Public Sector Ignite 2024

Oct 
25
Join Us
Text goes here
X

Question

Answer

Palo Alto Networks
Palo Alto Networks
Register
Text goes here
X
Agenda
Venue
Speakers
Sponsor
FAQ's
Register now

Public Sector Ignite 2024

Tuesday
, 
April 
02
, 
2024
  | 
8:00AM 
 EST
JETZT ANMELDEN
Text goes here
X

Delivering on Tomorrow’s Cybersecurity, Today

Digital transformation remains a top priority in the public sector, where global and technology trends continue to drive unprecedented change. As public sector organizations tap into AI, cloud computing, IoT and infrastructure modernization to accelerate their missions, questions remain:

  • How can organizations enable cyber resilience without hindering the mission?
  • How can cyber leaders remain compliant with new government mandates while amplifying cyber efforts?
  • What does the AI-driven threat landscape look like today, and what does it mean for organizations with large and complex networks?
  • How can organizations design and implement effective defenses against advanced cyber threats despite resource constraints?

Register now for Public Sector Ignite 2024, where we will bring together  cybersecurity decision makers, influencers and practitioners to explore the answers to these questions and so much more.

This unique one-day event features thought-leadership keynotes, technical deep-dives and networking opportunities to help you enable tomorrow’s cybersecurity, today. 
Topics include:

  • Zero Trust and network security
  • Threat intelligence and security operations
  • Cloud security

Digital transformation remains a top priority in the public sector, where global and technology trends continue to drive unprecedented change. As public sector organizations tap into AI, cloud computing, IoT and infrastructure modernization to accelerate their missions, questions remain:

  • How can organizations enable cyber resilience without hindering the mission?
  • How can cyber leaders remain compliant with new government mandates while amplifying cyber efforts?
  • What does the AI-driven threat landscape look like today, and what does it mean for organizations with large and complex networks?
  • How can organizations design and implement effective defenses against advanced cyber threats despite resource constraints?

Register now for Public Sector Ignite 2024, where we will bring together  cybersecurity decision makers, influencers and practitioners to explore the answers to these questions and so much more.

This unique one-day event features thought-leadership keynotes, technical deep-dives and networking opportunities to help you enable tomorrow’s cybersecurity, today. 
Topics include:

  • Zero Trust and network security
  • Threat intelligence and security operations
  • Cloud security
Register Now
Text goes here
X

Convene 225 Liberty

Reasons to attend

Inspiration.

Hear from the brightest minds in cybersecurity about how to effectively operationalize Zero Trust, AI/ML and automation to stay a step ahead.

Technical Sessions.

Explore the latest innovations for stopping complex and evasive threats in real time, at any scale.

Networking.

Meet and connect with your peers at networking events and experiences throughout the show.

Agenda

7:30–9:00 a.m.

Registration & Breakfast

9:00 a.m.–noon

Keynotes & Morning Sessions

Noon–1:15 p.m.

Lunch/Expo

1:15–4:10 p.m.

Afternoon Sessions

4:10–5:30 p.m.

Networking Reception

Agenda

7:30–9:00 AM

Registration, Breakfast and Expo Open

9:00–9:05 AM

Welcome Remarks

Main Theater


Eric Trexler, SVP, Public Sector, Palo Alto Networks

Global and technology trends are reshaping virtually every organization around the world. From the shifting geopolitical landscape, to an ever-changing digital economy, to the ascendance of IoT and generative AI – organizations are rethinking how they operate and protect their business. The good news? With unprecedented cybersecurity innovation and AI advances, and increased engagement among the C-Suite and boards, there’s never been a better time to accelerate your cyber strategy.

9:05–9:30 AM

Outpacing the Adversary: The Latest in Palo Alto Networks Innovation

Main Theater


Lee Klarich, Chief Product Officer, Palo Alto Networks

The scale, sophistication and speed of today’s threats is startling; just about every version would surprise most organizations. Compounding the problem: attackers are just getting started with AI. How can organizations protect themselves without hindering their mission?

In this session, Palo Alto Networks Chief Product Officer Lee Klarich will unpack exactly what this new threat landscape demands: an AI-backed high-powered innovation engine and a unique type of platform approach.

Today’s threat landscape is dynamic and complex. Palo Alto Networks has a certain level of telemetry that can accurately make sense of the attack trends in order to help create and implement better, stronger cyber-defenses. In this session, Daniel Sergile of Unit 42, Palo Alto Networks’ incident response and threat intelligence division, will share critical insights into the state of the evolving threat landscape - and what businesses need to consider about attacks as they confront how to secure against them.

9:30–10:00 AM

Journey to an AI-Powered Future

Main Theater


Dr. Garfield Jones, Associate Chief, Strategic Technology, CISA

Meerah Rajavel, SVP, CIO, Palo Alto Networks

In challenging the prevailing misconceptions surrounding AI, it is important to recognize that its essence transcends the mere replacement or elimination of humans. Instead, AI functions as a transformative force, reshaping the intricate landscape of work, skills, and the unfolding of human potential. This shift, however, is not without its complexities. The uncharted territory of AI lacks a predefined roadmap, thrusting a critical responsibility upon IT leaders to navigate this evolving landscape. As organizations prepare to embark on this transformative journey, a central question emerges: How can we ensure that the adoption of AI paves the way for a future where technology enhances human capabilities?


In this conversation, public sector leaders will delve into the art of the possible with AI. They will discuss current use cases, sharing best practices and lessons learned in their transformation journey. They will also shed light on where Generative AI is making a significant impact, transforming how the government fulfills its mission and ultimately creating better outcomes at scale.

10:00–10:30 AM

Fortifying Trust: Securely Work From Anywhere

Main Theater


Chi Kang, Deputy Director for Operations, Cyber Security Division, NOAA

As the public sector workforce balances a hybrid work setting, prioritizing trustworthiness and bolstering the resilience of mobile infrastructure becomes paramount. As such, IT leaders are actively seeking ways to integrate frameworks into their tech stacks, aiming for comprehensive control over mobile operations. This encompasses overseeing identities, managing software permissions, monitoring company apps, and implementing remote management tailored to specific needs. The pivotal question that emerges is: where should leaders focus their efforts to enhance the resilience of their mobile workforce?


In this session, leaders from various sectors within the public domain will explore cutting-edge technologies designed to elevate the security of a mobile workforce. The discussion will span secure communication devices, networks, and IoT solutions, providing insights into the continuous advancements in this critical domain.

10:30–11:00 AM

Networking Break and Solutions Hub

11:00–11:30 AM

Digital Defenders: Women at the Helm of AI Cybersecurity

Main Theater


Wendi Whitmore, SVP, Unit 42, Palo Alto Networks

Cybersecurity is one of the most pressing challenges in the digital age. Navigating the intricacies of this landscape requires organizations to not merely react to cyber threats but to proactively and strategically address them. An informed cybersecurity strategy becomes the linchpin, empowering organizations to make crucial decisions about their threat model and to respond effectively to the constantly evolving threat actors. Enter artificial intelligence (AI), a transformative force in reshaping cybersecurity dynamics. AI's prowess in real-time, in-depth analysis becomes a catalyst for organizations looking to shift from a reactive security stance to a more proactive one.


During this conversation hear from female public leaders redefining the security narrative, paving the way for organizations to stay resilient and ahead of the curve in an ever-changing digital landscape. They will uncover how they have been leveraging AI to enhance threat intelligence, automate processes, and redefine the paradigm of proactive cybersecurity.

11:30 AM–12:00 PM

Entering the New Era of CDM

Main Theater


Deontray Jones, Director, Systems Engineering, Palo Alto Networks

The Continuous Diagnostics and Mitigation (CDM) program has been instrumental in fortifying cybersecurity defenses within the federal government, thwarting significant cyberattacks, and bolstering overall resilience. Its recent accolades include praise for its swift response to cyber incidents like the MOVEit mass exploit earlier this year, which affected both on-premise and cloud-based versions of a widely-used file transfer service across federal agencies. However, with the ever-evolving nature of cyber threats, there is a pressing need for the CDM program to adapt and expand its scope to effectively address emerging challenges. With the inclusion of over $400 million in the Biden administration's fiscal 2024 budget request for the CDM program, the question arises: what's next for the program, and how can it evolve to bolster proactive cyber defense operations?


In this session, we will delve into the dynamic evolution of the CDM program, charting its trajectory as it aligns with the Cybersecurity and Infrastructure Security Agency (CISA) in supporting the Federal Civilian Executive Branches (FCEB) in ongoing Zero Trust initiatives. Additionally, we will explore strategies for extending existing CDM capabilities to the cloud, implementing a comprehensive approach to Zero Trust, and delivering services across government entities. Furthermore, we will discuss the significance of extending CDM to the cloud and implementing a Cloud-Native Application Protection Platform (CNAPP) across FCEB. This transformative shift marks a transition from the program's traditional focus on endpoint and network security to a broader perspective that addresses mobile, cloud, and microservices hosted by public cloud providers

Artificial Intelligence is revolutionizing businesses and organizations at an unprecedented rate. The opportunity that AI is demonstrating to drive efficiency and technological innovation is infinite. At Palo Alto Networks, we have been transforming AI-powered potential into AI-powered protection for nearly a decade. Join us to explore the future of cybersecurity and learn how AI and ML are not only a differentiator in our products, but help you drive tangible benefits to prepare your organization for the AI era.

12:00–1:15 PM 

Lunch and Solutions Hub 

12:25 - 12:45

Simplifying Security Through Consolidation

Shailesh Rao, President, Cortex

With an average of 75 security products utilized by organizations, no wonder Gartner has cited consolidation as a top cybersecurity trend. Having multiple security products translates to higher costs, operational complexity, and intraorganizational friction. CISOs today must strive to maximize value with ubiquitous and powerful security that is centralized and simple to use. Join this session to learn about how a consolidated platform approach can supercharge your risk posture and prepare your organization for transformation.

1:15–2:00 PM

Lunch and Solutions Hub

Activation area OPEN rest of the day

Safeguarding America's Future in the Era of Quantum Computing 

Main Theater

Philip Kwan, Director, Product Management, Palo Alto Networks

Neal Ziring, Technical Director, Cybersecurity Directorate, NSA

The United States is hurtling toward a quantum computing future, raising questions about the effectiveness of extensive investments and cybersecurity preparations. But, in May 2023, President Biden signed a national security memo mandating federal agencies to conduct a thorough inventory of encryption use cases within their systems. This directive responds to the longstanding concern among experts that quantum computing could jeopardize the unassailable encryption standards protecting most online data, leaving crucial systems vulnerable, from online payments to classified government secrets. So, how is the nation gearing up to defend against this quantum future? This panel conversation will conviene industry experts to explore the current uses, future prospects, and potential legislative mandates of quantum computing within government agencies.They will delve into the practical applications of quantum computing in government, the challenges and opportunities it presents, and how it might shape future problem-solving.

The Autonomous SOC


Vault

Jeff Yeutter, Systems Engineering Manager - Federal Cortex Specialists, Palo Alto Networks

2:00–2:45 PM

Lunch and Solutions Hub

Activation area OPEN rest of the day

Navigating the Zero Trust Cybersecurity Landscape

Main Theater

Cherilyn Pascoe, Director, National Cybersecurity Center of Excellence


Dr. Mark Stanley, Enterprise Cybersecurity Architect & Lead, NASA

Confronted by the complexities of automation, modernization, and the transition to hybrid work environments, cyber leaders are actively pursuing proactive measures to mitigate risks. A pivotal strategy in this complex landscape involves the adoption of cutting-edge zero trust security solutions. However, despite the ongoing strategic guidance available, IT and cyber leaders continue to grapple with persistent challenges presented by dynamic threats, the rapid emergence of new technologies, and an intensely competitive labor market. During this session, leaders will explore best practices meticulously crafted to enhance cybersecurity postures within the public sector. Delving into the implementation of zero trust, they will elaborate on how this approach has played a crucial role in securing their networks and data. The discussion will spotlight the strategic steps taken to meet Zero Trust requirements, providing insights into their journey and outlining their trajectory for 2024.

Unified Cloud Security

Vault

David Kubicki, Sr. Solution Architect Manager - Federal, Palo Alto Networks

Explore the intricacies of unified cloud security in this technical session on Prisma Cloud. Uncover the power of a cohesive approach, seamlessly integrating security across multi-cloud environments. Gain insights into comprehensive threat prevention, compliance management, and the unification of diverse security controls for robust cloud security.

2:45–3:30 PM

Lunch and Solutions Hub

Activation area OPEN rest of the day

Securing Federal Cloud: FedRAMP's Vision for Tomorrow

Main Theater

Speaker

 The incorporation of the FedRAMP Authorization Act into the FY23 National Defense Authorization Act represents a significant stride in fortifying America's cloud-first mission. This groundbreaking legislation not only fosters innovation but also enhances the security of federal entities transitioning to the cloud. Moreover, it introduces roles aimed at alleviating bottlenecks and streamlining the process for agencies to procure FedRAMP providers. Consequently, the FedRAMP team has witnessed a remarkable surge in program adoption, evident through increased agency participation and the widespread reuse of authorizations. In this session, FedRAMP leaders will delve into the program's expansion, shedding light on ongoing efforts to modernize through advancements in automation and refined business processes. The discussion will feature insights from key figures in both the public and private sectors, showcasing innovative solutions, sharing best practices, and envisioning the future trajectory of the Federal cloud marketplace.

Delivering Secure Access and End-to-End Zero Trust Maturity Model Alignment

Vault

Steve Brown, Senior SASE Technical Marketing Engineer, Palo Alto Networks

We will be discussing Palo Alto’s Prisma SASE solution and how it satisfies the TIC 3.0 guidelines for delivering on the Zero Trust Maturity Model (ZTMM - NIST 800-207). This will include a functional demonstration of a day in the life of a Zero Trust user and Prisma SASE features that enable it.

12:30 - 13:30

Threat Intel & Security Operations

Location: Main field (keynote stage)

Cloud Security

Location: Field Club Side B (Visitors side)

02:00 - 02:30

Zero Trust and Network Security

Location: Field Club Side A (Cowboys side)

02:00 - 02:30

02:30 - 03:00

Protect your hybrid workforce: Why Zero Trust Access is Broken, and How to Fix It
Don Meyer, Product Marketing Director

People, applications, and data are everywhere, and the concept of work has been transformed from a place we go to something we do anywhere at any time. Point products, VPN, and “trusted” network zones no longer provide adequate protection, but instead introduce risk. Securing hybrid work requires a fundamental shift that challenges traditional security approaches and exposes legacy architectures.

Threat Intel & Security Operations

Location: Main field (keynote stage)

02:00 - 02:30

Know Your Attack Surface: What you don't know CAN hurt you.
Abhi Anbazhagan, Product Marketing Manager | Cortex

If you don’t know about a problem, you don’t have to worry about it, right? Well, not when it comes to your unknown internet-accessible attack surface. We've discovered that attackers initiate attacks within hours of a CVE being published. It’s important that you find and fix those security risks before they become an incident. Join this session to hear about the most common attack surface exposures we found on the global attack surface of large enterprises and national governments. You will also learn the best practices on how to effectively manage your dynamic attack surface and fight back.

02:30 - 03:00

Unmasking Shadows: Illuminating the Dark Realm of Insider Threats and Identity-Based Attacks.
Parker Crook, Director Technical Marketing Engineering


In this session, you will learn about how Cortex's ITDR module helps you investigate one of the most difficult AND pervasive indicators of compromise, malicious insiders. You will learn the data science behind how Cortex catches these individuals and future capabilities so that we can help our customers achieve their outcomes in their Insider Threat programs.

Cloud Security

Location: Field Club Side B (Visitors side)

02:00 - 02:30

Your hybrid cloud is under attack: Protect it with software firewalls.
Dennis Payton, Sr Product Marketing Manager

Over 45% of organizations have suffered a cloud-based breach, is your hybrid cloud in danger? With over 87% of businesses taking a hybrid cloud strategy, protecting your applications’ communications, interconnection, and data transaction traffic from modern sophisticated cyberthreats is more challenging than ever. Now is the time to build your cloud security strategy to protect your applications whether you are lifting and shifting or building modern cloud-native applications. As modern cyberthreats continue to grow in complexity and volume, you must deliver Zero Trust security with agility.

Join us and learn how software NGFWs deliver consistent security and drive accelerated business value for your digital application journeys to the cloud and beyond.

02:30 - 03:00

Key considerations to help reduce cloud-native application risk
Cameron Hyde, Sr Product Marketing Manager

Do you have applications deployed across public clouds? Do you know which risks pose the greatest threats to those applications? Join this session as we uncover best practices and solutions that can help you identify and address your most pressing cloud-native risks. With these considerations, security professionals can save time prioritizing risks and improve collaboration across teams.

02:30 - 03:00

02:30 - 03:00

Protect your hybrid workforce: Why Zero Trust Access is Broken, and How to Fix It
Don Meyer, Product Marketing Director

People, applications, and data are everywhere, and the concept of work has been transformed from a place we go to something we do anywhere at any time. Point products, VPN, and “trusted” network zones no longer provide adequate protection, but instead introduce risk. Securing hybrid work requires a fundamental shift that challenges traditional security approaches and exposes legacy architectures.

02:30 - 03:00

Unmasking Shadows: Illuminating the Dark Realm of Insider Threats and Identity-Based Attacks.
Parker Crook, Director Technical Marketing Engineering

In this session, you will learn about how Cortex's ITDR module helps you investigate one of the most difficult AND pervasive indicators of compromise, malicious insiders. You will learn the data science behind how Cortex catches these individuals and future capabilities so that we can help our customers achieve their outcomes in their Insider Threat programs.

02:30 - 03:00

Key considerations to help reduce cloud-native application risk 
Cameron Hyde, Sr Product Marketing Manager

Do you have applications deployed across public clouds? Do you know which risks pose the greatest threats to those applications? Join this session as we uncover best practices and solutions that can help you identify and address your most pressing cloud-native risks. With these considerations, security professionals can save time prioritizing risks and improve collaboration across teams.

03:00 - 03:15

Break

03:15 - 03:45

03:15 - 03:45

CDW Sponsored Session.

Making the Case for SASE & ZTNA.

Robert Cooper, CDW

Organizations are more heavily vested in the cloud than ever before and are faced with inter and intra cloud sprawl, lack of visibility and management control, and ever-increasing data protection and privacy requirements. These environments are only as secure as the weakest link. In this session will discuss the business case for secure access service edge (SASE) and zero trust network authentication (ZTNA) and how it can help your organization improve total cost of ownership, reduce unnecessary infrastructure and services, create a “single pane of glass” view, and provide information assurance.

03:15 - 03:45

Deloitte Sponsored Session.
Transform Security Operations Through AI, Automation, and Orchestration

Kieran Norton Principal, Deloitte Risk & Financial Advisory

Enterprise-scale security operations are becoming critical functions in large organizations. Collecting the centralized logs, continuously securing budgets for the security tools, such as Security Information and Event Management (SIEM), and hiring and retaining highly trained cybersecurity specialists are growing challenges. Rising concerns include evolving existing capabilities within a security operation to address rapidly changing business environments and threat landscapes. Add to this increasing threats, such as ransomware, and many organizations are struggling to find the applicable balance between prevention, detection, and response security capabilities. This means building, refining, and modernizing security operations. Join us to learn more about automating and orchestrating an efficient and intelligent cybersecurity response for your organization.

03:15 - 03:45

AWS Sponsored Session
A hack is inevitable. Are you ready to respond?

Jerry Martin, Global Account Manager at AWS and Compliance Leader & Chris Richter,Global Detect and Respond Product Leader | Deloitte Global

Security is no longer a technical problem—it’s a business problem that impacts CEOs and the Board of Directors, and as we have seen with recent breaches, a major cybersecurity event can bring a company to a standstill. The reality is it’s not a matter if a company is going to get hacked, it’s a
matter of when. So, it’s a business imperative for organizations to raise their security posture to
ensure that breaches are identified sooner and resolved in a timely and cost-effective manner. Join
us for a discussion about the power of actionable security data and autonomous security operations
using Gen AI and Machine Learning. We’ll also share how you can increase your organization’s
overall security posture with the support of end-to-end security solutions from AWS and Deloitte.

12:30 - 13:30

Zero Trust and Network Security

Location: Field Club Side A (Cowboys side)

Threat Intel & Security Operations

Location: Main field (keynote stage)

Cloud Security

Location: Field Club Side B (Visitors side)

12:30 - 13:30

Zero Trust and Network Security

Threat Intel & Security Operations

Cloud Security

03:45 - 04:15

Zero Trust and Network Security

Location: Field Club Side A (Cowboys side)

03:45 - 04:15

Protect your branches: Is Your Network Ready for the Branch of the Future?
Rajesh Kari, Senior Product Marketing Manager

In this post-pandemic era, businesses have fully reopened and branches are back. The hybrid work model, rapid cloud and SaaS adoption and the need for better security are driving fundamental shifts at the branches. This evolution requires businesses to implement the branch of the future by ensuring flexible connectivity with WAN resiliency, direct-to-app access for all apps like cloud, internet and SaaS and zero trust security for apps, users and devices including IoT. All of this is done while drastically improving observability and automation to simplify operations with the power of AI/ML. Learn why you need a next-generation SD-WAN with SASE to deliver the branch of the future, today.

04:15 - 04:45

Protect your connected devices: Complete Zero Trust from IT to OT
Robert Albach, Director of Product Management, Network Security

No Zero Trust framework is complete without factoring in unmanaged IoT and OT devices. These devices make up more than 30% of all devices on your organization’s network, and are springboards for 25% of the cyber attacks targeting your organization. These devices often ship with vulnerabilities, run unsupported operating systems, and lack encryption, posing a huge security risk to organizations. But stopping threats and achieving Zero Trust security for IoT devices need not be complex and daunting.This session shares a set of best practices to help you implement closed-loop Zero Trust security to protect your organization’s IoT devices.

Threat Intel & Security Operations

Location: Main field (keynote stage)

03:45 - 04:15

Fighting Tech with Tech - Equipping your SOC to fight evolving threats.
Parker Crook, Director Technical Marketing Engineering

Modern applications, workloads and microservices are generating vast amounts of data faster than most security operations centers (SOCs) can adapt. And security teams operating on a legacy SOC model can spend hours — even days — triaging a single threat event.
How can SOC teams outpace modern threats? By fighting technology with technology and leaning into AI to augment analysts, SOC teams can amp up their defenses and focus on more critical issues.
Join us to hear how real teams improved their security outcomes with a machine-led, human-empowered SecOps platform. At the event, you will hear detailed Cortex® XSIAM™ case studies. Gain insights on:

  • Unleashing machine learning and automation in your SOC.
  • Streamlining your existing security stack, including SIEM and endpoint.
  • Outperforming benchmarks for detection and response times.

 

04:15 - 04:45

One Minute After: Best Practices for Proactive Breach Mitigation.
 Daniel Sergile, Consulting Director

While breaches and ransomware attacks can have a profound impact on your business, what you do next has an even greater impact. The Unit 42 Incident Response team sees it all too frequently. Company gets breached, IR team is called in, incident is investigated, contained and remediated, and the client is back in business. But rarely do they look back to see what happened, how it happened, and change their security posture. SecOps teams continue running from incident to incident and get stuck in a reactive vortex. Our experts will share tales from the field and provide practical steps you can take now to prevent future incidents, be more resilient, and break out of the reactive vortex.

Cloud Security

Location: Field Club Side B (Visitors side)

03:45 - 04:15

Runtime Armor for the Cloud: Shield Your Applications in Real-Time.
Mohit Bhasin, Sr Product Marketing Manager

As cloud-native applications become the lifeblood of modern enterprises, securing them from malicious actors is paramount. This session will unveil the power of realtime protection, a security strategy that strengthens your cloud defenses with multiple layers of protection. Explore how to protect your runtime cloud native applications including workloads, networks, web apps and APIs against emerging threats. Gain insights on how to leverages dynamic monitoring, behavior analysis, and positive security model to stop attacks and defends against zero-day exploits.

04:15 - 04:45

Shift Left: Strengthen Cloud Defense from the Start.
Kevin Jackson, Prisma Cloud Solutions Architect

As cloud attacks increasingly target the supply chain and delivery pipeline it’s crucial to build a framework for effectively reducing risk across the engineering ecosystem. This session will cover how you can operationalize a modern AppSec framework that helps organizations build scalable DevSecOps workflows and ship applications that are secure by design.

04:15 - 04:45

04:15 - 04:45

Protect your connected devices: Complete Zero Trust from IT to OT
Robert Albach, Director of Product Management, Network Security

No Zero Trust framework is complete without factoring in unmanaged IoT and OT devices. These devices make up more than 30% of all devices on your organization’s network, and are springboards for 25% of the cyber attacks targeting your organization. These devices often ship with vulnerabilities, run unsupported operating systems, and lack encryption, posing a huge security risk to organizations. But stopping threats and achieving Zero Trust security for IoT devices need not be complex and daunting.This session shares a set of best practices to help you implement closed-loop Zero Trust security to protect your organization’s IoT devices.

04:15 - 04:45

One Minute After: Best Practices for Proactive Breach Mitigation.
 Daniel Sergile, Consulting Director

While breaches and ransomware attacks can have a profound impact on your business, what you do next has an even greater impact. The Unit 42 Incident Response team sees it all too frequently. Company gets breached, IR team is called in, incident is investigated, contained and remediated, and the client is back in business. But rarely do they look back to see what happened, how it happened, and change their security posture. SecOps teams continue running from incident to incident and get stuck in a reactive vortex. Our experts will share tales from the field and provide practical steps you can take now to prevent future incidents, be more resilient, and break out of the reactive vortex.

04:15 - 04:45

Shift Left: Strengthen Cloud Defense from the Start.
Kevin Jackson, Prisma Cloud Solutions Architect

As cloud attacks increasingly target the supply chain and delivery pipeline it’s crucial to build a framework for effectively reducing risk across the engineering ecosystem. This session will cover how you can operationalize a modern AppSec framework that helps organizations build scalable DevSecOps workflows and ship applications that are secure by design.

3:30–4:00 PM

Luminary Session

Meet Rowdy, the Dallas Cowboys mascot and get ready to show your stuff with the Punt, Pass, Kick, Catch and Run Game on the field!

4:00–4:10 PM

 

Closing Remarks

Main Theater


Eric Trexler, SVP, Public Sector, Palo Alto Networks

4:10–5:30 PM

 

Networking Reception

Meet Rowdy, the Dallas Cowboys mascot and get ready to show your stuff with the Punt, Pass, Kick, Catch and Run Game on the field!

* Pending agency approval.

Location

Get directions
Text goes here
X

Speakers

Keynote Speakers

Dr. Garfield Jones Associate Chief, Strategic Technology

CISA

Chi Kang
Deputy Director for Operations, Cyber Security Division

NOAA

Deontray Jones,
Director, Systems Engineering

NIST NCCoE

Lee Klarich
Chief Product Officer

Palo Alto Networks

Meerah Rajavel
SVP, CIO

Palo Alto Networks

Wendi Whitmore
SVP, Unit 42

Palo Alto Networks

Cherilyn Pascoe
Director

NIST NCCoE

Mark Stanley
Enterprise Cybersecurity Architect & Lead

NASA

Neal Ziring,
Technical Director, Cybersecurity Directorate

NSA

David Kubicki
Sr. Solution Architect Manager - Federal

Palo Alto Networks

Eric Trexler
SVP, Public Sector

Palo Alto Networks

Jeff Yeutter
Systems Engineering Manager - Federal Cortex Specialists

Palo Alto Networks

Philip Kwan
Director, Product Management

Palo Alto Networks

Wayne Leriche
Field CTO & Federal Solutions Architect

Palo Alto Networks

SPONSORS

Premier Sponsor

Platinum Sponsors

Diamond Sponsor

Register now

Ignite on Tour Test Event

Our consultants serve as your trusted advisors to assess and test your security controls against the right threats, transform your security strategy with an intelligence-informed approach and respond to incidents in record time.

Sign up

[confirmation_headline]
[confirmation_messaging]
Add to Calendar
Text goes here
X

Ignite on Tour FAQs

Where will Public Sector Ignite 2024 take place?

This year’s Public Sector Ignite will take place at the Capital One Hall in Tysons, Virginia, on April 2, 2024.  Public Sector Ignite 2024 is free to attend.

 

Capital One Hall
7750 Capital One Tower Rd
Tysons, VA 22102

Is there parking near Capital One Hall?

General Parking for all Capital One Hall events is now located in the Visitor and Associate Parking Garage (1680 Capital One Drive South, McLean, VA 22102). This parking facility is located to the left of Capital One Center's C2 Building. C2 is a short and walkable distance to the front doors and box office of Capital One Hall. Please be advised the walk is outside and not under any covering — please be prepared for the weather.  

 
Please mention to the parking attendant that you are attending Public Sector Ignite to have your parking fees waived. 

If you are taking public transportation, the Metro Silver Line, McLean Station, is a five-minute walk from Capital One Hall.

Who can attend Public Sector Ignite 2024?

Public Sector Ignite is open to all cybersecurity professionals, including:

  • CIOs/CISOs
  • VPs of IT
  • Network engineers/architects
  • SOC engineers
  • DevOps and cloud architects
  • IT directors/managers

How do I make edits to my registration or cancel my registration?

Log in to your registration account using the credentials that you created during registration. For any other questions, please contact publicsectorignite@paloaltonetworks.com

Can I share my Public Sector Ignite login information with other members of my team?

No, each attendee must register individually for the event.

Will there be a virtual component of Public Sector Ignite 2024?

Public Sector Ignite 2024 is an in-person event. There will not be a virtual component for the event.

Whom can I contact if I have other questions?

If you have any additional questions, please email the Palo Alto Networks Public Sector Ignite ’24 event team at publicsectorignite@paloaltonetworks.com.

What is the dress code?

The dress code for Public Sector Ignite is business casual. We encourage you to dress casually and comfortably.

How long should I plan to attend?

Palo Alto Networks Public Sector Ignite 2024 officially kicks off at 8 a.m. Eastern with breakfast. Sessions end at 4 p.m., and the event concludes with a networking reception from 4 to 5:30 p.m. The networking reception is open to all attendees.

Will food be provided?

Breakfast and lunch will be provided to all attendees. Hors d'oeuvres will be served at the networking reception. If you have dietary restrictions, please note this during your registration or reach out to publicsectorignite@paloaltonetworks.com.

Are there any public sector compliance considerations?

Attendees from the public sector (defined as employees of the US federal government, state and local government and education employees) should consult their internal compliance requirements and obtain approval from the appropriate ethics or compliance official prior to accepting an invitation to any event offering gratuitous items such as meals and other business courtesies. If you have any questions about this event, you may reach out to publicsectorignite@paloaltonetworks.com.


Can attendees accrue Continuing Professional Education (CPE) credits during Public Sector Ignite 2024?

Yes, attendees will be able to earn CPE credits during Public Sector Ignite 2024. Attendees will have to sign in and out of the CPE sheet at the registration desk on site on April 2. To receive a CPE certificate, please reach out to the Palo Alto Networks Public Sector Ignite 2024 event team at publicsectorignite@paloaltonetworks.com. 

GovExec is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org.

After completing this course, you will be able to: understand how organizations enable cyber resilience without hindering the mission, understand what the AI-driven threat landscape look like today and understand how organizations design and implement effective defenses against advanced cyber threats despite resource constraints, 

To register for this session, enter your information here.  If you would like to indicate interest in receiving CPE credit, please contact Beka after the event at btroutman@govexec.com. In order to receive full credit as an in-person attendee you must attend for at least 50 minutes and sign in and out at the registration desk on-site on April 2nd. 

Participants will earn up to 6 CPE credits in Information Technology. Participants will earn 1 CPE credit for each 50 minutes of participation. 

Field of Study: Information Technology

Additional Information Prerequisites: None

Who Should Attend: All cybersecurity professionals, including: CIOs/CISOs, VPs of IT, Network engineers/architects, SOC engineers, DevOps and cloud architects, IT directors/managers, and anyone else who is interested in learning about the future of cybersecurity in the public sector. 

Advanced Preparation: None

Program Level: Basic

Delivery Method: Group Live

Refunds, Complaints and Cancellations: This program is free for all attendees. information regarding administrative policies such as complaints or program cancellations please contact the Palo Alto Networks Public Sector Ignite 2024 event team at publicsectorignite@paloaltonetworks.com.


Copyright © 2024 Palo Alto Networks. All rights reserved

Privacy
Text goes here
X
Contact Us
Text goes here
X
Terms of Use
Text goes here
X
Link Text
Text goes here
X

Zero Trust and Network Security

03:45 - 04:15

Protect your network: Combat the most advanced threats using AI-powered security
Scott Fanning, VP Product Management

With an average of 75 security products utilized by organizations, no wonder Gartner has cited consolidation as a top cybersecurity trend. Having multiple security products translates to higher costs, operational complexity, and intraorganizational friction. CISOs today must strive to maximize value with ubiquitous and powerful security that is centralized and simple to use. Join this session to learn about how a consolidated platform approach can supercharge your risk posture and prepare your organization for transformation.

04:45 - 05:15

Know Your Attack Surface: What you don't know CAN hurt you.
Abhi Anbazhagan, Product Marketing Manager | Cortex

With an average of 75 security products utilized by organizations, no wonder Gartner has cited consolidation as a top cybersecurity trend. Having multiple security products translates to higher costs, operational complexity, and intraorganizational friction. CISOs today must strive to maximize value with ubiquitous and powerful security that is centralized and simple to use. Join this session to learn about how a consolidated platform approach can supercharge your risk posture and prepare yo

05:45 - 06:15

Your hybrid cloud is under attack: Protect it with software firewalls.
Dennis Payton, Sr Product Marketing Manager

With an average of 75 security products utilized by organizations, no wonder Gartner has cited consolidation as a top cybersecurity trend. Having multiple security products translates to higher costs, operational complexity, and intraorganizational friction. CISOs today must strive to maximize value with ubiquitous and powerful security that is centralized and simple to use. Join this session to learn about how a consolidated platform approach can supercharge your risk posture and prepare yo

Threat Intel & Security Operations

03:45 - 04:15

Protect your network: Combat the most advanced threats using AI-powered security
Scott Fanning, VP Product Management

With an average of 75 security products utilized by organizations, no wonder Gartner has cited consolidation as a top cybersecurity trend. Having multiple security products translates to higher costs, operational complexity, and intraorganizational friction. CISOs today must strive to maximize value with ubiquitous and powerful security that is centralized and simple to use. Join this session to learn about how a consolidated platform approach can supercharge your risk posture and prepare your organization for transformation.

04:15 - 05:45

Know Your Attack Surface: What you don't know CAN hurt you.
Abhi Anbazhagan, Product Marketing Manager | Cortex

With an average of 75 security products utilized by organizations, no wonder Gartner has cited consolidation as a top cybersecurity trend. Having multiple security products translates to higher costs, operational complexity, and intraorganizational friction. CISOs today must strive to maximize value with ubiquitous and powerful security that is centralized and simple to use. Join this session to learn about how a consolidated platform approach can supercharge your risk posture and prepare yo

05:45 - 06:15

Your hybrid cloud is under attack: Protect it with software firewalls.
Dennis Payton, Sr Product Marketing Manager

With an average of 75 security products utilized by organizations, no wonder Gartner has cited consolidation as a top cybersecurity trend. Having multiple security products translates to higher costs, operational complexity, and intraorganizational friction. CISOs today must strive to maximize value with ubiquitous and powerful security that is centralized and simple to use. Join this session to learn about how a consolidated platform approach can supercharge your risk posture and prepare yo

Cloud Security

03:45 - 04:15

Protect your network: Combat the most advanced threats using AI-powered security
Scott Fanning, VP Product Management

With an average of 75 security products utilized by organizations, no wonder Gartner has cited consolidation as a top cybersecurity trend. Having multiple security products translates to higher costs, operational complexity, and intraorganizational friction. CISOs today must strive to maximize value with ubiquitous and powerful security that is centralized and simple to use. Join this session to learn about how a consolidated platform approach can supercharge your risk posture and prepare your organization for transformation.

04:15 - 05:15

Know Your Attack Surface: What you don't know CAN hurt you.
Abhi Anbazhagan, Product Marketing Manager | Cortex

With an average of 75 security products utilized by organizations, no wonder Gartner has cited consolidation as a top cybersecurity trend. Having multiple security products translates to higher costs, operational complexity, and intraorganizational friction. CISOs today must strive to maximize value with ubiquitous and powerful security that is centralized and simple to use. Join this session to learn about how a consolidated platform approach can supercharge your risk posture and prepare yo

05:15 - 06:15

Your hybrid cloud is under attack: Protect it with software firewalls.
Dennis Payton, Sr Product Marketing Manager

With an average of 75 security products utilized by organizations, no wonder Gartner has cited consolidation as a top cybersecurity trend. Having multiple security products translates to higher costs, operational complexity, and intraorganizational friction. CISOs today must strive to maximize value with ubiquitous and powerful security that is centralized and simple to use. Join this session to learn about how a consolidated platform approach can supercharge your risk posture and prepare yo

SPEAKER BIO

Michael Coden

Head of Cybersecurity Practice

BCG

Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.

SPEAKER BIO

Michael Coden

Head of Cybersecurity Practice

BCG

Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.

SPEAKER BIO

Michael Coden

Head of Cybersecurity Practice

BCG

Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.

SPEAKER BIO

Michael Coden

Head of Cybersecurity Practice

BCG

Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.

SPEAKER BIO

Michael Coden

Head of Cybersecurity Practice

BCG

Michael Coden is Head of the Cybersecurity Practice at BCG Platinion, the part of Boston Consulting Group that provides deep technical expertise. Michael has over 30 years of experience in cybersecurity strategy, organization, processes, technologies, research, product design, and markets for both users and producers of cybersecurity products in all industry and public sectors. He has advised clients in the Americas, Europe, the Middle East, and Asia, and is the North America lead for Cybersecurity at BCG.

Share with Friends
Facebook
Twitter
LinkedIn
Link
CONTACT THE ORGANIZER
Google   Outlook   iCal   Yahoo

RSVP

Google Icon
Google
Outlook Icon
Outlook
Apple Icon
Apple
Yahoo Icon
Yahoo