Catch all the highlights from the industry’s premier cybersecurity event at Ignite on Tour London 2023.
Hear from some of the biggest names and brightest minds in cybersecurity about how Palo Alto Networks can help you respond to major trends and challenges, including:
- Securing hybrid workforces consistently and at scale
- Protecting cloud-native applications
- Enabling Zero Trust
- Leaning on AI and automation to run security operations
- Defending mobile networks and IOT devices
Register now to secure your spot.
The digital economy has experienced accelerated transformation in the last three years. Organizations are harnessing cloud-based innovations to drive their digital initiatives, elevate the customer experience, create greater efficiencies, and break away from their competition. Where is Cloud computing heading and how should organizations be thinking about cybersecurity?
We've all heard it many times across many years: The threat landscape is getting increasingly challenging. With the highly motivated and innovative adversaries we face, it's likely this will always be true. But it is possible to beat them at their own game, no matter how quickly they move. Palo Alto Networks VP Systems Engineering, Thierry Karsenti deconstructs key elements of successful attacks and outlines a better approach to out-innovate cybercriminals.
As CIO and CISO roles evolve in a post-pandemic world, strategic business initiatives focused on cost consolidation, better cybersecurity outcomes and improved resilience stay top of mind even during a difficult economic period. Unfortunately, due to the highly fragmented cybersecurity market, businesses continue to stay challenged due to a high number of vendor products which impacts risk, inefficiencies, and maintenance overheads. Vendor consolidation is no longer optional and during this session, we will review the positive business outcomes of a platform-based strategy, including lowered risk and cost with improved cyber posture and business agility.
There was a time when nation-state actors were the trendsetters in threat innovation. But times change, and there's a new bellwether now. The good news: Unit 42 knows what's next.
During this session, we will give you an insider's view into Unit 42's world-renowned threat intelligence and incident response. We will reveal the new tactics and techniques surfacing in the evolving threat landscape, so you can be better prepared for what's next.
Simplifying and Securing Your Multi-Cloud Journey
Mark Govan, Senior Director, Prisma Cloud Solutions Architect
As you rapidly develop cloud native applications, adopt cloud infrastructure and service, it's critical that you can visualise and manage all vulnerabilities in a simple manner. During this session, we'll share our perspective on why a prevention-first platform can accelerate your journey to the cloud whilst minimising risk
How the Access Group Approach Incident Response
Chris George, Senior Consulting Director, Unit 42 and Alex Jeffery, Operations Director, Cloud Hosting Services, Access Group
The Aptiv ZTA Strategy with ZTNA 2.0
Joe Bombagi, Director, Systems Engineering and Luis Cunha, Director of Engineering & Architecture, Aptiv
How Deliveroo secure Cloud Native Applications at Scale
Mark Govan, Senior Director, Prisma Cloud Solutions Architect and Lee Thurlow, Head of Product Security, Roofoods Ltd
Deliveroo face many complexities of managing the security of cloud native applications in a fast moving environment. Join us in this fireside chat to learn how Lee approaches cloud security at Deliveroo and how he has addressed the challenging topic of cloud transformation in previous organisations.
Why Palo Alto Networks Is Headed To SOC Supremacy
Yochai Kattan, Sr Director, Technical Marketing Engineering
Data has allowed security operations centers (SOCs) to transform, but its volume and fragmentation is thwarting SOC efficiency, so threats can still dwell inside corporate networks for months. While triaging dozens of alerts daily, cyber analysts must leverage terabytes of data scattered across different sources and switch between different workflows to piece together the ‘story’ of an attack. The current SOC model is broken, and it’s time for a rethink. Based on a unified data model and an analytics-first approach, XSIAM provides the foundation for a modern, proactive, automation-driven SOC.
10 Best Practice Tips to stop Ransomware Attacks
John Harrison, Senior Product Marketing Manager, Strata
In this session we will map out how ransomware has evolved in 2023 and focus on 10 best practices and policy recommendations using the Palo Alto Networks NGFW, SASE, CDSS, Cortex and Prisma Cloud solutions for protection against Ransomware attacks. Palo Alto Networks Ignite rockstar, John Harrison, is back for his 7th Ignite session to share this update with you!
Maximising the efficiency of your security operations in a multi-cloud world
Martijn Baecke, Product Marketing Manager, Prisma Cloud
74% of our customers state that multi-cloud is a reality today, not a problem for tomorrow. Maximising the effectiveness of your cloud and security operations teams available time and skills is critical. During this session, we'll outline how an integrated approach to managing cloud posture across multiple Cloud Service Providers can reduce the workload on your teams by standardising on one set of policies whilst improving security as a result of end to end visbility from the code, build, deploy, run approach of Prisma Cloud
According to the recent JCSA (International Joint Cybersecurity Advisory), internet-facing vulnerabilities were the most commonly used types of vulnerabilities in 2021 attacks. Alarmingly, 30-40% of an organization’s internet-facing exposure is unknown and hence, unsecured. Tools that only focus on finding your unknowns and not fixing them are attack surface discovery tools not attack surface management solutions. Join this session to learn how Cortex Xpanse helps you not just find risks in your attack surface but also automatically fix them.
Learn about the latest innovations in Network Security with the latest in PAN-OS releases including the recently announced PAN-OS® 11.0 Nova and latest fourth-generation ML-Powered NGFWs. With 50+ product updates and innovations, Nova is a leap forward in network security. Palo Alto Networks innovations help you to increase your security protection and compliance while reducing the operational cost and complexity and allowing you the speed and agility to secure your organisation. PAN-OS® 11.0 Nova innovations include new Advanced WildFire® and Proxy, and also innovations in Advanced Threat Prevention, CASB and AIOps. The NetSec Platform brings PAN-OS innovations to SASE, ML-Powered NGFW Hardware and Software Firewalls. Software Firewalls protect all clouds with agility covering your virtual lift-and-shift and cloud-native container applications.
The protection of application workloads has been gaining a lot of attention in recent years due to the move of modern applications to cloud-native environments and micro-service based architectures. In this session, we will cover the the best practices that all organizations need to secure application workloads as well as discuss the synergies and value that can be gained by combining workload protection with other layers of security as part of a Cloud Native Application Protection Platform.
Unearth advanced threats using your network and cloud data
Nana-Ampofo Ampofo-Anti, Enterprise Security Architect - SecOps
The truth is out there, hiding in your data. Whether you’re hunting for adversaries in your network or searching for compromised cloud assets, your mission is to detect and stop threats fast. By analyzing cloud and network data with machine learning, you can uncover active attacks anywhere in your organization, including advanced threats targeting cloud containers, VMs, and managed and unmanaged devices.
In this session, Palo Alto Networks experts will demonstrate how you can use XDR to hunt for stolen cloud tokens and stealthy network attacks, detect adversaries operating in your organization using analytics, machine learning, and rich data and ultimately stop sophisticated cloud and network attacks.
Never Trust, Always Verify: How to Secure IoT Devices using a Zero Trust Approach
David Scrivens, Systems Engineer
The first half of 2021 saw 1.5 billion attacks on smart devices, more than 100% growth in cyberattacks against Internet-of-Things (IoT) devices. This session shares a set of best practices to help you with a closed-loop Zero Trust security strategy to protect your IoT, IoMT, and OT devices:
Understand the security risks to the enterprise, industrial and healthcare networks introduced by increasing digitization.
Learn about the key challenges in securing unmanaged IT, IoT, and OT devices and how to properly implement segmentation to limit risk.
Its crucial to secure the full application lifecycle within your company - Prisma Cloud gives you the unique capability to integrate security at the point of code creation and in the execution of CI/CD to significantly improve the quality of your security posture. This session will cover how you can reduce the workload on your developers whilst achieving your security objectives.
Complete the details below to register for Ignite on Tour London 2023 and be ready for the industry’s premier cybersecurity event of the year!
If you have any specific dietary or access requirements, or for any other questions, please email us directly at email@example.com.