Public Sector Ignite 2025
Oct 
25
Join Us
Text goes here
X

Question

Answer

Palo Alto Networks
Palo Alto Networks
Register now
Text goes here
X
Reconfirm here
Text goes here
X
Reconfirm here
Register now
Palo Alto Networks
Palo Alto Networks
Register now
Text goes here
X
Register now
Public Sector Ignite 2025

Reimagining Cybersecurity with Precision AI™

Thursday
, 
October 
30
, 
2025
  | 
8:00AM 
 ET
JETZT ANMELDEN
Text goes here
X

Public Sector Ignite 2025

Capital One Hall | Tysons, VA

Thursday, October 30, 2025 | 8:00 AM ET

Enhance your user experience and build brand equity with your design vernacular.

RSVP
Text goes here
X

Securely Unleash What's Next for the US Public Sector


During the government shutdown, we know the mission doesn't stop. Threat actors don't wait, and with October being Cybersecurity Awareness Month, we believe our work to defend our nation's critical assets is more important than ever.

That’s why Public Sector Ignite 2025 will proceed as planned. We’re committed to hosting this crucial forum for the community to reinforce our collective defense.


The future of the US public sector is being built today, driven by an AI transformation that's reshaping how public sector organizations operate and serve citizens. This new digital way of life offers incredible opportunities for mission advancement, but it also creates massive cyber risk. This often forces public sector leaders to question if security is a barrier to progress.

 

Public sector organizations operate under constant pressure to protect highly sensitive data and adhere to stringent regulations, while simultaneously optimizing resources, driving operational efficiency and ensuring cybersecurity enables, rather than hinders, mission advancement within strict budget constraints.

 

It's time to reframe cybersecurity as a critical enabler of innovation and mission success.

 

Public Sector Ignite is the essential one-day event where you'll learn how to stop chasing threats and start building a resilient defense for what's next in the US public sector. Join your peers and our leading experts to discover a new security strategy — one that empowers you to confidently embrace revolutionary technologies and securely unleash your organization's critical mission to protect national security and public safety.


Discover how to:

  • Transform your SOC for the AI era: Learn how to scale and enhance your security operations center to combat the sophisticated, AI-powered attacks targeting public sector entities today and tomorrow.
  • Harness AI and agentics safely for government operations: Embrace AI's potential within your agency without introducing new risk. We'll show you how to embed security throughout the entire AI lifecycle to accelerate your AI-driven transformations securely and compliantly. Get a head start with the administration’s focus on operationalizing the AI Action Plan. 
  • Simplify public sector security and reduce complexity: Discover how to leverage a single, AI-powered platform to reduce operational complexity and automate manual tasks — freeing your teams to focus on mission-critical innovation rather than constant threat management.
Register Now
Text goes here
X

Explore what’s in store by watching this video of
Public Sector Ignite 2024!

Explore what’s in store by watching this video of Public Sector Ignite 2024!

Why Attend Public Sector Ignite?

Gain a strategic blueprint for public sector security:

Move beyond keeping pace and learn how to get ahead. You'll gain a clear plan for consolidating your agency's architecture with a unified platform, automation and the power of AI, giving you the confidence to drive secure innovation across your department or agency.

Master the tools to stop modern attacks on government systems:

Learn to operationalize Palo Alto Networks platforms to neutralize sophisticated, evasive threats at scale and strengthen your agency's security posture immediately. Protect critical infrastructure and sensitive data with confidence.

Connect with a community of public sector leaders:

Network with fellow cybersecurity leaders from federal, state and local agencies who are also navigating this complex landscape. Learn from the real-world successes of your counterparts and build a trusted network of peers that you can rely on long after the event.

Don’t miss out!

This is your chance to be part of the evolution of cybersecurity and strengthen your agency’s defense while navigating complex administrative priorities. Register now to secure your spot at Public Sector Ignite.

Explore what’s in store by watching this video of Public Sector Ignite 2024!

Agenda

7:30 AM - 9:00 AM

Registration, Breakfast & Expo

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

8:00 AM – 8:55 AM

Women in Technology Breakfast

with Renata Spinks-McNeal, Amanda Cody and Rachel McAlpin

Women in Technology Breakfast

Public sector organizations face some of the toughest cybersecurity challenges, from nation-state threats to safeguarding sensitive data and ensuring mission continuity. Meeting these demands takes more than technical expertise; it requires resilient leaders who can balance innovation, accountability, and mission priorities. Women leaders in this space bring unique perspectives shaped by adaptability, mentorship, and a drive to create lasting change. In this fireside chat, leaders will share how they began their careers, the skills that shaped their success, and the challenges they encountered as women in cybersecurity. They will discuss the role of mentorship, the best advice they’ve received, their approaches to adversity, and the personal habits that guide their leadership journey.

9:00 AM – 9:15 AM

Welcome Remarks and What’s Next

with Eric Trexler

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

9:15 AM – 9:40 AM

Securing Cyberspace: A Strategy for America

with Sean Cairncross

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

9:40 AM – 10:10 AM

Cybersecurity in the Age of AI
with Lee Klarich

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

10:10 AM – 10:30 AM

10:10 AM – 10:30 AM

Unpacking CMMC — Driving Defense Industrial Base Resilience

with Matt Travis and John Davis

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

10:30 AM – 10:50 AM

Promoting Federal Cyber Resilience

with Nick Andersen and Daniel Kroese

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

10:50 AM – 11:05 AM

Break and Expo

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

11:05 AM – 11:30 AM

Securing AI by Design: Building Trustworthy AI at Scale
with Ian Swanson

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

11:30 AM – 12:00 PM

AI vs. AI: Revolutionizing SecOps with the AI-powered SOC

with Chris Whitlock and Rachel Sile

AI vs. AI: Revolutionizing SecOps with the AI-powered SOC

The scale and complexity of today’s cyber threats are overwhelming government Security Operations Centers (SOCs). Adversaries are faster, more coordinated, and increasingly using automation and AI to exploit vulnerabilities. SOC teams face a flood of alerts, leading to fatigue, missed threats, and rising risk. At the same time, maintaining legacy SOCs is becoming more expensive, stretching limited budgets and staff. With the gap widening between threat speed and response capability, agencies must rethink their approach. The challenge now is how IT and security leaders can move from reactive operations to a smarter, more autonomous model that strengthens defense and reduces strain on teams. In this session, public sector cybersecurity leaders will explore how agencies can modernize their SOCs with advanced AI and intelligent orchestration. They’ll discuss moving beyond basic automation to deploy predictive threat intelligence, automated threat hunting, and near real-time remediation. Speakers will share strategies for streamlining workflows across complex environments, helping lean teams respond faster and more effectively. The conversation will also highlight how to responsibly integrate AI, free up analysts for high-value work, and improve visibility and resilience. Real-world examples will shed light on the technical, policy, and cultural shifts needed to build a more autonomous and adaptive cyber defense posture.

AI vs. AI: Revolutionizing SecOps with the AI-powered SOC

The scale and complexity of today’s cyber threats are overwhelming government Security Operations Centers (SOCs). Adversaries are faster, more coordinated, and increasingly using automation and AI to exploit vulnerabilities. SOC teams face a flood of alerts, leading to fatigue, missed threats, and rising risk. At the same time, maintaining legacy SOCs is becoming more expensive, stretching limited budgets and staff. With the gap widening between threat speed and response capability, agencies must rethink their approach. The challenge now is how IT and security leaders can move from reactive operations to a smarter, more autonomous model that strengthens defense and reduces strain on teams. In this session, public sector cybersecurity leaders will explore how agencies can modernize their SOCs with advanced AI and intelligent orchestration. They’ll discuss moving beyond basic automation to deploy predictive threat intelligence, automated threat hunting, and near real-time remediation. Speakers will share strategies for streamlining workflows across complex environments, helping lean teams respond faster and more effectively. The conversation will also highlight how to responsibly integrate AI, free up analysts for high-value work, and improve visibility and resilience. Real-world examples will shed light on the technical, policy, and cultural shifts needed to build a more autonomous and adaptive cyber defense posture.

12:00 PM – 1:00 PM

Lunch and Expo

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

1:05 PM – 1:30 PM

Quantum Leap: Driving National Preparedness with Post-Quantum Cryptography

with Richu Channakeshava

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

1:30 PM – 1:55 PM

The AI Arms Race: A Fireside Chat with the FBI and Unit 42

 with Brett Leatherman, Sam Rubin and Frank Konkel

Accelerating Zero Trust Through the Power of the Platform

The Indian Health Service (IHS) faces constant pressure to protect sensitive patient data, including Electronic Health Records (EHRs), from cyber threats while adhering to stringent regulations such as HIPAA and FedRAMP. To meet these demands, IHS must adopt a Zero Trust Architecture (ZTA) and advance through the Zero Trust Maturity Model (ZTMM).


Palo Alto Networks delivers a comprehensive cybersecurity platform that enables IHS to secure networks, IoT devices, cloud workloads, and endpoints while safeguarding EHR systems. By integrating solutions such as Strata Next-Generation Firewalls (NGFW), Cloud-Delivered Security Services (CDSS), IoT Security, Prisma Access with PAN-OS SD-WAN, Cortex XSOAR, Cortex XDR, Xpanse, and Prisma Cloud, IHS can strengthen security, ensure regulatory compliance, and progress through the ZTMM to achieve a mature Zero Trust posture. This unified approach ensures robust data protection, operational efficiency, and enhanced patient safety.

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

1:55 PM – 2:20 PM

Accelerating Zero Trust Through the Power of the Platform
with Benjamin Koshy, Solomon Wilson and Brenna Plesich

The AI Arms Race: A Fireside Chat with the FBI and Unit 42


Join Brett Leatherman, the FBI's Deputy Assistant Director for Cyber Operations, and the SVP of Unit 42 at Palo Alto Networks for a riveting fireside chat on the new reality of AI-supercharged cybercrime. Adversarial AI has accelerated the speed of attacks, allowing even low-skilled actors to launch sophisticated campaigns, including convincing deepfakes, at machine speed—often ten times faster than traditional methods.
Drawing on exclusive insights from hundreds of real-world Unit 42 incident-response engagements, our experts will dissect the latest AI-driven tactics being used across the entire attack chain. You'll learn field-tested defenses you can deploy now to protect your organization and stay ahead in the escalating AI arms race. This discussion will provide a critical look at the threats facing us today and the strategies required to stop them. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

2:20 PM – 2:45 PM

Zero Trust Device Security for the Public Sector: A Joint Strategy from CDW and Palo Alto Networks

with Steve Thamasett and Sam Brown

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

2:45 PM – 3:05 PM

Break and Expo

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

3:05 PM – 3:30 PM

Mission Possible: Cloud Strategies for Next Generation Security

 with Bob Ritchie, Harsh Dalwadi and Joe Sangiuliano

Mission Possible: Cloud Strategies for Next Generation Security

As government agencies accelerate their shift to cloud-based infrastructure, they’re not only transforming operations and service delivery but also encountering a new set of cybersecurity imperatives. Security Operations Centers (SOCs) now face the challenge of securing sensitive data and mission-critical systems within a complex, rapidly evolving cloud environment. For agency leaders, the question is clear: how can they capitalize on the advantages of the cloud while fortifying security, ensuring resilience, and maintaining compliance?


In this forward-looking panel, will bring together cloud security experts and government leaders to examine SOC integration within cloud environments. Leaders will share insights from recent implementations, strategies for strengthening SOC capabilities, and best practices for threat detection, incident response, and data protection across multi-cloud setups. The discussion offers practical guidance and forecasts on the future of SOC operations in a cloud-driven landscape, empowering agencies to enhance the security and impact of their cloud investments.

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

3:30 PM – 3:55 PM

Expert Panel: Security is Solvable - Insights on Cybersecurity Best Practices
with Derek Doerr, Sean Frazier, Thomas Wootton and Toni Mitchell

Expert Panel: The Power of Partnership & Securing the AI-Driven Public Sector Mission

As the public sector embraces an AI transformation, agencies face a critical need to secure this new digital frontier. Join three of our key partners for a panel on how they are helping government agencies navigate this complex landscape. You'll learn how to securely and compliantly adopt AI, simplify operations, and build a resilient defense to enable mission advancement. This session will demonstrate how strategic partnerships are crucial to making security a solvable endeavor and unleashing the full potential of AI.

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

3:55 PM – 4:00 PM

Closing Remarks

with Eric Trexler

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

4:00 PM - 5:00 PM

Networking Opportunity and Expo

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

*Agenda is subject to change

8:00 AM–9:30 AM

Registration & Breakfast

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

9:30 AM–12:30 PM

Keynotes & Morning Sessions

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

12:30 PM–2:00 PM

Lunch/Expo/Demo Area Opens

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

2:00 PM–4:45 PM

Afternoon Sessions

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

4:45 PM–6:30 PM

Networking Opportunity

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Agenda

7:30 AM - 9:00 AM

REGISTRATION, BREAKFAST, EXPO

MAINSTAGE MORNING KEYNOTE

8:00 AM - 9:00 AM

Women in Technology Breakfast Public sector organizations face some of the toughest cybersecurity challenges, from nation-state threats to safeguarding sensitive data and ensuring mission continuity. Meeting these demands takes more than technical expertise; it requires resilient leaders who can balance innovation, accountability, and mission priorities. Women leaders in this space bring unique perspectives shaped by adaptability, mentorship, and a drive to create lasting change. In this fireside chat, leaders will share how they began their careers, the skills that shaped their success, and the challenges they encountered as women in cybersecurity. They will discuss the role of mentorship, the best advice they’ve received, their approaches to adversity, and the personal habits that guide their leadership journey.

Eric Trexler, SVP Public Sector, Palo Alto Networks

Main Theater


9:05 AM - 9:25 AM

Future Forward: Cybersecurity and AI

BJ Jenkins, President, Palo Alto Networks

Main Theater

Women in Technology Breakfast Public sector organizations face some of the toughest cybersecurity challenges, from nation-state threats to safeguarding sensitive data and ensuring mission continuity. Meeting these demands takes more than technical expertise; it requires resilient leaders who can balance innovation, accountability, and mission priorities. Women leaders in this space bring unique perspectives shaped by adaptability, mentorship, and a drive to create lasting change. In this fireside chat, leaders will share how they began their careers, the skills that shaped their success, and the challenges they encountered as women in cybersecurity. They will discuss the role of mentorship, the best advice they’ve received, their approaches to adversity, and the personal habits that guide their leadership journey.

9:25 AM - 10:00 AM

Accelerating Zero Trust Through the Power of the Platform

Ben Koshy, CISO, Division of Information Security (DIS), Indian Health Service (IHS)

Solomon Wilson, DIS Project Manager, Division of Information Security (DIS), Indian Health Service (IHS)

Brenna Plesich, RVP Civilian & FSI, Palo Alto Networks


Main Theater

The Indian Health Service (IHS) faces constant pressure to protect sensitive patient data, including Electronic Health Records (EHRs), from cyber threats while adhering to stringent regulations such as HIPAA and FedRAMP. To meet these demands, IHS must adopt a Zero Trust Architecture (ZTA) and advance through the Zero Trust Maturity Model (ZTMM).

Palo Alto Networks delivers a comprehensive cybersecurity platform that enables IHS to secure networks, IoT devices, cloud workloads, and endpoints while safeguarding EHR systems. By integrating solutions such as Strata Next-Generation Firewalls (NGFW), Cloud-Delivered Security Services (CDSS), IoT Security, Prisma Access with PAN-OS SD-WAN, Cortex XSOAR, Cortex XDR, Xpanse, and Prisma Cloud, IHS can strengthen security, ensure regulatory compliance, and progress through the ZTMM to achieve a mature Zero Trust posture. This unified approach ensures robust data protection, operational efficiency, and enhanced patient safety.

10:00 AM - 10:45 AM

From Complexity To Clarity: The Latest In Cybersecurity Innovation

Lee Klarich, EVP, Chief Product Officer, Palo Alto Networks 

Main Theater

Attacks are faster and more relentless than ever—the old ways of doing things (siloed and fragmented) can't keep up with constant, evolving threats. To keep up, a new approach is needed. In this session Lee Klarich, Chief Product Officer and his team demonstrate how to secure the public sector's rapidly evolving attack surface.


See our cutting-edge innovations firsthand, including Zero Trust Network Security, Code-to-Cloud, and AI-Driven Security Operations platforms. Through real-time demonstrations, you'll see how our solutions protect organizations including securing the cloud, transforming your SOC, helping you safely embrace AI, and simplifying cybersecurity through the power of platformization.
Don’t just listen—experience how to unlock innovation without sacrificing security, empowering you to stay ahead.

10:45 AM - 11:00 AM

MORNING BREAK

11:00 AM - 11:25 AM

Quantum Leap: Driving National Preparedness with Post-Quantum Cryptography

Bill Newhouse, Cybersecurity Engineer, Leading the Migration to Post-Quantum Cryptography, National Cybersecurity Center of Excellence (NIST)

Phil Kwan, Director Product Management, Quantum Security, Palo Alto Networks


Main Theater

As quantum computing technology advances, it introduces significant challenges for traditional cryptographic systems. This evolution highlights the urgent need for national preparedness in adopting post-quantum cryptography. The remarkable computational power of quantum computers threatens to undermine existing encryption methods, placing sensitive data at unprecedented risk. In response to these emerging threats, agencies are proactively exploring quantum-resistant encryption solutions to strengthen national security and ensure the integrity of critical communications in a world increasingly influenced by quantum technology.


During this conversation, public sector leaders will come together to discuss why national preparedness is vital in addressing the emerging threats posed by quantum computing. They will delve into innovative strategies for implementing post-quantum cryptography, sharing valuable insights on transitioning to quantum-resistant encryption methods.

11:25 AM - 11:45 AM

Titanium Partner Panel - CDW

Rob Smith, Senior Industry Advisor, CDW

Main Theater

To defeat AI-based threats, organizations must proactively adopt AI-powered cybersecurity platforms. This interactive simulation will take security leaders through a modern, AI-based cyber attack to prepare your team to counter adversaries at every stage of an attack by transforming security operations with an AI-powered platform. You'll learn how to get better detection and faster response and build cyber resilience by fighting AI with AI to build a more secure future.

11:45 AM - 12:10 PM

Government Keynote - Sponsored by Carahsoft


Main Theather

Join us for an insightful panel session featuring esteemed Palo Alto Networks partners and customers as they share their invaluable insights into current cybersecurity trends, challenges, and the collaborative efforts with Palo Alto Networks to create a world where security is solvable. These experts will provide unique perspectives on the evolving threat landscape and the strategic initiatives aimed at addressing the most pressing security challenges.

Through this engaging discussion, you will gain a deeper understanding of cybersecurity solutions and services that enable a future where organizations can effectively navigate the complexities of cybersecurity and embrace a world where security is not an insurmountable obstacle but a solvable endeavor.

12:10 AM - 1:10 PM

LUNCH + EXPO

BREAKOUTS

1:30 PM - 2:15 PM

Network Security in the Age of AI

Cloud Security in the Age of AI

SecOps in the Age of AI

1:30 PM - 2:15 PM

1:10 PM - 1:30 PM

From Trust to Verify: Embracing Zero Trust Security

Cherilyn Pascoe, Director, National Cybersecurity Center of Excellence (NCCoE), NIST
Sean Morgan , Director, Cybersecurity Policy & Partnerships, Palo Alto Networks

Main Theater

Zero Trust has become a strategic imperative, but how do you practically implement it? Palo Alto Networks has partnered with NIST’s National Cybersecurity Center of Excellence to address exactly that. The session will explore NIST Special Publication 1800-35–which demonstrates how organizations can deploy Next-Gen Firewalls and Prisma SASE as part of an end-to-end Zero Trust Architecture– and the broader role NIST plays in accelerating adoption of industry-leading cybersecurity best practices.

1:30 PM - 1:50 PM

The Resilience Playbook: Winning Strategies for Infrastructure Protection

Mike Dent, CISO, Fairfax County, VA
Chi Kang, Deputy Director for Operations, Cyber Security Division, NOAA

David Aspinall, Director, IoT GTM, Palo Alto Networks

Main Theater

The urgency of protecting critical infrastructure has surged as our nation grapples with an escalating array of cyber threats and climate-related challenges. Recent events, including significant cyberattacks and severe weather incidents, have exposed vulnerabilities in essential services, underscoring the need for coordinated action among state, local, and federal leaders. How can we ensure the resilience of our infrastructure to safeguard national security and public safety in such an unpredictable landscape?

This discussion will convene public sector experts who will share their insights on effectively safeguarding our vital systems. Leaders will examine innovative strategies and best practices for enhancing infrastructure resilience. Key topics will include implementing robust cybersecurity measures to defend against attacks, developing effective emergency response protocols for swift recovery, and fostering intergovernmental collaboration to build a unified defense.

1:50 PM - 2:10 PM

Unleashing Thunderdome: The Next-Gen User Experience in Defense

Christopher Pymm, Zero Trust Portfolio Manager & Thunderdome, ID7 Division Chief, DISA

Imran Umar, Vice President, Booz Allen Hamilton
Jim Smid, Principal Architect - DoD & Intel, Palo Alto Networks

Main Theater

The significance of secure and user-friendly experiences cannot be overstated, particularly within the Department of Defense (DoD). Thunderdome, the DoD's groundbreaking initiative aimed at modernizing cybersecurity and network infrastructure, is at the forefront of this transformation, enhancing both security measures and user accessibility. As federal agencies increasingly adopt cloud solutions and zero-trust architectures, Thunderdome is establishing a new benchmark for secure and accessible digital interactions across the public sector.

In this conversation, public sector leaders and tech experts will discuss Thunderdome’s user experience, examining challenges, successes, and key elements that support seamless, secure access. This session offers insights into how Thunderdome balances security with usability, sharing lessons and strategies that can inform future user-centered cybersecurity efforts.

1:10 PM - 2:10 PM

Hands-On Workshop:
Securing the Future of Work: Offer Exceptional User Experience while delivering Best-in-Class Security

Speaker

Classroom A

More work is getting done in the browser, unmanaged devices are on the rise, GenAI usage is growing exponentially, and scale & sophistication of attacks are ever increasing. To deliver best-in-class security and exceptional user experience across all your users, apps, data, devices and branches, you need a comprehensive SASE solution to power the future of work.


Come to this technical deep dive to experience how Prisma SASE enables device freedom with a secure enterprise browser, powers safe GenAI adoption, stops the most sophisticated threats with the latest innovations in our security services, while offering exceptional user experience with autonomous digital experience management (ADEM).

Technical Deep Dive:
The Future of Real-Time Cloud Security: Best-in-Class CDR merged with Industry-Leading CNAPP

Speaker

Classroom B

As AI-driven cloud adoption soars, cloud environments have become prime targets for cyber attackers. Traditional “peace time” security approaches are no longer sufficient against real-time threats.


Join us to get a first look at Cortex Cloud, the next generation of Prisma Cloud, which brings together best-in-class Cloud Detection and Response (CDR) with industry-leading CNAPP to unleash the future of real-time cloud security. Discover how Cortex Cloud unifies data, automates workflows, and applies AI-driven insights to reduce risk, prevent threats, and stop attacks. Experience the future of cloud security, today.

 

Hands-On Workshop:
Revolutionize AI-Driven SecOps: Accelerate Threat Detection and Response with Cortex XSIAM

Speaker

Vault

Traditional, human-centered SOCs have failed to keep pace with the speed and sophistication of modern threats. To outpace today's adversaries, security operations must evolve.


Join our hands-on workshop to experience how Cortex XSIAM, the world’s #1 AI-driven SOC platform, uses advanced AI and automation to transform security operations forever. You’ll have the opportunity to investigate and respond to incidents in record time with XSIAM, while seeing how automation can dramatically speed workflows, saving hours each day. See firsthand how you can transform SecOps to take back the advantage from adversaries.

Speaker Name

Location

Breakout description

2:10 PM - 2:30 PM

AFTERNOON BREAK + EXPO

1:30 PM - 2:15 PM

Network Security in the Age of AI

Cloud Security in the Age of AI

SecOps in the Age of AI

1:30 PM - 2:15 PM

2:30 PM - 2:55 PM

Expert Panel: Security is Solvable - Insights on Cybersecurity Best Practices

Arien Seghetti, Principal Cybersecurity Architect | Global Security Practice, IronBow

Sean Frazier, VP, Federal CSO, Okta

Derek Doerr, US Federal Security Leader, AWS

Main Theater

Join us for an insightful panel session featuring esteemed Palo Alto Networks partners and customers as they share their invaluable insights into current cybersecurity trends, challenges, and the collaborative efforts with Palo Alto Networks to create a world where security is solvable. These experts will provide unique perspectives on the evolving threat landscape and the strategic initiatives aimed at addressing the most pressing security challenges.

Through this engaging discussion, you will gain a deeper understanding of cybersecurity solutions and services that enable a future where organizations can effectively navigate the complexities of cybersecurity and embrace a world where security is not an insurmountable obstacle but a solvable endeavor.

2:55 PM - 3:20 PM

Mission Possible: Cloud Strategies for Next Generation Security

Colonel Bryan Eovito, Commanding Officer, Marine Corps Cyberspace Operations Group (pending agency approval)
Stan Lowe, CISO, US Department of Interior (pending agency approval)

Manuel Medrano, Director – Cyber Monitoring and Operations, US Department of State (pending agency approval)

Kent Meyer, Advisory Managing Director, Deloitte

David Kubicki, Solution Architect Manager - Federal, Palo Alto Networks

Main Theater

As government agencies accelerate their shift to cloud-based infrastructure, they’re not only transforming operations and service delivery but also encountering a new set of cybersecurity imperatives. Security Operations Centers (SOCs) now face the challenge of securing sensitive data and mission-critical systems within a complex, rapidly evolving cloud environment. For agency leaders, the question is clear: how can they capitalize on the advantages of the cloud while fortifying security, ensuring resilience, and maintaining compliance?

In this forward-looking panel, will bring together cloud security experts and government leaders to examine SOC integration within cloud environments. Leaders will share insights from recent implementations, strategies for strengthening SOC capabilities, and best practices for threat detection, incident response, and data protection across multi-cloud setups. The discussion offers practical guidance and forecasts on the future of SOC operations in a cloud-driven landscape, empowering agencies to enhance the security and impact of their cloud investments.

2:30 PM - 3:30 PM

Tech Deep Dive:
Securing the Future of Work: Offer Exceptional User Experience while delivering Best-in-Class Security

Speaker

Classroom A

More work is getting done in the browser, unmanaged devices are on the rise, GenAI usage is growing exponentially, and scale & sophistication of attacks are ever increasing. To deliver best-in-class security and exceptional user experience across all your users, apps, data, devices and branches, you need a comprehensive SASE solution to power the future of work.


Come to this technical deep dive to experience how Prisma SASE enables device freedom with a secure enterprise browser, powers safe GenAI adoption, stops the most sophisticated threats with the latest innovations in our security services, while offering exceptional user experience with autonomous digital experience management (ADEM).

Tech Deep Dive:
The Future of Real-Time Cloud Security: Best-in-Class CDR merged with Industry-Leading CNAPP

Speaker

Classroom B

As AI-driven cloud adoption soars, cloud environments have become prime targets for cyber attackers. Traditional “peace time” security approaches are no longer sufficient against real-time threats.


Join us to get a first look at Cortex Cloud, the next generation of Prisma Cloud, which brings together best-in-class Cloud Detection and Response (CDR) with industry-leading CNAPP to unleash the future of real-time cloud security. Discover how Cortex Cloud unifies data, automates workflows, and applies AI-driven insights to reduce risk, prevent threats, and stop attacks. Experience the future of cloud security, today.

 

Hands-On Workshop:
Revolutionize AI-Driven SecOps: Accelerate Threat Detection and Response with Cortex XSIAM

Speaker

Vault

Traditional, human-centered SOCs have failed to keep pace with the speed and sophistication of modern threats. To outpace today's adversaries, security operations must evolve.


Join our hands-on workshop to experience how Cortex XSIAM, the world’s #1 AI-driven SOC platform, uses advanced AI and automation to transform security operations forever. You’ll have the opportunity to investigate and respond to incidents in record time with XSIAM, while seeing how automation can dramatically speed workflows, saving hours each day. See firsthand how you can transform SecOps to take back the advantage from adversaries.

Speaker Name

Location

Breakout description

3:20 PM - 4:20 PM

The AI Threat Landscape & Crisis Simulation

Joshua Costa, Sr Director, Product Marketing, Palo Alto Networks

Wendi Whitmore, SVP, Unit 42, Palo Alto Networks


Main Theater

Join Wendi Whitmore for a critical session on how nation-state actors and other adversaries are targeting public sector agencies and critical infrastructure. Gain insights into the evolving AI-driven threat landscape and explore how attackers can use AI to automate attacks and evade detection.


This session features a live simulation of a breach, showcasing how such attacks progress through agency networks and the key actions leaders must take to mitigate damage. Learn strategies to defend against AI-enabled threats and enhance cyber resilience by adopting AI-powered cybersecurity platforms.


Prepare your team to counter adversaries at every stage of an attack and secure your agency’s digital future by fighting AI with AI.

4:20 PM - 4:25 PM

Closing Remarks

Eric Trexler, SVP Public Sector, Palo Alto Networks

Main Theater

4:25 PM - 6:00 PM

NETWORKING OPPORTUNITY + EXPO

**Subject to change.

Register now
Text goes here
X

SPEAKERS

Sean Cairncross

National Cyber Director

The White House

Nick Andersen

Executive Assistant Director for the Cybersecurity Division

CISA

Nick Andersen

Executive Assistant Director
Cybersecurity Division, CISA

CISA

Brett Leatherman

Assistant Director, FBI Cyber Division

FBI

Garfield Jones

Associate Chief of Strategic Technology

(pending agency approval)

CISA

Bill Newhouse

 Cybersecurity Engineer, Post-Quantum Cryptography

(pending agency approval)

National Cybersecurity Center of Excellence (NIST)

Benjamin Koshy

Chief Information Security Officer

Indian Health Services (IHS) 

Solomon Wilson

DIS Project Manager

Indian Health Services (IHS)

Bob Ritchie

CTO/CGO

SAIC

Matthew Travis

Chief Executive Officer

Cyber AB

Renata Spinks-McNeal

Chief Executive Officer

CyberSec International

Amanda Cody

Chief Information Security Officer

Booz Allen Hamilton

Lee Klarich

Chief Product & Technology Officer

Palo Alto Networks

Bruce Byrd

EVP, General Counsel

Palo Alto Networks

Eric Trexler

SVP, Public Sector

Palo Alto Networks

Sam Rubin

SVP, Unit 42 Consulting and Threat Intelligence

Palo Alto Networks

Ian Swanson

VP, Product, AI Security

Palo Alto Networks

John Davis

VP, Public Sector

Palo Alto Networks

Daniel Kroese

VP, Public Policy & Government Affairs

Palo Alto Networks

Sean Frazier

VP, Federal CSO

Okta

Chris Whitlock

VP, Advanced Technology Programs

Vibrint

Steve Thamasett

Public Sector Field CISO

CDW

Derek Doerr

US Federal Security Leader

AWS

Thomas Wootton

Senior Solutions Architect

IronBow

Harsh Dalwadi

Managing Director | Cyber & Strategic Risk

Deloitte

Brenna Plesich

Regional Vice President- Civilian & Federal Systems Integrators

Palo Alto Networks

Joe Sangiuliano

Regional Vice President-Public Sector, Prisma Cloud

Palo Alto Networks

Richu Channakeshava

Principal Product Management Leader

Palo Alto Networks

Toni Mitchell

Director, US Public Sector Ecosystems

Palo Alto Networks

Rachel McAlpin

Director, North America Marketing

Palo Alto Networks

Sam Brown

Critical Infrastructure Lead

Palo Alto Networks

Frank Konkel

Editor-in-chief

GovExec

Location

Get directions
Text goes here
X

SPONSORS

Titanium Sponsor

Industry Premier Sponsor

Diamond Sponsors

Platinum Sponsors

Bronze Sponsors

Register now

Ignite on Tour Registration

Our consultants serve as your trusted advisors to assess and test your security controls against the right threats, transform your security strategy with an intelligence-informed approach and respond to incidents in record time.

Sign up

[confirmation_headline]
[confirmation_messaging]
Add to Calendar
Text goes here
X

Ignite on Tour FAQs

Where will Public Sector Ignite 2025 take place?

This year’s Public Sector Ignite will take place at the Capital One Hall in Tysons, Virginia, on October 30, 2025.   Public Sector Ignite 2025 is free to attend.

Capital One Hall
7750 Capital One Tower Rd
Tysons, VA 22102

Is there parking near Capital One Hall?

Premium Parking for all Capital One Hall Events is located in the Hotel/Event Garage (1625 Capital One Drive North, Tysons, VA 22102). This parking facility is attached to Capital One Hall and offers exclusive entry access directly from the Hotel/Event Garage. Please mention to the parking attendant that you are attending Public Sector Ignite to have your parking fees waived.

Who can attend Public Sector Ignite 2025?

Public Sector Ignite is open to all cybersecurity professionals, including:

  • CIOs/CISOs
  • VPs of IT
  • Network engineers/architects
  • SOC engineers
  • DevOps and cloud architects
  • IT directors/managers

How do I make edits to my registration or cancel my registration?

Log in to your registration account using the credentials that you created during registration. For any other questions, please contact publicsectorignite@paloaltonetworks.com.

Can I share my Public Sector Ignite login information with other members of my team?

No, each attendee must register individually for the event.

Will there be a virtual component of Public Sector Ignite 2025?

Public Sector Ignite 2025 is an in-person event. There won't be a virtual component for the event.

Whom can I contact if I have other questions?

If you have any additional questions, please email the Palo Alto Networks Public Sector Ignite 2025 event team at publicsectorignite@paloaltonetworks.com.

What is the dress code?

The dress code for Public Sector Ignite is business casual. We encourage you to dress casually and comfortably.

How long should I plan to attend?

Palo Alto Networks Public Sector Ignite 2025 officially kicks off at 8 AM ET with breakfast. Sessions end at 4 PM and the event concludes with a networking reception from 4 to 5:00 PM. The networking reception is open to all attendees.

Will food be provided?

Breakfast and lunch will be provided to all attendees. Hors d'oeuvres will be served at the networking reception. If you have dietary restrictions, please note this during your registration or reach out to publicsectorignite@paloaltonetworks.com.

Are there any public sector compliance considerations?

Attendees from the public sector (defined as employees of the US federal government, state and local government and education employees) should consult their internal compliance requirements and obtain approval from the appropriate ethics or compliance official prior to accepting an invitation to any event offering gratuitous items such as meals and other business courtesies. If you have any questions about this event, you may reach out to publicsectorignite@paloaltonetworks.com.

Can attendees accrue Continuing Professional Education (CPE) credits during Public Sector Ignite 2025?

Yes, attendees will be able to earn CPE credits during Public Sector Ignite 2025. Attendees will have to sign in and out of the CPE sheet at the registration desk on site on October 30. To receive a CPE certificate, please reach out to the Palo Alto Networks Public Sector Ignite 2025 event team at publicsectorignite@paloaltonetworks.com.

Is there a fee to attend this event?

There is no fee to attend Public Sector Ignite, however Public Sector attendees (defined as employees of the U.S. federal government, state and local governments and public education institutions) should always consult with their organization's ethics or compliance officer to ensure their compliance with relevant laws, statutes, and gift rules and to obtain necessary approval prior to attending an event offering free admission and accepting any gratuitous items. (The estimated market value of meals and courtesies offered by Palo Alto Networks to attendees at this event is $175.00 per person.) Please direct any questions to publicsectorignite@paloaltonetworks.com.

Cancellation/Refund Policies

Any cancellation requests must be received in writing or by email no later than 5:00 p.m. Eastern Daylight Time EDT Monday, March 17, 2025, to be eligible for a refund of the entire registration fee. Cancellation requests received after Monday, March 17, 2025 will not be eligible for a refund. Email inquiries to publicsectorignite@paloaltonetworks.com.

GovExec is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org.


After completing this course, you will be able to: understand how organizations enable cyber resilience without hindering the mission, understand what the AI-driven threat landscape look like today and understand how organizations design and implement effective defenses against advanced cyber threats despite resource constraints,

 

To register for this session, enter your information here.  If you would like to indicate interest in receiving CPE credit, please contact Tracy after the event at tkerley@govexec.com. In order to receive full credit as an in-person attendee you must attend for at least 50 minutes and sign in and out at the registration desk on-site on October 30.

 

Participants will earn up to 6 CPE credits in Information Technology. Participants will earn 1 CPE credit for each 50 minutes of participation.
Field of Study: Information Technology
Additional Information Prerequisites: None
Who Should Attend: All cybersecurity professionals, including: CIOs/CISOs, VPs of IT, Network engineers/architects, SOC engineers, DevOps and cloud architects, IT directors/managers, and anyone else who is interested in learning about the future of cybersecurity in the public sector.

 

Advanced Preparation: None
Program Level: Basic
Delivery Method: Group Live


Copyright © 2026 Palo Alto Networks. All rights reserved.

Privacy
Text goes here
X
Contact Us
Text goes here
X
Terms of Use
Text goes here
X
Link Text
Text goes here
X

SPEAKER BIO

Michael Coden

Head of Cybersecurity Practice

BCG

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum. Proin efficitur lobortis leo vel sodales. Vivamus mauris enim, tempus ut sapien at, iaculis vestibulum dolor. Praesent vehicula, lacus ut ultricies pellentesque, ligula enim maximus urna, nec tempor eros mauris quis sapien. Suspendisse potenti. Nunc ac ornare dui. Aenean ultrices elit lectus, non viverra lectus malesuada a. Curabitur mattis tincidunt erat in gravida. Vivamus sit amet lacus egestas mi suscipit finibus. Aliquam ac urna libero.

Breakout session : Zero Trust and Network Security

9:35 - 9:45

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Lorem ipsum dolor sit amet, CEO EMEA & LATAM

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum. Proin efficitur lobortis leo vel sodales. Vivamus mauris enim, tempus ut sapien at, iaculis vestibulum dolor.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum.

9:35 - 9:45

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Lorem ipsum dolor sit amet, CEO EMEA & LATAM

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum. Proin efficitur lobortis leo vel sodales. Vivamus mauris enim, tempus ut sapien at, iaculis vestibulum dolor.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum.

9:35 - 9:45

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Lorem ipsum dolor sit amet, CEO EMEA & LATAM

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum. Proin efficitur lobortis leo vel sodales. Vivamus mauris enim, tempus ut sapien at, iaculis vestibulum dolor.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum.

Threat Intel & Security Operations

9:35 - 9:45

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Lorem ipsum dolor sit amet, CEO EMEA & LATAM

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum. Proin efficitur lobortis leo vel sodales. Vivamus mauris enim, tempus ut sapien at, iaculis vestibulum dolor.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum.

9:35 - 9:45

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Lorem ipsum dolor sit amet, CEO EMEA & LATAM

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum. Proin efficitur lobortis leo vel sodales. Vivamus mauris enim, tempus ut sapien at, iaculis vestibulum dolor.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum.

9:35 - 9:45

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Lorem ipsum dolor sit amet, CEO EMEA & LATAM

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum. Proin efficitur lobortis leo vel sodales. Vivamus mauris enim, tempus ut sapien at, iaculis vestibulum dolor.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum.

Cloud Security

9:35 - 9:45

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Lorem ipsum dolor sit amet, CEO EMEA & LATAM

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum. Proin efficitur lobortis leo vel sodales. Vivamus mauris enim, tempus ut sapien at, iaculis vestibulum dolor.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum.

9:35 - 9:45

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Lorem ipsum dolor sit amet, CEO EMEA & LATAM

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum. Proin efficitur lobortis leo vel sodales. Vivamus mauris enim, tempus ut sapien at, iaculis vestibulum dolor.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum.

9:35 - 9:45

Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Lorem ipsum dolor sit amet, CEO EMEA & LATAM

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum. Proin efficitur lobortis leo vel sodales. Vivamus mauris enim, tempus ut sapien at, iaculis vestibulum dolor.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum.

8:00 AM – 8:55 AM

Women in Technology Breakfast


Public sector organizations face some of the toughest cybersecurity challenges, from nation-state threats to safeguarding sensitive data and ensuring mission continuity. Meeting these demands takes more than technical expertise; it requires resilient leaders who can balance innovation, accountability, and mission priorities. Women leaders in this space bring unique perspectives shaped by adaptability, mentorship, and a drive to create lasting change. In this fireside chat, leaders will share how they began their careers, the skills that shaped their success, and the challenges they encountered as women in cybersecurity. They will discuss the role of mentorship, the best advice they’ve received, their approaches to adversity, and the personal habits that guide their leadership journey.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum. Proin efficitur lobortis leo vel sodales. Vivamus mauris enim, tempus ut sapien at, iaculis vestibulum dolor.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum.

9:15 AM – 9:40 AM

Securing Cyberspace: A Strategy for America


Details Coming Soon

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum. Proin efficitur lobortis leo vel sodales. Vivamus mauris enim, tempus ut sapien at, iaculis vestibulum dolor.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum.

9:40 AM – 10:10 AM

Cybersecurity in the Age of AI

Details Coming Soon

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum. Proin efficitur lobortis leo vel sodales. Vivamus mauris enim, tempus ut sapien at, iaculis vestibulum dolor.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum.

11:30 AM – 12:00 PM

 

AI vs. AI: Revolutionizing SecOps with the AI-powered SOC

The scale and complexity of today’s cyber threats are overwhelming government Security Operations Centers (SOCs). Adversaries are faster, more coordinated, and increasingly using automation and AI to exploit vulnerabilities. SOC teams face a flood of alerts, leading to fatigue, missed threats, and rising risk. At the same time, maintaining legacy SOCs is becoming more expensive, stretching limited budgets and staff. With the gap widening between threat speed and response capability, agencies must rethink their approach. The challenge now is how IT and security leaders can move from reactive operations to a smarter, more autonomous model that strengthens defense and reduces strain on teams. In this session, public sector cybersecurity leaders will explore how agencies can modernize their SOCs with advanced AI and intelligent orchestration. They’ll discuss moving beyond basic automation to deploy predictive threat intelligence, automated threat hunting, and near real-time remediation. Speakers will share strategies for streamlining workflows across complex environments, helping lean teams respond faster and more effectively. The conversation will also highlight how to responsibly integrate AI, free up analysts for high-value work, and improve visibility and resilience. Real-world examples will shed light on the technical, policy, and cultural shifts needed to build a more autonomous and adaptive cyber defense posture.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum. Proin efficitur lobortis leo vel sodales. Vivamus mauris enim, tempus ut sapien at, iaculis vestibulum dolor.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum.

12:50 PM – 1:15 PM 

Quantum Leap: Driving National Preparedness with Post-Quantum Cryptography

As quantum computing technology advances, it introduces significant challenges for traditional cryptographic systems. This evolution highlights the urgent need for national preparedness in adopting post-quantum cryptography. The remarkable computational power of quantum computers threatens to undermine existing encryption methods, placing sensitive data at unprecedented risk. In response to these emerging threats, agencies are proactively exploring quantum-resistant encryption solutions to strengthen national security and ensure the integrity of critical communications in a world increasingly influenced by quantum technology. During this conversation, public sector leaders will come together to discuss why national preparedness is vital in addressing the emerging threats posed by quantum computing. They will delve into innovative strategies for implementing post-quantum cryptography, sharing valuable insights on transitioning to quantum-resistant encryption methods.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum. Proin efficitur lobortis leo vel sodales. Vivamus mauris enim, tempus ut sapien at, iaculis vestibulum dolor.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum.

1:05 PM – 1:30 PM

Quantum Leap: Driving National Preparedness with Post-Quantum Cryptography

 

As quantum computing technology advances, it introduces significant challenges for traditional cryptographic systems. This evolution highlights the urgent need for national preparedness in adopting post-quantum cryptography. The remarkable computational power of quantum computers threatens to undermine existing encryption methods, placing sensitive data at unprecedented risk. In response to these emerging threats, agencies are proactively exploring quantum-resistant encryption solutions to strengthen national security and ensure the integrity of critical communications in a world increasingly influenced by quantum technology. During this conversation, public sector leaders will come together to discuss why national preparedness is vital in addressing the emerging threats posed by quantum computing. They will delve into innovative strategies for implementing post-quantum cryptography, sharing valuable insights on transitioning to quantum-resistant encryption methods.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum. Proin efficitur lobortis leo vel sodales. Vivamus mauris enim, tempus ut sapien at, iaculis vestibulum dolor.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum.

1:30 PM – 1:55 PM

The AI Arms Race: A Fireside Chat with Unit 42

 

A riveting fireside chat on the new reality of AI-supercharged cybercrime. Adversarial AI has accelerated the speed of attacks, allowing even low-skilled actors to launch sophisticated campaigns, including convincing deepfakes, at machine speed—often ten times faster than traditional methods.

Drawing on exclusive insights from hundreds of real-world Unit 42 incident-response engagements, our experts will dissect the latest AI-driven tactics being used across the entire attack chain. You'll learn field-tested defenses you can deploy now to protect your organization and stay ahead in the escalating AI arms race. This discussion will provide a critical look at the threats facing us today and the strategies required to stop them.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum. Proin efficitur lobortis leo vel sodales. Vivamus mauris enim, tempus ut sapien at, iaculis vestibulum dolor.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum.

2:20 PM – 2:45 PM

Zero Trust Device Security for the Public Sector: A Joint Strategy from CDW and Palo Alto Networks

 

With ever expanding attacks on critical infrastructure and an exponential rise in vulnerabilities, in Federal and State agencies, delivering security to the edge of these networks is a necessity. Join this session to discover how Palo Alto Networks and CDW partnered to secure 8,000 remote network nodes for a state Department of Transportation and deliver valuable customer outcomes including:

  • Visibility into the security posture of thousands of IOT devices
  • Policy enforcement
  • Inspection at the network edge
  • Virtual patching to mitigate vulnerability exploits

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum. Proin efficitur lobortis leo vel sodales. Vivamus mauris enim, tempus ut sapien at, iaculis vestibulum dolor.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum.

3:05 PM – 3:30 PM

Mission Possible: Cloud Strategies for Next Generation Security

 

As government agencies accelerate their shift to cloud-based infrastructure, they’re not only transforming operations and service delivery but also encountering a new set of cybersecurity imperatives. Security Operations Centers (SOCs) now face the challenge of securing sensitive data and mission-critical systems within a complex, rapidly evolving cloud environment. For agency leaders, the question is clear: how can they capitalize on the advantages of the cloud while fortifying security, ensuring resilience, and maintaining compliance?

In this forward-looking panel, will bring together cloud security experts and government leaders to examine SOC integration within cloud environments. Leaders will share insights from recent implementations, strategies for strengthening SOC capabilities, and best practices for threat detection, incident response, and data protection across multi-cloud setups. The discussion offers practical guidance and forecasts on the future of SOC operations in a cloud-driven landscape, empowering agencies to enhance the security and impact of their cloud investments.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum. Proin efficitur lobortis leo vel sodales. Vivamus mauris enim, tempus ut sapien at, iaculis vestibulum dolor.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum.

10:45 AM – 11:10 AM

The AI Imperative: A Fireside Chat on Innovation and Strategy

Details Coming Soon

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum. Proin efficitur lobortis leo vel sodales. Vivamus mauris enim, tempus ut sapien at, iaculis vestibulum dolor.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum.

11:05 AM – 11:30 AM

AI Keynote

AI is transforming how organizations operate — from improving services to enabling autonomous decision-making. Yet innovation without security can expose sensitive data, models, and systems to new threats such as prompt injection, model manipulation, and data leakage. Learn how Palo Alto Networks helps enterprises Secure AI by Design with a unified platform that protects users, applications, agents, and models — ensuring every AI system operates with integrity, transparency, and accountability at scale.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum. Proin efficitur lobortis leo vel sodales. Vivamus mauris enim, tempus ut sapien at, iaculis vestibulum dolor.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum.

1:55 PM – 2:20 PM

Accelerating Zero Trust Through the Power of the Platform

The Indian Health Service (IHS) faces constant pressure to protect sensitive patient data, including Electronic Health Records (EHRs), from cyber threats while adhering to stringent regulations such as HIPAA and FedRAMP. To meet these demands, IHS must adopt a Zero Trust Architecture (ZTA) and advance through the Zero Trust Maturity Model (ZTMM).


Palo Alto Networks delivers a comprehensive cybersecurity platform that enables IHS to secure networks, IoT devices, cloud workloads, and endpoints while safeguarding EHR systems. By integrating solutions such as Strata Next-Generation Firewalls (NGFW), Cloud-Delivered Security Services (CDSS), IoT Security, Prisma Access with PAN-OS SD-WAN, Cortex XSOAR, Cortex XDR, Xpanse, and Prisma Cloud, IHS can strengthen security, ensure regulatory compliance, and progress through the ZTMM to achieve a mature Zero Trust posture. This unified approach ensures robust data protection, operational efficiency, and enhanced patient safety.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum. Proin efficitur lobortis leo vel sodales. Vivamus mauris enim, tempus ut sapien at, iaculis vestibulum dolor.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum.

3:30 PM – 3:55 PM

Expert Panel: Security is Solvable - Insights on Cybersecurity Best Practices

As the public sector embraces an AI transformation, agencies face a critical need to secure this new digital frontier. Join three of our key partners for a panel on how they are helping government agencies navigate this complex landscape. You'll learn how to securely and compliantly adopt AI, simplify operations, and build a resilient defense to enable mission advancement. This session will demonstrate how strategic partnerships are crucial to making security a solvable endeavor and unleashing the full potential of AI.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum. Proin efficitur lobortis leo vel sodales. Vivamus mauris enim, tempus ut sapien at, iaculis vestibulum dolor.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum.

10:10 AM – 10:30 AM

Unpacking CMMC — Driving Defense Industrial Base Resilience


Matt Travis is the CEO of the Cyber AB -- the accreditation body for the Pentagon's Cybersecurity Maturity Model Certification (CMMC). He has a distinguished national security career, including service as the Deputy Director of CISA. In this fireside chat, he breaks down what the cyber community should anticipate with the imminent November 10 effective date of CMMC -- at which point CMMC requirements will begin integration into the defense contracting process. CMMC is a far-reaching effort that has spanned three different administrations. Matt Travis has been a driving force in these efforts, and will break down what the implementation of CMMC means for our collective defense and the resilience of the federal enterprise.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum. Proin efficitur lobortis leo vel sodales. Vivamus mauris enim, tempus ut sapien at, iaculis vestibulum dolor.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum.

10:30 AM – 10:50 AM

Promoting Federal Cyber Resilience

As the federal enterprise rapidly integrates artificial intelligence into its operations, the cybersecurity landscape is shifting just as quickly. Agencies are being challenged to not only defend against increasingly sophisticated nation state threats but also to build resilience that keeps pace with emerging technologies. This conversation will explore how government and industry leaders can drive measurable improvements in cyber outcomes by embracing smarter, more efficient strategies, leveraging AI to strengthen defenses, streamline operations, and anticipate future risks before they materialize. In this session, we will hear insights from the leader of CISA's Cybersecurity Division about how the agency is maturing its capabilities to drive enhanced federal cyber resilience.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum. Proin efficitur lobortis leo vel sodales. Vivamus mauris enim, tempus ut sapien at, iaculis vestibulum dolor.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Curabitur porttitor lacus a condimentum dictum.

Share with Friends
Facebook
Twitter
LinkedIn
Link
CONTACT THE ORGANIZER
Google   Outlook   iCal   Yahoo

RSVP

Google Icon
Google
Outlook Icon
Outlook
Apple Icon
Apple
Yahoo Icon
Yahoo