Calling all cyber leaders: All-new Ignite on Tour
Â
Disruptive technologies, such as AI/ML, cloud computing, and IoT, are fueling digital transformation while increasing the risk of cyber threats. With an ever-evolving and expanding threat landscape, it is time for cyber leaders to take decisive action.
Â
It’s time to be bold. To change with purpose. And to embrace the technologies that enable you to secure the way forward.
Â
Join us on November 2nd in Amsterdam, for Ignite on Tour, an exclusive one-day cybersecurity strategy and networking event specifically for cybersecurity leaders and influencers.Â
Â
We’ve refocused our traditional Ignite user conference, previously geared toward practitioners, to share and discuss the latest innovations, insights and strategies for today’s cyber decision makers. Don’t miss this opportunity to learn about what’s new, now and next in cybersecurity.
Â
At Ignite on Tour, we’re bringing top cybersecurity decision makers and influencers together to discover how Palo Alto Networks can help organizations harness AI to:
Â
- Solve for tomorrow’s SecOps challenges today
- Enable cloud transformation and deployment
- Accelerate incident response and speed investigations
- Apply best-in-class network security
- Secure hybrid workforces consistently and at scale
- Defend mobile networks and IOT devices
Â
Register now to secure your spot.Â
Please note that this event is open to both current and prospective customers and geared towards business leaders and influencers. We will be carefully reviewing event registrations to ensure that attendees are a match for the event’s focus and objectives.
If you’re a cybersecurity practitioner seeking technical demos, training and certifications, please be sure to check out our Palo Alto Networks Events calendar for a complete list of upcoming events and Ultimate Test Drives that may better align with your needs.
We look forward to seeing you there.
Richard, with multiple chip implants to experience the future physically, has inspired over 550,000 people in his sessions. As the leader of an international research team, he explores trends in robotics, drones, self-driving systems, 3D & 4D printing, blockchain, quantum computing, neurotech, biotech, and more, combining them with AI for groundbreaking opportunities and challenges.
Since 2014, he's spoken at prestigious institutions and companies worldwide, including Google, Microsoft, IBM, Interpol, and more. He's also the CEO of Trendforce, an innovative intelligence agency, known for its COVID-19 'Road to Recovery' program.
His mission is to infuse innovation and imagination into individuals and organizations shaping the future, fostering a forward-looking mindset for better health, happiness, and prosperity.
There was a time when nation-state actors were the trendsetters in threat innovation. But times change, and there's a new bellwether now. The good news: Unit 42 knows what's next.
During this session, we will give you an insider's view into Unit 42's world-renowned threat intelligence and incident response. We will reveal the new tactics and techniques surfacing in the evolving threat landscape, so you can be better prepared for what's next.
The digital economy has experienced accelerated transformation in the last three years. Organizations are harnessing cloud-based innovations to drive their digital initiatives, elevate the customer experience, create greater efficiencies, and break away from their competition. Where is Cloud computing heading and how should organizations be thinking about cybersecurity?
We've all heard it many times across many years: The threat landscape is getting increasingly challenging. With the highly motivated and innovative adversaries we face, it's likely this will always be true. But it is possible to beat them at their own game, no matter how quickly they move. Palo Alto Networks Vice President System Engineering Thierry Karsenti deconstructs key elements of successful attacks and outlines a better approach to out-innovate cybercriminals.
As CIO and CISO roles evolve in a post-pandemic world, strategic business initiatives focused on cost consolidation, better cybersecurity outcomes and improved resilience stay top of mind even during a difficult economic period. Unfortunately, due to the highly fragmented cybersecurity market, businesses continue to stay challenged due to a high number of vendor products which impacts risk, inefficiencies, and maintenance overheads. Vendor consolidation is no longer optional and during this session, we will review the positive business outcomes of a platform-based strategy, including lowered risk and cost with improved cyber posture and business agility.
It's clear that it's no longer if you'll implement SASE, but when and how. Join this session to learn why your SASE deployment should start with ZTNA 2.0, and what to watch out for. Hear from Palo Alto Networks Experts on why current legacy ZTNA solutions fall short and the need for ZTNA 2.0 to secure your hybrid workforce.
Data has allowed security operations centers (SOCs) to transform, but its volume and fragmentation is thwarting SOC efficiency, so threats can still dwell inside corporate networks for months. While triaging dozens of alerts daily, cyber analysts must leverage terabytes of data scattered across different sources and switch between different workflows to piece together the ‘story’ of an attack. The current SOC model is broken, and it’s time for a rethink. Based on a unified data model and an analytics-first approach, XSIAM provides the foundation for a modern, proactive, automation-driven SOC.
Learn about the latest innovations in Network Security with the latest in PAN-OS releases including the recently announced PAN-OS® 11.0 Nova and latest fourth-generation ML-Powered NGFWs. With 50+ product updates and innovations, Nova is a leap forward in network security. Palo Alto Networks innovations help you to increase your security protection and compliance while reducing the operational cost and complexity and allowing you the speed and agility to secure your organisation. PAN-OS® 11.0 Nova innovations include new Advanced WildFire® and Proxy, and also innovations in Advanced Threat Prevention, CASB and AIOps. The NetSec Platform brings PAN-OS innovations to SASE, ML-Powered NGFW Hardware and Software Firewalls. Software Firewalls protect all clouds with agility covering your virtual lift-and-shift and cloud-native container applications.
According to the recent JCSA (International Joint Cybersecurity Advisory), internet-facing vulnerabilities were the most commonly used types of vulnerabilities in 2021 attacks. Alarmingly, 30-40% of an organization’s internet-facing exposure is unknown and hence, unsecured. Tools that only focus on finding your unknowns and not fixing them are attack surface discovery tools not attack surface management solutions. Join this session to learn how Cortex Xpanse helps you not just find risks in your attack surface but also automatically fix them.
Organisations don’t have to choose between business agility and strong security when partnering with Palo Alto Networks and Amazon Web Services. In this session, hear how the partnership between AWS and Palo Alto Networks is delivering key integrations to help organisations employ security use cases and accelerate their journey in the Cloud.
"The truth is out there, hiding in your data. Whether you’re hunting for adversaries in your network or searching for compromised cloud assets, your mission is to detect and stop threats fast. By analyzing cloud and network data with machine learning, you can uncover active attacks anywhere in your organization, including advanced threats targeting cloud containers, VMs, and managed and unmanaged devices.
In this session, Palo Alto Networks experts will demonstrate how you can use XDR to hunt for stolen cloud tokens and stealthy network attacks, detect adversaries operating in your organization using analytics, machine learning, and rich data and ultimately stop sophisticated cloud and network attacks."
As you rapidly develop cloud native applications, adopt cloud infrastructure and service, it's critical that you can visualise and manage all vulnerabilities in a simple manner. During this session, we'll share our perspective on why a prevention-first platform can accelerate your journey to the cloud whilst minimising risk
In this session we will map out how ransomware has evolved in 2023 and focus on 10 best practices and policy recommendations using the Palo Alto Networks NGFW, SASE, CDSS, Cortex and Prisma Cloud solutions for protection against Ransomware attacks. Palo Alto Networks Ignite rockstar, John Harrison, is back for his 7th Ignite session to share this update with you!
As cloud attacks increasingly target the supply chain and delivery pipeline it’s crucial to build a framework for effectively reducing risk across the engineering ecosystem. This session will cover how you can operationalize a modern AppSec framework that helps organizations build scalable DevSecOps workflows and ship applications that are secure by design.
The first half of 2021 saw 1.5 billion attacks on smart devices, more than 100% growth in cyberattacks against Internet-of-Things (IoT) devices. This session shares a set of best practices to help you with a closed-loop Zero Trust security strategy to protect your IoT, IoMT, and OT devices:
Understand the security risks to the enterprise, industrial and healthcare networks introduced by increasing digitization.
Learn about the key challenges in securing unmanaged IT, IoT, and OT devices and how to properly implement segmentation to limit risk.
Please note: Agenda is subject to change
This is an end-user event. If you are a partner that would like to participate there is a programme in place - please contact your CBM for further details
Sophie Dyson on the details shown for further information sodyson@paloaltonetworks.com
Complete the details below to register for Ignite on Tour Amsterdam 2023 and be ready for the industry’s premier cybersecurity event of the year!
If you have any questions, please email us directly at igniteontour-emea@paloaltonetworks.com.
Is there someone else in your company's leadership team or among your peers who you'd like to connect with during this event? Send them an invite now
Est ac ac mauris arcu, vestibulum. Quam elementum risus duis amet. Magna quam sem vestibulum id senectus mauris. Ultrices amet id turpis sed integer libero in nunc morbi. Nisl, in nunc morbi turpis semper senectus at. Mauris, tincidunt nunc netus scelerisque et velit in. Ut tincidunt nullam gravida id urna, augue. Tempor vestibulum suspendisse faucibus ut elit. Hendrerit nec mattis tristique turpis sit. Aliquam interdum sed fames augue nec. Adipiscing erat sed nullam at vulputate amet. Semper vitae molestie nam ullamcorper gravida.
Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.
Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.
Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.
Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.
Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.
Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.