{"id":163083,"date":"2022-06-14T06:00:40","date_gmt":"2022-06-14T13:00:40","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=163083"},"modified":"2022-06-10T12:02:35","modified_gmt":"2022-06-10T19:02:35","slug":"ignite-22-call-for-papers-is-now-open","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2022\/06\/ignite-22-call-for-papers-is-now-open\/","title":{"rendered":"Ignite \u201822 Call for Papers is Now Open!"},"content":{"rendered":"<p>Do you have amazing stories to share about tackling cybersecurity in this rapidly changing world? We\u2019re looking for highly technical perspectives based on firsthand experiences. This year\u2019s Ignite \u201822 user conference will take place as an in-person event on Dec. 12-15, in Las Vegas, and we would like to hear from you.<\/p>\n<p>Your stories may focus on our next-generation cybersecurity technologies, innovative threat research or evolved best practices. This is a fantastic opportunity to share your story with a community of elite security professionals and researchers.<\/p>\n<p>We\u2019re looking for presentations in a variety of tracks, use cases and themes:<\/p>\n<h4><a id=\"post-163083-_7gzx3cnwynws\"><\/a>Network Security (Next-Gen Firewall)<\/h4>\n<ul>\n<li>Zero Trust for Users<\/li>\n<li>Zero Trust Security<\/li>\n<li>Data Center Security<\/li>\n<li>Network Perimeter \/ Internet Edge Security<\/li>\n<li>Secure Network Segmentation<\/li>\n<li>Network Security Management<\/li>\n<li>Securing SDN \/ Virtualized Infrastructure<\/li>\n<li>Public Cloud Network Security &amp; Cloud NGFW<\/li>\n<li>Container Network Security \/ Container Firewalls<\/li>\n<li>Enterprise 5G Security<\/li>\n<li>AIOPs<\/li>\n<\/ul>\n<h4><a id=\"post-163083-_cj6jk5w1eso0\"><\/a>Cloud Delivered Security Services (CDSS)<\/h4>\n<ul>\n<li>Unmanaged (IOT) Device Security and Segmentation<\/li>\n<li>Data Loss Prevention<\/li>\n<li>Securing SaaS Applications<\/li>\n<li>Malware Analysis &amp; Sandboxing<\/li>\n<li>Intrusion Prevention (IPS\/IDS)<\/li>\n<li>Ransomware Protection<\/li>\n<li>Internet\/Web Security<\/li>\n<li>DNS Security<\/li>\n<li>Extending Network Security to the Cloud Access Security Broker<\/li>\n<\/ul>\n<h4><a id=\"post-163083-_5twl7yhw384c\"><\/a>Secure Access Service Edge (SASE)<\/h4>\n<ul>\n<li>SD-WAN<\/li>\n<li>Zero Trust Network Access (ZTNA)<\/li>\n<li>Cloud Secure Web Gateway (SWG)<\/li>\n<li>Firewall as a Service (FWaaS)<\/li>\n<li>Cloud Access Security Broker (CASB)<\/li>\n<li>Autonomous Digital Experience Management (ADEM)<\/li>\n<li>Home Network (Okyo Garde)<\/li>\n<\/ul>\n<h4><a id=\"post-163083-_betffbk17fw6\"><\/a>Cloud Native Application Protection (Prisma Cloud)<\/h4>\n<ul>\n<li>Cloud Native Application Protection Platform (CNAPP)<\/li>\n<li>Cloud Security Posture Management (CSPM)<\/li>\n<li>Cloud Workload Protection (CWP)<\/li>\n<li>Web App and API Security<\/li>\n<li>Cloud Network Security and Microsegmentation<\/li>\n<li>Cloud Infrastructure Entitlement Management (CIEM)<\/li>\n<li>Cloud Code Security (Infrastructure as Code Security)<\/li>\n<\/ul>\n<h4><a id=\"post-163083-_xk0sz0j3qnwm\"><\/a>Security Operations (Cortex)<\/h4>\n<ul>\n<li>Cloud Security &amp; Automation<\/li>\n<li>Cloud Detection &amp; Response<\/li>\n<li>Network Security Automation<\/li>\n<li>Incident Case Management<\/li>\n<li>Security Operations Workflow Automation<\/li>\n<li>Threat Intel Management<\/li>\n<li>Managed Detection &amp; Response<\/li>\n<li>Managed Threat Hunting<\/li>\n<li>Attack Surface Management<\/li>\n<li>Unmanaged Cloud Security<\/li>\n<li>Third-Party Security<\/li>\n<li>Compliance Management<\/li>\n<\/ul>\n<h4><a id=\"post-163083-_c6z9op7fw1br\"><\/a>Endpoint Security (Cortex XDR)<\/h4>\n<ul>\n<li>Endpoint Protection<\/li>\n<li>Endpoint Detection &amp; Response<\/li>\n<li>Ransomware Protection<\/li>\n<li>Digital Forensics<\/li>\n<\/ul>\n<h4><a id=\"post-163083-_u52ta5km902a\"><\/a>Threat Intel &amp; Incident Response Services (Unit 42)<\/h4>\n<ul>\n<li>Threat Intelligence \/ Threat Landscape<\/li>\n<li>Incident Response<\/li>\n<li>Ransomware Investigation<\/li>\n<li>Business Email Compromise<\/li>\n<li>Cloud Incident Response<\/li>\n<li>Advanced Persistent Threat Investigation<\/li>\n<li>Compromise Assessment<\/li>\n<li>Breach Readiness<\/li>\n<li>Cybersecurity Risk Assessments<\/li>\n<li>Supply Chain Risk Assessments<\/li>\n<li>Incident Simulations (Tabletop Exercises, Red\/Blue\/Purple Team Exercises)<\/li>\n<\/ul>\n<h4><a id=\"post-163083-_y63muubm2v4g\"><\/a>Simplifying Security (Cross Portfolio)<\/h4>\n<ul>\n<li>Consolidating Security with the PANW Portfolio<\/li>\n<li>Securing 5G<\/li>\n<li>Hybrid Work<\/li>\n<li>Complete Cloud Security<\/li>\n<li>Zero Trust Enterprise: A Deep Dive<\/li>\n<\/ul>\n<h4><a id=\"post-163083-_m1xjn3m7awrc\"><\/a>Industry Solutions<\/h4>\n<ul>\n<li>State and Local Government and Education<\/li>\n<li>Financial Services<\/li>\n<li>ICS\/SCADA<\/li>\n<li>Manufacturing<\/li>\n<li>Healthcare<\/li>\n<li>Utilities<\/li>\n<li>Oil &amp; Gas<\/li>\n<li>Retail<\/li>\n<li>Service Providers<\/li>\n<li>Other<\/li>\n<\/ul>\n<h4><a id=\"post-163083-_8fesq93y8wyg\"><\/a>Partner Showcase<\/h4>\n<ul>\n<li><span style=\"font-weight: 400;\">Partner Use Cases<\/span><\/li>\n<\/ul>\n<h2><a id=\"post-163083-_ps5xj8a1tzo4\"><\/a>Submit to the Call for Papers Today<\/h2>\n<p>We want to hear your story, so please <a href=\"https:\/\/reg.paloaltonetworks.com\/flow\/paloaltonetworks\/ignite22\/cfp\/page\/home\">send us your submission<\/a> soon. The call for papers will close on Tuesday, August 9, 2022, 11:59 PT.<\/p>\n<p>Reach out to IgniteCFP@paloaltonetworks.com if you have any questions about a submission.<\/p>\n<p>We look forward to your submissions and feedback, but most of all, we look forward to seeing you in-person at Ignite \u201822, Dec 12-15, Las Vegas!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This year\u2019s Ignite \u201822 call for papers may focus on our next-generation cybersecurity technologies, innovative threat research or evolved best practices.<\/p>\n","protected":false},"author":723,"featured_media":163148,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[308],"tags":[1819,8686],"coauthors":[7921],"class_list":["post-163083","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcement","tag-ignite","tag-ignite-22"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2022\/06\/ignite22-blog-400x300-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/163083","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/723"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=163083"}],"version-history":[{"count":6,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/163083\/revisions"}],"predecessor-version":[{"id":163296,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/163083\/revisions\/163296"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/163148"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=163083"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=163083"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=163083"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=163083"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}