Group

Hear how the Access Group's security operations were supported by Unit 42 to enhance their incident response capabilities. and how they work with Unit 42 to stop a live cyber attack.

14:25 - 14:45

The Aptiv ZTA Strategy with ZTNA 2.0
Joe Bombagi, Director, Systems Engineering and Luis Cunha, Director of Engineering & Architecture, Aptiv

Palo Alto Networks Expert Joe Bombagi and Luis Cunha from Aptiv discuss why current legacy ZTNA solutions fall short and the need for ZTNA 2.0 to secure your hybrid workforce.

14:25 - 14:45

How Deliveroo secure Cloud Native Applications at Scale
Mark Govan, Senior Director, Prisma Cloud Solutions Architect and Lee Thurlow, Head of Product Security, Roofoods Ltd

Deliveroo face many complexities of managing the security of cloud native applications in a fast moving environment. Join us in this fireside chat to learn how Lee approaches cloud security at Deliveroo and how he has addressed the challenging topic of cloud transformation in previous organisations.

14:45 - 15:15

14:45- 15:15

Google Cloud EMEA Ltd
Platinum Sponsor

Google Cloud accelerates every organization’s ability to digitally transform its business. We deliver enterprise-grade solutions that leverage Google’s cutting-edge technology – all on the cleanest cloud in the industry. Customers in more than 200 countries and territories turn to Google Cloud as their trusted partner to enable growth and solve their most critical business problems.

14:45- 15:15

Orange Cyberdefense
Platinum Sponsor

Orange Cyberdefense is the expert cybersecurity business unit of the Orange Group. As a leading security services provider, we strive to build a safer digital society.
We are a threat research and intelligence-driven security provider offering unparalleled access to current and emerging threats.
Orange Cyberdefense retains a 25+ year track record in information security, 250+ researchers, 18 SOCs, 14 CyberSOCs and 8 CERTs distributed globally and sales and services support in 160 countries.

14:45- 15:15

Telstra

Platinum Sponsor

Telstra Purple is a global professional and managed services business focused on helping our customers bring purpose to technology. Our global team of experts consult on, deliver and manage leading-edge technology and transformative experiences.

14:45- 15:15

14:45 - 15:15

Orange Cyberdefense will be joining us for a session discussing Threat Intel and Security Operations

14:45 - 15:15

BT will be joining us for a session discussing Zero Trust and Network Security

14:45 - 15:15

Google will be joining us for a session discussing Cloud Security

15:15 - 15:30

Break

Location: Galleria

12:30 - 13:30

Atelier thématique 1: Threat Intel & Security Operations

Atelier thématique 2: Zero Trust & Network Security

Atelier thématique 3: Cloud Security

15:00 - 15:30

Threat Intelligence und Security Operations (SecOps)

15:00 - 15:30 Uhr

Cortex XSIAM: Das moderne SOC, neu durchdacht

SOCs haben ihre Umstellung auf moderne Prozesse Daten zu verdanken. Allerdings beeinträchtigen die Menge und die fragmentierte Ansiedelung dieser Daten die Effizienz der SOCs und sind der Grund dafür, dass sich Bedrohungen monatelang unerkannt in Unternehmensnetzwerken aufhalten können. Cyberanalysten sichten Tag für Tag Dutzende von Alarmen. Sie müssen Datenberge in Terabytehöhe aus verschiedenen Quellen durchforsten und unterschiedliche Workflows nutzen, um den Ablauf eines Angriffs zu rekonstruieren. Das ist auf Dauer nicht tragbar, weshalb wir umdenken müssen. Auf Basis eines einheitlichen Datenmodells und eines analysezentrierten Ansatzes bietet XSIAM die Grundlage für ein modernes, proaktives und automatisierungsgestütztes SOC.

Zero Trust und Netzwerksicherheit

15:00 - 15:30 Uhr

Zehn Best Practices zur Vereitelung von Ransomwareangriffen

In dieser Sitzung legen wir den derzeitigen Stand der Ransomwareentwicklung dar und zeigen Ihnen anhand von zehn Best Practices und Richtlinienempfehlungen, wie Sie Ihr Unternehmen unter Nutzung der NGFW-, SASE- und CDSS-Lösungen von Palo Alto Networks vor Ransomwareangriffen schützen. Präsentiert wird diese Sitzung von Ignite-Koryphähe John Harrison, der zum siebten Mal bei Palo Alto Networks Ignite dabei ist.

Cloud-Sicherheit

15:00 - 15:30 Uhr

Effizientere SecOps-Abläufe in der Multi-Cloud

74 % unserer Kunden sagen, dass die Multi-Cloud ihre heutige Realität bestimmt und kein reines Problem der Zukunft ist. Daher ist es unerlässlich, dass Sie die Effektivität Ihrer für Cloud-Umgebungen und SecOps zuständigen Teams in Bezug auf das Zeitmanagement und Kompetenzen maximieren. In dieser Sitzung geben wir einen Überblick darüber, wie ein integrierter Ansatz für das Management von Cloud-Umgebungen mehrerer Anbieter Ihre Teams entlasten kann. Zum einen geschieht das durch die Einführung standardisierter Richtlinien, zum anderen durch ein stärkeres Sicherheitsniveau, das sich durch die umfassende Transparenz ergibt, die der Prisma Cloud-Ansatz unter dem Motto „Programmieren, entwickeln, bereitstellen und ausführen“ bietet.

15:30 - 16:00

Kaffeepause

12:30 - 13:30

Breakout 2: Threat Intel & Security Operations

Location: Enterprise 2

Breakout 1: Zero Trust & Network Security

Location: Enterprise 1

Breakout 3: Cloud Security

Location: Interact

15:30 - 16:00

Breakout 2: Threat Intel & Security Operations

Location: Enterprise 2

15:30 - 16:00

Why Palo Alto Networks Is Headed To SOC Supremacy
Yochai Kattan, Sr Director, Technical Marketing Engineering

Data has allowed security operations centers (SOCs) to transform, but its volume and fragmentation is thwarting SOC efficiency, so threats can still dwell inside corporate networks for months. While triaging dozens of alerts daily, cyber analysts must leverage terabytes of data scattered across different sources and switch between different workflows to piece together the ‘story’ of an attack. The current SOC model is broken, and it’s time for a rethink. Based on a unified data model and an analytics-first approach, XSIAM provides the foundation for a modern, proactive, automation-driven SOC.

16:00 - 16:30

Unveiling the Next Phase of Attack Surface Management
Martin Lombard, Systems Engineer

According to the recent JCSA (International Joint Cybersecurity Advisory), internet-facing vulnerabilities were the most commonly used types of vulnerabilities in 2021 attacks. Alarmingly, 30-40% of an organization’s internet-facing exposure is unknown and hence, unsecured. Tools that only focus on finding your unknowns and not fixing them are attack surface discovery tools not attack surface management solutions. Join this session to learn how Cortex Xpanse helps you not just find risks in your attack surface but also automatically fix them.

16:30 - 17:00

Unearth advanced threats using your network and cloud data
Nana-Ampofo Ampofo-Anti, Enterprise Security Architect - SecOps

The truth is out there, hiding in your data. Whether you’re hunting for adversaries in your network or searching for compromised cloud assets, your mission is to detect and stop threats fast. By analyzing cloud and network data with machine learning, you can uncover active attacks anywhere in your organization, including advanced threats targeting cloud containers, VMs, and managed and unmanaged devices.

In this session, Palo Alto Networks experts will demonstrate how you can use XDR to hunt for stolen cloud tokens and stealthy network attacks, detect adversaries operating in your organization using analytics, machine learning, and rich data and ultimately stop sophisticated cloud and network attacks.

Breakout 1: Zero Trust & Network Security

Location: Enterprise 1

15:30 - 16:00

10 Best Practice Tips to stop Ransomware Attacks
John Harrison, Senior Product Marketing Manager, Strata

In this session we will map out how ransomware has evolved in 2023 and focus on 10 best practices and policy recommendations using the Palo Alto Networks NGFW, SASE, CDSS, Cortex and Prisma Cloud solutions for protection against Ransomware attacks. Palo Alto Networks Ignite rockstar, John Harrison, is back for his 7th Ignite session to share this update with you!

16:00 - 16:30

Latest Innovations in Network Security
Amit Tailor, Director Systems Engineering

Learn about the latest innovations in Network Security with the latest in PAN-OS releases including the recently announced PAN-OS® 11.0 Nova and latest fourth-generation ML-Powered NGFWs. With 50+ product updates and innovations, Nova is a leap forward in network security. Palo Alto Networks innovations help you to increase your security protection and compliance while reducing the operational cost and complexity and allowing you the speed and agility to secure your organisation. PAN-OS® 11.0 Nova innovations include new Advanced WildFire® and Proxy, and also innovations in Advanced Threat Prevention, CASB and AIOps. The NetSec Platform brings PAN-OS innovations to SASE, ML-Powered NGFW Hardware and Software Firewalls. Software Firewalls protect all clouds with agility covering your virtual lift-and-shift and cloud-native container applications.

16:30 - 17:00

Never Trust, Always Verify: How to Secure IoT Devices using a Zero Trust Approach
David Scrivens, Systems Engineer

The first half of 2021 saw 1.5 billion attacks on smart devices, more than 100% growth in cyberattacks against Internet-of-Things (IoT) devices. This session shares a set of best practices to help you with a closed-loop Zero Trust security strategy to protect your IoT, IoMT, and OT devices:
Understand the security risks to the enterprise, industrial and healthcare networks introduced by increasing digitization.
Learn about the key challenges in securing unmanaged IT, IoT, and OT devices and how to properly implement segmentation to limit risk.

Breakout 3: Cloud Security

Location: Interact

15:30 - 16:00

Maximising the efficiency of your security operations in a multi-cloud world
Martijn Baecke, Product Marketing Manager, Prisma Cloud

74% of our customers state that multi-cloud is a reality today, not a problem for tomorrow. Maximising the effectiveness of your cloud and security operations teams available time and skills is critical. During this session, we'll outline how an integrated approach to managing cloud posture across multiple Cloud Service Providers can reduce the workload on your teams by standardising on one set of policies whilst improving security as a result of end to end visbility from the code, build, deploy, run approach of Prisma Cloud

16:00 - 16:30

Securing all aspects of your Cloud Workloads
Stuart Wyatt, Senior Prisma Cloud Solutions Architect

The protection of application workloads has been gaining a lot of attention in recent years due to the move of modern applications to cloud-native environments and micro-service based architectures. In this session, we will cover the the best practices that all organizations need to secure application workloads as well as discuss the synergies and value that can be gained by combining workload protection with other layers of security as part of a Cloud Native Application Protection Platform.

16:30 - 17:00

Code to Cloud - How to Shift Left with Prisma Cloud
Fulya Sengil, Prisma Cloud Solutions Architect

Its crucial to secure the full application lifecycle within your company - Prisma Cloud gives you the unique capability to integrate security at the point of code creation and in the execution of CI/CD to significantly improve the quality of your security posture. This session will cover how you can reduce the workload on your developers whilst achieving your security objectives.

16:00 - 16:30

16:00 - 16:30

Unveiling the Next Phase of Attack Surface Management
Martin Lombard, Systems Engineer

According to the recent JCSA (International Joint Cybersecurity Advisory), internet-facing vulnerabilities were the most commonly used types of vulnerabilities in 2021 attacks. Alarmingly, 30-40% of an organization’s internet-facing exposure is unknown and hence, unsecured. Tools that only focus on finding your unknowns and not fixing them are attack surface discovery tools not attack surface management solutions. Join this session to learn how Cortex Xpanse helps you not just find risks in your attack surface but also automatically fix them.

16:00 - 16:30

Latest Innovations in Network Security
Amit Tailor, Director Systems Engineering

Learn about the latest innovations in Network Security with the latest in PAN-OS releases including the recently announced PAN-OS® 11.0 Nova and latest fourth-generation ML-Powered NGFWs. With 50+ product updates and innovations, Nova is a leap forward in network security. Palo Alto Networks innovations help you to increase your security protection and compliance while reducing the operational cost and complexity and allowing you the speed and agility to secure your organisation. PAN-OS® 11.0 Nova innovations include new Advanced WildFire® and Proxy, and also innovations in Advanced Threat Prevention, CASB and AIOps. The NetSec Platform brings PAN-OS innovations to SASE, ML-Powered NGFW Hardware and Software Firewalls. Software Firewalls protect all clouds with agility covering your virtual lift-and-shift and cloud-native container applications.

16:00 - 16:30

Securing all aspects of your Cloud Workloads
Stuart Wyatt, Senior Prisma Cloud Solutions Architect

The protection of application workloads has been gaining a lot of attention in recent years due to the move of modern applications to cloud-native environments and micro-service based architectures. In this session, we will cover the the best practices that all organizations need to secure application workloads as well as discuss the synergies and value that can be gained by combining workload protection with other layers of security as part of a Cloud Native Application Protection Platform.

16:30 - 17:00

16:30 - 17:00

Unearth advanced threats using your network and cloud data
Nana-Ampofo Ampofo-Anti, Enterprise Security Architect - SecOps

The truth is out there, hiding in your data. Whether you’re hunting for adversaries in your network or searching for compromised cloud assets, your mission is to detect and stop threats fast. By analyzing cloud and network data with machine learning, you can uncover active attacks anywhere in your organization, including advanced threats targeting cloud containers, VMs, and managed and unmanaged devices.

In this session, Palo Alto Networks experts will demonstrate how you can use XDR to hunt for stolen cloud tokens and stealthy network attacks, detect adversaries operating in your organization using analytics, machine learning, and rich data and ultimately stop sophisticated cloud and network attacks.

16:30 - 17:00

Never Trust, Always Verify: How to Secure IoT Devices using a Zero Trust Approach
David Scrivens, Systems Engineer

The first half of 2021 saw 1.5 billion attacks on smart devices, more than 100% growth in cyberattacks against Internet-of-Things (IoT) devices. This session shares a set of best practices to help you with a closed-loop Zero Trust security strategy to protect your IoT, IoMT, and OT devices:
Understand the security risks to the enterprise, industrial and healthcare networks introduced by increasing digitization.

Learn about the key challenges in securing unmanaged IT, IoT, and OT devices and how to properly implement segmentation to limit risk.

16:30 - 17:00

Code to Cloud - How to Shift Left with Prisma Cloud
Fulya Sengil, Prisma Cloud Solutions Architect

Its crucial to secure the full application lifecycle within your company - Prisma Cloud gives you the unique capability to integrate security at the point of code creation and in the execution of CI/CD to significantly improve the quality of your security posture. This session will cover how you can reduce the workload on your developers whilst achieving your security objectives.

17:00

Gaming and drinks reception

Location: Galleria

19:00

Departures

Agenda

10:30am – 12:30pm

12:30pm – 13:30pm

13:30pm – 17:00pm

17:00pm – 18:30pm

Keynotes

Lunch

Breakout Sessions

Networking Reception

10:30am – 12:30pm

Keynote

 

12:30pm – 13:30pm

Lunch

 

13:30pm – 17:00pm

Breakout Sessions

 

17:00pm – 18:30pm
Networking Reception

Location

133 Houndsditch,
Liverpool Street,
London

Speakers who spark change

Gavin Mee
VP & General Manager, Western & Northern Europe

Palo Alto Networks

Helmut Reisinger
CEO EMEA & LATAM

Palo Alto Networks

Nir Zuk
 Founder and Chief Technology Officer

Palo Alto Networks

Thierry Karsenti, VP, Systems Engineering EMEA & LATAM

Palo Alto Networks

Haider Pasha
Chief Security Officer EMEA & LATAM

Palo Alto Networks

Zeynep Inanoglu Ozdemir
Chief Marketing Officer

Palo Alto Networks

SPONSORS

Speakers who spark change.

Zeynep Inanoglu Ozdemir
Chief Marketing Officer

Palo Alto Networks

Zeynep Inanoglu Ozdemir
Chief Marketing Officer

Palo Alto Networks

Zeynep Inanoglu Ozdemir
Chief Marketing Officer

Palo Alto Networks

Zeynep Inanoglu Ozdemir
Chief Marketing Officer

Palo Alto Networks

Zeynep Inanoglu Ozdemir
Chief Marketing Officer

Palo Alto Networks

Zeynep Inanoglu Ozdemir
Chief Marketing Officer

Palo Alto Networks

Ignite 22 Agenda

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod temp.

9:00 am | EDT

Session 1 - Keynotes
Room 1
Keynotes is Session 1, there will be more details soon.

  • SOC/Threat Intel - part 1 (open to all)
  • Zero Trust/NetSec - part 1 (open to all)
  • Cloud Security - part 1 (open to all)
  • SOC/Threat Intel - part 2 (open to all)
  • Zero Trust/NetSec - part 2 (open to all)
  • Cloud Security - part 2 (open to all)

10:00 am | EDT

Session 2 - Products
Room 2
Keynotes is Session 1, there will be more details soon.

  • SOC/Threat Intel - part 1 (open to all)
  • Zero Trust/NetSec - part 1 (open to all)
  • Cloud Security - part 1 (open to all)
  • SOC/Threat Intel - part 2 (open to all)
  • Zero Trust/NetSec - part 2 (open to all)
  • Cloud Security - part 2 (open to all)

11:00 am | EDT

Session 3 - Expo
Room 3
Keynotes is Session 1, there will be more details soon.

  • SOC/Threat Intel - part 1 (open to all)
  • Zero Trust/NetSec - part 1 (open to all)
  • Cloud Security - part 1 (open to all)
  • SOC/Threat Intel - part 2 (open to all)
  • Zero Trust/NetSec - part 2 (open to all)
  • Cloud Security - part 2 (open to all)

SPONSORS

Register now

SAVE YOUR SEAT
NOW

Complete the details below to register for Ignite on Tour London 2023 and be ready for the industry’s premier cybersecurity event of the year!

If you have any specific dietary or access requirements, or for any other questions, please email us directly at igniteontour-emea@paloaltonetworks.com.

Copyright © 2023 Palo Alto Networks. All rights reserved

Privacy
Text goes here
X
Contact Us
Text goes here
X
Terms of Use
Text goes here
X
Link Text
Text goes here
X

Amazon Web Service Security

Speaker: Mary Smith

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Armis

Gold Sponsor

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Armis

Gold Sponsor

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

John Smith

SVP of Public Cloud Security Products

Palo Alto Networks

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Lorem ipsum dolor sit amet, consectetur adipiscing elit

Leslie Alexander

Nursing Assistant

Louis Vuitton

Est ac ac mauris arcu, vestibulum. Quam elementum risus duis amet. Magna quam sem vestibulum id senectus mauris. Ultrices amet id turpis sed integer libero in nunc morbi. Nisl, in nunc morbi turpis semper senectus at. Mauris, tincidunt nunc netus scelerisque et velit in. Ut tincidunt nullam gravida id urna, augue. Tempor vestibulum suspendisse faucibus ut elit. Hendrerit nec mattis tristique turpis sit. Aliquam interdum sed fames augue nec. Adipiscing erat sed nullam at vulputate amet. Semper vitae molestie nam ullamcorper gravida.

SPEAKER BIO

Michael Coden

Head of Cybersecurity Practice

BCG

Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.

SPEAKER BIO

Michael Coden

Head of Cybersecurity Practice

BCG

Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.

SPEAKER BIO

Michael Coden

Head of Cybersecurity Practice

BCG

Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.

SPEAKER BIO

Michael Coden

Head of Cybersecurity Practice

BCG

Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.

SPEAKER BIO

Michael Coden

Head of Cybersecurity Practice

BCG

Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.

SPEAKER BIO

Michael Coden

Head of Cybersecurity Practice

BCG

Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.