www.fortinetaccelerate.com
Open in
urlscan Pro
35.85.179.81
Public Scan
URL:
https://www.fortinetaccelerate.com/flow/fortinet/accelerate2022/limitless/page/home?tab.eventday=16397584247430017WtI&elqTrackId=e2...
Submission: On March 17 via api from CH — Scanned from DE
Submission: On March 17 via api from CH — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Cookie Policy This site uses cookies to provide you with a more responsive and personalized service. By using this site and clicking on the "Accept" button, you agree to our use of cookies. Please read our Privacy Policy for more information on the types of cookies we use and how to delete or block them. Learn more DeclineAccept * Home * Solutions * Agenda * FAQ Sign In The CONTENT CATALOG is now LIVE! Click HERE to see what you can learn at ACCELERATE 2022! ACCELERATE 2022 LIMITLESS Join us for Accelerate 2022 digital edition this May. This year's conference will deliver inspiring and innovative plenary sessions designed to broaden your perspective, engage your thoughts and help you improve your security senses. Register Now AMERICAS May 10 - 12 APAC May 11 - 13 EMEA May 11 - 13 EVENT HIGHLIGHTS Industry Leaders Tune in to hear from the industry’s most qualified experts who will share their unique wisdom and understanding of today’s most pressing security threats. Executive Keynotes KEN XIE FOUNDER, CHAIRMAN OF THE BOARD, AND CHIEF EXECUTIVE OFFICER (CEO) The Cybersecurity Imperative: Security-driven Networking Today’s enterprise network is in a state of constant flux. The perimeter has become increasingly fragmented with applications and data no longer contained within the corporate data center but instead reside across distributed networks, resulting in billions of edges and creating unprecedented complexity. Organizations need to invest in a modern architecture that enables greater productivity and a better user experience. Ken Xie, Founder and CEO will demonstrate how integrating security and the network enables Enterprise and Government organizations to adapt instantaneously to change, and a tightly integrated security platform that can be deployed anywhere to ensure consistent protection against increasingly sophisticated threats. PATRICE PERCHE CHIEF REVENUE OFFICER Winning Strategies In An Era of Disruption In under a decade, cybersecurity has emerged as one of the most important systemic issues for the global economy. The increase in Incidents and attacks is only the tip of a new and growing problem. According to the World Economic Forum, cyberattacks are one of the top 10 global risks of highest concern in the next decade. Hear from Patrice Perche on how Fortinet’s 20+ years of organic innovation is helping customers and partners navigate today’s challenging environment and position them for the next wave. JOHN MADDISON CHIEF MARKETING OFFICER AND EXECUTIVE VICE PRESIDENT, PRODUCTS Fortinet Technology Innovation, Products and Services Modern enterprises need a system that makes deploying new technologies and services secure and straightforward. This requires a broad, integrated, and automated cybersecurity mesh platform that provides centralized management and visibility, supports and interoperates across a vast ecosystem of solutions automatically adapting to dynamic changes in the network. Learn from John Maddison how Fortinet’s Security Fabric provides a platform and mesh architecture that is essential to reducing complexity and increasing overall security effectiveness across today’s expanding networks. KEITH JENSEN CHIEF FINANCIAL OFFICER (CFO) Investing for Growth As organizations continue to consolidate towards a platform and cybersecurity mesh architecture approach and as network security expands to the local and wide-area networks, to the work from anywhere environment and to the cloud, Fortinet is strongly positioned to significantly capture market share. Hear from Keith Jensen about Fortinet’s strategy to capture long-term growth. Additionally, supply chain security is a highly complex, evolving function, and is increasingly becoming a board conversation as security pros and business executives face increasing risk as information flows throughout the supply chain. Keith will share Fortinet’s the evolution of Fortinet’s supply chain strategy for our customer and partners. ROBERT MAY SENIOR VICE PRESIDENT, PRODUCT MANAGEMENT CyberEclipse 2022: Alignment of SD-WAN, SASE and ZTNA In 2022, the alignment of SDWAN, SASE an ZTNA will enable transparent and seamless mobility of customers and employees. Today’s enterprises demand instant access to applications and data regardless of the IT deployment or the location of users. Enterprises rely on the use of SaaS applications, public cloud and private cloud data centers to store their most sensitive data, and require employees to access it securely from anywhere. Fortinet is powering today’s remote workforce, ensuring strict compliance and access to sensitive data, at speeds demanded by today’s applications & users. FELIX GAEHTGENS VP ANALYST (GARTNER) Fortinet Presents: How to Implement a Cybersecurity Mesh Architecture, Featuring Gartner Digital Acceleration has led organizations into a perfect storm for attacks exploiting silos, complexities, and visibility gaps – making a broad, integrated, and automated cybersecurity mesh platform like the Fortinet Security Fabric a necessity. Join us to hear about what it takes to successfully achieve a cybersecurity mesh architecture – named a “Top 2022 Cybersecurity Trend” by Gartner. Reasons to Attend KEYNOTE Hear Fortinet executives share their expertise and insight on today’s security challenges and tomorrow’s solutions to keep networks secure. PARTNER TRACK Join our global channel leaders to learn about the exciting innovations coming to the Engage Partner Program in 2022. BUSINESS TRACK Focus your time exploring session that will help you learn about top security trends, challenges, and considerations to achieve successful digital acceleration. TECHNICAL TRACK Take your learning to the next level with carefully curated sessions that will show you how to solve technical requirements and achieve digital acceleration success. INDUSTRY TRACK Discover how Fortinet solutions solve security challenges with the most comprehensive solutions to help industries. AND MUCH MORE... Engage with other attendees in birds of a feather sessions, compete for prizes, and gain valuable real-word experience. AGENDA This is an example of a subheader text. This is an example of a subheader text. Button FILTERS Clear Search * widgets.catalog.result.title.heart.solidTracks General SessionGeneral Session PartnerPartner VerticalVertical BusinessBusiness TechnicalTechnical Fortinet Fabric StoryFortinet Fabric Story * widgets.catalog.result.title.heart.solidTopic Work from AnywhereWork from Anywhere Securing Digital Acceleration (Networks) Securing Digital Acceleration (Networks) Preventing Ransomware Preventing Ransomware Security FabricSecurity Fabric OT SecurityOT Security Zero Trust AccessZero Trust Access Security-Driven Networking Security-Driven Networking Adaptive Cloud Security Adaptive Cloud Security RetailRetail Financial Services Financial Services HealthcareHealthcare Service Provider Service Provider Security Operations Security Operations EducationEducation OTOT FederalFederal Ransomware ProtectionRansomware Protection Securing the Application JourneySecuring the Application Journey * widgets.catalog.result.title.heart.solidRegion AmericasAmericas APACAPAC EMEAEMEA * widgets.catalog.result.title.heart.solidDelivery Method On-DemandOn-Demand LiveLive 192 sessions AMERICAS * Breakout Vertical Federal Americas Live 2022: Key Cybersecurity Challenges for State and Local Government Expand Click to favorite Hybrid work patterns and online services are here to stay, Infrastructure investment funds will begin flowing to state and local government, ransomware is a threat that continues to grow in volume and impact, and jurisdictions will be conducting...Show more Tracks: Vertical Topic: Federal Region: Americas * Breakout Technical Security Operations Day 2 Americas Live Augment Your SOC with Fortinet Managed Security Operations Services Expand Click to favorite In this session we will describe how Fortinet’s Security Operations portfolio of Managed Services supports your end-to-end Monitoring and Response needs by complementing the SOC to help overcome challenges such as keeping tabs on a changing threat...Show more Tracks: Technical Topic: Security Operations Region: Americas * Breakout Business Preventing Ransomware Ransomware Protection Day 2 Americas Live Augment Your Team with Ransomware Experts Expand Click to favorite Coming SoonShow more Tracks: Business Topic: Preventing Ransomware , Ransomware Protection Region: Americas * Breakout Technical Security Operations Day 2 Americas Live Automate Security Operations to Transform Your SOC Expand Click to favorite Today's Enterprise SOC is burdened with a large volume of alerts, manual processes, and many disparate legacy SOC tools. A SOC needs to be equipped with modern technologies in order to successfully defend and protect against today's attacks. In...Show more Tracks: Technical Topic: Security Operations Region: Americas * Breakout Vertical Americas Live Automation is Key to Driving Secure Business Growth in the Technology Sector Expand Click to favorite From the initial days of networking, automation has played a crucial role in provisioning, monitoring and ongoing operational tasks. As networking and security continue to converge, the need for improved integration has surpassed both standalone...Show more Tracks: Vertical Region: Americas * Breakout Technical Adaptive Cloud Security Day 2 Americas Live Automation: The Key Element for a Safer, Simpler and More Effective Multi-Cloud Life-Cycle Management Expand Click to favorite Cloud environments have become very complex organisms, where provisioning is expected to last just for a few seconds, therefore saving human power which gets translated into money-saving and increased effectiveness. Most organizations struggle...Show more Tracks: Technical Topic: Adaptive Cloud Security Region: Americas * Breakout Technical Zero Trust Access Day 2 Americas Live Brokering Authentication in a Multiple Identity Provider Environment Expand Click to favorite There are many common use cases requiring different end-users to be authenticated against different Identity Providers (IdPs) For example, a school system that uses separate Microsoft Azure tenants for each school where each tenant is a different...Show more Tracks: Technical Topic: Zero Trust Access Region: Americas * Breakout Partner Day 2 Americas Live Building a Successful Security Practice with Fortinet Engage Expand Click to favorite Hear from our global channel leadership team about the exciting things coming for the Engage Partner Program, what the Fortinet Fabric means for your business, and how we continue to support our channel to drive profitability and expertise.Show more Tracks: Partner Region: Americas * Breakout Business Securing Digital Acceleration (Networks) Day 2 Americas Live Building the Right Strategy to Secure the Next-Generation of Web Expand Click to favorite Web traffic comprises an increasing volume of the total traffic for many organizations. As a result, the Web continues to be one of the top attack vectors for delivering today’s rapidly evolving threats. In addition, web-based attacks have become...Show more Tracks: Business Topic: Securing Digital Acceleration (Networks) Region: Americas * Breakout Partner Americas Live Cloud Enterprise Business Transformation with GSIs Expand Click to favorite Organizations are increasingly deploying a variety of workloads across multiple clouds. In turn, business-critical data and services are increasingly scattered across this distributed infrastructure. Using the shared responsibility model as a...Show more Tracks: Partner Region: Americas * Breakout Technical Adaptive Cloud Security Day 2 Americas Live Cloud Security Best Practices, Reducing Alert Fatigue and Making the Best Out of Cloud Native Security Services Expand Click to favorite As cloud workloads are deployed at a rapid pace, keeping up with security is increasingly challenging. In order to get the best security coverage across the growing number of workloads, Security professionals choose to utilize cloud-native...Show more Tracks: Technical Topic: Adaptive Cloud Security Region: Americas * Breakout Technical Security-Driven Networking Day 2 Americas Live Cloud Security Web Gateway Expand Click to favorite In this session, we will discuss the future of converged security and networking. From Secure Web Gateway, client browser Isolation, ZTNA, and cloud-delivered NGFW, the Fortinet platform provides a complete solution for any organization. Join us...Show more Tracks: Technical Topic: Security-Driven Networking Region: Americas * Breakout Business Ransomware Protection Day 2 Americas Live Continuously and Proactively Monitor for Ransomware 24x7x365 Expand Click to favorite Even with all of the best security solutions deployed for the prevention and detection of threats, someone needs to watch over security as a whole, investigate alerts and respond to confirmed incidents. Unfortunately, according to Gartner, 78% of...Show more Tracks: Business Topic: Ransomware Protection Region: Americas * Breakout Technical Security-Driven Networking Day 2 Americas Live Delivering Enterprise-Grade Security at Any Edge at Any Scale Expand Click to favorite Be the first to find out more about the latest Next Gen NGFW in the FortiGate mid-range and High-end platforms and enhance your Enterprise-Grade security by deploying some of the latest Security services from FortiOS 7.2. We will introduce you to...Show more Tracks: Technical Topic: Security-Driven Networking Region: Americas * Breakout Technical Security Operations Day 2 Americas Live Delivering New Intelligence and Insights to Proactively Hunt for Threats Before They Emerge Using Deception Expand Click to favorite Sophisticated cyberattacks often happen during downtimes and when least expected. Today's enterprises must be vigilant to proactively detect and hunt for suspicious activities and perform reconnaissance across their digital attack surface to avoid...Show more Tracks: Technical Topic: Security Operations Region: Americas * Breakout Technical Security Operations Day 2 Americas Live Demystifying Network Detection Response with FortiNDR Expand Click to favorite Is Network Detection Response (NDR) the next hype cycle in Cyber Security? What are the key challenges in SecOps and where does NDR fit into the big picture? Is ML/AI-based detection aiding detection or does it have its flaws? In this session,...Show more Tracks: Technical Topic: Security Operations Region: Americas * Breakout Business Ransomware Protection Day 2 Americas Live Detect Ransomware Along the Cyber Kill Chain - Part II Expand Click to favorite As much as organizations try to prevent cybercriminals from gaining a foothold within their organization, that is unsustainable over an extended period of time, given the sophistication of many of today's multi-stage ransomware campaigns...Show more Tracks: Business Topic: Ransomware Protection Region: Americas * Breakout Business Ransomware Protection Day 2 Americas Live Detect Ransomware Along the Cyber Kill Chain - Part I Expand Click to favorite This session will discuss how ransomware operators are designing campaigns and weaponizing payloads to evade traditional security controls and successfully insert components within unsuspecting organizations. It will further outline advanced...Show more Tracks: Business Topic: Ransomware Protection Region: Americas * Breakout Business Securing Digital Acceleration (Networks) Day 2 Americas Live Don’t Let a Simple Configuration Error Open the Door for Hackers Expand Click to favorite The rapidly changing security threat landscape requires organizations of all sizes to become more agile, proactive, and in control of their security fabric. Accelerate the convergence of network and security with centralized management and...Show more Tracks: Business Topic: Securing Digital Acceleration (Networks) Region: Americas * Breakout Business Securing Digital Acceleration (Networks) Day 2 Americas Live Don't Let Hackers Derail Business Growth: Fortify Your Network Expand Click to favorite Enterprise networks are under enormous pressure to allow users to connect to any application from any location using any device creating and exposing many edges in the hybrid IT architecture. Legacy firewalls were never designed to provide...Show more Tracks: Business Topic: Securing Digital Acceleration (Networks) Region: Americas * Breakout Technical Security Operations Day 2 Americas Live Expanding Core Attack Surface Protections to Defend Against Ransomware Attacks Expand Click to favorite Sophisticated outbreaks demand quick action from many points across the attack surface, from initial vulnerability detection and exploit prevention, to post-exploit defusion and incident response. In this session, we'll introduce new capabilities...Show more Tracks: Technical Topic: Security Operations Region: Americas * Breakout Vertical Federal Americas Live Federal Cybersecurity as a Team Sport Expand Click to favorite Cybersecurity is a top-of-mind issue for Federal managers, employees, and citizens alike. While there are dedicated security professionals within agencies, every user bears some responsibility for ensuring security. No agency arguably has enough...Show more Tracks: Vertical Topic: Federal Region: Americas * Breakout Business Work from Anywhere Day 2 Americas Live FortiEDR, the First and Last Line of Defense Expand Click to favorite Before the pandemic, 70% of endpoints were outside the traditional network once a week and 54% more than twice a week. Today, the percentage of those endpoints at home or away in other places five days a week is considerably higher. According to a...Show more Tracks: Business Topic: Work from Anywhere Region: Americas * Breakout Business Securing Digital Acceleration (Networks) Day 2 Americas Live Gain User-to-Application Visibility Over Modern Networks with Digital Experience Monitoring Expand Click to favorite Organizations no longer own all the infrastructure their employee traffic transverses but are still responsible for the end-to-end employee experience. Network teams are shifting focus from traditional network performance monitoring to...Show more Tracks: Business Topic: Securing Digital Acceleration (Networks) Region: Americas * Breakout Partner Day 2 Americas Live GSI Growth Opportunities in 5G-Enabled Industrial Environments Expand Click to favorite Enterprises, and specifically OT-rich enterprises in many verticals, are early adopters of 5G as a technology to enable and accelerate Industry 4.0, automation, agility, safety, and overall innovation in their products, services, and operations...Show more Tracks: Partner Region: Americas * Breakout Partner Americas Live GSIs: Monetizing Fortinet End-to-End Zero Trust Architecture Expand Click to favorite Organizations need to simultaneously support accelerated digital business initiatives and the growth of remote working, while protecting their users, data, and applications against an aggressive threat landscape. This represents both a challenge...Show more Tracks: Partner Region: Americas * Breakout Business Securing Digital Acceleration (Networks) Day 2 Americas Live Improve LAN Edge Performance and Security with Intelligence Throughout the Fabric Expand Click to favorite IT groups are looking for ways to unburden staff from day-to-day tactical efforts for a more strategic focus. While Artificial Intelligence with Machine Learning gets most of the hype, there are varying levels and areas for intelligence...Show more Tracks: Business Topic: Securing Digital Acceleration (Networks) Region: Americas * Breakout Vertical OT Americas Live Industrial Security for Power Utilities with the Fortinet Security Fabric: Power Utility Customer Panel Expand Click to favorite Power utilities are essential for public health, ecosystem protection, and economic strength. As utilities transform, digital security is necessary to protect the legacy and modern equipment which serve citizens and communities. As operational...Show more Tracks: Vertical Topic: OT Region: Americas * Breakout Partner Day 2 Americas Live Industry Solutions To Drive Growth with Fortinet Expand Click to favorite Fortinet offers the most comprehensive solutions to help industries accelerate security, maximize productivity, preserve user experience, and lower total cost of ownership. Join us to learn about the industry solutions, tools, and resources...Show more Tracks: Partner Region: Americas * Breakout Technical Security-Driven Networking Day 2 Americas Live LAN Edge – Secure and Automated Expand Click to favorite Automate your Enterprise Wired and Wireless LAN. Check out Fortinet's seamlessly integrated and scalable LAN Edge solutions with cutting-edge FortiAP and FortiSwitch hardware, zero-touch provisioning, integration with Security Fabric and AI-Driven...Show more Tracks: Technical Topic: Security-Driven Networking Region: Americas * Breakout Technical Security Operations Day 2 Americas Live Machine Learning Fueled Automated Endpoint Protection Across the Security Ecosystem Expand Click to favorite Learn how FortiEDR can dynamically classify incidents utilizing machine learning and apply customized eXtended incident response recipes across the entire security ecosystem.Show more Tracks: Technical Topic: Security Operations Region: Americas * Breakout Technical Zero Trust Access Day 2 Americas Live Managing Risk with Adaptive Authentication in FortiToken Cloud Expand Click to favorite Multi-factor authentication provides more security than password-only logins, but it comes at the cost of inconvenience for end-users. The adaptive authentication feature uses the available information regarding a login attempt (e.g., time of day,...Show more Tracks: Technical Topic: Zero Trust Access Region: Americas * Breakout Vertical OT Americas Live Manufacturing Customer Panel: Digital Security for Legacy and Modern Manufacturing Expand Click to favorite The future of digital security for manufacturing industrial controls and SCADA systems will be governed by readiness. As digital transformation increases the number and type of devices connecting to the network, such as smart sensors, valves, and...Show more Tracks: Vertical Topic: OT Region: Americas * Breakout Technical Zero Trust Access Day 2 Americas Live Modernizing Your Performance Monitoring to Digital Experience Monitoring Expand Click to favorite In this session, we'll explore how network teams may not own the entirety of a user connection but will ultimately be responsible for the digital experience. Users may be operating from the office, on the move, or, as is increasingly the case, at...Show more Tracks: Technical Topic: Zero Trust Access Region: Americas * Breakout Technical Security-Driven Networking Day 2 Americas Live Modernizing Your WAN Edge with Fortinet Secure SD-WAN Expand Click to favorite The most versatile solution in the market just received its most significant update to date. Fortinet Secure SD-WAN makes it easier than ever to modernize your WAN edge and converge your Work From Anywhere (WFA) users wherever they are located...Show more Tracks: Technical Topic: Security-Driven Networking Region: Americas * Breakout Vertical Healthcare Americas Live Protect Connected Medical Devices and Networks Against Ransomware and Evolving Threats Expand Click to favorite Healthcare and Life Sciences organizations are developing strategies and tactical plans to defend against Ransomware and evolving threats impacting the entire ecosystem. Fortinet Healthcare team will engage customers in a fireside chat to talk...Show more Tracks: Vertical Topic: Healthcare Region: Americas * Breakout Technical Adaptive Cloud Security Day 2 Americas Live Protecting APIs and Using Machine Learning to Quickly Identify Real Threats Expand Click to favorite The digital transformation and the pandemic accelerated the use of applications in pretty much every aspect of our lives. This is driving the proliferation of APIs creating an entirely new attack surface organizations now need to protect. In this...Show more Tracks: Technical Topic: Adaptive Cloud Security Region: Americas * Breakout Technical Zero Trust Access Day 2 Americas Live Protecting Your Enterprise Modern-day Hybrid Workplace with Zero Trust Expand Click to favorite With the onset of mass remote working, the hybrid workplace has weakened the approach to perimeter security. Applications are moving from the data center to cloud, and users are connecting from anywhere and everywhere. This transition to...Show more Tracks: Technical Topic: Zero Trust Access Region: Americas * Breakout Business Securing Digital Acceleration (Networks) Day 2 Americas Live SD-WAN and 5G/LTE Are Here To Transform The WAN Edge. Do You Have The Right Solution? Expand Click to favorite Digital transformation and work-from-anywhere are creating many edges for organizations to support. These edges are causing major challenges for organizations to deliver superior quality of experience and effective security posture. At the same...Show more Tracks: Business Topic: Securing Digital Acceleration (Networks) Region: Americas * Breakout Business Work from Anywhere Day 2 Americas Live Secure and Efficient Communications in a Hybrid World Expand Click to favorite Digital innovation is rapidly changing the way people communicate. The shift to remote working during the pandemic has further driven the demand for network infrastructure and connectivity rapidly. The need for communication tools to keep...Show more Tracks: Business Topic: Work from Anywhere Region: Americas * Breakout Technical Adaptive Cloud Security Day 2 Americas Live Secure the Workday: Defending Cloud Email Expand Click to favorite Many organizations are using SaaS applications like Office 365 and Google Workspace, to empower employees and deliver business results. Meanwhile, email remains the primary threat vector in an evolving landscape characterized by increasing...Show more Tracks: Technical Topic: Adaptive Cloud Security Region: Americas * Breakout Business Securing the Application Journey Day 2 Americas Live Securing CI/CD Pipeline Expand Click to favorite The way in which software applications are developed has changed significantly over the past 10 years. Traditionally, SW applications relied on monolithic SW architectures that contained all the core functions and features of an application in a...Show more Tracks: Business Topic: Securing the Application Journey Region: Americas * Breakout Fortinet Fabric Story Americas Live Securing Digital Acceleration Across All Application Journeys Expand Click to favorite Many organizations have expedited their application journey to the cloud in response to external factors such as the need to support digital acceleration efforts or the push to enable employees to work from anywhere (WFA). Often organizations have...Show more Tracks: Fortinet Fabric Story Region: Americas * Breakout Vertical Education Americas Live Securing Education with the Fortinet Security Fabric Expand Click to favorite The threat landscape is continuously evolving in the education sector. Investing in comprehensive cybersecurity strategies and advanced threat protection protects sensitive data and infrastructure while reducing operating expenses. During this...Show more Tracks: Vertical Topic: Education Region: Americas * Breakout Fortinet Fabric Story OT Security Americas Live Securing OT in the Face of Digital Transformation Expand Click to favorite The attack surface for OT environments is expanding because Digital Transformation often requires taking data out of industrial assets to deliver outcomes in the cloud and because the pandemic requires more remote connectivity to industrial...Show more Tracks: Fortinet Fabric Story Topic: OT Security Region: Americas * Breakout Technical Security-Driven Networking Day 2 Americas Live Securing OT Networks from Evolving Cyber-threats Expand Click to favorite Digital innovation and transformation impact every business and organization. Some of these businesses and organizations may be part of critical infrastructure or national critical infrastructure and depend on technologies like industrial...Show more Tracks: Technical Topic: Security-Driven Networking Region: Americas * Breakout Business Securing the Application Journey Day 2 Americas Live Securing SAP and Oracle ERP Deployments Expand Click to favorite ERP systems are the definition of mission-critical. If you were to ask a CISO where do they hide the crown jewels, where do they keep their most critical data – most likely the answer would be in their ERP system. ERP or Enterprise Resource...Show more Tracks: Business Topic: Securing the Application Journey Region: Americas * Breakout Vertical Service Provider Americas Live Securing the 5G Ecosystem Expand Click to favorite The successful deployment of 5G networks and services will require the implementation of security at all points in the 5G ecosystem. For Service Providers building a new 5G-enabled revenue stream, there must be careful thought and consideration...Show more Tracks: Vertical Topic: Service Provider Region: Americas * Breakout Business Securing the Application Journey Day 2 Americas Live Securing the Full Web Application and API Attack Surface Expand Click to favorite Are you fully protecting the web application and API attack surface? The cyber skills shortage can lead to inadequately deployed security solutions. Like a sports car that never gets past first gear, too often the full capabilities of security...Show more Tracks: Business Topic: Securing the Application Journey Region: Americas * Breakout Vertical Retail Americas Live Securing the Future of Retail with Fortinet Expand Click to favorite In retail, it’s all about the experience, and consistent delivery is key. Businesses are always looking to gain competitive advantages by accelerating digital transformation, embracing new technologies, bolstering supply chains and gaining...Show more Tracks: Vertical Topic: Retail Region: Americas Show more APAC * Breakout Vertical Federal APAC Live 2022: Key Cybersecurity Challenges for State and Local Government Expand Click to favorite Hybrid work patterns and online services are here to stay, Infrastructure investment funds will begin flowing to state and local government, ransomware is a threat that continues to grow in volume and impact, and jurisdictions will be conducting...Show more Tracks: Vertical Topic: Federal Region: APAC * Breakout Technical Security Operations APAC Live Augment Your SOC with Fortinet Managed Security Operations Services Expand Click to favorite In this session we will describe how Fortinet’s Security Operations portfolio of Managed Services supports your end-to-end Monitoring and Response needs by complementing the SOC to help overcome challenges such as keeping tabs on a changing threat...Show more Tracks: Technical Topic: Security Operations Region: APAC * Breakout Business Ransomware Protection APAC Live Augment Your Team with Ransomware Experts Expand Click to favorite Coming SoonShow more Tracks: Business Topic: Ransomware Protection Region: APAC * Breakout Technical Security Operations APAC Live Automate Security Operations to Transform Your SOC Expand Click to favorite Today's Enterprise SOC is burdened with a large volume of alerts, manual processes, and many disparate legacy SOC tools. A SOC needs to be equipped with modern technologies in order to successfully defend and protect against today's attacks. In...Show more Tracks: Technical Topic: Security Operations Region: APAC * Breakout Vertical APAC Live Automation is Key to Driving Secure Business Growth in the Technology Sector Expand Click to favorite From the initial days of networking, automation has played a crucial role in provisioning, monitoring and ongoing operational tasks. As networking and security continue to converge, the need for improved integration has surpassed both standalone...Show more Tracks: Vertical Region: APAC * Breakout Technical Adaptive Cloud Security APAC Live Automation: The Key Element for a Safer, Simpler and More Effective Multi-Cloud Life-Cycle Management Expand Click to favorite Cloud environments have become very complex organisms, where provisioning is expected to last just for a few seconds, therefore saving human power which gets translated into money-saving and increased effectiveness. Most organizations struggle...Show more Tracks: Technical Topic: Adaptive Cloud Security Region: APAC * Breakout Technical Zero Trust Access APAC Live Brokering Authentication in a Multiple Identity Provider Environment Expand Click to favorite There are many common use cases requiring different end-users to be authenticated against different Identity Providers (IdPs) For example, a school system that uses separate Microsoft Azure tenants for each school where each tenant is a different...Show more Tracks: Technical Topic: Zero Trust Access Region: APAC * Breakout Partner APAC Live Building a Successful Security Practice with Fortinet Engage Expand Click to favorite Hear from our global channel leadership team about the exciting things coming for the Engage Partner Program, what the Fortinet Fabric means for your business, and how we continue to support our channel to drive profitability and expertise.Show more Tracks: Partner Region: APAC * Breakout Business Securing Digital Acceleration (Networks) APAC Live Building the Right Strategy to Secure the Next-Generation of Web Expand Click to favorite Web traffic comprises an increasing volume of the total traffic for many organizations. As a result, the Web continues to be one of the top attack vectors for delivering today’s rapidly evolving threats. In addition, web-based attacks have become...Show more Tracks: Business Topic: Securing Digital Acceleration (Networks) Region: APAC * Breakout Partner APAC Live Cloud Enterprise Business Transformation with GSIs Expand Click to favorite Organizations are increasingly deploying a variety of workloads across multiple clouds. In turn, business-critical data and services are increasingly scattered across this distributed infrastructure. Using the shared responsibility model as a...Show more Tracks: Partner Region: APAC * Breakout Technical Adaptive Cloud Security APAC Live Cloud Security Best Practices, Reducing Alert Fatigue and Making the Best Out of Cloud Native Security Services Expand Click to favorite As cloud workloads are deployed at a rapid pace, keeping up with security is increasingly challenging. In order to get the best security coverage across the growing number of workloads, Security professionals choose to utilize cloud-native...Show more Tracks: Technical Topic: Adaptive Cloud Security Region: APAC * Breakout Technical Security-Driven Networking APAC Live Cloud Security Web Gateway Expand Click to favorite In this session, we will discuss the future of converged security and networking. From Secure Web Gateway, client browser Isolation, ZTNA, and cloud-delivered NGFW, the Fortinet platform provides a complete solution for any organization. Join us...Show more Tracks: Technical Topic: Security-Driven Networking Region: APAC * Breakout Business Ransomware Protection APAC Live Continuously and Proactively Monitor for Ransomware 24x7x365 Expand Click to favorite Even with all of the best security solutions deployed for the prevention and detection of threats, someone needs to watch over security as a whole, investigate alerts and respond to confirmed incidents. Unfortunately, according to Gartner, 78% of...Show more Tracks: Business Topic: Ransomware Protection Region: APAC * Breakout Technical Security-Driven Networking APAC Live Delivering Enterprise-Grade Security at Any Edge at Any Scale Expand Click to favorite Be the first to find out more about the latest Next Gen NGFW in the FortiGate mid-range and High-end platforms and enhance your Enterprise-Grade security by deploying some of the latest Security services from FortiOS 7.2. We will introduce you to...Show more Tracks: Technical Topic: Security-Driven Networking Region: APAC * Breakout Technical Security Operations APAC Live Delivering New Intelligence and Insights to Proactively Hunt for Threats Before They Emerge Using Deception Expand Click to favorite Sophisticated cyberattacks often happen during downtimes and when least expected. Today's enterprises must be vigilant to proactively detect and hunt for suspicious activities and perform reconnaissance across their digital attack surface to avoid...Show more Tracks: Technical Topic: Security Operations Region: APAC * Breakout Technical Security Operations APAC Live Demystifying Network Detection Response with FortiNDR Expand Click to favorite Is Network Detection Response (NDR) the next hype cycle in Cyber Security? What are the key challenges in SecOps and where does NDR fit into the big picture? Is ML/AI-based detection aiding detection or does it have its flaws? In this session,...Show more Tracks: Technical Topic: Security Operations Region: APAC * Breakout Business Ransomware Protection APAC Live Detect Ransomware Along the Cyber Kill Chain - Part II Expand Click to favorite As much as organizations try to prevent cybercriminals from gaining a foothold within their organization, that is unsustainable over an extended period of time, given the sophistication of many of today's multi-stage ransomware campaigns...Show more Tracks: Business Topic: Ransomware Protection Region: APAC * Breakout Business Preventing Ransomware APAC Live Detect Ransomware Along the Cyber Kill Chain - Part I Expand Click to favorite This session will discuss how ransomware operators are designing campaigns and weaponizing payloads to evade traditional security controls and successfully insert components within unsuspecting organizations. It will further outline advanced...Show more Tracks: Business Topic: Preventing Ransomware Region: APAC * Breakout Business Securing Digital Acceleration (Networks) APAC Live Don’t Let a Simple Configuration Error Open the Door for Hackers Expand Click to favorite The rapidly changing security threat landscape requires organizations of all sizes to become more agile, proactive, and in control of their security fabric. Accelerate the convergence of network and security with centralized management and...Show more Tracks: Business Topic: Securing Digital Acceleration (Networks) Region: APAC * Breakout Business Securing Digital Acceleration (Networks) APAC Live Don't Let Hackers Derail Business Growth: Fortify Your Network Expand Click to favorite Enterprise networks are under enormous pressure to allow users to connect to any application from any location using any device creating and exposing many edges in the hybrid IT architecture. Legacy firewalls were never designed to provide...Show more Tracks: Business Topic: Securing Digital Acceleration (Networks) Region: APAC * Breakout Technical Security Operations APAC Live Expanding Core Attack Surface Protections to Defend Against Ransomware Attacks Expand Click to favorite Sophisticated outbreaks demand quick action from many points across the attack surface, from initial vulnerability detection and exploit prevention, to post-exploit defusion and incident response. In this session, we'll introduce new capabilities...Show more Tracks: Technical Topic: Security Operations Region: APAC * Breakout Business Work from Anywhere APAC Live FortiEDR, the First and Last Line of Defense Expand Click to favorite Before the pandemic, 70% of endpoints were outside the traditional network once a week and 54% more than twice a week. Today, the percentage of those endpoints at home or away in other places five days a week is considerably higher. According to a...Show more Tracks: Business Topic: Work from Anywhere Region: APAC * Breakout Business Securing Digital Acceleration (Networks) APAC Live Gain User-to-Application Visibility Over Modern Networks with Digital Experience Monitoring Expand Click to favorite Organizations no longer own all the infrastructure their employee traffic transverses but are still responsible for the end-to-end employee experience. Network teams are shifting focus from traditional network performance monitoring to...Show more Tracks: Business Topic: Securing Digital Acceleration (Networks) Region: APAC * Breakout Partner APAC Live GSI Growth Opportunities in 5G-Enabled Industrial Environments Expand Click to favorite Enterprises, and specifically OT-rich enterprises in many verticals, are early adopters of 5G as a technology to enable and accelerate Industry 4.0, automation, agility, safety, and overall innovation in their products, services, and operations...Show more Tracks: Partner Region: APAC * Breakout Partner APAC Live GSIs: Monetizing Fortinet End-to-End Zero Trust Architecture Expand Click to favorite Organizations need to simultaneously support accelerated digital business initiatives and the growth of remote working, while protecting their users, data, and applications against an aggressive threat landscape. This represents both a challenge...Show more Tracks: Partner Region: APAC * Breakout Business Securing Digital Acceleration (Networks) APAC Live Improve LAN Edge Performance and Security with Intelligence Throughout the Fabric Expand Click to favorite IT groups are looking for ways to unburden staff from day-to-day tactical efforts for a more strategic focus. While Artificial Intelligence with Machine Learning gets most of the hype, there are varying levels and areas for intelligence...Show more Tracks: Business Topic: Securing Digital Acceleration (Networks) Region: APAC * Breakout Vertical OT APAC Live Industrial Security for Power Utilities with the Fortinet Security Fabric: Power Utility Customer Panel Expand Click to favorite Power utilities are essential for public health, ecosystem protection, and economic strength. As utilities transform, digital security is necessary to protect the legacy and modern equipment which serve citizens and communities. As operational...Show more Tracks: Vertical Topic: OT Region: APAC * Breakout Technical Security-Driven Networking APAC Live LAN Edge – Secure and Automated Expand Click to favorite Automate your Enterprise Wired and Wireless LAN. Check out Fortinet's seamlessly integrated and scalable LAN Edge solutions with cutting-edge FortiAP and FortiSwitch hardware, zero-touch provisioning, integration with Security Fabric and AI-Driven...Show more Tracks: Technical Topic: Security-Driven Networking Region: APAC * Breakout Technical Security Operations APAC Live Machine Learning Fueled Automated Endpoint Protection Across the Security Ecosystem Expand Click to favorite Learn how FortiEDR can dynamically classify incidents utilizing machine learning and apply customized eXtended incident response recipes across the entire security ecosystem.Show more Tracks: Technical Topic: Security Operations Region: APAC * Breakout Technical Zero Trust Access APAC Live Managing Risk with Adaptive Authentication in FortiToken Cloud Expand Click to favorite Multi-factor authentication provides more security than password-only logins, but it comes at the cost of inconvenience for end-users. The adaptive authentication feature uses the available information regarding a login attempt (e.g., time of day,...Show more Tracks: Technical Topic: Zero Trust Access Region: APAC * Breakout Vertical OT APAC Live Manufacturing Customer Panel: Digital Security for Legacy and Modern Manufacturing Expand Click to favorite The future of digital security for manufacturing industrial controls and SCADA systems will be governed by readiness. As digital transformation increases the number and type of devices connecting to the network, such as smart sensors, valves, and...Show more Tracks: Vertical Topic: OT Region: APAC * Breakout Technical Zero Trust Access APAC Live Modernizing Your Performance Monitoring to Digital Experience Monitoring Expand Click to favorite In this session, we'll explore how network teams may not own the entirety of a user connection but will ultimately be responsible for the digital experience. Users may be operating from the office, on the move, or, as is increasingly the case, at...Show more Tracks: Technical Topic: Zero Trust Access Region: APAC * Breakout Technical Security-Driven Networking APAC Live Modernizing Your WAN Edge with Fortinet Secure SD-WAN Expand Click to favorite The most versatile solution in the market just received its most significant update to date. Fortinet Secure SD-WAN makes it easier than ever to modernize your WAN edge and converge your Work From Anywhere (WFA) users wherever they are located...Show more Tracks: Technical Topic: Security-Driven Networking Region: APAC * Breakout Vertical Healthcare APAC Live Protect Connected Medical Devices and Networks Against Ransomware and Evolving Threats Expand Click to favorite Healthcare and Life Sciences organizations are developing strategies and tactical plans to defend against Ransomware and evolving threats impacting the entire ecosystem. Fortinet Healthcare team will engage customers in a fireside chat to talk...Show more Tracks: Vertical Topic: Healthcare Region: APAC * Breakout Technical Adaptive Cloud Security APAC Live Protecting APIs and Using Machine Learning to Quickly Identify Real Threats Expand Click to favorite The digital transformation and the pandemic accelerated the use of applications in pretty much every aspect of our lives. This is driving the proliferation of APIs creating an entirely new attack surface organizations now need to protect. In this...Show more Tracks: Technical Topic: Adaptive Cloud Security Region: APAC * Breakout Technical Zero Trust Access APAC Live Protecting Your Enterprise Modern-day Hybrid Workplace with Zero Trust Expand Click to favorite With the onset of mass remote working, the hybrid workplace has weakened the approach to perimeter security. Applications are moving from the data center to cloud, and users are connecting from anywhere and everywhere. This transition to...Show more Tracks: Technical Topic: Zero Trust Access Region: APAC * Breakout Business Securing Digital Acceleration (Networks) APAC Live SD-WAN and 5G/LTE Are Here To Transform The WAN Edge. Do You Have The Right Solution? Expand Click to favorite Digital transformation and work-from-anywhere are creating many edges for organizations to support. These edges are causing major challenges for organizations to deliver superior quality of experience and effective security posture. At the same...Show more Tracks: Business Topic: Securing Digital Acceleration (Networks) Region: APAC * Breakout Business Work from Anywhere APAC Live Secure and Efficient Communications in a Hybrid World Expand Click to favorite Digital innovation is rapidly changing the way people communicate. The shift to remote working during the pandemic has further driven the demand for network infrastructure and connectivity rapidly. The need for communication tools to keep...Show more Tracks: Business Topic: Work from Anywhere Region: APAC * Breakout Business Securing the Application Journey APAC Live Securing CI/CD Pipeline Expand Click to favorite The way in which software applications are developed has changed significantly over the past 10 years. Traditionally, SW applications relied on monolithic SW architectures that contained all the core functions and features of an application in a...Show more Tracks: Business Topic: Securing the Application Journey Region: APAC * Breakout Fortinet Fabric Story APAC Live Securing Digital Acceleration Across All Application Journeys Expand Click to favorite Many organizations have expedited their application journey to the cloud in response to external factors such as the need to support digital acceleration efforts or the push to enable employees to work from anywhere (WFA). Often organizations have...Show more Tracks: Fortinet Fabric Story Region: APAC * Breakout Vertical Education APAC Live Securing Education with the Fortinet Security Fabric Expand Click to favorite The threat landscape is continuously evolving in the education sector. Investing in comprehensive cybersecurity strategies and advanced threat protection protects sensitive data and infrastructure while reducing operating expenses. During this...Show more Tracks: Vertical Topic: Education Region: APAC * Breakout Fortinet Fabric Story OT Security APAC Live Securing OT in the Face of Digital Transformation Expand Click to favorite The attack surface for OT environments is expanding because Digital Transformation often requires taking data out of industrial assets to deliver outcomes in the cloud and because the pandemic requires more remote connectivity to industrial...Show more Tracks: Fortinet Fabric Story Topic: OT Security Region: APAC * Breakout Technical Security-Driven Networking APAC Live Securing OT Networks from Evolving Cyber-threats Expand Click to favorite Digital innovation and transformation impact every business and organization. Some of these businesses and organizations may be part of critical infrastructure or national critical infrastructure and depend on technologies like industrial...Show more Tracks: Technical Topic: Security-Driven Networking Region: APAC * Breakout Business Securing the Application Journey APAC Live Securing SAP and Oracle ERP Deployments Expand Click to favorite ERP systems are the definition of mission-critical. If you were to ask a CISO where do they hide the crown jewels, where do they keep their most critical data – most likely the answer would be in their ERP system. ERP or Enterprise Resource...Show more Tracks: Business Topic: Securing the Application Journey Region: APAC * Breakout Vertical Service Provider APAC Live Securing the 5G Ecosystem Expand Click to favorite The successful deployment of 5G networks and services will require the implementation of security at all points in the 5G ecosystem. For Service Providers building a new 5G-enabled revenue stream, there must be careful thought and consideration...Show more Tracks: Vertical Topic: Service Provider Region: APAC * Breakout Business Securing the Application Journey APAC Live Securing the Full Web Application and API Attack Surface Expand Click to favorite Are you fully protecting the web application and API attack surface? The cyber skills shortage can lead to inadequately deployed security solutions. Like a sports car that never gets past first gear, too often the full capabilities of security...Show more Tracks: Business Topic: Securing the Application Journey Region: APAC * Breakout Vertical Retail APAC Live Securing the Future of Retail with Fortinet Expand Click to favorite In retail, it’s all about the experience, and consistent delivery is key. Businesses are always looking to gain competitive advantages by accelerating digital transformation, embracing new technologies, bolstering supply chains and gaining...Show more Tracks: Vertical Topic: Retail Region: APAC * Breakout Technical Zero Trust Access APAC Live Securing the New Normal - Securing the Extended Enterprise to Home Expand Click to favorite Working from home can be both positive and negative. For organizations and administrators, the flexibility needed can also extend the attack surface. Considerations around competing for limited bandwidth for business-critical apps through to...Show more Tracks: Technical Topic: Zero Trust Access Region: APAC * Breakout Vertical Financial Services APAC Live Security Driven Networking for the Financial Services Industry Expand Click to favorite Today’s financial services customers are squarely in the crosshairs, 300% more likely to be targeted by cyberattacks than any other industry – and the financial and regulatory implications of being breached are bigger than ever. Join the members...Show more Tracks: Vertical Topic: Financial Services Region: APAC * Breakout Technical Adaptive Cloud Security APAC Live Security That Fits Modern Cloud-native Application Development Expand Click to favorite Application development has moved from a monolithic to a cloud-native architecture built using micro-services, containers, continuous integration/deployment, and other DevOps tools/ practices. The old ways of scanning the application for security...Show more Tracks: Technical Topic: Adaptive Cloud Security Region: APAC Show more EMEA * Breakout Vertical Federal EMEA Live 2022: Key Cybersecurity Challenges for State and Local Government Expand Click to favorite Hybrid work patterns and online services are here to stay, Infrastructure investment funds will begin flowing to state and local government, ransomware is a threat that continues to grow in volume and impact, and jurisdictions will be conducting...Show more Tracks: Vertical Topic: Federal Region: EMEA * Breakout Technical Security Operations EMEA Live Augment Your SOC with Fortinet Managed Security Operations Services Expand Click to favorite In this session we will describe how Fortinet’s Security Operations portfolio of Managed Services supports your end-to-end Monitoring and Response needs by complementing the SOC to help overcome challenges such as keeping tabs on a changing threat...Show more Tracks: Technical Topic: Security Operations Region: EMEA * Breakout Business Ransomware Protection EMEA Live Augment Your Team with Ransomware Experts Expand Click to favorite Coming SoonShow more Tracks: Business Topic: Ransomware Protection Region: EMEA * Breakout Technical Security Operations EMEA Live Automate Security Operations to Transform Your SOC Expand Click to favorite Today's Enterprise SOC is burdened with a large volume of alerts, manual processes, and many disparate legacy SOC tools. A SOC needs to be equipped with modern technologies in order to successfully defend and protect against today's attacks. In...Show more Tracks: Technical Topic: Security Operations Region: EMEA * Breakout Vertical EMEA Live Automation is Key to Driving Secure Business Growth in the Technology Sector Expand Click to favorite From the initial days of networking, automation has played a crucial role in provisioning, monitoring and ongoing operational tasks. As networking and security continue to converge, the need for improved integration has surpassed both standalone...Show more Tracks: Vertical Region: EMEA * Breakout Technical Adaptive Cloud Security EMEA Live Automation: The Key Element for a Safer, Simpler and More Effective Multi-Cloud Life-Cycle Management Expand Click to favorite Cloud environments have become very complex organisms, where provisioning is expected to last just for a few seconds, therefore saving human power which gets translated into money-saving and increased effectiveness. Most organizations struggle...Show more Tracks: Technical Topic: Adaptive Cloud Security Region: EMEA * Breakout Technical Zero Trust Access EMEA Live Brokering Authentication in a Multiple Identity Provider Environment Expand Click to favorite There are many common use cases requiring different end-users to be authenticated against different Identity Providers (IdPs) For example, a school system that uses separate Microsoft Azure tenants for each school where each tenant is a different...Show more Tracks: Technical Topic: Zero Trust Access Region: EMEA * Breakout Partner EMEA Live Building a Successful Security Practice with Fortinet Engage Expand Click to favorite Hear from our global channel leadership team about the exciting things coming for the Engage Partner Program, what the Fortinet Fabric means for your business, and how we continue to support our channel to drive profitability and expertise.Show more Tracks: Partner Region: EMEA * Breakout Business Securing Digital Acceleration (Networks) EMEA Live Building the Right Strategy to Secure the Next-Generation of Web Expand Click to favorite Web traffic comprises an increasing volume of the total traffic for many organizations. As a result, the Web continues to be one of the top attack vectors for delivering today’s rapidly evolving threats. In addition, web-based attacks have become...Show more Tracks: Business Topic: Securing Digital Acceleration (Networks) Region: EMEA * Breakout Partner EMEA Live Cloud Enterprise Business Transformation with GSIs Expand Click to favorite Organizations are increasingly deploying a variety of workloads across multiple clouds. In turn, business-critical data and services are increasingly scattered across this distributed infrastructure. Using the shared responsibility model as a...Show more Tracks: Partner Region: EMEA * Breakout Technical Adaptive Cloud Security EMEA Live Cloud Security Best Practices, Reducing Alert Fatigue and Making the Best Out of Cloud Native Security Services Expand Click to favorite As cloud workloads are deployed at a rapid pace, keeping up with security is increasingly challenging. In order to get the best security coverage across the growing number of workloads, Security professionals choose to utilize cloud-native...Show more Tracks: Technical Topic: Adaptive Cloud Security Region: EMEA * Breakout Technical Security-Driven Networking EMEA Live Cloud Security Web Gateway Expand Click to favorite In this session, we will discuss the future of converged security and networking. From Secure Web Gateway, client browser Isolation, ZTNA, and cloud-delivered NGFW, the Fortinet platform provides a complete solution for any organization. Join us...Show more Tracks: Technical Topic: Security-Driven Networking Region: EMEA * Breakout Business Ransomware Protection EMEA Live Continuously and Proactively Monitor for Ransomware 24x7x365 Expand Click to favorite Even with all of the best security solutions deployed for the prevention and detection of threats, someone needs to watch over security as a whole, investigate alerts and respond to confirmed incidents. Unfortunately, according to Gartner, 78% of...Show more Tracks: Business Topic: Ransomware Protection Region: EMEA * Breakout Technical Security-Driven Networking EMEA Live Delivering Enterprise-Grade Security at Any Edge at Any Scale Expand Click to favorite Be the first to find out more about the latest Next Gen NGFW in the FortiGate mid-range and High-end platforms and enhance your Enterprise-Grade security by deploying some of the latest Security services from FortiOS 7.2. We will introduce you to...Show more Tracks: Technical Topic: Security-Driven Networking Region: EMEA * Breakout Technical Security Operations EMEA Live Delivering New Intelligence and Insights to Proactively Hunt for Threats Before They Emerge Using Deception Expand Click to favorite Sophisticated cyberattacks often happen during downtimes and when least expected. Today's enterprises must be vigilant to proactively detect and hunt for suspicious activities and perform reconnaissance across their digital attack surface to avoid...Show more Tracks: Technical Topic: Security Operations Region: EMEA * Breakout Technical Security Operations EMEA Live Demystifying Network Detection Response with FortiNDR Expand Click to favorite Is Network Detection Response (NDR) the next hype cycle in Cyber Security? What are the key challenges in SecOps and where does NDR fit into the big picture? Is ML/AI-based detection aiding detection or does it have its flaws? In this session,...Show more Tracks: Technical Topic: Security Operations Region: EMEA * Breakout Business Ransomware Protection EMEA Live Detect Ransomware Along the Cyber Kill Chain - Part II Expand Click to favorite As much as organizations try to prevent cybercriminals from gaining a foothold within their organization, that is unsustainable over an extended period of time, given the sophistication of many of today's multi-stage ransomware campaigns...Show more Tracks: Business Topic: Ransomware Protection Region: EMEA * Breakout Business Ransomware Protection EMEA Live Detect Ransomware Along the Cyber Kill Chain - Part I Expand Click to favorite This session will discuss how ransomware operators are designing campaigns and weaponizing payloads to evade traditional security controls and successfully insert components within unsuspecting organizations. It will further outline advanced...Show more Tracks: Business Topic: Ransomware Protection Region: EMEA * Breakout Business Securing Digital Acceleration (Networks) EMEA Live Don’t Let a Simple Configuration Error Open the Door for Hackers Expand Click to favorite The rapidly changing security threat landscape requires organizations of all sizes to become more agile, proactive, and in control of their security fabric. Accelerate the convergence of network and security with centralized management and...Show more Tracks: Business Topic: Securing Digital Acceleration (Networks) Region: EMEA * Breakout Business Securing Digital Acceleration (Networks) EMEA Live Don't Let Hackers Derail Business Growth: Fortify Your Network Expand Click to favorite Enterprise networks are under enormous pressure to allow users to connect to any application from any location using any device creating and exposing many edges in the hybrid IT architecture. Legacy firewalls were never designed to provide...Show more Tracks: Business Topic: Securing Digital Acceleration (Networks) Region: EMEA * Breakout Technical Security Operations EMEA Live Expanding Core Attack Surface Protections to Defend Against Ransomware Attacks Expand Click to favorite Sophisticated outbreaks demand quick action from many points across the attack surface, from initial vulnerability detection and exploit prevention, to post-exploit defusion and incident response. In this session, we'll introduce new capabilities...Show more Tracks: Technical Topic: Security Operations Region: EMEA * Breakout Business Work from Anywhere EMEA Live FortiEDR, the First and Last Line of Defense Expand Click to favorite Before the pandemic, 70% of endpoints were outside the traditional network once a week and 54% more than twice a week. Today, the percentage of those endpoints at home or away in other places five days a week is considerably higher. According to a...Show more Tracks: Business Topic: Work from Anywhere Region: EMEA * Breakout Business Securing Digital Acceleration (Networks) EMEA Live Gain User-to-Application Visibility Over Modern Networks with Digital Experience Monitoring Expand Click to favorite Organizations no longer own all the infrastructure their employee traffic transverses but are still responsible for the end-to-end employee experience. Network teams are shifting focus from traditional network performance monitoring to...Show more Tracks: Business Topic: Securing Digital Acceleration (Networks) Region: EMEA * Breakout Partner EMEA Live GSI Growth Opportunities in 5G-Enabled Industrial Environments Expand Click to favorite Enterprises, and specifically OT-rich enterprises in many verticals, are early adopters of 5G as a technology to enable and accelerate Industry 4.0, automation, agility, safety, and overall innovation in their products, services, and operations...Show more Tracks: Partner Region: EMEA * Breakout Partner EMEA Live GSIs: Monetizing Fortinet End-to-End Zero Trust Architecture Expand Click to favorite Organizations need to simultaneously support accelerated digital business initiatives and the growth of remote working, while protecting their users, data, and applications against an aggressive threat landscape. This represents both a challenge...Show more Tracks: Partner Region: EMEA * Breakout Business Securing Digital Acceleration (Networks) EMEA Live Improve LAN Edge Performance and Security with Intelligence Throughout the Fabric Expand Click to favorite IT groups are looking for ways to unburden staff from day-to-day tactical efforts for a more strategic focus. While Artificial Intelligence with Machine Learning gets most of the hype, there are varying levels and areas for intelligence...Show more Tracks: Business Topic: Securing Digital Acceleration (Networks) Region: EMEA * Breakout Vertical OT EMEA Live Industrial Security for Power Utilities with the Fortinet Security Fabric: Power Utility Customer Panel Expand Click to favorite Power utilities are essential for public health, ecosystem protection, and economic strength. As utilities transform, digital security is necessary to protect the legacy and modern equipment which serve citizens and communities. As operational...Show more Tracks: Vertical Topic: OT Region: EMEA * Breakout Technical Security-Driven Networking EMEA Live LAN Edge – Secure and Automated Expand Click to favorite Automate your Enterprise Wired and Wireless LAN. Check out Fortinet's seamlessly integrated and scalable LAN Edge solutions with cutting-edge FortiAP and FortiSwitch hardware, zero-touch provisioning, integration with Security Fabric and AI-Driven...Show more Tracks: Technical Topic: Security-Driven Networking Region: EMEA * Breakout Technical Security Operations EMEA Live Machine Learning Fueled Automated Endpoint Protection Across the Security Ecosystem Expand Click to favorite Learn how FortiEDR can dynamically classify incidents utilizing machine learning and apply customized eXtended incident response recipes across the entire security ecosystem.Show more Tracks: Technical Topic: Security Operations Region: EMEA * Breakout Technical Zero Trust Access EMEA Live Managing Risk with Adaptive Authentication in FortiToken Cloud Expand Click to favorite Multi-factor authentication provides more security than password-only logins, but it comes at the cost of inconvenience for end-users. The adaptive authentication feature uses the available information regarding a login attempt (e.g., time of day,...Show more Tracks: Technical Topic: Zero Trust Access Region: EMEA * Breakout Vertical OT EMEA Live Manufacturing Customer Panel: Digital Security for Legacy and Modern Manufacturing Expand Click to favorite The future of digital security for manufacturing industrial controls and SCADA systems will be governed by readiness. As digital transformation increases the number and type of devices connecting to the network, such as smart sensors, valves, and...Show more Tracks: Vertical Topic: OT Region: EMEA * Breakout Technical Zero Trust Access EMEA Live Modernizing Your Performance Monitoring to Digital Experience Monitoring Expand Click to favorite In this session, we'll explore how network teams may not own the entirety of a user connection but will ultimately be responsible for the digital experience. Users may be operating from the office, on the move, or, as is increasingly the case, at...Show more Tracks: Technical Topic: Zero Trust Access Region: EMEA * Breakout Technical Security-Driven Networking EMEA Live Modernizing Your WAN Edge with Fortinet Secure SD-WAN Expand Click to favorite The most versatile solution in the market just received its most significant update to date. Fortinet Secure SD-WAN makes it easier than ever to modernize your WAN edge and converge your Work From Anywhere (WFA) users wherever they are located...Show more Tracks: Technical Topic: Security-Driven Networking Region: EMEA * Breakout Vertical Healthcare EMEA Live Protect Connected Medical Devices and Networks Against Ransomware and Evolving Threats Expand Click to favorite Healthcare and Life Sciences organizations are developing strategies and tactical plans to defend against Ransomware and evolving threats impacting the entire ecosystem. Fortinet Healthcare team will engage customers in a fireside chat to talk...Show more Tracks: Vertical Topic: Healthcare Region: EMEA * Breakout Technical Adaptive Cloud Security EMEA Live Protecting APIs and Using Machine Learning to Quickly Identify Real Threats Expand Click to favorite The digital transformation and the pandemic accelerated the use of applications in pretty much every aspect of our lives. This is driving the proliferation of APIs creating an entirely new attack surface organizations now need to protect. In this...Show more Tracks: Technical Topic: Adaptive Cloud Security Region: EMEA * Breakout Technical Zero Trust Access EMEA Live Protecting Your Enterprise Modern-day Hybrid Workplace with Zero Trust Expand Click to favorite With the onset of mass remote working, the hybrid workplace has weakened the approach to perimeter security. Applications are moving from the data center to cloud, and users are connecting from anywhere and everywhere. This transition to...Show more Tracks: Technical Topic: Zero Trust Access Region: EMEA * Breakout Business Securing Digital Acceleration (Networks) EMEA Live SD-WAN and 5G/LTE Are Here To Transform The WAN Edge. Do You Have The Right Solution? Expand Click to favorite Digital transformation and work-from-anywhere are creating many edges for organizations to support. These edges are causing major challenges for organizations to deliver superior quality of experience and effective security posture. At the same...Show more Tracks: Business Topic: Securing Digital Acceleration (Networks) Region: EMEA * Breakout Business Work from Anywhere EMEA Live Secure and Efficient Communications in a Hybrid World Expand Click to favorite Digital innovation is rapidly changing the way people communicate. The shift to remote working during the pandemic has further driven the demand for network infrastructure and connectivity rapidly. The need for communication tools to keep...Show more Tracks: Business Topic: Work from Anywhere Region: EMEA * Breakout Technical Adaptive Cloud Security EMEA Live Secure the Workday: Defending Cloud Email Expand Click to favorite Many organizations are using SaaS applications like Office 365 and Google Workspace, to empower employees and deliver business results. Meanwhile, email remains the primary threat vector in an evolving landscape characterized by increasing...Show more Tracks: Technical Topic: Adaptive Cloud Security Region: EMEA * Breakout Business Securing the Application Journey EMEA Live Securing CI/CD Pipeline Expand Click to favorite The way in which software applications are developed has changed significantly over the past 10 years. Traditionally, SW applications relied on monolithic SW architectures that contained all the core functions and features of an application in a...Show more Tracks: Business Topic: Securing the Application Journey Region: EMEA * Breakout Fortinet Fabric Story EMEA Live Securing Digital Acceleration Across All Application Journeys Expand Click to favorite Many organizations have expedited their application journey to the cloud in response to external factors such as the need to support digital acceleration efforts or the push to enable employees to work from anywhere (WFA). Often organizations have...Show more Tracks: Fortinet Fabric Story Region: EMEA * Breakout Vertical Education EMEA Live Securing Education with the Fortinet Security Fabric Expand Click to favorite The threat landscape is continuously evolving in the education sector. Investing in comprehensive cybersecurity strategies and advanced threat protection protects sensitive data and infrastructure while reducing operating expenses. During this...Show more Tracks: Vertical Topic: Education Region: EMEA * Breakout Fortinet Fabric Story OT Security EMEA Live Securing OT in the Face of Digital Transformation Expand Click to favorite The attack surface for OT environments is expanding because Digital Transformation often requires taking data out of industrial assets to deliver outcomes in the cloud and because the pandemic requires more remote connectivity to industrial...Show more Tracks: Fortinet Fabric Story Topic: OT Security Region: EMEA * Breakout Technical Security-Driven Networking EMEA Live Securing OT Networks from Evolving Cyber-threats Expand Click to favorite Digital innovation and transformation impact every business and organization. Some of these businesses and organizations may be part of critical infrastructure or national critical infrastructure and depend on technologies like industrial...Show more Tracks: Technical Topic: Security-Driven Networking Region: EMEA * Breakout Business Securing the Application Journey EMEA Live Securing SAP and Oracle ERP Deployments Expand Click to favorite ERP systems are the definition of mission-critical. If you were to ask a CISO where do they hide the crown jewels, where do they keep their most critical data – most likely the answer would be in their ERP system. ERP or Enterprise Resource...Show more Tracks: Business Topic: Securing the Application Journey Region: EMEA * Breakout Vertical Service Provider EMEA Live Securing the 5G Ecosystem Expand Click to favorite The successful deployment of 5G networks and services will require the implementation of security at all points in the 5G ecosystem. For Service Providers building a new 5G-enabled revenue stream, there must be careful thought and consideration...Show more Tracks: Vertical Topic: Service Provider Region: EMEA * Breakout Business Securing the Application Journey EMEA Live Securing the Full Web Application and API Attack Surface Expand Click to favorite Are you fully protecting the web application and API attack surface? The cyber skills shortage can lead to inadequately deployed security solutions. Like a sports car that never gets past first gear, too often the full capabilities of security...Show more Tracks: Business Topic: Securing the Application Journey Region: EMEA * Breakout Vertical Retail EMEA Live Securing the Future of Retail with Fortinet Expand Click to favorite In retail, it’s all about the experience, and consistent delivery is key. Businesses are always looking to gain competitive advantages by accelerating digital transformation, embracing new technologies, bolstering supply chains and gaining...Show more Tracks: Vertical Topic: Retail Region: EMEA * Breakout Technical Zero Trust Access EMEA Live Securing the New Normal - Securing the Extended Enterprise to Home Expand Click to favorite Working from home can be both positive and negative. For organizations and administrators, the flexibility needed can also extend the attack surface. Considerations around competing for limited bandwidth for business-critical apps through to...Show more Tracks: Technical Topic: Zero Trust Access Region: EMEA * Breakout Vertical Financial Services EMEA Live Security Driven Networking for the Financial Services Industry Expand Click to favorite Today’s financial services customers are squarely in the crosshairs, 300% more likely to be targeted by cyberattacks than any other industry – and the financial and regulatory implications of being breached are bigger than ever. Join the members...Show more Tracks: Vertical Topic: Financial Services Region: EMEA Show more OTHER SESSIONS * General Session General Session On-Demand Changing Employee Behavior Through the New Fortinet Security Awareness and Training Service Expand Click to favorite Fortinet is committed to helping organizations create cyber-aware workforces through its new Fortinet Security Awareness and Training Service. Security awareness training can dramatically improve employees’ ability to recognize and avoid... Show more Tracks: General Session Featured Sessions WORK FROM ANYWHERE Uncover the framework for how the Fortinet Security Fabric enables a unique and complete WFA solution that supports organizations and their employees with an innovative, yet sensible approach to this complex issue. OT SECURITY Find out how Fortinet products differentiate in OT and how our OT ecosystem of fabric-ready partners extend the capabilities. SECURING DIGITAL ACCELERATION NETWORKS Discover Fortinet’s unique approach to security-driven networking to enable best-in-class convergence to provide a consistent security and digital experience across all network edges. SECURING DIGITAL ACCELERATION APPLICATIONS Learn about the key considerations for developing a robust and secure digital acceleration strategy for all your application journeys. PREVENTING RANSOMWARE Gain deep perspectives from your peers about ransomware, including the top methods cyber criminals used to gain access to their organization. EVERYWHERE YOU NEED IT See why the Fortinet Security Fabric has become the reference model for Gartner’s Cybersecurity Mesh Architecture (CSMA). Questions? Contact Us * About * Event FAQ's * Privacy Policy * * * * © 2021. All rights reserved.