Ignite 2015 March 30, 2015 to April 1, 2015, Las Vegas,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Latest Innovations in Advanced Endpoint Protection Nati Davidi , Sebastian Goodwin N/A
Defining the Future of Threat Intelligence Bilal Malik N/A
Tales from the DatacenterTrenches: Deploying the PA-7050 Glen Gibson , Mandeep Sandhu , Justin Tibbs N/A
Core Concepts and PlanningStrategies Brian Tokuyoshi , Moinul Khan , Randy Guin N/A
We Know Before You Do:Predicting Malicious Domains Kyle Sanders , Wei Xu N/A
Financial Services LessonsLearned in Cybersecurity Preparedness Ashutosh Kapse N/A
Real World Attacks in Action Erik Yunghans N/A
SSL Decryption Best Practices:Policy to Implementation Mike Jacobsen N/A
NSX Network Virtualization:Architecting Security into theDatacenter Network Srini Nimmagadda N/A
Raising the Bar for MobileSecurity Basil Hashem N/A
Who’s in Your Network and Why? (Adversaries and Their Motivations) Rob Downs N/A
Securing Industrial Control Systems with the Palo Alto Networks Platform–Use CaseWorkshop Justin Harris , Del Rodillas N/A
Simple Code, Big Threat: Simple Methods in ModernMalware Gal Badishi N/A
Firewall–Lessons Learned From a Global Deployment Guy Denton N/A
Navigating the Journey to a Software Defined Datacenter John Spiegel , Ryan Kiste N/A
Design, Deploy and Implement Mobile Security Policies with GlobalProtect Joby Menon , Andrew Fischbach , Ian Anderson N/A
How To: Threat Intelligence Analysis With CRITs Jen Miller-osborn , Vishaal Hariprasad N/A
How I Got a Job at “Hogwarts” Using User-ID and Scheduling in a Highly Technologically Diverse, Apple-Heavy K-12 Environment Bob Williamson , Brian Carter N/A
Scoping and Rapid Response with Palo Alto Networks and Splunk Monzy Merza N/A
A 360 Degree View into Network Security Management with Panorama Jamie Fitz-gerald N/A
Using VMware and the VM-Series to Secure Hybrid Cloud Deployments Sudeep Padiyar N/A
Aruba Networks–Adaptive Trust for a Mobile Workforce Don Meyer N/A
Recent Attacks on Android Devices Zhi Xu N/A
A Secure, Connected, and Highly Available Care Environment in Healthcare Frank Nydam , Ed Bond N/A
21st Century SCADA Security–9 Tips for Better Defense of Modern-Day Control Systems Mario Chiock , Del Rodillas N/A
Solution Lead, Palo Alto Networks Who’s Knocking on Your Front Door? Phil Cummings N/A
Networks Security Policies Using Network Acceleration with Arista’s DirectFlow Assist Ed Chapman N/A
Merging Physically Separated Networks Using GlobalProtect Ahmed Sarwat , Sherif M. El-halawani N/A
Hacking Back–Legal Aspects of Full Spectrum Computer Network (Active) Defense Bob Clark N/A
Scaling for the Education Sector: How We Built Australia’s Largest Next-Gen Multi-Tenant Solution Simon Sigre N/A
Implementing a Data-Centric Perimeter: Real World Lessons from Netflix David Guretz , Rob Fry N/A
Best Practices for User and App-Based Policies Nick Campagna N/A
Next-Generation Security for Amazon Web Services Jigar Shah N/A
Trends in Mobile Malware– Threat Analysis and Countermeasures Zhi Xu , Claud Xiao N/A
The Cybersecurity Canon Rick Howard N/A
Discovering and Mitigating Threats to a Healthcare Environment Benjamin Nicholson , John Brow , Terrance Johnson , Jean Compere N/A
Having Your Cake and Eating It Too: Deploying DLP Services in a Next-Generation Firewall Environment Mike Spaulding N/A
Enabling SaaS Application Security Moinul Khan N/A
Leveraging OpenStack to Build Secure Public Clouds Marc Benoit , Luigi Mori N/A
Protecting Against Unknown Cyber Threats Scott Johanson N/A
Operational Strategies for Intelligence-Driven Security Rafal wh1t3rabbit Los N/A
Service Provider and Large Enterprise Network Needs with Palo Alto Networks Platforms Christer Swartz , David Willis N/A
Preventing Threats in 10 Easy Steps: Secret Tips for Getting the Most from Your NGFW John Harrison , Tim Mather N/A
Applying Order to Computing Chaos Brian Torres-gil , Carl Foster N/A
Deliver Mobile, Web and Enterprise Applications with Best Security and Availability Morgan Gerhart N/A
Death by a Thousand Endpoints–Weaknesses in a Diverse Mobile Enterprise Adam Mansour N/A
iOS Malware: New Techniques, Trends and Ecosystems Claud Xiao N/A
Securing Isolated Locations Tighe Schlottog N/A
CISO Panel Discussion: Trends and Strategies for Protecting Your Organization Ashutosh Kapse , Mario Chiock , Scott Gainey , Golan Ben-onieddie Borrero N/A
Combatting Cyber Attacks Through Advanced Analytics & Intelligence Simon Mason N/A
Amazon Web Services Security Best Practices Scott Ward N/A
In-depth Analysis of the iOS and Android Security Models Joby Menon , Andrew Fischbach N/A
How To: Connecting and Visualizing Data with Maltego Ryan Olson N/A