{"id":139778,"date":"2021-08-13T06:00:07","date_gmt":"2021-08-13T13:00:07","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=139778"},"modified":"2021-08-13T07:46:15","modified_gmt":"2021-08-13T14:46:15","slug":"ignite-21-is-now-open","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2021\/08\/ignite-21-is-now-open\/","title":{"rendered":"Call for Papers \u2014 Ignite \u201821 Is Now Open"},"content":{"rendered":"<p>Share your cybersecurity experience with Palo Alto Networks users, customers, partners and employees from all around the world at Ignite \u201821!<\/p>\n<p>Ignite is already known for delivering the most up-to-date, technical content from the Palo Alto Networks platform. This year\u2019s Ignite user conference will be available in the comfort of your own home on November 16-19, 2021. It will be a free-to-attend, virtual event, filled with the biggest experts in the industry, and you could be one of those experts!<\/p>\n<p>We\u2019re looking for highly technical perspectives with firsthand experience with our next-generation cybersecurity technologies, as well as groundbreaking new threat research or innovative best practices to be showcased at Ignite this November. This is a fantastic opportunity for you, your customers and partners to share their stories with a community of top-tier security professionals and researchers.<\/p>\n<p>We\u2019re looking for presentations in the following tracks and areas:<\/p>\n<h2><a id=\"post-139778-_wllqbad2cxkg\"><\/a> Track | Use Cases<\/h2>\n<h4><a id=\"post-139778-_xy9ukvfmup94\"><\/a>Firewalls<\/h4>\n<ul>\n<li>Data Center Security<\/li>\n<li>Network Perimeter Internet Edge Security<\/li>\n<li>Network Security Management<\/li>\n<li>SDN Virtualized Infrastructure<\/li>\n<li>Public Cloud Network Security<\/li>\n<li>Container Network Security<\/li>\n<li>5G Security<\/li>\n<li>Zero Trust Security<\/li>\n<\/ul>\n<h4><a id=\"post-139778-_xucro99cfy51\"><\/a>Security Services<\/h4>\n<ul>\n<li>Unmanaged (IOT) Device Security &amp; Segmentation<\/li>\n<li>Data Loss Prevention<\/li>\n<li>Securing SaaS Applications<\/li>\n<li>Cloud Access Security Broker<\/li>\n<li>Malware Analysis &amp; Sandboxing<\/li>\n<li>Intrusion Prevention (IPS\/IDS)<\/li>\n<li>Ransomware Protection<\/li>\n<li>Internet \/ Web Security<\/li>\n<li>DNS Security<\/li>\n<li>Extending Network Security to the Cloud<\/li>\n<\/ul>\n<h4><a id=\"post-139778-_exftn12demvr\"><\/a>Secure Access Service Edge - Prisma SASE<\/h4>\n<ul>\n<li>SD-WAN<\/li>\n<li>Zero Trust Network Access<\/li>\n<li>Firewall as a Service<\/li>\n<li>Cloud Access Security Broker<\/li>\n<li>Autonomous Digital Experience Management<\/li>\n<\/ul>\n<h4><a id=\"post-139778-_irlt0yb5xab2\"><\/a>Cloud Native Security - Prisma Cloud<\/h4>\n<ul>\n<li>Cloud Security Posture Management<\/li>\n<li>Cloud Workload Protection<\/li>\n<li>Container Security<\/li>\n<li>Cloud Network Security and Microsegmentation<\/li>\n<li>Cloud Infrastructure Entitlement Management<\/li>\n<\/ul>\n<h4><a id=\"post-139778-_tmmh7b1gesw0\"><\/a>Security Analytics Cortex<\/h4>\n<ul>\n<li>Attack Surface Management<\/li>\n<li>Endpoint Protection<\/li>\n<li>Detection &amp; Response<\/li>\n<li>Orchestration &amp; Automation<\/li>\n<li>Case Management<\/li>\n<li>Managed Detection &amp; Response<\/li>\n<li>Network Traffic Analysis<\/li>\n<li>Threat Intel Management<\/li>\n<li>Managed Threat Hunting<\/li>\n<li>Ransomware Protection<\/li>\n<li>Internet Operations Management<\/li>\n<\/ul>\n<h4><a id=\"post-139778-_k4s0gygrwdsj\"><\/a>Threat Intel &amp; Consulting - Unit 42<\/h4>\n<ul>\n<li>Ransomware Investigation<\/li>\n<li>Business Email Compromise<\/li>\n<li>Advanced Persistent Threat Investigation<\/li>\n<li>Compromise Assessment<\/li>\n<li>Breach Readiness Review<\/li>\n<li>Cybersecurity Risk Assessment<\/li>\n<li>Third-Party Risk Assessment<\/li>\n<\/ul>\n<h2><a id=\"post-139778-_pj6t90kmrwq\"><\/a><strong>Submit to the Call for Papers Today<\/strong><\/h2>\n<p>We want to hear your story, so please <a href=\"https:\/\/www.ignite.paloaltonetworks.com\/panwignitecfpwelcomepage\">send us your submission <\/a>soon. The call for papers will close on September 3, 2021, 5pm PST.<\/p>\n<p>Check out the Ignite <a href=\"https:\/\/www.ignite.paloaltonetworks.com\/panwignitefaq\">call for papers FAQ<\/a> or reach out to IgniteCFP@paloaltonetworks.com if you have any questions about a submission.<\/p>\n<p>We look forward to your submissions and feedback, but most of all, we look forward to seeing you at Ignite \u201821!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019re looking for highly technical perspectives with firsthand experience with our next-generation cybersecurity technologies to showcase at Ignite '21.<\/p>\n","protected":false},"author":723,"featured_media":139784,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[308],"tags":[1819],"coauthors":[7921],"class_list":["post-139778","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcement","tag-ignite"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2021\/08\/Ignite_Blog-BlogImage.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/139778","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/723"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=139778"}],"version-history":[{"count":7,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/139778\/revisions"}],"predecessor-version":[{"id":139821,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/139778\/revisions\/139821"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/139784"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=139778"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=139778"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=139778"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=139778"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}