Palo Alto Networks® invites you to our first Federal Government Summit

Our 2018 Federal Government summit event has concluded.

Watch the event highlights

Palo Alto Networks® invites you to our first Federal Government summit on Thursday October 4th, 2018

This event will bring leaders from the Federal Government and representatives from the cybersecurity technology industry together for a full-day of discussion around solutions available to the Federal Government for cyber defense.

You’ll walk away with the latest best practices, tips and strategies from industry experts, Palo Alto Networks and it’s partners for safely enabling applications while preventing successful cyber breaches across your networks, endpoints, public and private clouds.


8:00 am - 9:00 am Registration, Networking Breakfast and Technology exhibits
9:00 am - 10:00 am Welcome & Opening Keynote
10:00 am - 10.45 am Panel discussion: Moving Targets: Securing Dynamic Networks & Cloud Environments
10:45 am - 11:00 am Break and exhibits
11:00 am - 11:45 am Securely Enable the Cloud
11:45 am - 12:30 pm Extensible Endpoint Security
12:30 pm - 2:00 pm Lunch & exhibits
2:00 pm - 2:45 pm Technical Breakouts
2:45 pm - 3:30 pm Technical Breakouts
3:30 pm - 4:15 pm Technical Breakouts


John Davis

John Davis Vice President, Federal Chief Security Officer
Palo Alto Networks

Retired U.S. Army Major General John Davis is the Vice President and Federal Chief Security Officer for Palo Alto Networks, where he is responsible for expanding cybersecurity initiatives and global policy for the international public sector and assisting governments around the world in preventing successful cyber attacks. He is also the Vice President of Palo Alto Networks Public Sector LLC, which is the company’s U.S.-only subsidiary based in Reston, Virginia. Read More ...

Prior to joining Palo Alto Networks, John served as the Senior Military Advisor for Cyber to the Under Secretary of Defense for Policy and served as the Acting Deputy Assistant Secretary of Defense for Cyber Policy. Prior to this assignment, he served in multiple leadership positions in special operations, cyber, and information operations. His military decorations include the Defense Superior Service Medal, Legion of Merit, and the Bronze Star Medal.

John earned a Master of Strategic Studies from the U.S. Army War College, Master of Military Art and Science from U.S. Army Command and General Staff College, and Bachelor of Science from U.S. Military Academy at West Point.

Ryan Gillis

Ryan Gillis Vice President, Cybersecurity Strategy and Global Policy
Palo Alto Networks

Ryan works with governments, companies and organizations around the world to develop and implement strategies, policies and operational partnerships that prevent successful cyberattacks. He oversees the company’s involvement in public-private cybersecurity exercises, and is responsible for expanding cyberthreat information sharing relationships with various government organizations. Additionally, Ryan leads the company’s global public policy efforts and oversees government affairs around the world. Read More ...

Prior to joining Palo Alto Networks, Ryan spent nearly 15 years in government, and with technology and defense companies. Most recently, Ryan served as a cybersecurity official on the U.S. National Security Council staff at the White House, and more than a decade in various positions across the Department of Homeland Security during both Republican and Democratic administrations.

Ryan is a member of the Council on Foreign Relations and the World Economic Forum’s expert network supporting the growth of a secure and reliable Industrial Internet of Things (IIoT). In 2016, he also served on the CSIS Cyber Policy Task Force to develop recommendations for the incoming U.S. administration, and he participated in the U.S.-Australia Diplomatic Track 1.5 Cyber Dialogue. Ryan is an elected member of the executive committee of the U.S. Information Technology Sector Coordinating Council. He is also a recipient of the National Security Council’s “Outstanding Service Award,” and the 2017 Federal Computer Week “Fed 100” award. Ryan is a graduate of Georgetown University.

Donald Messier

Donald Messier Director General, Cyber and IT Security Infrastructure
Shared Services Canada

Mr. Messier works collaboratively with Partners, Client Departments and Agencies to plan, design, build, operate, and maintain an effective, efficient and responsive IT and Cyber Security Infrastructure to secure Government of Canada data and technology assets. Leading a team of 400 Public Servants and contractors distributed across Canada he manages a complex security infrastructure including Firewalls, Intrusion Detection and Prevention, Event Management Systems, Anti-Virus, Anti-Malware, Data Lost Prevention, Denial of Service Protection, Web Content Filtering, Mail Gateways, Secure Remote Access, Identity and Credential Management, and Advanced Threat Protection systems. Read More ...

Mr. Messier has held several roles including Sr. Dir for the Telecommunications Transformation Program at SSC, Sr. Dir, Project Delivery, Communications and Sense portfolio at National Defence where he led the development and implementation of the $2 billion DND Space Projects, including Military Satellite Communications and space based sensor projects. Chief IT Infrastructure Architect at National Defence.

Mr. Messier served in the Canadian Forces in various roles starting as a Communications Research Operator working in Signals Intelligence and moving on to pursue his education at Royal Roads and Royal Military College where he graduated in 1989 with a BEng in Engineering Physics and a MEng in Computer and Network engineering from Carleton University in 2002. While in the Military, Mr. Messier served in many locations including CFS Alert Nunavut, Ottawa, Bagotville, Goose Bay, Fort Huachuca, Arizona; and Kingston.

Francis Castonguay

Francis Castonguay Director General, Partnerships and Risk Mitigation
Communications Security Establishment

Francis is the Director General, Partnerships and Risk Mitigation at the Communications Security Establishment (CSE), responsible for providing IT Security advice, guidance and services to Canadian critical infrastructure organizations and for advancing collaborative relationships with private industry for the purpose of strengthening cyber security practices in Canada. Read More ...

Before joining CSE, Francis led Deloitte’s Cyber Risk Services team in Ottawa, providing cybersecurity advice to government and private sector organizations. Prior to this, he served as a Communications and Electronics Engineering Officer within the Royal Canadian Airforce. During his military career, Francis led operational cyber teams, managed the Department of National Defence’s global telecommunications services and was the Commander of the Canadian Forces Cyber Task Force where he helped develop National Defence’s cyber strategy and partnerships.

Francis holds a Bachelor of Sciences (Computer) degree from le College militaire royal (CMR), a Master’s certificate in Program Management from York University and a Master of Defence Studies degree from the Royal Military College of Canada (RMCC).

Saj Nair

Saj Nair Partner, Cybersecurity & Privacy PwC Canada

Saj leads PwC's Cybersecurity & Privacy practice in Canada. He is passionate about helping organizations improve resiliency to cyber risk while enabling them to achieve their business strategies through technological transformation and digital innovations. By doing so organizations are able to grow their business with confidence in the digital age and better prepared to respond to crises. Read More ...

Saj has led numerous consulting engagements to define and execute on business aligned, risk intelligent and sustainable strategies for achieving cyber resilience. He enjoys teaming up and working collaboratively with his client’s executive stakeholders and their team to transform their security, enterprise risk and technology functions to become more integrated and resilient.

Saj has international experience across several industry sectors in North America, Australia, Asia and Europe. He is a frequent speaker at industry events and conferences, and is regularly sought after by clients for presenting complex cyber security concepts in ‘plain language’ to their executives, boards and audit committees.

William Goins

William Goins Systems Engineering Manager, Cyber Security Specialists
Palo Alto Networks - East | Federal | Canada | Latam

William Goins joined Palo Alto Networks in September 2017. In his role, he manages the Cyber Security Specialists field SE organization for US East & Federal, Canada and Latin American markets. He has 20 plus years of experience in information security and cyber security vendor space as a consultant, architect and leader of technical teams. Read More ...

Prior to joining Palo Alto Networks, William spent the majority of his career at Symantec, serving as Sr. Director of Systems Engineering where he led the technical teams in the East & Canada regions.

William currently holds and maintains several information security accreditations and is an active participant in the information security community.

Victor Tavares

Victor Tavares Leads the Systems Engineering organization
Palo Alto Networks in Canada

Victor Tavares is responsible for the customer and partner facing SE team. Victor has more than 20 years of experience in the networking and information security industry where he has worked with most of Canada's largest enterprise, service provider, and public sector organizations. Read More ...

Prior to joining Palo Alto Networks in 2014, Victor lead the Enterprise Systems Engineering team at Juniper Networks in Canada, which he joined through Juniper’s acquisition of network security pioneer NetScreen Technologies in 2004. Victor’s technical background extends to software engineering and development, cloud, and datacenter experience.

For sponsorship enquires please contact: Anu Vijh

Technology Track Sponsors

For over 12 years, Amazon Web Services has been the world’s most comprehensive and broadly adopted cloud platform. AWS offers over 125 fully featured services for compute, storage, databases, networking, analytics, machine learning and artificial intelligence (AI), Internet of Things (IoT), mobile, security, hybrid, virtual and augmented reality (VR and AR), media, and application development, deployment, and management around the world. AWS services are trusted by millions of active customers around the world—including the leading government agencies, educational institutions and non-profits—to power their infrastructure, make them more agile, and lower costs. To learn more about AWS, visit

Proofpoint Inc. (NASDAQ: PFPT) is a leading next-generation security and compliance company that provides cloud-based solutions to protect the way people work today. Proofpoint solutions enable organizations to protect their users from advanced attacks delivered via email, social media, mobile, and cloud applications, protect the information their users create from advanced attacks and compliance risks, and respond quickly when incidents occur. More information is available at

Splunk enables organizations to search, monitor, analyze and visualize machine generated big data coming from websites, applications, servers, networks, sensors, security devices, and cloud providers. More than 16,000 enterprises, government agencies, universities and service providers in more than 110 countries use Splunk software to deepen business and customer understanding, mitigate cybersecurity risk, prevent fraud, improve service performance and reduce costs.

Tanium gives the world's largest enterprises and government organizations the unique power to secure, control and manage millions of endpoints across the enterprise. Serving as the "central nervous system" for enterprises, Tanium empowers cybersecurity and IT operations teams to ask questions about the state of every endpoint across the enterprise in plain English, retrieve data on their current state and execute change as necessary, all within seconds. Visit us at or follow us on Twitter at @Tanium.

TITUS solutions enable organizations to discover, classify, protect, analyze and confidently share information. Organizations use TITUS to meet regulatory compliance requirements by identifying and securing unstructured data – on the desktop, on mobile devices, and in the cloud. Millions of users in over 120 countries trust TITUS to keep their data compliant and secure, including some of the largest financial institutions and manufacturing companies in the world, government and military organizations across the G-7 and Australia, and Fortune 2000 companies. More information is available at

VMware, a global leader in cloud infrastructure and business mobility, accelerates our customers’ digital transformation journey by enabling enterprises to master a software-defined approach to business and IT.

With the VMware Cross-Cloud Architecture™ and digital workspace solutions, organizations are creating exceptional experiences by mobilizing everything; differentiating and responding faster to opportunities with modern apps; and safeguarding brand and customer trust with a defense-in-depth approach to security. With 2015 revenues of $6.6 billion, VMware has more than 500,000 customers and 75,000 partners worldwide and is a member of the Dell Technologies family of businesses.

Learn more at

Channel Partner Sponsors

Table Top Sponsors

Parking Sponsor

Fuel User Group influences and shapes the future of cybersecurity through meaningful online and in-person engagement with peers and industry experts. Benefit from joining a cybersecurity community of over 25,000 industry professionals, networking and learning new skills at in-person events, and get the most out of your Palo Alto Networks products in the process. Fuel is free to join, free to participate, and free to learn. Sign up today:


Restoring trust in the digital age

Retired US Army Major General John Davis, CSO for the Federal Sector at Palo Alto Networks, discusses some of the current challenges throughout the cybersecurity industry and how innovation can be a solution. He will rely on his decade of experience in cyber related assignments throughout the US military as well as his 3 years of experience as a CSO. He will describe four levels of innovation through the integration of various technologies and processes, and how applying these innovations can provide a solution to many of the challenges in the world of cybersecurity and restore trust in the digital age.

Panel Discussion

Moving Targets: Securing Dynamic Networks & Cloud Environments

With significant new government IT modernization policies reinforcing ongoing trends towards cloud and shared services adoption, Federal agencies are facing both new opportunities and risks. Especially as network architectures become more complex, it has become increasingly important for organizations to leverage innovative technologies and sound policies that deliver consistent security across all environments, including in the cloud, to holistically reduce organizational cyber risks. This session will bring together a diverse set of perspectives from across the Federal enterprise—with views from civilian, defense, and cross-agency leaders.

This session will explore best practices to deploy consistent and flexible security protections across physical and virtual environments. How can agencies meet growing demands and unleash the benefits of cloud without compromising data integrity? How do you lock down mission-critical applications in a highly-connected environment? Join us to explore options for managing emerging risks and achieving new levels of cyber threat prevention for public, private, and hybrid cloud infrastructure.

Securely Enable the Cloud

The traditional enterprise security perimeter has become incredibly fragmented. Data and applications reside everywhere, on the network, endpoints, and in the constantly evolving cloud ecosystem. The applications and data in the cloud need to be protected as vigilantly as on-premise applications and data. Each of the major cloud providers will emphasize that security is a shared responsibility – they protect the infrastructure, you protect your apps and data and that is where Palo Alto Networks can help. In this session, Victor Tavares, Sr. Systems Engineering Manager for Palo Alto Networks Canada, will provide guidance on how we can securely accelerate your move to the cloud with consistent protection for cloud infrastructure (VM-Series), platform (Evident) and workloads (Traps). These security capabilities can be integrated into your cloud app development lifecycle making cloud security frictionless for the development and security teams.

Extensible Endpoint Security

Endpoint protection is a critical security control we deploy in defense of our networks, data and users. However, a lot of organization fail to realize the value of their endpoint security implementations due to changing requirements or the evolving threat landscape. In this talk we will discuss Palo Alto Networks approach to an extensible endpoint security strategy and the value that delivers to customers.

Technology Tracks:

Presenter: Geordie Anderson, Principal Security Solutions Architect, Amazon Web Services (AWS) focusing on the Public Sector in Canada.
2:00 pm - 2.40 pm

How Do I Plan for Security, Risk and Compliance when Migrating to AWS?

When migrating to the cloud, the shared responsibility model inherent to AWS creates different paradigms for assessing your security, risk and compliance posture. Determining how to deal with these aspects of cloud can often slow migration and adoption far more than any technical blockers. In this session, we will discuss how you can build your landing zone in a way that addresses your security, risk, and compliance requirements.

Presenter: Chris Richmond, Sales Engineering Lead, Proofpoint
2:00 pm - 2.40 pm

Why are email attacks still getting through? Solving the problem with Advanced Email Protection

The threat landscape evolves, we adapt with new technologies and techniques. But the attackers keep getting in. As you know, spoofing emails, phishing and URL’s continues to be a challenge for most security professionals. We are going to discuss the tactics and targets of the malware authors via this Workshop. Chris Richmond at Proofpoint, will discuss the email threat landscape evolution, how to identify potential exposure and how to leverage different tools and techniques to protect your employees, brand and customers. We will also discuss how to protect email from the prospective of your business email but also look at outside your mail environment and provide perspective on how you can improve your partners, customers, and even your employees email security.

What Are Three Key Things the Audience Will Be Able to Do After Attending Your Session?

  • Understand the tactics and targets of the attackers
  • How to protect your brand
  • How to protect your employees from inbound attacks that seem to still get through

Presenter: Dennis Moreau,Senior Cybersecurity Architect, Office of the CTSO, VMware
2.45 pm - 3.25 pm

Cloud Platform and Application Context for Simplifying, Aligning and Automating Security Policy

The processes and technology stacks underlying cloud applications are deeper, more dynamic, and managed by more participants than conventionally hosted applications, creating complexity challenges as we address security and compliance across private, public and hybrid clouds. However, these same processes and technology stacks also provide extraordinary levels of contextual information that can be leveraged to address these challenges. In this session we'll look at how platform and application context are enabling trans formatively simpler and more effective cloud security and compliance.

Presenter: Steve Bowers,Director of Technical Account Management
2.45 pm - 3.25 pm

The benefits of moving applications and workloads to the cloud are well documented. So are the challenges.

For instance, when migrating and building services in the cloud, you need an understanding of what resources you are currently running locally, their configuration and dependencies, and any hardening that may have taken place. Moving to the cloud without properly identifying current configuration, dependencies, or security issues can be disastrous. And let’s not forget about the extra hoops through which we may have to jump when detecting and responding to security incidents!

This session will show you how to gain complete visibility and control of your endpoints to address these challenges, among others. With enhanced visibility, you can more accurately size your infrastructure and better target your plan to increase your chance of successful migration. Added visibility at an endpoint level, while leaving the hub-and-spoke model behind, can also greatly increase your organization’s ability to respond and recover to security threats in the cloud. This session will provide insights on how to get the right data to make the right decisions, wherever your systems are located (even in The Cloud!)

Presenter: Eric Tse, Sr. Sales Engineer, Splunk
3.30 pm - 4.15 pm

Combat threats with actionable intelligence and advanced analytics.

Hand-in-hand with the deployment of a robust security architecture is the need for a monitoring and response system that allows enterprises to continuously monitor and process security data efficiently and proactively act upon this data, if suspicious network activity is found. Palo Alto Networks has partnered with Splunk® to deliver an advanced visibility, reporting and monitoring solution for intelligent security analysis. This collaboration delivers operational reporting, configurable dashboard views, and adaptive response across Palo Alto Networks family of next-generation firewalls, advanced endpoint security, and threat intelligence cloud.

Presenter: Mark Cassetta,SVP Product Management
3.30 pm- 4.15 pm

Preventing Data Loss while enabling users to securely share sensitive information.

As government agencies are actively embracing a cybersecurity strategy that includes identifying and protecting data, TITUS and Palo Alto Networks have partnered to disrupt the traditional approaches. The result? With TITUS Data Classification solutions and Palo Alto Next-Generation Security Platform users and administrators can seamlessly identify and control the flow of sensitive data, meet stringent regulatory requirements, and optimize prevention policies to focus on the highest-risk areas, no matter where the information resides - across the desktop, on mobile devices and in the Cloud! Learn how public sector departments are challenging the status quo for data protection today.


On-site parking is available in the parking lot at Elgin/Slater and Albert entrances and are open at all times.

Free parking vouchers will be provided to all attendees for this event.


Both the Elgin st. and Canal entrances have a lay-by location for easy pick-up and drop-off.


If arriving by taxi, we recommend that you instruct your taxi to drop-off at the lay-by on Elgin Street.

Public Transit

The NAC is only a 5 to 10-minute walk from major bus interchanges, including the Mackenzie King and Rideau Street stations. For bus schedules and maps please refer to your bus website.

Para Transpo is a shared-ride, book-in-advance, public transit service. The service is open to eligible customers who are unable to take conventional transit (buses and O-Train) some or all of the time due to a disability. It is funded by the City of Ottawa and administered by OC Transpo.




National Arts Centre in Ottawa


1 Elgin Street, (at Confederation Square)
Ontario K1P 5W1
View in Google Maps


4th October 2018


8:00am - 4:15pm

Event Hashtag


Find us on