Calling all cyber leaders: All-new Ignite on Tour
Disruptive technologies, such as AI/ML, cloud computing, and IoT, are fueling digital transformation while increasing the risk of cyber threats. With an ever-evolving and expanding threat landscape, it is time for cyber leaders to take decisive action.
It’s time to be bold. To change with purpose. And to embrace the technologies that enable you to secure the way forward.
Join us on October 25 in New York, for Ignite on Tour, an exclusive one-day cybersecurity strategy and networking event specifically for cybersecurity leaders and influencers.
We’ve refocused our traditional Ignite user conference, previously geared toward practitioners, to share and discuss the latest innovations, insights and strategies for today’s cyber decision makers. Don’t miss this opportunity to learn about what’s new, now and next in cybersecurity.
Cybersecurity takes center stage
At Ignite on Tour, we’re bringing top cybersecurity decision makers and influencers together to discover how Palo Alto Networks can help organizations harness AI to:
- Solve for tomorrow’s SecOps challenges today
- Enable cloud transformation and deployment
- Accelerate incident response and speed investigations
- Apply best-in-class network security
- Secure hybrid workforces consistently and at scale
- Defend mobile networks and IOT devices
Register now to secure your spot.
Please note that this event is open to both current and prospective customers and geared towards business leaders and influencers. We will be carefully reviewing event registrations to ensure that attendees are a match for the event’s focus and objectives.
If you’re a cybersecurity practitioner seeking technical demos, training and certifications, please be sure to check out our Palo Alto Networks Events calendar for a complete list of upcoming events and Ultimate Test Drives that may better align with your needs.
We look forward to seeing you there.
Public sector attendees (defined as employees of the US federal government, state and local government and education employees) should consult their internal compliance requirements and obtain approval from the appropriate compliance official prior to the acceptance of any gratuitous (e.g., "free") items including but not limited to food, beverages, etc. Such employees should be prepared to pay for such items in order to maintain compliance with their own internal policies. A breakdown of costs for food and beverages will be provided upon request. This event is not open to K-12 or Library customers. Please reach out to igniteontournam@paloaltonetworks.com with any questions.
Global and technology trends are reshaping virtually every organization around the world. From the shifting geopolitical landscape, to an ever-changing digital economy, to the ascendance of IoT and generative AI – organizations are rethinking how they operate and protect their business. The good news? With unprecedented cybersecurity innovation and AI advances, and increased engagement among the C-Suite and boards, there’s never been a better time to accelerate your cyber strategy.
Today’s threat landscape is dynamic and complex. Palo Alto Networks has a certain level of telemetry that can accurately make sense of the attack trends in order to help create and implement better, stronger cyber-defenses. In this session, MIchael Sikorski of Unit 42, Palo Alto Networks’ incident response and threat intelligence division, will share critical insights into the state of the evolving threat landscape - and what businesses need to consider about attacks as they confront how to secure against them.
Ron Insana, CNBC Senior Analyst and Commentator and Chief Market Strategist at Dynasty Financial Partners
Between now and next year’s presidential election, there is no end to the variables that can affect the economy, financial markets and the geo-political landscape and each will have an effect on the others. In “Outlook 2024:” Ron Insana reviews where the domestic and global economy stand today, how they’re likely to hold up for the remainder of the year, and how looming issues in 2024 could alter the trajectory of expected growth, inflation and financial market performance. While it recently looked like a “Goldilocks” environment for the US economy, three bears could emerge to eat her porridge in the next 6-12 months.
Artificial Intelligence is revolutionizing businesses and organizations at an unprecedented rate. The opportunity that AI is demonstrating to drive efficiency and technological innovation is infinite. At Palo Alto Networks, we have been transforming AI-powered potential into AI-powered protection for nearly a decade. Join us to explore the future of cybersecurity and learn how AI and ML are not only a differentiator in our products, but help you drive tangible benefits to prepare your organization for the AI era.
With an average of 75 security products utilized by organizations, no wonder Gartner has cited consolidation as a top cybersecurity trend. Having multiple security products translates to higher costs, operational complexity, and intraorganizational friction. CISOs today must strive to maximize value with ubiquitous and powerful security that is centralized and simple to use. Join this session to learn about how a consolidated platform approach can supercharge your risk posture and prepare your organization for transformation.
Protect your network: Combat the most advanced threats using AI-powered security
Scott Fanning, VP Product Management
The proliferation of AI has brought major benefits to the way we work, unfortunately, this proliferation has also brought innovative capabilities to modern day adversaries, allowing them to launch more advanced and convincing attacks, at scale. Learn how today’s threat actors are leveraging AI and other advanced techniques to breach the modern enterprise and how you can fight back.
Know Your Attack Surface: What you don't know CAN hurt you.
Abhi Anbazhagan, Product Marketing Manager | Cortex
If you don’t know about a problem, you don’t have to worry about it, right? Well, not when it comes to your unknown internet-accessible attack surface. We've discovered that attackers initiate attacks within hours of a CVE being published. It’s important that you find and fix those security risks before they become an incident. Join this session to hear about the most common attack surface exposures we found on the global attack surface of large enterprises and national governments. You will also learn the best practices on how to effectively manage your dynamic attack surface and fight back.
Your hybrid cloud is under attack: Protect it with software firewalls.
Dennis Payton, Sr Product Marketing Manager
Over 45% of organizations have suffered a cloud-based breach, is your hybrid cloud in danger? With over 87% of businesses taking a hybrid cloud strategy, protecting your applications’ communications, interconnection, and data transaction traffic from modern sophisticated cyberthreats is more challenging than ever. Now is the time to build your cloud security strategy to protect your applications whether you are lifting and shifting or building modern cloud-native applications. As modern cyberthreats continue to grow in complexity and volume, you must deliver Zero Trust security with agility.
Join us and learn how software NGFWs deliver consistent security and drive accelerated business value for your digital application journeys to the cloud and beyond.
Protect your hybrid workforce: Why Zero Trust Access is Broken, and How to Fix It
Jason Georgi, Director of GTM, SASE
People, applications, and data are everywhere, and the concept of work has been transformed from a place we go to something we do anywhere at any time. Point products, VPN, and “trusted” network zones no longer provide adequate protection, but instead introduce risk. Securing hybrid work requires a fundamental shift that challenges traditional security approaches and exposes legacy architectures.
Unmasking Shadows: Illuminating the Dark Realm of Insider Threats and Identity-Based Attacks.
Chris Tillet, Senior Engineer, Strategic Product Intelligence
In this session, you will learn about how Cortex's ITDR module helps you investigate one of the most difficult AND pervasive indicators of compromise, malicious insiders. You will learn the data science behind how Cortex catches these individuals and future capabilities so that we can help our customers achieve their outcomes in their Insider Threat programs.
Key considerations to help reduce cloud-native application risk
Cameron Hyde, Sr Product Marketing Manager
Do you have applications deployed across public clouds? Do you know which risks pose the greatest threats to those applications? Join this session as we uncover best practices and solutions that can help you identify and address your most pressing cloud-native risks. With these considerations, security professionals can save time prioritizing risks and improve collaboration across teams.
Aaron McCray, Field CISO, CDW
Organizations are more heavily vested in the cloud than ever before and are faced with inter and intra cloud sprawl, lack of visibility and management control, and ever-increasing data protection and privacy requirements. These environments are only as secure as the weakest link. In this session will discuss the business case for secure access service edge (SASE) and zero trust network authentication (ZTNA) and how it can help your organization improve total cost of ownership, reduce unnecessary infrastructure and services, create a “single pane of glass” view, and provide information assurance.
Kieran Norton Principal, Deloitte Risk & Financial Advisory
Enterprise-scale security operations are becoming critical functions in large organizations. Collecting the centralized logs, continuously securing budgets for the security tools, such as Security Information and Event Management (SIEM), and hiring and retaining highly trained cybersecurity specialists are growing challenges. Rising concerns include evolving existing capabilities within a security operation to address rapidly changing business environments and threat landscapes. Add to this increasing threats, such as ransomware, and many organizations are struggling to find the applicable balance between prevention, detection, and response security capabilities. This means building, refining, and modernizing security operations. Join us to learn more about automating and orchestrating an efficient and intelligent cybersecurity response for your organization.
Gary B. Meshell, Global Leader AWS GSI Security and Compliance Leader & Fiona Williams, Advisory Partner, Deloitte
Security is no longer a technical problem—it’s a business problem that impacts CEOs and the Board of Directors, and as we have seen with recent breaches, a major cybersecurity event can bring a company to a standstill. The reality is it’s not a matter if a company is going to get hacked, it’s a matter of when. So, it’s a business imperative for organizations to raise their security posture to ensure that breaches are identified sooner and resolved in a timely and cost-effective manner. Join us for a discussion about the power of actionable security data and autonomous security operations using Gen AI and Machine Learning. We’ll also share how you can increase your organization’s
overall security posture with the support of end-to-end security solutions from AWS and Deloitte.
Protect your branches: Is Your Network Ready for the Branch of the Future?
Graham Sheppard, Sr. Product Manager
In this post-pandemic era, businesses have fully reopened and branches are back. The hybrid work model, rapid cloud and SaaS adoption and the need for better security are driving fundamental shifts at the branches. This evolution requires businesses to implement the branch of the future by ensuring flexible connectivity with WAN resiliency, direct-to-app access for all apps like cloud, internet and SaaS and zero trust security for apps, users and devices including IoT. All of this is done while drastically improving observability and automation to simplify operations with the power of AI/ML. Learn why you need a next-generation SD-WAN with SASE to deliver the branch of the future, today.
Fighting Tech with Tech - Equipping your SOC to fight evolving threats.
Chris Tillet, Senior Engineer, Strategic Product Intelligence
Modern applications, workloads and microservices are generating vast amounts of data faster than most security operations centers (SOCs) can adapt. And security teams operating on a legacy SOC model can spend hours — even days — triaging a single threat event.
How can SOC teams outpace modern threats? By fighting technology with technology and leaning into AI to augment analysts, SOC teams can amp up their defenses and focus on more critical issues.
Join us to hear how real teams improved their security outcomes with a machine-led, human-empowered SecOps platform. At the event, you will hear detailed Cortex® XSIAM™ case studies. Gain insights on:
- Unleashing machine learning and automation in your SOC.
- Streamlining your existing security stack, including SIEM and endpoint.
- Outperforming benchmarks for detection and response times.
Runtime Armor for the Cloud: Shield Your Applications in Real-Time.
Bob West, Chief Security Officer Prisma Cloud
As cloud-native applications become the lifeblood of modern enterprises, securing them from malicious actors is paramount. This session will unveil the power of realtime protection, a security strategy that strengthens your cloud defenses with multiple layers of protection. Explore how to protect your runtime cloud native applications including workloads, networks, web apps and APIs against emerging threats. Gain insights on how to leverages dynamic monitoring, behavior analysis, and positive security model to stop attacks and defends against zero-day exploits.
Protect your connected devices: Complete Zero Trust from IT to OT
Shravanthi Reddy, Sr. Product Marketing Manager, IoT Security
No Zero Trust framework is complete without factoring in unmanaged IoT and OT devices. These devices make up more than 30% of all devices on your organization’s network, and are springboards for 25% of the cyber attacks targeting your organization. These devices often ship with vulnerabilities, run unsupported operating systems, and lack encryption, posing a huge security risk to organizations. But stopping threats and achieving Zero Trust security for IoT devices need not be complex and daunting.This session shares a set of best practices to help you implement closed-loop Zero Trust security to protect your organization’s IoT devices.
One Minute After: Best Practices for Proactive Breach Mitigation.
Daniel Sergile, Consulting Director
While breaches and ransomware attacks can have a profound impact on your business, what you do next has an even greater impact. The Unit 42 Incident Response team sees it all too frequently. Company gets breached, IR team is called in, incident is investigated, contained and remediated, and the client is back in business. But rarely do they look back to see what happened, how it happened, and change their security posture. SecOps teams continue running from incident to incident and get stuck in a reactive vortex. Our experts will share tales from the field and provide practical steps you can take now to prevent future incidents, be more resilient, and break out of the reactive vortex.
Shift Left: Strengthen Cloud Defense from the Start.
Ben Nicholson, Global Practice Lead - Prisma Cloud
As cloud attacks increasingly target the supply chain and delivery pipeline it’s crucial to build a framework for effectively reducing risk across the engineering ecosystem. This session will cover how you can operationalize a modern AppSec framework that helps organizations build scalable DevSecOps workflows and ship applications that are secure by design.
Cyber adversaries are more innovative and effective than ever. The same disruptive technologies that are fueling digital transformation in the enterprise, such as AI/ML, cloud computing, and IoT, have changed the game for cybersecurity. Yesterday’s approaches just can’t keep up. Leaders will need to make tough decisions and bold moves.
That’s why we’ve reimagined Ignite, our flagship user conference, into Ignite on Tour, a global roadshow exclusively for cybersecurity leaders and influencers. At Ignite on Tour, we will share the latest innovations, insights and strategies to help you secure the way forward.
Ignite on Tour brings top cybersecurity decision makers and influencers together for one exciting day of inspiration, strategy building and networking with peers. Instead of technical demos, training and certifications, you’ll find thought-leadership keynotes, strategy sessions and executive networking opportunities to help you accelerate cyber transformation in the face of a rapidly changing threat landscape.
Practitioners seeking technical demos, training and certifications should check out the Palo Alto Networks events calendar for a list of upcoming events for cybersecurity practitioners.
Ignite on Tour is a global roadshow, happening in North America, Europe, Middle East and Asia.To view our current tour schedule,
please visit: https://register.paloaltonetworks.com/igniteontour
If you’re a cybersecurity practitioner seeking technical demos, training and certifications, please be sure to check out the Palo Alto Networks events calendar for a complete list of upcoming events and Ultimate Test Drives that may better align with your needs.
- Dallas: October 19, 2023 | AT&T Stadium
- New York: October 25, 2023 | Convene 225 Liberty St.
- Dallas: October 19, 2023 | AT&T Stadium
Below are some options that are near the event venues.
Dallas:
- Courtyard Dallas Arlington/Entertainment District (0.9 miles from venue)
- Live! by Loews - Arlington Texas (0.5 miles from venue)
- Four Points by Sheraton Dallas Arlington Entertainment District (1.6 miles from venue)
New York:
- Sheraton Tribeca New York Hotel (1.4 miles from venue)
- Courtyard New York World Trade Center Area (0.4 miles from venue)
- The Beekman (0.6 miles from venue)
- New York Marriott Downtown (0.2 miles from venue)
Palo Alto Networks does not offer any discounted rates at any of the hotels listed above.
Please email igniteontournam@paloaltonetworks.com.
Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.
Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.
Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.
Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.
Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.
Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.