www.fortinetaccelerate.com Open in urlscan Pro
35.85.179.81  Public Scan

URL: https://www.fortinetaccelerate.com/flow/fortinet/accelerate2022/limitless/page/home?tab.eventday=16397584247430017WtI&elqTrackId=e2...
Submission: On March 17 via api from CH — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Cookie Policy
This site uses cookies to provide you with a more responsive and personalized
service. By using this site and clicking on the "Accept" button, you agree to
our use of cookies. Please read our Privacy Policy for more information on the
types of cookies we use and how to delete or block them. Learn more
DeclineAccept
 * Home
 * Solutions
 * Agenda
 * FAQ

Sign In

 
 
 
The CONTENT CATALOG is now LIVE!
 
  Click HERE to see what you can learn at ACCELERATE 2022!  
ACCELERATE 2022
LIMITLESS
Join us for Accelerate 2022 digital edition this May. This
year's conference will deliver inspiring and innovative
plenary sessions designed to broaden your perspective,
engage your thoughts and help you improve your security
senses.
Register Now
AMERICAS
May 10 - 12
APAC
May 11 - 13
EMEA
May 11 - 13
EVENT HIGHLIGHTS
Industry Leaders
Tune in to hear from the industry’s most qualified experts who will share their
unique wisdom and understanding of today’s most pressing security threats.
Executive Keynotes

KEN XIE

FOUNDER, CHAIRMAN OF THE BOARD, AND CHIEF EXECUTIVE OFFICER (CEO)

The Cybersecurity Imperative: Security-driven Networking
Today’s enterprise network is in a state of constant flux. The perimeter has
become increasingly fragmented with applications and data no longer contained
within the corporate data center but instead reside across distributed networks,
resulting in billions of edges and creating unprecedented complexity.
Organizations need to invest in a modern architecture that enables greater
productivity and a better user experience. Ken Xie, Founder and CEO will
demonstrate how integrating security and the network enables Enterprise and
Government organizations to adapt instantaneously to change, and a tightly
integrated security platform that can be deployed anywhere to ensure consistent
protection against increasingly sophisticated threats.

PATRICE PERCHE

CHIEF REVENUE OFFICER

Winning Strategies In An Era of Disruption
In under a decade, cybersecurity has emerged as one of the most important
systemic issues for the global economy. The increase in Incidents and attacks is
only the tip of a new and growing problem. According to the World Economic
Forum, cyberattacks are one of the top 10 global risks of highest concern in the
next decade.  Hear from Patrice Perche on how Fortinet’s 20+ years of organic
innovation is helping customers and partners navigate today’s challenging
environment and position them for the next wave.

JOHN MADDISON

CHIEF MARKETING OFFICER AND EXECUTIVE VICE PRESIDENT, PRODUCTS

Fortinet Technology Innovation, Products and Services
Modern enterprises need a system that makes deploying new technologies and
services secure and straightforward. This requires a broad, integrated, and
automated cybersecurity mesh platform that provides centralized management and
visibility, supports and interoperates across a vast ecosystem of solutions
automatically adapting to dynamic changes in the network. Learn from John
Maddison how Fortinet’s Security Fabric provides a platform and mesh
architecture that is essential to reducing complexity and increasing overall
security effectiveness across today’s expanding networks.

KEITH JENSEN

CHIEF FINANCIAL OFFICER (CFO)

Investing for Growth
As organizations continue to consolidate towards a platform and cybersecurity
mesh architecture approach and as network security expands to the local and
wide-area networks, to the work from anywhere environment and to the cloud,
Fortinet is strongly positioned to significantly capture market share. Hear from
Keith Jensen about Fortinet’s strategy to capture long-term growth.
Additionally, supply chain security is a highly complex, evolving function, and
is increasingly becoming a board conversation as security pros and business
executives face increasing risk as information flows throughout the supply
chain. Keith will share Fortinet’s the evolution of Fortinet’s supply chain
strategy for our customer and partners.

ROBERT MAY

SENIOR VICE PRESIDENT, PRODUCT MANAGEMENT

CyberEclipse 2022: Alignment of SD-WAN, SASE and ZTNA
In 2022, the alignment of SDWAN, SASE an ZTNA will enable transparent and
seamless mobility of customers and employees. Today’s enterprises demand instant
access to applications and data regardless of the IT deployment or the location
of users. Enterprises rely on the use of SaaS applications, public cloud and
private cloud data centers to store their most sensitive data, and require
employees to access it securely from anywhere. Fortinet is powering today’s
remote workforce, ensuring strict compliance and access to sensitive data, at
speeds demanded by today’s applications & users.

FELIX GAEHTGENS

VP ANALYST (GARTNER)

Fortinet Presents: How to Implement a Cybersecurity Mesh Architecture, Featuring
Gartner
Digital Acceleration has led organizations into a perfect storm for attacks
exploiting silos, complexities, and visibility gaps – making a broad,
integrated, and automated cybersecurity mesh platform like the Fortinet Security
Fabric a necessity.
Join us to hear about what it takes to successfully achieve a cybersecurity mesh
architecture – named a “Top 2022 Cybersecurity Trend” by Gartner.

Reasons to Attend


KEYNOTE

Hear Fortinet executives share their expertise and insight on today’s security
challenges and tomorrow’s solutions to keep networks secure.


PARTNER TRACK

Join our global channel leaders to learn about the exciting innovations coming
to the Engage Partner Program in 2022.


BUSINESS TRACK

Focus your time exploring session that will help you learn about top security
trends, challenges, and considerations to achieve successful digital
acceleration.


TECHNICAL TRACK

Take your learning to the next level with carefully curated sessions that will
show you how to solve technical requirements and achieve digital acceleration
success.


INDUSTRY TRACK

Discover how Fortinet solutions solve security challenges with the most
comprehensive solutions to help industries.


AND MUCH MORE...

Engage with other attendees in birds of a feather sessions, compete for prizes,
and gain valuable real-word experience.

AGENDA

This is an example of a subheader text.

This is an example of a subheader text.

Button


FILTERS

Clear

Search
 * widgets.catalog.result.title.heart.solidTracks
   
   General SessionGeneral Session
   
   PartnerPartner
   
   VerticalVertical
   
   BusinessBusiness
   
   TechnicalTechnical
   
   Fortinet Fabric StoryFortinet Fabric Story
 * widgets.catalog.result.title.heart.solidTopic
   
   Work from AnywhereWork from Anywhere
   
   Securing Digital Acceleration (Networks) Securing Digital Acceleration
   (Networks)
   
   Preventing Ransomware Preventing Ransomware
   
   Security FabricSecurity Fabric
   
   OT SecurityOT Security
   
   Zero Trust AccessZero Trust Access
   
   Security-Driven Networking Security-Driven Networking
   
   Adaptive Cloud Security Adaptive Cloud Security
   
   RetailRetail
   
   Financial Services Financial Services
   
   HealthcareHealthcare
   
   Service Provider Service Provider
   
   Security Operations Security Operations
   
   EducationEducation
   
   OTOT
   
   FederalFederal
   
   Ransomware ProtectionRansomware Protection
   
   Securing the Application JourneySecuring the Application Journey
 * widgets.catalog.result.title.heart.solidRegion
   
   AmericasAmericas
   
   APACAPAC
   
   EMEAEMEA
 * widgets.catalog.result.title.heart.solidDelivery Method
   
   On-DemandOn-Demand
   
   LiveLive

192 sessions


AMERICAS

 * Breakout
   Vertical
   Federal
   Americas
   Live
   2022: Key Cybersecurity Challenges for State and Local Government
   Expand
   Click to favorite
   
   Hybrid work patterns and online services are here to stay, Infrastructure
   investment funds will begin flowing to state and local government, ransomware
   is a threat that continues to grow in volume and impact, and jurisdictions
   will be conducting...Show more
   
   Tracks: Vertical
   Topic: Federal
   Region: Americas
 * Breakout
   Technical
   Security Operations
   Day 2
   Americas
   Live
   Augment Your SOC with Fortinet Managed Security Operations Services
   Expand
   Click to favorite
   
   In this session we will describe how Fortinet’s Security Operations portfolio
   of Managed Services supports your end-to-end Monitoring and Response needs by
   complementing the SOC to help overcome challenges such as keeping tabs on a
   changing threat...Show more
   
   Tracks: Technical
   Topic: Security Operations
   Region: Americas
 * Breakout
   Business
   Preventing Ransomware
   Ransomware Protection
   Day 2
   Americas
   Live
   Augment Your Team with Ransomware Experts
   Expand
   Click to favorite
   
   Coming SoonShow more
   
   Tracks: Business
   Topic: Preventing Ransomware , Ransomware Protection
   Region: Americas
 * Breakout
   Technical
   Security Operations
   Day 2
   Americas
   Live
   Automate Security Operations to Transform Your SOC
   Expand
   Click to favorite
   
   Today's Enterprise SOC is burdened with a large volume of alerts, manual
   processes, and many disparate legacy SOC tools. A SOC needs to be equipped
   with modern technologies in order to successfully defend and protect against
   today's attacks. In...Show more
   
   Tracks: Technical
   Topic: Security Operations
   Region: Americas
 * Breakout
   Vertical
   Americas
   Live
   Automation is Key to Driving Secure Business Growth in the Technology Sector
   Expand
   Click to favorite
   
   From the initial days of networking, automation has played a crucial role in
   provisioning, monitoring and ongoing operational tasks. As networking and
   security continue to converge, the need for improved integration has
   surpassed both standalone...Show more
   
   Tracks: Vertical
   Region: Americas
 * Breakout
   Technical
   Adaptive Cloud Security
   Day 2
   Americas
   Live
   Automation: The Key Element for a Safer, Simpler and More Effective
   Multi-Cloud Life-Cycle Management
   Expand
   Click to favorite
   
   Cloud environments have become very complex organisms, where provisioning is
   expected to last just for a few seconds, therefore saving human power which
   gets translated into money-saving and increased effectiveness. Most
   organizations struggle...Show more
   
   Tracks: Technical
   Topic: Adaptive Cloud Security
   Region: Americas
 * Breakout
   Technical
   Zero Trust Access
   Day 2
   Americas
   Live
   Brokering Authentication in a Multiple Identity Provider Environment
   Expand
   Click to favorite
   
   There are many common use cases requiring different end-users to be
   authenticated against different Identity Providers (IdPs) For example, a
   school system that uses separate Microsoft Azure tenants for each school
   where each tenant is a different...Show more
   
   Tracks: Technical
   Topic: Zero Trust Access
   Region: Americas
 * Breakout
   Partner
   Day 2
   Americas
   Live
   Building a Successful Security Practice with Fortinet Engage
   Expand
   Click to favorite
   
   Hear from our global channel leadership team about the exciting things coming
   for the Engage Partner Program, what the Fortinet Fabric means for your
   business, and how we continue to support our channel to drive profitability
   and expertise.Show more
   
   Tracks: Partner
   Region: Americas
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   Day 2
   Americas
   Live
   Building the Right Strategy to Secure the Next-Generation of Web
   Expand
   Click to favorite
   
   Web traffic comprises an increasing volume of the total traffic for many
   organizations. As a result, the Web continues to be one of the top attack
   vectors for delivering today’s rapidly evolving threats. In addition,
   web-based attacks have become...Show more
   
   Tracks: Business
   Topic: Securing Digital Acceleration (Networks)
   Region: Americas
 * Breakout
   Partner
   Americas
   Live
   Cloud Enterprise Business Transformation with GSIs
   Expand
   Click to favorite
   
   Organizations are increasingly deploying a variety of workloads across
   multiple clouds. In turn, business-critical data and services are
   increasingly scattered across this distributed infrastructure. Using the
   shared responsibility model as a...Show more
   
   Tracks: Partner
   Region: Americas
 * Breakout
   Technical
   Adaptive Cloud Security
   Day 2
   Americas
   Live
   Cloud Security Best Practices, Reducing Alert Fatigue and Making the Best Out
   of Cloud Native Security Services
   Expand
   Click to favorite
   
   As cloud workloads are deployed at a rapid pace, keeping up with security is
   increasingly challenging. In order to get the best security coverage across
   the growing number of workloads, Security professionals choose to utilize
   cloud-native...Show more
   
   Tracks: Technical
   Topic: Adaptive Cloud Security
   Region: Americas
 * Breakout
   Technical
   Security-Driven Networking
   Day 2
   Americas
   Live
   Cloud Security Web Gateway
   Expand
   Click to favorite
   
   In this session, we will discuss the future of converged security and
   networking. From Secure Web Gateway, client browser Isolation, ZTNA, and
   cloud-delivered NGFW, the Fortinet platform provides a complete solution for
   any organization. Join us...Show more
   
   Tracks: Technical
   Topic: Security-Driven Networking
   Region: Americas
 * Breakout
   Business
   Ransomware Protection
   Day 2
   Americas
   Live
   Continuously and Proactively Monitor for Ransomware 24x7x365
   Expand
   Click to favorite
   
   Even with all of the best security solutions deployed for the prevention and
   detection of threats, someone needs to watch over security as a whole,
   investigate alerts and respond to confirmed incidents. Unfortunately,
   according to Gartner, 78% of...Show more
   
   Tracks: Business
   Topic: Ransomware Protection
   Region: Americas
 * Breakout
   Technical
   Security-Driven Networking
   Day 2
   Americas
   Live
   Delivering Enterprise-Grade Security at Any Edge at Any Scale
   Expand
   Click to favorite
   
   Be the first to find out more about the latest Next Gen NGFW in the FortiGate
   mid-range and High-end platforms and enhance your Enterprise-Grade security
   by deploying some of the latest Security services from FortiOS 7.2. We will
   introduce you to...Show more
   
   Tracks: Technical
   Topic: Security-Driven Networking
   Region: Americas
 * Breakout
   Technical
   Security Operations
   Day 2
   Americas
   Live
   Delivering New Intelligence and Insights to Proactively Hunt for Threats
   Before They Emerge Using Deception
   Expand
   Click to favorite
   
   Sophisticated cyberattacks often happen during downtimes and when least
   expected. Today's enterprises must be vigilant to proactively detect and hunt
   for suspicious activities and perform reconnaissance across their digital
   attack surface to avoid...Show more
   
   Tracks: Technical
   Topic: Security Operations
   Region: Americas
 * Breakout
   Technical
   Security Operations
   Day 2
   Americas
   Live
   Demystifying Network Detection Response with FortiNDR
   Expand
   Click to favorite
   
   Is Network Detection Response (NDR) the next hype cycle in Cyber Security?
   What are the key challenges in SecOps and where does NDR fit into the big
   picture? Is ML/AI-based detection aiding detection or does it have its flaws?
   In this session,...Show more
   
   Tracks: Technical
   Topic: Security Operations
   Region: Americas
 * Breakout
   Business
   Ransomware Protection
   Day 2
   Americas
   Live
   Detect Ransomware Along the Cyber Kill Chain - Part II
   Expand
   Click to favorite
   
   As much as organizations try to prevent cybercriminals from gaining a
   foothold within their organization, that is unsustainable over an extended
   period of time, given the sophistication of many of today's multi-stage
   ransomware campaigns...Show more
   
   Tracks: Business
   Topic: Ransomware Protection
   Region: Americas
 * Breakout
   Business
   Ransomware Protection
   Day 2
   Americas
   Live
   Detect Ransomware Along the Cyber Kill Chain - Part I
   Expand
   Click to favorite
   
   This session will discuss how ransomware operators are designing campaigns
   and weaponizing payloads to evade traditional security controls and
   successfully insert components within unsuspecting organizations. It will
   further outline advanced...Show more
   
   Tracks: Business
   Topic: Ransomware Protection
   Region: Americas
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   Day 2
   Americas
   Live
   Don’t Let a Simple Configuration Error Open the Door for Hackers
   Expand
   Click to favorite
   
   The rapidly changing security threat landscape requires organizations of all
   sizes to become more agile, proactive, and in control of their security
   fabric. Accelerate the convergence of network and security with centralized
   management and...Show more
   
   Tracks: Business
   Topic: Securing Digital Acceleration (Networks)
   Region: Americas
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   Day 2
   Americas
   Live
   Don't Let Hackers Derail Business Growth: Fortify Your Network
   Expand
   Click to favorite
   
   Enterprise networks are under enormous pressure to allow users to connect to
   any application from any location using any device creating and exposing many
   edges in the hybrid IT architecture. Legacy firewalls were never designed to
   provide...Show more
   
   Tracks: Business
   Topic: Securing Digital Acceleration (Networks)
   Region: Americas
 * Breakout
   Technical
   Security Operations
   Day 2
   Americas
   Live
   Expanding Core Attack Surface Protections to Defend Against Ransomware
   Attacks
   Expand
   Click to favorite
   
   Sophisticated outbreaks demand quick action from many points across the
   attack surface, from initial vulnerability detection and exploit prevention,
   to post-exploit defusion and incident response. In this session, we'll
   introduce new capabilities...Show more
   
   Tracks: Technical
   Topic: Security Operations
   Region: Americas
 * Breakout
   Vertical
   Federal
   Americas
   Live
   Federal Cybersecurity as a Team Sport
   Expand
   Click to favorite
   
   Cybersecurity is a top-of-mind issue for Federal managers, employees, and
   citizens alike. While there are dedicated security professionals within
   agencies, every user bears some responsibility for ensuring security. No
   agency arguably has enough...Show more
   
   Tracks: Vertical
   Topic: Federal
   Region: Americas
 * Breakout
   Business
   Work from Anywhere
   Day 2
   Americas
   Live
   FortiEDR, the First and Last Line of Defense
   Expand
   Click to favorite
   
   Before the pandemic, 70% of endpoints were outside the traditional network
   once a week and 54% more than twice a week. Today, the percentage of those
   endpoints at home or away in other places five days a week is considerably
   higher. According to a...Show more
   
   Tracks: Business
   Topic: Work from Anywhere
   Region: Americas
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   Day 2
   Americas
   Live
   Gain User-to-Application Visibility Over Modern Networks with Digital
   Experience Monitoring
   Expand
   Click to favorite
   
   Organizations no longer own all the infrastructure their employee traffic
   transverses but are still responsible for the end-to-end employee experience.
   Network teams are shifting focus from traditional network performance
   monitoring to...Show more
   
   Tracks: Business
   Topic: Securing Digital Acceleration (Networks)
   Region: Americas
 * Breakout
   Partner
   Day 2
   Americas
   Live
   GSI Growth Opportunities in 5G-Enabled Industrial Environments
   Expand
   Click to favorite
   
   Enterprises, and specifically OT-rich enterprises in many verticals, are
   early adopters of 5G as a technology to enable and accelerate Industry 4.0,
   automation, agility, safety, and overall innovation in their products,
   services, and operations...Show more
   
   Tracks: Partner
   Region: Americas
 * Breakout
   Partner
   Americas
   Live
   GSIs: Monetizing Fortinet End-to-End Zero Trust Architecture
   Expand
   Click to favorite
   
   Organizations need to simultaneously support accelerated digital business
   initiatives and the growth of remote working, while protecting their users,
   data, and applications against an aggressive threat landscape. This
   represents both a challenge...Show more
   
   Tracks: Partner
   Region: Americas
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   Day 2
   Americas
   Live
   Improve LAN Edge Performance and Security with Intelligence Throughout the
   Fabric
   Expand
   Click to favorite
   
   IT groups are looking for ways to unburden staff from day-to-day tactical
   efforts for a more strategic focus. While Artificial Intelligence with
   Machine Learning gets most of the hype, there are varying levels and areas
   for intelligence...Show more
   
   Tracks: Business
   Topic: Securing Digital Acceleration (Networks)
   Region: Americas
 * Breakout
   Vertical
   OT
   Americas
   Live
   Industrial Security for Power Utilities with the Fortinet Security Fabric:
   Power Utility Customer Panel
   Expand
   Click to favorite
   
   Power utilities are essential for public health, ecosystem protection, and
   economic strength. As utilities transform, digital security is necessary to
   protect the legacy and modern equipment which serve citizens and communities.
   As operational...Show more
   
   Tracks: Vertical
   Topic: OT
   Region: Americas
 * Breakout
   Partner
   Day 2
   Americas
   Live
   Industry Solutions To Drive Growth with Fortinet
   Expand
   Click to favorite
   
   Fortinet offers the most comprehensive solutions to help industries
   accelerate security, maximize productivity, preserve user experience, and
   lower total cost of ownership. Join us to learn about the industry solutions,
   tools, and resources...Show more
   
   Tracks: Partner
   Region: Americas
 * Breakout
   Technical
   Security-Driven Networking
   Day 2
   Americas
   Live
   LAN Edge – Secure and Automated
   Expand
   Click to favorite
   
   Automate your Enterprise Wired and Wireless LAN. Check out Fortinet's
   seamlessly integrated and scalable LAN Edge solutions with cutting-edge
   FortiAP and FortiSwitch hardware, zero-touch provisioning, integration with
   Security Fabric and AI-Driven...Show more
   
   Tracks: Technical
   Topic: Security-Driven Networking
   Region: Americas
 * Breakout
   Technical
   Security Operations
   Day 2
   Americas
   Live
   Machine Learning Fueled Automated Endpoint Protection Across the Security
   Ecosystem
   Expand
   Click to favorite
   
   Learn how FortiEDR can dynamically classify incidents utilizing machine
   learning and apply customized eXtended incident response recipes across the
   entire security ecosystem.Show more
   
   Tracks: Technical
   Topic: Security Operations
   Region: Americas
 * Breakout
   Technical
   Zero Trust Access
   Day 2
   Americas
   Live
   Managing Risk with Adaptive Authentication in FortiToken Cloud
   Expand
   Click to favorite
   
   Multi-factor authentication provides more security than password-only logins,
   but it comes at the cost of inconvenience for end-users. The adaptive
   authentication feature uses the available information regarding a login
   attempt (e.g., time of day,...Show more
   
   Tracks: Technical
   Topic: Zero Trust Access
   Region: Americas
 * Breakout
   Vertical
   OT
   Americas
   Live
   Manufacturing Customer Panel: Digital Security for Legacy and Modern
   Manufacturing
   Expand
   Click to favorite
   
   The future of digital security for manufacturing industrial controls and
   SCADA systems will be governed by readiness. As digital transformation
   increases the number and type of devices connecting to the network, such as
   smart sensors, valves, and...Show more
   
   Tracks: Vertical
   Topic: OT
   Region: Americas
 * Breakout
   Technical
   Zero Trust Access
   Day 2
   Americas
   Live
   Modernizing Your Performance Monitoring to Digital Experience Monitoring
   Expand
   Click to favorite
   
   In this session, we'll explore how network teams may not own the entirety of
   a user connection but will ultimately be responsible for the digital
   experience. Users may be operating from the office, on the move, or, as is
   increasingly the case, at...Show more
   
   Tracks: Technical
   Topic: Zero Trust Access
   Region: Americas
 * Breakout
   Technical
   Security-Driven Networking
   Day 2
   Americas
   Live
   Modernizing Your WAN Edge with Fortinet Secure SD-WAN
   Expand
   Click to favorite
   
   The most versatile solution in the market just received its most significant
   update to date. Fortinet Secure SD-WAN makes it easier than ever to modernize
   your WAN edge and converge your Work From Anywhere (WFA) users wherever they
   are located...Show more
   
   Tracks: Technical
   Topic: Security-Driven Networking
   Region: Americas
 * Breakout
   Vertical
   Healthcare
   Americas
   Live
   Protect Connected Medical Devices and Networks Against Ransomware and
   Evolving Threats
   Expand
   Click to favorite
   
   Healthcare and Life Sciences organizations are developing strategies and
   tactical plans to defend against Ransomware and evolving threats impacting
   the entire ecosystem. Fortinet Healthcare team will engage customers in a
   fireside chat to talk...Show more
   
   Tracks: Vertical
   Topic: Healthcare
   Region: Americas
 * Breakout
   Technical
   Adaptive Cloud Security
   Day 2
   Americas
   Live
   Protecting APIs and Using Machine Learning to Quickly Identify Real Threats
   Expand
   Click to favorite
   
   The digital transformation and the pandemic accelerated the use of
   applications in pretty much every aspect of our lives. This is driving the
   proliferation of APIs creating an entirely new attack surface organizations
   now need to protect. In this...Show more
   
   Tracks: Technical
   Topic: Adaptive Cloud Security
   Region: Americas
 * Breakout
   Technical
   Zero Trust Access
   Day 2
   Americas
   Live
   Protecting Your Enterprise Modern-day Hybrid Workplace with Zero Trust
   Expand
   Click to favorite
   
   With the onset of mass remote working, the hybrid workplace has weakened the
   approach to perimeter security. Applications are moving from the data center
   to cloud, and users are connecting from anywhere and everywhere. This
   transition to...Show more
   
   Tracks: Technical
   Topic: Zero Trust Access
   Region: Americas
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   Day 2
   Americas
   Live
   SD-WAN and 5G/LTE Are Here To Transform The WAN Edge. Do You Have The Right
   Solution?
   Expand
   Click to favorite
   
   Digital transformation and work-from-anywhere are creating many edges for
   organizations to support. These edges are causing major challenges for
   organizations to deliver superior quality of experience and effective
   security posture. At the same...Show more
   
   Tracks: Business
   Topic: Securing Digital Acceleration (Networks)
   Region: Americas
 * Breakout
   Business
   Work from Anywhere
   Day 2
   Americas
   Live
   Secure and Efficient Communications in a Hybrid World
   Expand
   Click to favorite
   
   Digital innovation is rapidly changing the way people communicate. The shift
   to remote working during the pandemic has further driven the demand for
   network infrastructure and connectivity rapidly. The need for communication
   tools to keep...Show more
   
   Tracks: Business
   Topic: Work from Anywhere
   Region: Americas
 * Breakout
   Technical
   Adaptive Cloud Security
   Day 2
   Americas
   Live
   Secure the Workday: Defending Cloud Email
   Expand
   Click to favorite
   
   Many organizations are using SaaS applications like Office 365 and Google
   Workspace, to empower employees and deliver business results. Meanwhile,
   email remains the primary threat vector in an evolving landscape
   characterized by increasing...Show more
   
   Tracks: Technical
   Topic: Adaptive Cloud Security
   Region: Americas
 * Breakout
   Business
   Securing the Application Journey
   Day 2
   Americas
   Live
   Securing CI/CD Pipeline
   Expand
   Click to favorite
   
   The way in which software applications are developed has changed
   significantly over the past 10 years. Traditionally, SW applications relied
   on monolithic SW architectures that contained all the core functions and
   features of an application in a...Show more
   
   Tracks: Business
   Topic: Securing the Application Journey
   Region: Americas
 * Breakout
   Fortinet Fabric Story
   Americas
   Live
   Securing Digital Acceleration Across All Application Journeys
   Expand
   Click to favorite
   
   Many organizations have expedited their application journey to the cloud in
   response to external factors such as the need to support digital acceleration
   efforts or the push to enable employees to work from anywhere (WFA). Often
   organizations have...Show more
   
   Tracks: Fortinet Fabric Story
   Region: Americas
 * Breakout
   Vertical
   Education
   Americas
   Live
   Securing Education with the Fortinet Security Fabric
   Expand
   Click to favorite
   
   The threat landscape is continuously evolving in the education sector.
   Investing in comprehensive cybersecurity strategies and advanced threat
   protection protects sensitive data and infrastructure while reducing
   operating expenses. During this...Show more
   
   Tracks: Vertical
   Topic: Education
   Region: Americas
 * Breakout
   Fortinet Fabric Story
   OT Security
   Americas
   Live
   Securing OT in the Face of Digital Transformation
   Expand
   Click to favorite
   
   The attack surface for OT environments is expanding because Digital
   Transformation often requires taking data out of industrial assets to deliver
   outcomes in the cloud and because the pandemic requires more remote
   connectivity to industrial...Show more
   
   Tracks: Fortinet Fabric Story
   Topic: OT Security
   Region: Americas
 * Breakout
   Technical
   Security-Driven Networking
   Day 2
   Americas
   Live
   Securing OT Networks from Evolving Cyber-threats
   Expand
   Click to favorite
   
   Digital innovation and transformation impact every business and organization.
   Some of these businesses and organizations may be part of critical
   infrastructure or national critical infrastructure and depend on technologies
   like industrial...Show more
   
   Tracks: Technical
   Topic: Security-Driven Networking
   Region: Americas
 * Breakout
   Business
   Securing the Application Journey
   Day 2
   Americas
   Live
   Securing SAP and Oracle ERP Deployments
   Expand
   Click to favorite
   
   ERP systems are the definition of mission-critical. If you were to ask a CISO
   where do they hide the crown jewels, where do they keep their most critical
   data – most likely the answer would be in their ERP system. ERP or Enterprise
   Resource...Show more
   
   Tracks: Business
   Topic: Securing the Application Journey
   Region: Americas
 * Breakout
   Vertical
   Service Provider
   Americas
   Live
   Securing the 5G Ecosystem
   Expand
   Click to favorite
   
   The successful deployment of 5G networks and services will require the
   implementation of security at all points in the 5G ecosystem. For Service
   Providers building a new 5G-enabled revenue stream, there must be careful
   thought and consideration...Show more
   
   Tracks: Vertical
   Topic: Service Provider
   Region: Americas
 * Breakout
   Business
   Securing the Application Journey
   Day 2
   Americas
   Live
   Securing the Full Web Application and API Attack Surface
   Expand
   Click to favorite
   
   Are you fully protecting the web application and API attack surface? The
   cyber skills shortage can lead to inadequately deployed security solutions.
   Like a sports car that never gets past first gear, too often the full
   capabilities of security...Show more
   
   Tracks: Business
   Topic: Securing the Application Journey
   Region: Americas
 * Breakout
   Vertical
   Retail
   Americas
   Live
   Securing the Future of Retail with Fortinet
   Expand
   Click to favorite
   
   In retail, it’s all about the experience, and consistent delivery is key.
   Businesses are always looking to gain competitive advantages by accelerating
   digital transformation, embracing new technologies, bolstering supply chains
   and gaining...Show more
   
   Tracks: Vertical
   Topic: Retail
   Region: Americas

Show more


APAC

 * Breakout
   Vertical
   Federal
   APAC
   Live
   2022: Key Cybersecurity Challenges for State and Local Government
   Expand
   Click to favorite
   
   Hybrid work patterns and online services are here to stay, Infrastructure
   investment funds will begin flowing to state and local government, ransomware
   is a threat that continues to grow in volume and impact, and jurisdictions
   will be conducting...Show more
   
   Tracks: Vertical
   Topic: Federal
   Region: APAC
 * Breakout
   Technical
   Security Operations
   APAC
   Live
   Augment Your SOC with Fortinet Managed Security Operations Services
   Expand
   Click to favorite
   
   In this session we will describe how Fortinet’s Security Operations portfolio
   of Managed Services supports your end-to-end Monitoring and Response needs by
   complementing the SOC to help overcome challenges such as keeping tabs on a
   changing threat...Show more
   
   Tracks: Technical
   Topic: Security Operations
   Region: APAC
 * Breakout
   Business
   Ransomware Protection
   APAC
   Live
   Augment Your Team with Ransomware Experts
   Expand
   Click to favorite
   
   Coming SoonShow more
   
   Tracks: Business
   Topic: Ransomware Protection
   Region: APAC
 * Breakout
   Technical
   Security Operations
   APAC
   Live
   Automate Security Operations to Transform Your SOC
   Expand
   Click to favorite
   
   Today's Enterprise SOC is burdened with a large volume of alerts, manual
   processes, and many disparate legacy SOC tools. A SOC needs to be equipped
   with modern technologies in order to successfully defend and protect against
   today's attacks. In...Show more
   
   Tracks: Technical
   Topic: Security Operations
   Region: APAC
 * Breakout
   Vertical
   APAC
   Live
   Automation is Key to Driving Secure Business Growth in the Technology Sector
   Expand
   Click to favorite
   
   From the initial days of networking, automation has played a crucial role in
   provisioning, monitoring and ongoing operational tasks. As networking and
   security continue to converge, the need for improved integration has
   surpassed both standalone...Show more
   
   Tracks: Vertical
   Region: APAC
 * Breakout
   Technical
   Adaptive Cloud Security
   APAC
   Live
   Automation: The Key Element for a Safer, Simpler and More Effective
   Multi-Cloud Life-Cycle Management
   Expand
   Click to favorite
   
   Cloud environments have become very complex organisms, where provisioning is
   expected to last just for a few seconds, therefore saving human power which
   gets translated into money-saving and increased effectiveness. Most
   organizations struggle...Show more
   
   Tracks: Technical
   Topic: Adaptive Cloud Security
   Region: APAC
 * Breakout
   Technical
   Zero Trust Access
   APAC
   Live
   Brokering Authentication in a Multiple Identity Provider Environment
   Expand
   Click to favorite
   
   There are many common use cases requiring different end-users to be
   authenticated against different Identity Providers (IdPs) For example, a
   school system that uses separate Microsoft Azure tenants for each school
   where each tenant is a different...Show more
   
   Tracks: Technical
   Topic: Zero Trust Access
   Region: APAC
 * Breakout
   Partner
   APAC
   Live
   Building a Successful Security Practice with Fortinet Engage
   Expand
   Click to favorite
   
   Hear from our global channel leadership team about the exciting things coming
   for the Engage Partner Program, what the Fortinet Fabric means for your
   business, and how we continue to support our channel to drive profitability
   and expertise.Show more
   
   Tracks: Partner
   Region: APAC
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   APAC
   Live
   Building the Right Strategy to Secure the Next-Generation of Web
   Expand
   Click to favorite
   
   Web traffic comprises an increasing volume of the total traffic for many
   organizations. As a result, the Web continues to be one of the top attack
   vectors for delivering today’s rapidly evolving threats. In addition,
   web-based attacks have become...Show more
   
   Tracks: Business
   Topic: Securing Digital Acceleration (Networks)
   Region: APAC
 * Breakout
   Partner
   APAC
   Live
   Cloud Enterprise Business Transformation with GSIs
   Expand
   Click to favorite
   
   Organizations are increasingly deploying a variety of workloads across
   multiple clouds. In turn, business-critical data and services are
   increasingly scattered across this distributed infrastructure. Using the
   shared responsibility model as a...Show more
   
   Tracks: Partner
   Region: APAC
 * Breakout
   Technical
   Adaptive Cloud Security
   APAC
   Live
   Cloud Security Best Practices, Reducing Alert Fatigue and Making the Best Out
   of Cloud Native Security Services
   Expand
   Click to favorite
   
   As cloud workloads are deployed at a rapid pace, keeping up with security is
   increasingly challenging. In order to get the best security coverage across
   the growing number of workloads, Security professionals choose to utilize
   cloud-native...Show more
   
   Tracks: Technical
   Topic: Adaptive Cloud Security
   Region: APAC
 * Breakout
   Technical
   Security-Driven Networking
   APAC
   Live
   Cloud Security Web Gateway
   Expand
   Click to favorite
   
   In this session, we will discuss the future of converged security and
   networking. From Secure Web Gateway, client browser Isolation, ZTNA, and
   cloud-delivered NGFW, the Fortinet platform provides a complete solution for
   any organization. Join us...Show more
   
   Tracks: Technical
   Topic: Security-Driven Networking
   Region: APAC
 * Breakout
   Business
   Ransomware Protection
   APAC
   Live
   Continuously and Proactively Monitor for Ransomware 24x7x365
   Expand
   Click to favorite
   
   Even with all of the best security solutions deployed for the prevention and
   detection of threats, someone needs to watch over security as a whole,
   investigate alerts and respond to confirmed incidents. Unfortunately,
   according to Gartner, 78% of...Show more
   
   Tracks: Business
   Topic: Ransomware Protection
   Region: APAC
 * Breakout
   Technical
   Security-Driven Networking
   APAC
   Live
   Delivering Enterprise-Grade Security at Any Edge at Any Scale
   Expand
   Click to favorite
   
   Be the first to find out more about the latest Next Gen NGFW in the FortiGate
   mid-range and High-end platforms and enhance your Enterprise-Grade security
   by deploying some of the latest Security services from FortiOS 7.2. We will
   introduce you to...Show more
   
   Tracks: Technical
   Topic: Security-Driven Networking
   Region: APAC
 * Breakout
   Technical
   Security Operations
   APAC
   Live
   Delivering New Intelligence and Insights to Proactively Hunt for Threats
   Before They Emerge Using Deception
   Expand
   Click to favorite
   
   Sophisticated cyberattacks often happen during downtimes and when least
   expected. Today's enterprises must be vigilant to proactively detect and hunt
   for suspicious activities and perform reconnaissance across their digital
   attack surface to avoid...Show more
   
   Tracks: Technical
   Topic: Security Operations
   Region: APAC
 * Breakout
   Technical
   Security Operations
   APAC
   Live
   Demystifying Network Detection Response with FortiNDR
   Expand
   Click to favorite
   
   Is Network Detection Response (NDR) the next hype cycle in Cyber Security?
   What are the key challenges in SecOps and where does NDR fit into the big
   picture? Is ML/AI-based detection aiding detection or does it have its flaws?
   In this session,...Show more
   
   Tracks: Technical
   Topic: Security Operations
   Region: APAC
 * Breakout
   Business
   Ransomware Protection
   APAC
   Live
   Detect Ransomware Along the Cyber Kill Chain - Part II
   Expand
   Click to favorite
   
   As much as organizations try to prevent cybercriminals from gaining a
   foothold within their organization, that is unsustainable over an extended
   period of time, given the sophistication of many of today's multi-stage
   ransomware campaigns...Show more
   
   Tracks: Business
   Topic: Ransomware Protection
   Region: APAC
 * Breakout
   Business
   Preventing Ransomware
   APAC
   Live
   Detect Ransomware Along the Cyber Kill Chain - Part I
   Expand
   Click to favorite
   
   This session will discuss how ransomware operators are designing campaigns
   and weaponizing payloads to evade traditional security controls and
   successfully insert components within unsuspecting organizations. It will
   further outline advanced...Show more
   
   Tracks: Business
   Topic: Preventing Ransomware
   Region: APAC
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   APAC
   Live
   Don’t Let a Simple Configuration Error Open the Door for Hackers
   Expand
   Click to favorite
   
   The rapidly changing security threat landscape requires organizations of all
   sizes to become more agile, proactive, and in control of their security
   fabric. Accelerate the convergence of network and security with centralized
   management and...Show more
   
   Tracks: Business
   Topic: Securing Digital Acceleration (Networks)
   Region: APAC
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   APAC
   Live
   Don't Let Hackers Derail Business Growth: Fortify Your Network
   Expand
   Click to favorite
   
   Enterprise networks are under enormous pressure to allow users to connect to
   any application from any location using any device creating and exposing many
   edges in the hybrid IT architecture. Legacy firewalls were never designed to
   provide...Show more
   
   Tracks: Business
   Topic: Securing Digital Acceleration (Networks)
   Region: APAC
 * Breakout
   Technical
   Security Operations
   APAC
   Live
   Expanding Core Attack Surface Protections to Defend Against Ransomware
   Attacks
   Expand
   Click to favorite
   
   Sophisticated outbreaks demand quick action from many points across the
   attack surface, from initial vulnerability detection and exploit prevention,
   to post-exploit defusion and incident response. In this session, we'll
   introduce new capabilities...Show more
   
   Tracks: Technical
   Topic: Security Operations
   Region: APAC
 * Breakout
   Business
   Work from Anywhere
   APAC
   Live
   FortiEDR, the First and Last Line of Defense
   Expand
   Click to favorite
   
   Before the pandemic, 70% of endpoints were outside the traditional network
   once a week and 54% more than twice a week. Today, the percentage of those
   endpoints at home or away in other places five days a week is considerably
   higher. According to a...Show more
   
   Tracks: Business
   Topic: Work from Anywhere
   Region: APAC
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   APAC
   Live
   Gain User-to-Application Visibility Over Modern Networks with Digital
   Experience Monitoring
   Expand
   Click to favorite
   
   Organizations no longer own all the infrastructure their employee traffic
   transverses but are still responsible for the end-to-end employee experience.
   Network teams are shifting focus from traditional network performance
   monitoring to...Show more
   
   Tracks: Business
   Topic: Securing Digital Acceleration (Networks)
   Region: APAC
 * Breakout
   Partner
   APAC
   Live
   GSI Growth Opportunities in 5G-Enabled Industrial Environments
   Expand
   Click to favorite
   
   Enterprises, and specifically OT-rich enterprises in many verticals, are
   early adopters of 5G as a technology to enable and accelerate Industry 4.0,
   automation, agility, safety, and overall innovation in their products,
   services, and operations...Show more
   
   Tracks: Partner
   Region: APAC
 * Breakout
   Partner
   APAC
   Live
   GSIs: Monetizing Fortinet End-to-End Zero Trust Architecture
   Expand
   Click to favorite
   
   Organizations need to simultaneously support accelerated digital business
   initiatives and the growth of remote working, while protecting their users,
   data, and applications against an aggressive threat landscape. This
   represents both a challenge...Show more
   
   Tracks: Partner
   Region: APAC
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   APAC
   Live
   Improve LAN Edge Performance and Security with Intelligence Throughout the
   Fabric
   Expand
   Click to favorite
   
   IT groups are looking for ways to unburden staff from day-to-day tactical
   efforts for a more strategic focus. While Artificial Intelligence with
   Machine Learning gets most of the hype, there are varying levels and areas
   for intelligence...Show more
   
   Tracks: Business
   Topic: Securing Digital Acceleration (Networks)
   Region: APAC
 * Breakout
   Vertical
   OT
   APAC
   Live
   Industrial Security for Power Utilities with the Fortinet Security Fabric:
   Power Utility Customer Panel
   Expand
   Click to favorite
   
   Power utilities are essential for public health, ecosystem protection, and
   economic strength. As utilities transform, digital security is necessary to
   protect the legacy and modern equipment which serve citizens and communities.
   As operational...Show more
   
   Tracks: Vertical
   Topic: OT
   Region: APAC
 * Breakout
   Technical
   Security-Driven Networking
   APAC
   Live
   LAN Edge – Secure and Automated
   Expand
   Click to favorite
   
   Automate your Enterprise Wired and Wireless LAN. Check out Fortinet's
   seamlessly integrated and scalable LAN Edge solutions with cutting-edge
   FortiAP and FortiSwitch hardware, zero-touch provisioning, integration with
   Security Fabric and AI-Driven...Show more
   
   Tracks: Technical
   Topic: Security-Driven Networking
   Region: APAC
 * Breakout
   Technical
   Security Operations
   APAC
   Live
   Machine Learning Fueled Automated Endpoint Protection Across the Security
   Ecosystem
   Expand
   Click to favorite
   
   Learn how FortiEDR can dynamically classify incidents utilizing machine
   learning and apply customized eXtended incident response recipes across the
   entire security ecosystem.Show more
   
   Tracks: Technical
   Topic: Security Operations
   Region: APAC
 * Breakout
   Technical
   Zero Trust Access
   APAC
   Live
   Managing Risk with Adaptive Authentication in FortiToken Cloud
   Expand
   Click to favorite
   
   Multi-factor authentication provides more security than password-only logins,
   but it comes at the cost of inconvenience for end-users. The adaptive
   authentication feature uses the available information regarding a login
   attempt (e.g., time of day,...Show more
   
   Tracks: Technical
   Topic: Zero Trust Access
   Region: APAC
 * Breakout
   Vertical
   OT
   APAC
   Live
   Manufacturing Customer Panel: Digital Security for Legacy and Modern
   Manufacturing
   Expand
   Click to favorite
   
   The future of digital security for manufacturing industrial controls and
   SCADA systems will be governed by readiness. As digital transformation
   increases the number and type of devices connecting to the network, such as
   smart sensors, valves, and...Show more
   
   Tracks: Vertical
   Topic: OT
   Region: APAC
 * Breakout
   Technical
   Zero Trust Access
   APAC
   Live
   Modernizing Your Performance Monitoring to Digital Experience Monitoring
   Expand
   Click to favorite
   
   In this session, we'll explore how network teams may not own the entirety of
   a user connection but will ultimately be responsible for the digital
   experience. Users may be operating from the office, on the move, or, as is
   increasingly the case, at...Show more
   
   Tracks: Technical
   Topic: Zero Trust Access
   Region: APAC
 * Breakout
   Technical
   Security-Driven Networking
   APAC
   Live
   Modernizing Your WAN Edge with Fortinet Secure SD-WAN
   Expand
   Click to favorite
   
   The most versatile solution in the market just received its most significant
   update to date. Fortinet Secure SD-WAN makes it easier than ever to modernize
   your WAN edge and converge your Work From Anywhere (WFA) users wherever they
   are located...Show more
   
   Tracks: Technical
   Topic: Security-Driven Networking
   Region: APAC
 * Breakout
   Vertical
   Healthcare
   APAC
   Live
   Protect Connected Medical Devices and Networks Against Ransomware and
   Evolving Threats
   Expand
   Click to favorite
   
   Healthcare and Life Sciences organizations are developing strategies and
   tactical plans to defend against Ransomware and evolving threats impacting
   the entire ecosystem. Fortinet Healthcare team will engage customers in a
   fireside chat to talk...Show more
   
   Tracks: Vertical
   Topic: Healthcare
   Region: APAC
 * Breakout
   Technical
   Adaptive Cloud Security
   APAC
   Live
   Protecting APIs and Using Machine Learning to Quickly Identify Real Threats
   Expand
   Click to favorite
   
   The digital transformation and the pandemic accelerated the use of
   applications in pretty much every aspect of our lives. This is driving the
   proliferation of APIs creating an entirely new attack surface organizations
   now need to protect. In this...Show more
   
   Tracks: Technical
   Topic: Adaptive Cloud Security
   Region: APAC
 * Breakout
   Technical
   Zero Trust Access
   APAC
   Live
   Protecting Your Enterprise Modern-day Hybrid Workplace with Zero Trust
   Expand
   Click to favorite
   
   With the onset of mass remote working, the hybrid workplace has weakened the
   approach to perimeter security. Applications are moving from the data center
   to cloud, and users are connecting from anywhere and everywhere. This
   transition to...Show more
   
   Tracks: Technical
   Topic: Zero Trust Access
   Region: APAC
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   APAC
   Live
   SD-WAN and 5G/LTE Are Here To Transform The WAN Edge. Do You Have The Right
   Solution?
   Expand
   Click to favorite
   
   Digital transformation and work-from-anywhere are creating many edges for
   organizations to support. These edges are causing major challenges for
   organizations to deliver superior quality of experience and effective
   security posture. At the same...Show more
   
   Tracks: Business
   Topic: Securing Digital Acceleration (Networks)
   Region: APAC
 * Breakout
   Business
   Work from Anywhere
   APAC
   Live
   Secure and Efficient Communications in a Hybrid World
   Expand
   Click to favorite
   
   Digital innovation is rapidly changing the way people communicate. The shift
   to remote working during the pandemic has further driven the demand for
   network infrastructure and connectivity rapidly. The need for communication
   tools to keep...Show more
   
   Tracks: Business
   Topic: Work from Anywhere
   Region: APAC
 * Breakout
   Business
   Securing the Application Journey
   APAC
   Live
   Securing CI/CD Pipeline
   Expand
   Click to favorite
   
   The way in which software applications are developed has changed
   significantly over the past 10 years. Traditionally, SW applications relied
   on monolithic SW architectures that contained all the core functions and
   features of an application in a...Show more
   
   Tracks: Business
   Topic: Securing the Application Journey
   Region: APAC
 * Breakout
   Fortinet Fabric Story
   APAC
   Live
   Securing Digital Acceleration Across All Application Journeys
   Expand
   Click to favorite
   
   Many organizations have expedited their application journey to the cloud in
   response to external factors such as the need to support digital acceleration
   efforts or the push to enable employees to work from anywhere (WFA). Often
   organizations have...Show more
   
   Tracks: Fortinet Fabric Story
   Region: APAC
 * Breakout
   Vertical
   Education
   APAC
   Live
   Securing Education with the Fortinet Security Fabric
   Expand
   Click to favorite
   
   The threat landscape is continuously evolving in the education sector.
   Investing in comprehensive cybersecurity strategies and advanced threat
   protection protects sensitive data and infrastructure while reducing
   operating expenses. During this...Show more
   
   Tracks: Vertical
   Topic: Education
   Region: APAC
 * Breakout
   Fortinet Fabric Story
   OT Security
   APAC
   Live
   Securing OT in the Face of Digital Transformation
   Expand
   Click to favorite
   
   The attack surface for OT environments is expanding because Digital
   Transformation often requires taking data out of industrial assets to deliver
   outcomes in the cloud and because the pandemic requires more remote
   connectivity to industrial...Show more
   
   Tracks: Fortinet Fabric Story
   Topic: OT Security
   Region: APAC
 * Breakout
   Technical
   Security-Driven Networking
   APAC
   Live
   Securing OT Networks from Evolving Cyber-threats
   Expand
   Click to favorite
   
   Digital innovation and transformation impact every business and organization.
   Some of these businesses and organizations may be part of critical
   infrastructure or national critical infrastructure and depend on technologies
   like industrial...Show more
   
   Tracks: Technical
   Topic: Security-Driven Networking
   Region: APAC
 * Breakout
   Business
   Securing the Application Journey
   APAC
   Live
   Securing SAP and Oracle ERP Deployments
   Expand
   Click to favorite
   
   ERP systems are the definition of mission-critical. If you were to ask a CISO
   where do they hide the crown jewels, where do they keep their most critical
   data – most likely the answer would be in their ERP system. ERP or Enterprise
   Resource...Show more
   
   Tracks: Business
   Topic: Securing the Application Journey
   Region: APAC
 * Breakout
   Vertical
   Service Provider
   APAC
   Live
   Securing the 5G Ecosystem
   Expand
   Click to favorite
   
   The successful deployment of 5G networks and services will require the
   implementation of security at all points in the 5G ecosystem. For Service
   Providers building a new 5G-enabled revenue stream, there must be careful
   thought and consideration...Show more
   
   Tracks: Vertical
   Topic: Service Provider
   Region: APAC
 * Breakout
   Business
   Securing the Application Journey
   APAC
   Live
   Securing the Full Web Application and API Attack Surface
   Expand
   Click to favorite
   
   Are you fully protecting the web application and API attack surface? The
   cyber skills shortage can lead to inadequately deployed security solutions.
   Like a sports car that never gets past first gear, too often the full
   capabilities of security...Show more
   
   Tracks: Business
   Topic: Securing the Application Journey
   Region: APAC
 * Breakout
   Vertical
   Retail
   APAC
   Live
   Securing the Future of Retail with Fortinet
   Expand
   Click to favorite
   
   In retail, it’s all about the experience, and consistent delivery is key.
   Businesses are always looking to gain competitive advantages by accelerating
   digital transformation, embracing new technologies, bolstering supply chains
   and gaining...Show more
   
   Tracks: Vertical
   Topic: Retail
   Region: APAC
 * Breakout
   Technical
   Zero Trust Access
   APAC
   Live
   Securing the New Normal - Securing the Extended Enterprise to Home
   Expand
   Click to favorite
   
   Working from home can be both positive and negative. For organizations and
   administrators, the flexibility needed can also extend the attack surface.
   Considerations around competing for limited bandwidth for business-critical
   apps through to...Show more
   
   Tracks: Technical
   Topic: Zero Trust Access
   Region: APAC
 * Breakout
   Vertical
   Financial Services
   APAC
   Live
   Security Driven Networking for the Financial Services Industry
   Expand
   Click to favorite
   
   Today’s financial services customers are squarely in the crosshairs, 300%
   more likely to be targeted by cyberattacks than any other industry – and the
   financial and regulatory implications of being breached are bigger than ever.
   Join the members...Show more
   
   Tracks: Vertical
   Topic: Financial Services
   Region: APAC
 * Breakout
   Technical
   Adaptive Cloud Security
   APAC
   Live
   Security That Fits Modern Cloud-native Application Development
   Expand
   Click to favorite
   
   Application development has moved from a monolithic to a cloud-native
   architecture built using micro-services, containers, continuous
   integration/deployment, and other DevOps tools/ practices. The old ways of
   scanning the application for security...Show more
   
   Tracks: Technical
   Topic: Adaptive Cloud Security
   Region: APAC

Show more


EMEA

 * Breakout
   Vertical
   Federal
   EMEA
   Live
   2022: Key Cybersecurity Challenges for State and Local Government
   Expand
   Click to favorite
   
   Hybrid work patterns and online services are here to stay, Infrastructure
   investment funds will begin flowing to state and local government, ransomware
   is a threat that continues to grow in volume and impact, and jurisdictions
   will be conducting...Show more
   
   Tracks: Vertical
   Topic: Federal
   Region: EMEA
 * Breakout
   Technical
   Security Operations
   EMEA
   Live
   Augment Your SOC with Fortinet Managed Security Operations Services
   Expand
   Click to favorite
   
   In this session we will describe how Fortinet’s Security Operations portfolio
   of Managed Services supports your end-to-end Monitoring and Response needs by
   complementing the SOC to help overcome challenges such as keeping tabs on a
   changing threat...Show more
   
   Tracks: Technical
   Topic: Security Operations
   Region: EMEA
 * Breakout
   Business
   Ransomware Protection
   EMEA
   Live
   Augment Your Team with Ransomware Experts
   Expand
   Click to favorite
   
   Coming SoonShow more
   
   Tracks: Business
   Topic: Ransomware Protection
   Region: EMEA
 * Breakout
   Technical
   Security Operations
   EMEA
   Live
   Automate Security Operations to Transform Your SOC
   Expand
   Click to favorite
   
   Today's Enterprise SOC is burdened with a large volume of alerts, manual
   processes, and many disparate legacy SOC tools. A SOC needs to be equipped
   with modern technologies in order to successfully defend and protect against
   today's attacks. In...Show more
   
   Tracks: Technical
   Topic: Security Operations
   Region: EMEA
 * Breakout
   Vertical
   EMEA
   Live
   Automation is Key to Driving Secure Business Growth in the Technology Sector
   Expand
   Click to favorite
   
   From the initial days of networking, automation has played a crucial role in
   provisioning, monitoring and ongoing operational tasks. As networking and
   security continue to converge, the need for improved integration has
   surpassed both standalone...Show more
   
   Tracks: Vertical
   Region: EMEA
 * Breakout
   Technical
   Adaptive Cloud Security
   EMEA
   Live
   Automation: The Key Element for a Safer, Simpler and More Effective
   Multi-Cloud Life-Cycle Management
   Expand
   Click to favorite
   
   Cloud environments have become very complex organisms, where provisioning is
   expected to last just for a few seconds, therefore saving human power which
   gets translated into money-saving and increased effectiveness. Most
   organizations struggle...Show more
   
   Tracks: Technical
   Topic: Adaptive Cloud Security
   Region: EMEA
 * Breakout
   Technical
   Zero Trust Access
   EMEA
   Live
   Brokering Authentication in a Multiple Identity Provider Environment
   Expand
   Click to favorite
   
   There are many common use cases requiring different end-users to be
   authenticated against different Identity Providers (IdPs) For example, a
   school system that uses separate Microsoft Azure tenants for each school
   where each tenant is a different...Show more
   
   Tracks: Technical
   Topic: Zero Trust Access
   Region: EMEA
 * Breakout
   Partner
   EMEA
   Live
   Building a Successful Security Practice with Fortinet Engage
   Expand
   Click to favorite
   
   Hear from our global channel leadership team about the exciting things coming
   for the Engage Partner Program, what the Fortinet Fabric means for your
   business, and how we continue to support our channel to drive profitability
   and expertise.Show more
   
   Tracks: Partner
   Region: EMEA
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   EMEA
   Live
   Building the Right Strategy to Secure the Next-Generation of Web
   Expand
   Click to favorite
   
   Web traffic comprises an increasing volume of the total traffic for many
   organizations. As a result, the Web continues to be one of the top attack
   vectors for delivering today’s rapidly evolving threats. In addition,
   web-based attacks have become...Show more
   
   Tracks: Business
   Topic: Securing Digital Acceleration (Networks)
   Region: EMEA
 * Breakout
   Partner
   EMEA
   Live
   Cloud Enterprise Business Transformation with GSIs
   Expand
   Click to favorite
   
   Organizations are increasingly deploying a variety of workloads across
   multiple clouds. In turn, business-critical data and services are
   increasingly scattered across this distributed infrastructure. Using the
   shared responsibility model as a...Show more
   
   Tracks: Partner
   Region: EMEA
 * Breakout
   Technical
   Adaptive Cloud Security
   EMEA
   Live
   Cloud Security Best Practices, Reducing Alert Fatigue and Making the Best Out
   of Cloud Native Security Services
   Expand
   Click to favorite
   
   As cloud workloads are deployed at a rapid pace, keeping up with security is
   increasingly challenging. In order to get the best security coverage across
   the growing number of workloads, Security professionals choose to utilize
   cloud-native...Show more
   
   Tracks: Technical
   Topic: Adaptive Cloud Security
   Region: EMEA
 * Breakout
   Technical
   Security-Driven Networking
   EMEA
   Live
   Cloud Security Web Gateway
   Expand
   Click to favorite
   
   In this session, we will discuss the future of converged security and
   networking. From Secure Web Gateway, client browser Isolation, ZTNA, and
   cloud-delivered NGFW, the Fortinet platform provides a complete solution for
   any organization. Join us...Show more
   
   Tracks: Technical
   Topic: Security-Driven Networking
   Region: EMEA
 * Breakout
   Business
   Ransomware Protection
   EMEA
   Live
   Continuously and Proactively Monitor for Ransomware 24x7x365
   Expand
   Click to favorite
   
   Even with all of the best security solutions deployed for the prevention and
   detection of threats, someone needs to watch over security as a whole,
   investigate alerts and respond to confirmed incidents. Unfortunately,
   according to Gartner, 78% of...Show more
   
   Tracks: Business
   Topic: Ransomware Protection
   Region: EMEA
 * Breakout
   Technical
   Security-Driven Networking
   EMEA
   Live
   Delivering Enterprise-Grade Security at Any Edge at Any Scale
   Expand
   Click to favorite
   
   Be the first to find out more about the latest Next Gen NGFW in the FortiGate
   mid-range and High-end platforms and enhance your Enterprise-Grade security
   by deploying some of the latest Security services from FortiOS 7.2. We will
   introduce you to...Show more
   
   Tracks: Technical
   Topic: Security-Driven Networking
   Region: EMEA
 * Breakout
   Technical
   Security Operations
   EMEA
   Live
   Delivering New Intelligence and Insights to Proactively Hunt for Threats
   Before They Emerge Using Deception
   Expand
   Click to favorite
   
   Sophisticated cyberattacks often happen during downtimes and when least
   expected. Today's enterprises must be vigilant to proactively detect and hunt
   for suspicious activities and perform reconnaissance across their digital
   attack surface to avoid...Show more
   
   Tracks: Technical
   Topic: Security Operations
   Region: EMEA
 * Breakout
   Technical
   Security Operations
   EMEA
   Live
   Demystifying Network Detection Response with FortiNDR
   Expand
   Click to favorite
   
   Is Network Detection Response (NDR) the next hype cycle in Cyber Security?
   What are the key challenges in SecOps and where does NDR fit into the big
   picture? Is ML/AI-based detection aiding detection or does it have its flaws?
   In this session,...Show more
   
   Tracks: Technical
   Topic: Security Operations
   Region: EMEA
 * Breakout
   Business
   Ransomware Protection
   EMEA
   Live
   Detect Ransomware Along the Cyber Kill Chain - Part II
   Expand
   Click to favorite
   
   As much as organizations try to prevent cybercriminals from gaining a
   foothold within their organization, that is unsustainable over an extended
   period of time, given the sophistication of many of today's multi-stage
   ransomware campaigns...Show more
   
   Tracks: Business
   Topic: Ransomware Protection
   Region: EMEA
 * Breakout
   Business
   Ransomware Protection
   EMEA
   Live
   Detect Ransomware Along the Cyber Kill Chain - Part I
   Expand
   Click to favorite
   
   This session will discuss how ransomware operators are designing campaigns
   and weaponizing payloads to evade traditional security controls and
   successfully insert components within unsuspecting organizations. It will
   further outline advanced...Show more
   
   Tracks: Business
   Topic: Ransomware Protection
   Region: EMEA
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   EMEA
   Live
   Don’t Let a Simple Configuration Error Open the Door for Hackers
   Expand
   Click to favorite
   
   The rapidly changing security threat landscape requires organizations of all
   sizes to become more agile, proactive, and in control of their security
   fabric. Accelerate the convergence of network and security with centralized
   management and...Show more
   
   Tracks: Business
   Topic: Securing Digital Acceleration (Networks)
   Region: EMEA
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   EMEA
   Live
   Don't Let Hackers Derail Business Growth: Fortify Your Network
   Expand
   Click to favorite
   
   Enterprise networks are under enormous pressure to allow users to connect to
   any application from any location using any device creating and exposing many
   edges in the hybrid IT architecture. Legacy firewalls were never designed to
   provide...Show more
   
   Tracks: Business
   Topic: Securing Digital Acceleration (Networks)
   Region: EMEA
 * Breakout
   Technical
   Security Operations
   EMEA
   Live
   Expanding Core Attack Surface Protections to Defend Against Ransomware
   Attacks
   Expand
   Click to favorite
   
   Sophisticated outbreaks demand quick action from many points across the
   attack surface, from initial vulnerability detection and exploit prevention,
   to post-exploit defusion and incident response. In this session, we'll
   introduce new capabilities...Show more
   
   Tracks: Technical
   Topic: Security Operations
   Region: EMEA
 * Breakout
   Business
   Work from Anywhere
   EMEA
   Live
   FortiEDR, the First and Last Line of Defense
   Expand
   Click to favorite
   
   Before the pandemic, 70% of endpoints were outside the traditional network
   once a week and 54% more than twice a week. Today, the percentage of those
   endpoints at home or away in other places five days a week is considerably
   higher. According to a...Show more
   
   Tracks: Business
   Topic: Work from Anywhere
   Region: EMEA
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   EMEA
   Live
   Gain User-to-Application Visibility Over Modern Networks with Digital
   Experience Monitoring
   Expand
   Click to favorite
   
   Organizations no longer own all the infrastructure their employee traffic
   transverses but are still responsible for the end-to-end employee experience.
   Network teams are shifting focus from traditional network performance
   monitoring to...Show more
   
   Tracks: Business
   Topic: Securing Digital Acceleration (Networks)
   Region: EMEA
 * Breakout
   Partner
   EMEA
   Live
   GSI Growth Opportunities in 5G-Enabled Industrial Environments
   Expand
   Click to favorite
   
   Enterprises, and specifically OT-rich enterprises in many verticals, are
   early adopters of 5G as a technology to enable and accelerate Industry 4.0,
   automation, agility, safety, and overall innovation in their products,
   services, and operations...Show more
   
   Tracks: Partner
   Region: EMEA
 * Breakout
   Partner
   EMEA
   Live
   GSIs: Monetizing Fortinet End-to-End Zero Trust Architecture
   Expand
   Click to favorite
   
   Organizations need to simultaneously support accelerated digital business
   initiatives and the growth of remote working, while protecting their users,
   data, and applications against an aggressive threat landscape. This
   represents both a challenge...Show more
   
   Tracks: Partner
   Region: EMEA
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   EMEA
   Live
   Improve LAN Edge Performance and Security with Intelligence Throughout the
   Fabric
   Expand
   Click to favorite
   
   IT groups are looking for ways to unburden staff from day-to-day tactical
   efforts for a more strategic focus. While Artificial Intelligence with
   Machine Learning gets most of the hype, there are varying levels and areas
   for intelligence...Show more
   
   Tracks: Business
   Topic: Securing Digital Acceleration (Networks)
   Region: EMEA
 * Breakout
   Vertical
   OT
   EMEA
   Live
   Industrial Security for Power Utilities with the Fortinet Security Fabric:
   Power Utility Customer Panel
   Expand
   Click to favorite
   
   Power utilities are essential for public health, ecosystem protection, and
   economic strength. As utilities transform, digital security is necessary to
   protect the legacy and modern equipment which serve citizens and communities.
   As operational...Show more
   
   Tracks: Vertical
   Topic: OT
   Region: EMEA
 * Breakout
   Technical
   Security-Driven Networking
   EMEA
   Live
   LAN Edge – Secure and Automated
   Expand
   Click to favorite
   
   Automate your Enterprise Wired and Wireless LAN. Check out Fortinet's
   seamlessly integrated and scalable LAN Edge solutions with cutting-edge
   FortiAP and FortiSwitch hardware, zero-touch provisioning, integration with
   Security Fabric and AI-Driven...Show more
   
   Tracks: Technical
   Topic: Security-Driven Networking
   Region: EMEA
 * Breakout
   Technical
   Security Operations
   EMEA
   Live
   Machine Learning Fueled Automated Endpoint Protection Across the Security
   Ecosystem
   Expand
   Click to favorite
   
   Learn how FortiEDR can dynamically classify incidents utilizing machine
   learning and apply customized eXtended incident response recipes across the
   entire security ecosystem.Show more
   
   Tracks: Technical
   Topic: Security Operations
   Region: EMEA
 * Breakout
   Technical
   Zero Trust Access
   EMEA
   Live
   Managing Risk with Adaptive Authentication in FortiToken Cloud
   Expand
   Click to favorite
   
   Multi-factor authentication provides more security than password-only logins,
   but it comes at the cost of inconvenience for end-users. The adaptive
   authentication feature uses the available information regarding a login
   attempt (e.g., time of day,...Show more
   
   Tracks: Technical
   Topic: Zero Trust Access
   Region: EMEA
 * Breakout
   Vertical
   OT
   EMEA
   Live
   Manufacturing Customer Panel: Digital Security for Legacy and Modern
   Manufacturing
   Expand
   Click to favorite
   
   The future of digital security for manufacturing industrial controls and
   SCADA systems will be governed by readiness. As digital transformation
   increases the number and type of devices connecting to the network, such as
   smart sensors, valves, and...Show more
   
   Tracks: Vertical
   Topic: OT
   Region: EMEA
 * Breakout
   Technical
   Zero Trust Access
   EMEA
   Live
   Modernizing Your Performance Monitoring to Digital Experience Monitoring
   Expand
   Click to favorite
   
   In this session, we'll explore how network teams may not own the entirety of
   a user connection but will ultimately be responsible for the digital
   experience. Users may be operating from the office, on the move, or, as is
   increasingly the case, at...Show more
   
   Tracks: Technical
   Topic: Zero Trust Access
   Region: EMEA
 * Breakout
   Technical
   Security-Driven Networking
   EMEA
   Live
   Modernizing Your WAN Edge with Fortinet Secure SD-WAN
   Expand
   Click to favorite
   
   The most versatile solution in the market just received its most significant
   update to date. Fortinet Secure SD-WAN makes it easier than ever to modernize
   your WAN edge and converge your Work From Anywhere (WFA) users wherever they
   are located...Show more
   
   Tracks: Technical
   Topic: Security-Driven Networking
   Region: EMEA
 * Breakout
   Vertical
   Healthcare
   EMEA
   Live
   Protect Connected Medical Devices and Networks Against Ransomware and
   Evolving Threats
   Expand
   Click to favorite
   
   Healthcare and Life Sciences organizations are developing strategies and
   tactical plans to defend against Ransomware and evolving threats impacting
   the entire ecosystem. Fortinet Healthcare team will engage customers in a
   fireside chat to talk...Show more
   
   Tracks: Vertical
   Topic: Healthcare
   Region: EMEA
 * Breakout
   Technical
   Adaptive Cloud Security
   EMEA
   Live
   Protecting APIs and Using Machine Learning to Quickly Identify Real Threats
   Expand
   Click to favorite
   
   The digital transformation and the pandemic accelerated the use of
   applications in pretty much every aspect of our lives. This is driving the
   proliferation of APIs creating an entirely new attack surface organizations
   now need to protect. In this...Show more
   
   Tracks: Technical
   Topic: Adaptive Cloud Security
   Region: EMEA
 * Breakout
   Technical
   Zero Trust Access
   EMEA
   Live
   Protecting Your Enterprise Modern-day Hybrid Workplace with Zero Trust
   Expand
   Click to favorite
   
   With the onset of mass remote working, the hybrid workplace has weakened the
   approach to perimeter security. Applications are moving from the data center
   to cloud, and users are connecting from anywhere and everywhere. This
   transition to...Show more
   
   Tracks: Technical
   Topic: Zero Trust Access
   Region: EMEA
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   EMEA
   Live
   SD-WAN and 5G/LTE Are Here To Transform The WAN Edge. Do You Have The Right
   Solution?
   Expand
   Click to favorite
   
   Digital transformation and work-from-anywhere are creating many edges for
   organizations to support. These edges are causing major challenges for
   organizations to deliver superior quality of experience and effective
   security posture. At the same...Show more
   
   Tracks: Business
   Topic: Securing Digital Acceleration (Networks)
   Region: EMEA
 * Breakout
   Business
   Work from Anywhere
   EMEA
   Live
   Secure and Efficient Communications in a Hybrid World
   Expand
   Click to favorite
   
   Digital innovation is rapidly changing the way people communicate. The shift
   to remote working during the pandemic has further driven the demand for
   network infrastructure and connectivity rapidly. The need for communication
   tools to keep...Show more
   
   Tracks: Business
   Topic: Work from Anywhere
   Region: EMEA
 * Breakout
   Technical
   Adaptive Cloud Security
   EMEA
   Live
   Secure the Workday: Defending Cloud Email
   Expand
   Click to favorite
   
   Many organizations are using SaaS applications like Office 365 and Google
   Workspace, to empower employees and deliver business results. Meanwhile,
   email remains the primary threat vector in an evolving landscape
   characterized by increasing...Show more
   
   Tracks: Technical
   Topic: Adaptive Cloud Security
   Region: EMEA
 * Breakout
   Business
   Securing the Application Journey
   EMEA
   Live
   Securing CI/CD Pipeline
   Expand
   Click to favorite
   
   The way in which software applications are developed has changed
   significantly over the past 10 years. Traditionally, SW applications relied
   on monolithic SW architectures that contained all the core functions and
   features of an application in a...Show more
   
   Tracks: Business
   Topic: Securing the Application Journey
   Region: EMEA
 * Breakout
   Fortinet Fabric Story
   EMEA
   Live
   Securing Digital Acceleration Across All Application Journeys
   Expand
   Click to favorite
   
   Many organizations have expedited their application journey to the cloud in
   response to external factors such as the need to support digital acceleration
   efforts or the push to enable employees to work from anywhere (WFA). Often
   organizations have...Show more
   
   Tracks: Fortinet Fabric Story
   Region: EMEA
 * Breakout
   Vertical
   Education
   EMEA
   Live
   Securing Education with the Fortinet Security Fabric
   Expand
   Click to favorite
   
   The threat landscape is continuously evolving in the education sector.
   Investing in comprehensive cybersecurity strategies and advanced threat
   protection protects sensitive data and infrastructure while reducing
   operating expenses. During this...Show more
   
   Tracks: Vertical
   Topic: Education
   Region: EMEA
 * Breakout
   Fortinet Fabric Story
   OT Security
   EMEA
   Live
   Securing OT in the Face of Digital Transformation
   Expand
   Click to favorite
   
   The attack surface for OT environments is expanding because Digital
   Transformation often requires taking data out of industrial assets to deliver
   outcomes in the cloud and because the pandemic requires more remote
   connectivity to industrial...Show more
   
   Tracks: Fortinet Fabric Story
   Topic: OT Security
   Region: EMEA
 * Breakout
   Technical
   Security-Driven Networking
   EMEA
   Live
   Securing OT Networks from Evolving Cyber-threats
   Expand
   Click to favorite
   
   Digital innovation and transformation impact every business and organization.
   Some of these businesses and organizations may be part of critical
   infrastructure or national critical infrastructure and depend on technologies
   like industrial...Show more
   
   Tracks: Technical
   Topic: Security-Driven Networking
   Region: EMEA
 * Breakout
   Business
   Securing the Application Journey
   EMEA
   Live
   Securing SAP and Oracle ERP Deployments
   Expand
   Click to favorite
   
   ERP systems are the definition of mission-critical. If you were to ask a CISO
   where do they hide the crown jewels, where do they keep their most critical
   data – most likely the answer would be in their ERP system. ERP or Enterprise
   Resource...Show more
   
   Tracks: Business
   Topic: Securing the Application Journey
   Region: EMEA
 * Breakout
   Vertical
   Service Provider
   EMEA
   Live
   Securing the 5G Ecosystem
   Expand
   Click to favorite
   
   The successful deployment of 5G networks and services will require the
   implementation of security at all points in the 5G ecosystem. For Service
   Providers building a new 5G-enabled revenue stream, there must be careful
   thought and consideration...Show more
   
   Tracks: Vertical
   Topic: Service Provider
   Region: EMEA
 * Breakout
   Business
   Securing the Application Journey
   EMEA
   Live
   Securing the Full Web Application and API Attack Surface
   Expand
   Click to favorite
   
   Are you fully protecting the web application and API attack surface? The
   cyber skills shortage can lead to inadequately deployed security solutions.
   Like a sports car that never gets past first gear, too often the full
   capabilities of security...Show more
   
   Tracks: Business
   Topic: Securing the Application Journey
   Region: EMEA
 * Breakout
   Vertical
   Retail
   EMEA
   Live
   Securing the Future of Retail with Fortinet
   Expand
   Click to favorite
   
   In retail, it’s all about the experience, and consistent delivery is key.
   Businesses are always looking to gain competitive advantages by accelerating
   digital transformation, embracing new technologies, bolstering supply chains
   and gaining...Show more
   
   Tracks: Vertical
   Topic: Retail
   Region: EMEA
 * Breakout
   Technical
   Zero Trust Access
   EMEA
   Live
   Securing the New Normal - Securing the Extended Enterprise to Home
   Expand
   Click to favorite
   
   Working from home can be both positive and negative. For organizations and
   administrators, the flexibility needed can also extend the attack surface.
   Considerations around competing for limited bandwidth for business-critical
   apps through to...Show more
   
   Tracks: Technical
   Topic: Zero Trust Access
   Region: EMEA
 * Breakout
   Vertical
   Financial Services
   EMEA
   Live
   Security Driven Networking for the Financial Services Industry
   Expand
   Click to favorite
   
   Today’s financial services customers are squarely in the crosshairs, 300%
   more likely to be targeted by cyberattacks than any other industry – and the
   financial and regulatory implications of being breached are bigger than ever.
   Join the members...Show more
   
   Tracks: Vertical
   Topic: Financial Services
   Region: EMEA

Show more


OTHER SESSIONS

 * General Session
   General Session
   On-Demand
   Changing Employee Behavior Through the New Fortinet Security Awareness and
   Training Service
   Expand
   Click to favorite
   
   Fortinet is committed to helping organizations create cyber-aware workforces
   through its new Fortinet Security Awareness and Training Service. Security
   awareness training can dramatically improve employees’ ability to recognize
   and avoid...
   
   Show more
   
   Tracks: General Session

Featured Sessions


WORK FROM ANYWHERE

Uncover the framework for how the Fortinet Security Fabric enables a unique and
complete WFA solution that supports organizations and their employees with an
innovative, yet sensible approach to this complex issue.


OT SECURITY

Find out how Fortinet products differentiate in OT and how our OT ecosystem of
fabric-ready partners extend the capabilities.


SECURING DIGITAL ACCELERATION NETWORKS

Discover Fortinet’s unique approach to security-driven networking to enable
best-in-class convergence to provide a consistent security and digital
experience across all network edges.


SECURING DIGITAL ACCELERATION APPLICATIONS

Learn about the key considerations for developing a robust and secure digital
acceleration strategy for all your application journeys.


PREVENTING RANSOMWARE

Gain deep perspectives from your peers about ransomware, including the top
methods cyber criminals used to gain access to their organization.


EVERYWHERE YOU NEED IT

See why the Fortinet Security Fabric has become the reference model for
Gartner’s Cybersecurity Mesh Architecture (CSMA).

Questions? Contact Us




 * About
 * Event FAQ's
 * Privacy Policy

 * 
 * 
 * 
 * 
   © 2021. All rights reserved.