Agenda - Palo Alto Networks

A MORE SECURE EVERYWHERE

Louwman Museum
Den Haag, The Netherlands
Tuesday,
14 May, 2019

PLENARY SESSIONS

09:00 – 10:00 Registration & Breakfast
10:00 – 10:15

Opening

10:15 – 10:45

Is your security as agile as your business Fred Streefland, CSO NEEUR - Palo Alto Networks

10:45 – 11:15

Your move to the cloud Secured Dan Vultur Public Cloud Sales Specialist - Palo Alto Networks

The public cloud is often thought of as something completely separate but the reality is that it should be managed and secured in the same way as the rest of the IT infrastructure. Having a single approach to protecting the whole IT environment removes complexity, reduces cost and improves security. In this session we will look at how the move to the cloud can integrated into a single security strategy for the whole organisation while simultaneously accelerating the digital transformation.

11:15 – 11:35

Application security and visibility with Nutanix Flow Adrian Lucio, Sr. Systems Engineer for Global Accounts - Nutanix


Security threats have become more sophisticated than ever and the first step to any security implementation is a solid strategy for what needs to be protected and ensuring it's done right. Join us in this session to learn how you can implement a security strategy with Nutanix Flow that allows applications to be secured with network microsegmentation in minutes. We will cover Nutanix Flow common use cases and best practices ranging from creating a DMZ to segmenting application tiers and isolating test and dev environments plus many more. In addition, we will show you how Nutanix Flow can integrate additional security and network functions like the Palo Alto Network next generation firewall in your hybrid cloud environment. p>
11:35 – 12:05

Cortex XDR Break Detection & Response silos to stop sophisticated threats Shailesh Rao, SVP, Go To Market - Palo Alto Networks

12:05 – 12:30

Cloud Transformation Everywhere Palo Alto Networks

There is much more to cloud security than just protecting your workloads. The way that users interact with applications, where they get access from, which applications they use. Trying to secure these things often needs a selection of different products and management processes. In this session we will look at how we can remove the complexity of managing users and applications and how they interact.

12:30 – 13:15 Lunch for all attendees
12:30 – 14:00 Executive Round Table Lunch
13:15 – 13:45

Guest Speaker

13:45 – 14:05

Platinum Sponsor

Break-Out Sessions

SECURITY LEADERSHIP

TECHNOLOGY

14:05 – 14:25

“Stronger Together” with integrated cybersecurity technologies-People Centric Protection for Microsoft O365 email and cloud applications Jim Cox, Area Vice President Benelux - Proofpoint

Detecting The Abnormal In The Normal - Behavioral Analytics Aviel Fogel, Sr Product Manager - Palo Alto Networks

14:35 – 15:05

Proving the value of cybersecurity to the board and how to validate it once deployed Fred Streefland, CSO NEEUR - Palo Alto Networks

15:05 – 15:30

Break

Break

15:30 – 16:00

Machine Learning 101: Streamline Security and Speed Up Response Time John Harrisson, Sr. Regional Product Marketing Manager EMEA- Palo Alto Networks

Continuous Visibility and Threat Defense for a Secure, Compliant Public Cloud Ramon de Boer - Palo Alto Networks

PLENARY SESSIONS

16:15 – 16:45

Cloud security, a game of C’s… Martin Vliem, National Security Officer - Microsoft

The fast growing adoption of Cloud computing including the vast amount and increasing sensitivity of data processing and the enlargement of dependencies, underscore both perceived value as well as the progression in trust in service provider maturity by service consumers. However, questions and concerns on security, privacy and compliance remain actual and although Cloud service providers can help reduce risk, the shared obligations model which is inherent to cloud computing requires service consumers (customers) to get in control and be aware of their own responsibilities. This session provides perspectives, experiences and learnings on challenges in securing the cloud and on security in the cloud. We will address the “game of C’s” of this disrupting IT paradigm; cloud, challenges, cybersecurity, compliance, control and consumer obligations..

16:45 – 17:15

Guest Speaker

17:15 - 19:00 SMALL TALK CAFE