{"id":2765,"date":"2012-08-28T16:27:47","date_gmt":"2012-08-28T23:27:47","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=2765"},"modified":"2012-08-28T16:27:47","modified_gmt":"2012-08-28T23:27:47","slug":"ignite-your-conference","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2012\/08\/ignite-your-conference\/","title":{"rendered":"Ignite: Your Conference"},"content":{"rendered":"<p>In June we <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2012\/06\/you-heard-it-here-first-where-security-leaders-will-be-this-november\/\">announced<\/a> our first global user conference \u2013 <a href=\"http:\/\/www.paloaltonetworks.com\/news\/events\/ignite\/index\/\">Ignite<\/a>. We told you that the conference would be all about <a href=\"http:\/\/www.paloaltonetworks.com\/literature\/videos\/\">customer collaboration<\/a>. Now it\u2019s time to tell you more about some of your security peers that you\u2019ll be able to meet, collaborate with and learn from at Ignite 2012.<\/p>\n<p>We are shaping our on-stage agenda with contributions from security professionals from some of the most advanced enterprises around the globe, including:<\/p>\n<p><strong>Paul Carugati<\/strong> of <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2012\/03\/enterprises-share-more-real-world-examples-of-safe-enablement\/\">Motorola Solutions<\/a> has developed some of the more highly refined user-based application policies that we\u2019ve seen. He commented onstage at the RSA Conference 2012 that, <em>\u201cWe actually meet on a monthly basis and review the visibility aspects of our applications, and not just the applications themselves, but the categories \u2013 whether social media or otherwise. Understanding what the most heavily used apps are and then taking the different information, drilling down and getting to know how and why those applications are being used and why it\u2019s important for business for those applications to be used.\u201d<\/em><\/p>\n<p><strong>Mark Starry<\/strong> of <a href=\"http:\/\/www.paloaltonetworks.com\/literature\/customers\/healthcare\/Case-Study-Capital-Region-Health-Care-CRHC-and-Concord-Hospital.html\">Capital Regional Healthcare<\/a> will share how he\u2019s completely revamped how he manages security at his hospital over the last three years while also maintaining HIPAA and PCI compliance regulations.<\/p>\n<p><strong>Phil Cummings<\/strong> of Health Information Technology Services of Nova Scotia spoke at the recent Gartner Security Summit about what he\u2019s learned as an early <a href=\"http:\/\/www.paloaltonetworks.com\/solutions\/WildFire.html\">WildFire<\/a> user. He\u2019ll share his own modern malware research and findings at Ignite.<\/p>\n<p>Remember, Ignite is intended to be <em>your<\/em> conference. We\u2019re just providing a forum for exchanging ideas with, and learning from, your peers.<\/p>\n<p>If you haven\u2019t already, view the full <a href=\"http:\/\/s297059271.t.en25.com\/e\/er?utm_campaign=Ignite%20Conference%202012%20082812&amp;utm_medium=email&amp;utm_source=Eloqua&amp;s=297059271&amp;lid=269&amp;elq=e6bb3ba3a6494a5ba6e55d65d391a068\" rel=\"nofollow,noopener\" >conference agenda<\/a> and be sure to <a href=\"http:\/\/s297059271.t.en25.com\/e\/er?utm_campaign=Ignite%20Conference%202012%20082812&amp;utm_medium=email&amp;utm_source=Eloqua&amp;s=297059271&amp;lid=329&amp;elq=e6bb3ba3a6494a5ba6e55d65d391a068\" rel=\"nofollow,noopener\" >register<\/a> before August 31 to save on your conference pass. We look forward to seeing you in Las Vegas, Nov. 12-14, 2012!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In June we announced our first global user conference \u2013 Ignite. We told you that the conference would be all about customer collaboration. Now it\u2019s time to tell you more about some &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[99],"tags":[71,1819,69],"coauthors":[1395],"class_list":["post-2765","post","type-post","status-publish","format-standard","hentry","category-ignite","tag-application-visibility","tag-ignite","tag-wildfire"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2765","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=2765"}],"version-history":[{"count":10,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2765\/revisions"}],"predecessor-version":[{"id":2775,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2765\/revisions\/2775"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=2765"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=2765"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=2765"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=2765"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}