{"id":117625,"date":"2020-08-17T13:15:15","date_gmt":"2020-08-17T20:15:15","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=117625"},"modified":"2020-08-19T15:58:16","modified_gmt":"2020-08-19T22:58:16","slug":"call-for-papers-ignite-2020","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2020\/08\/call-for-papers-ignite-2020\/","title":{"rendered":"Call for Papers for Ignite 2020: Share Your Cybersecurity Expertise"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Do you have amazing stories to share about how you\u2019re tackling cybersecurity in this rapidly changing world? Perhaps you helped your organization stand up and secure a remote workforce with Prisma Access, and in the process you learned what to do \u2013 and what not to do. Perhaps you\u2019ve become the resident expert in using Cortex XSOAR playbooks to automate processes and reduce the workload of your security team, and your skills are even more vital now that your organization\u2019s SOC is working virtually. Maybe you\u2019ve already figured out how to apply the new features of PAN-OS 10.0 to secure IoT devices your organization didn\u2019t even know existed on your network. We want to hear from you, and we\u2019re putting out a Call for Papers for this year\u2019s Ignite user conference. Not only are we excited to see your proposals \u2013 our attendees are hungry for practical information about getting the most out of our cybersecurity technologies.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We\u2019re looking for highly technical perspectives based on firsthand experience with our next-gen security technologies. We\u2019re also interested in groundbreaking new threat research or innovative best practices. Our attendees are excited to hear insights into the latest cyber threats, in-depth details on how to apply products and features to get the specific outcomes they need, and real-world examples of how our customers put our technologies to use. This is a fantastic opportunity to share your story with the community of top-tier security professionals and researchers at Ignite.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Ignite Conference is already known for bringing together cybersecurity experts from around the world to deliver the most up-to-date, technical content from across the Palo Alto Networks platform. This year, it will look a little different, but those differences will make it easier than ever to benefit from the information being shared.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Ignite user conference will be available in the comfort of your own home on Nov. 17-18, 2020. It will be a free-to-attend, completely virtual event, filled with the biggest experts in the industry \u2013 and you could be one of those experts.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We\u2019re looking for presentations in the following tracks and areas:\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\"><span style=\"font-weight: 400;\">Track<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Use Cases we\u2019re looking for<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">1<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Strata<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Datacenter Security<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Perimeter Security (Campus)<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Advanced Threat &amp; Intrusion Prevention\u00a0 (TP, WF)<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Web Security (URL, DNS, SaaS)<\/span><\/p>\n<p><span style=\"font-weight: 400;\">IoT Security\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Data Loss Prevention &amp; Compliance<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">2<\/span><\/td>\n<td><span style=\"font-weight: 400;\">PANW Security Services<\/span><\/td>\n<td><span style=\"font-weight: 400;\">GlobalProtect \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">WildFire\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Threat Prevention<\/span><span style=\"font-weight: 400;\">URL Filtering<\/span><span style=\"font-weight: 400;\">DNS Security<\/span><\/p>\n<p><span style=\"font-weight: 400;\">SD-WAN<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">IoT Security<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Data Loss Prevention<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Prisma SaaS<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">3<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Prisma Access<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Cloud Delivered Branch<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">4<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Prisma SD-WAN<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Secure Remote Workforce<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">5<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Prisma Cloud<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Network Protection<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Visibility, Compliance and Governance<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Identity Security<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Compute Security<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">6<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Cortex XDR<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Endpoint Threat Prevention<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Endpoint Detection and Response<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Managed Detection and Response<\/span><\/p>\n<p><span style=\"font-weight: 400;\">SOC Operations<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">7<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Cortex XSOAR<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Security Orchestration<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Case Management<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Threat Intelligence Management\u00a0<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<h2>Submit to the Call for Papers Today<\/h2>\n<p><span style=\"font-weight: 400;\">We want to hear your story, so please <\/span><a href=\"https:\/\/igniteevents.paloaltonetworks.com\/pages\/paloaltonetworks\/ignite20\/cfplanding\"><span style=\"font-weight: 400;\">send us your submission<\/span><\/a><span style=\"font-weight: 400;\"> soon. The Call for Papers website will no longer accept submissions after Sept. 9, 2020, but we\u2019ll be reviewing proposals on a rolling basis and will close early if we receive enough quality submissions before the end date. The earlier you submit, the greater your chances are.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Check out the Ignite <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/content\/dam\/creative-assets\/campaigns\/Ignite2020CFP\/ignite20-cfp-faq.pdf\"><span style=\"font-weight: 400;\">Call for Papers FAQ<\/span><\/a><span style=\"font-weight: 400;\"> or reach out to <\/span><a href=\"mailto:IgniteCFP@paloaltonetworks.com\"><span style=\"font-weight: 400;\">IgniteCFP@paloaltonetworks.com<\/span><\/a><span style=\"font-weight: 400;\"> if you have any questions about a submission.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Submitting a paper isn\u2019t the only way to get involved. We\u2019re also looking for your guidance in creating an Ignite experience that meets your needs. By answering <\/span><a href=\"https:\/\/www.surveymonkey.com\/r\/DFJN2ZH\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">this two-minute survey<\/span><\/a><span style=\"font-weight: 400;\">, you can influence the types of proposals we select for conference sessions.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We look forward to your submissions and your feedback, but most of all, we look forward to <\/span><a href=\"https:\/\/igniteusa.paloaltonetworks.com\/\"><span style=\"font-weight: 400;\">seeing you at Ignite<\/span><\/a><span style=\"font-weight: 400;\">!<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our call for papers for Ignite 2020 is open. Share your technical, firsthand experience with tackling cybersecurity using our next-gen technologies.<\/p>\n","protected":false},"author":663,"featured_media":117626,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6719,6768,6765,6770],"tags":[918,6737,7025,1819,6833,6890,5846,7095],"coauthors":[6834],"class_list":["post-117625","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company-culture","category-secure-the-cloud","category-secure-the-enterprise","category-secure-the-future","tag-call-for-papers","tag-cortex-xdr","tag-cortex-xsoar","tag-ignite","tag-prisma-access","tag-prisma-cloud","tag-sd-wan","tag-strata"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/08\/ignite-20-blog-image-400x300-1.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/117625","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/663"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=117625"}],"version-history":[{"count":3,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/117625\/revisions"}],"predecessor-version":[{"id":117824,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/117625\/revisions\/117824"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/117626"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=117625"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=117625"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=117625"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=117625"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}