www.fortinetaccelerate.com Open in urlscan Pro
35.85.179.81  Public Scan

Submitted URL: https://apps.global.fortinet.com/e/bfs?s=3049749&lguid=631e31fd41fd4152a41c3dc2b4298880&elqTrackId=4d98301a2024439e83b685f7464a1a...
Effective URL: https://www.fortinetaccelerate.com/flow/fortinet/accelerate2022/limitless/page/home??tab.eventday=16397584247430017WtI
Submission: On March 01 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Cookie Policy
This site uses cookies to provide you with a more responsive and personalized
service. By using this site and clicking on the "Accept" button, you agree to
our use of cookies. Please read our Privacy Policy for more information on the
types of cookies we use and how to delete or block them. Learn more
DeclineAccept
 * Home
 * Solutions
 * Agenda
 * FAQ

Sign In

 
 
 
The CONTENT CATALOG is now LIVE!
 
  Click HERE to see what you can learn at ACCELERATE 2022!  
ACCELERATE 2022
LIMITLESS
Join us for Accelerate 2022 digital edition this May. This
year's conference will deliver inspiring and innovative
plenary sessions designed to broaden your perspective,
engage your thoughts and help you improve your security
senses.
Register Now
AMERICAS
May 10 - 12
APAC
May 11 - 13
EMEA
May 11 - 13
EVENT HIGHLIGHTS
Industry Leaders
Tune in to hear from the industry’s most qualified experts who will share their
unique wisdom and understanding of today’s most pressing security threats.
Executive Keynotes

KEN XIE

FOUNDER, CHAIRMAN OF THE BOARD, AND CHIEF EXECUTIVE OFFICER (CEO)

The Cybersecurity Imperative: Security-driven Networking
Today’s enterprise network is in a state of constant flux. The perimeter has
become increasingly fragmented with applications and data no longer contained
within the corporate data center but instead reside across distributed networks,
resulting in billions of edges and creating unprecedented complexity.
Organizations need to invest in a modern architecture that enables greater
productivity and a better user experience. Ken Xie, Founder and CEO will
demonstrate how integrating security and the network enables Enterprise and
Government organizations to adapt instantaneously to change, and a tightly
integrated security platform that can be deployed anywhere to ensure consistent
protection against increasingly sophisticated threats.

PATRICE PERCHE

CHIEF REVENUE OFFICER

Winning Strategies In An Era of Disruption
In under a decade, cybersecurity has emerged as one of the most important
systemic issues for the global economy. The increase in Incidents and attacks is
only the tip of a new and growing problem. According to the World Economic
Forum, cyberattacks are one of the top 10 global risks of highest concern in the
next decade.  Hear from Patrice Perche on how Fortinet’s 20+ years of organic
innovation is helping customers and partners navigate today’s challenging
environment and position them for the next wave.

JOHN MADDISON

CHIEF MARKETING OFFICER AND EXECUTIVE VICE PRESIDENT, PRODUCTS

Fortinet Technology Innovation, Products and Services
Modern enterprises need a system that makes deploying new technologies and
services secure and straightforward. This requires a broad, integrated, and
automated cybersecurity mesh platform that provides centralized management and
visibility, supports and interoperates across a vast ecosystem of solutions
automatically adapting to dynamic changes in the network. Learn from John
Maddison how Fortinet’s Security Fabric provides a platform and mesh
architecture that is essential to reducing complexity and increasing overall
security effectiveness across today’s expanding networks.

KEITH JENSEN

CHIEF FINANCIAL OFFICER (CFO)

Investing for Growth
As organizations continue to consolidate towards a platform and cybersecurity
mesh architecture approach and as network security expands to the local and
wide-area networks, to the work from anywhere environment and to the cloud,
Fortinet is strongly positioned to significantly capture market share. Hear from
Keith Jensen about Fortinet’s strategy to capture long-term growth.
Additionally, supply chain security is a highly complex, evolving function, and
is increasingly becoming a board conversation as security pros and business
executives face increasing risk as information flows throughout the supply
chain. Keith will share Fortinet’s the evolution of Fortinet’s supply chain
strategy for our customer and partners.

ROBERT MAY

SENIOR VICE PRESIDENT, PRODUCT MANAGEMENT

CyberEclipse 2022: Alignment of SD-WAN, SASE and ZTNA
In 2022, the alignment of SDWAN, SASE an ZTNA will enable transparent and
seamless mobility of customers and employees. Today’s enterprises demand instant
access to applications and data regardless of the IT deployment or the location
of users. Enterprises rely on the use of SaaS applications, public cloud and
private cloud data centers to store their most sensitive data, and require
employees to access it securely from anywhere. Fortinet is powering today’s
remote workforce, ensuring strict compliance and access to sensitive data, at
speeds demanded by today’s applications & users.

FELIX GAEHTGENS

VP ANALYST (GARTNER)

Fortinet Presents: How to Implement a Cybersecurity Mesh Architecture, Featuring
Gartner
Digital Acceleration has led organizations into a perfect storm for attacks
exploiting silos, complexities, and visibility gaps – making a broad,
integrated, and automated cybersecurity mesh platform like the Fortinet Security
Fabric a necessity.
Join us to hear about what it takes to successfully achieve a cybersecurity mesh
architecture – named a “Top 2022 Cybersecurity Trend” by Gartner.

Reasons to Attend


KEYNOTE

Hear Fortinet executives share their expertise and insight on today’s security
challenges and tomorrow’s solutions to keep networks secure.


PARTNER TRACK

Join our global channel leaders to learn about the exciting innovations coming
to the Engage Partner Program in 2022.


BUSINESS TRACK

Focus your time exploring session that will help you learn about top security
trends, challenges, and considerations to achieve successful digital
acceleration.


TECHNICAL TRACK

Take your learning to the next level with carefully curated sessions that will
show you how to solve technical requirements and achieve digital acceleration
success.


INDUSTRY TRACK

Discover how Fortinet solutions solve security challenges with the most
comprehensive solutions to help industries.


AND MUCH MORE...

Engage with other attendees in birds of a feather sessions, compete for prizes,
and gain valuable real-word experience.

AGENDA

This is an example of a subheader text.

This is an example of a subheader text.

Button


FILTERS

Clear

Search
 * widgets.catalog.result.title.heart.solidSession Tracks
   
   PartnerPartner
   
   VerticalVertical
   
   BusinessBusiness
   
   TechnicalTechnical
   
   Fortinet Fabric StoryFortinet Fabric Story
 * widgets.catalog.result.title.heart.solidSession Topic
   
   Work from AnywhereWork from Anywhere
   
   Securing Digital Acceleration (Networks) Securing Digital Acceleration
   (Networks)
   
   Preventing Ransomware Preventing Ransomware
   
   Security FabricSecurity Fabric
   
   OT SecurityOT Security
   
   Zero Trust AccessZero Trust Access
   
   Security-Driven Networking Security-Driven Networking
   
   Adaptive Cloud Security Adaptive Cloud Security
   
   RetailRetail
   
   Financial Services Financial Services
   
   HealthcareHealthcare
   
   Service Provider Service Provider
   
   Security Operations Security Operations
   
   EducationEducation
   
   OTOT
   
   FederalFederal
   
   Ransomware ProtectionRansomware Protection
   
   Securing the Application JourneySecuring the Application Journey
 * widgets.catalog.result.title.heart.solidRegion
   
   AmericasAmericas
   
   APACAPAC
   
   EMEAEMEA

193 sessions


AMERICAS

 * Breakout
   Technical
   Security Operations
   Day 2
   Americas
   Augment Your SOC with Fortinet Managed Security Operations Services
   Expand
   Click to favorite
   
   In this session we will describe how Fortinet’s Security Operations portfolio
   of Managed Services supports your end-to-end Monitoring and Response needs by
   complementing the SOC to help overcome challenges such as keeping tabs on a
   changing threat...Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Business
   Preventing Ransomware
   Ransomware Protection
   Day 2
   Americas
   Augment Your Team with Ransomware Experts
   Expand
   Click to favorite
   
   Coming SoonShow more
   
   Session Tracks: Business
   Session Topic: Preventing Ransomware , Ransomware Protection
 * Breakout
   Technical
   Security Operations
   Day 2
   Americas
   Automate Security Operations to Transform Your SOC
   Expand
   Click to favorite
   
   Today's Enterprise SOC is burdened with a large volume of alerts, manual
   processes, and many disparate legacy SOC tools. A SOC needs to be equipped
   with modern technologies in order to successfully defend and protect against
   today's attacks. In...Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Vertical
   Americas
   Automation is Key to Driving Secure Business Growth in the Technology Sector
   Expand
   Click to favorite
   
   Fast-growth companies rely on technology to either differentiate or
   completely create themselves in the marketplace. To keep pace with the rate
   of change in disparate, cloud-centric environments, technology-driven
   organizations need to be able to...Show more
   
   Session Tracks: Vertical
 * Breakout
   Technical
   Adaptive Cloud Security
   Day 2
   Americas
   Automation: The Key Element for a Safer, Simpler and More Effective
   Multi-Cloud Life-Cycle Management
   Expand
   Click to favorite
   
   Cloud environments have become very complex organisms, where provisioning is
   expected to last just for a few seconds, therefore saving human power which
   gets translated into money-saving and increased effectiveness. Most
   organizations struggle...Show more
   
   Session Tracks: Technical
   Session Topic: Adaptive Cloud Security
 * Breakout
   Technical
   Zero Trust Access
   Day 2
   Americas
   Brokering Authentication in a Multiple Identity Provider Environment
   Expand
   Click to favorite
   
   There are many common use cases requiring different end-users to be
   authenticated against different Identity Providers (IdPs) For example, a
   school system that uses separate Microsoft Azure tenants for each school
   where each tenant is a different...Show more
   
   Session Tracks: Technical
   Session Topic: Zero Trust Access
 * Breakout
   Partner
   Day 2
   Americas
   Building a Successful Security Practice with Fortinet Engage
   Expand
   Click to favorite
   
   Hear from our global channel leadership team about the exciting things coming
   for the Engage Partner Program, what the Fortinet Fabric means for your
   business, and how we continue to support our channel to drive profitability
   and expertise.Show more
   
   Session Tracks: Partner
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   Day 2
   Americas
   Building the Right Strategy to Secure the Next-Generation of Web
   Expand
   Click to favorite
   
   Web traffic comprises an increasing volume of the total traffic for many
   organizations. As a result, the Web continues to be one of the top attack
   vectors for delivering today’s rapidly evolving threats. In addition,
   web-based attacks have become...Show more
   
   Session Tracks: Business
   Session Topic: Securing Digital Acceleration (Networks)
 * Breakout
   Partner
   Americas
   Cloud Enterprise Business Transformation with GSIs
   Expand
   Click to favorite
   
   Organizations are increasingly deploying a variety of workloads across
   multiple clouds. In turn, business-critical data and services are
   increasingly scattered across this distributed infrastructure. Using the
   shared responsibility model as a...Show more
   
   Session Tracks: Partner
 * Breakout
   Technical
   Security-Driven Networking
   Day 2
   Americas
   Cloud Security Web Gateway
   Expand
   Click to favorite
   
   In this session, we will discuss the future of converged security and
   networking. From Secure Web Gateway, client browser Isolation, ZTNA, and
   cloud-delivered NGFW, the Fortinet platform provides a complete solution for
   any organization. Join us...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Business
   Ransomware Protection
   Day 2
   Americas
   Continuously and Proactively Monitor for Ransomware 24x7x365
   Expand
   Click to favorite
   
   Even with all of the best security solutions deployed for the prevention and
   detection of threats, someone needs to watch over security as a whole,
   investigate alerts and respond to confirmed incidents. Unfortunately,
   according to Gartner, 78% of...Show more
   
   Session Tracks: Business
   Session Topic: Ransomware Protection
 * Breakout
   Technical
   Security-Driven Networking
   Day 2
   Americas
   Delivering Enterprise-Grade Security at Any Edge at Any Scale
   Expand
   Click to favorite
   
   Be the first to find out more about the latest Next Gen NGFW in the FortiGate
   mid-range and High-end platforms and enhance your Enterprise-Grade security
   by deploying some of the latest Security services from FortiOS 7.2. We will
   introduce you to...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Technical
   Security Operations
   Day 2
   Americas
   Delivering New Intelligence and Insights to Proactively Hunt for Threats
   Before They Emerge Using Deception
   Expand
   Click to favorite
   
   Sophisticated cyberattacks often happen during downtimes and when least
   expected. Today's enterprises must be vigilant to proactively detect and hunt
   for suspicious activities and perform reconnaissance across their digital
   attack surface to avoid...Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Technical
   Security Operations
   Day 2
   Americas
   Demystifying Network Detection Response with FortiNDR
   Expand
   Click to favorite
   
   Is Network Detection Response (NDR) the next hype cycle in Cyber Security?
   What are the key challenges in SecOps and where does NDR fit into the big
   picture? Is ML/AI-based detection aiding detection or does it have its flaws?
   In this session,...Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Business
   Ransomware Protection
   Day 2
   Americas
   Detect Ransomware Along the Cyber Kill Chain - Part II
   Expand
   Click to favorite
   
   As much as organizations try to prevent cybercriminals from gaining a
   foothold within their organization, that is unsustainable over an extended
   period of time, given the sophistication of many of today's multi-stage
   ransomware campaigns...Show more
   
   Session Tracks: Business
   Session Topic: Ransomware Protection
 * Breakout
   Business
   Ransomware Protection
   Day 2
   Americas
   Detect Ransomware Along the Cyber Kill Chain - Part I
   Expand
   Click to favorite
   
   This session will discuss how ransomware operators are designing campaigns
   and weaponizing payloads to evade traditional security controls and
   successfully insert components within unsuspecting organizations. It will
   further outline advanced...Show more
   
   Session Tracks: Business
   Session Topic: Ransomware Protection
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   Day 2
   Americas
   Don’t Let a Simple Configuration Error Open the Door for Hackers
   Expand
   Click to favorite
   
   The rapidly changing security threat landscape requires organizations of all
   sizes to become more agile, proactive, and in control of their security
   fabric. Accelerate the convergence of network and security with centralized
   management and...Show more
   
   Session Tracks: Business
   Session Topic: Securing Digital Acceleration (Networks)
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   Day 2
   Americas
   Don't Let Hackers Derail Business Growth: Fortify Your Network
   Expand
   Click to favorite
   
   Enterprise networks are under enormous pressure to allow users to connect to
   any application from any location using any device creating and exposing many
   edges in the hybrid IT architecture. Legacy firewalls were never designed to
   provide...Show more
   
   Session Tracks: Business
   Session Topic: Securing Digital Acceleration (Networks)
 * Breakout
   Technical
   Security Operations
   Day 2
   Americas
   Expanding Core Attack Surface Protections to Defend Against Ransomware
   Attacks
   Expand
   Click to favorite
   
   Sophisticated outbreaks demand quick action from many points across the
   attack surface, from initial vulnerability detection and exploit prevention,
   to post-exploit defusion and incident response. In this session, we'll
   introduce new capabilities...Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Vertical
   Federal
   Americas
   Federal Cybersecurity as a Team Sport
   Expand
   Click to favorite
   
   Cybersecurity is a top-of-mind issue for Federal managers, employees, and
   citizens alike. While there are dedicated security professionals within
   agencies, every user bears some responsibility for ensuring security. No
   agency arguably has enough...Show more
   
   Session Tracks: Vertical
   Session Topic: Federal
 * Breakout
   Business
   Work from Anywhere
   Day 2
   Americas
   FortiEDR, the First and Last Line of Defense
   Expand
   Click to favorite
   
   Before the pandemic, 70% of endpoints were outside the traditional network
   once a week and 54% more than twice a week. Today, the percentage of those
   endpoints at home or away in other places five days a week is considerably
   higher. According to a...Show more
   
   Session Tracks: Business
   Session Topic: Work from Anywhere
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   Day 2
   Americas
   Gain User-to-Application Visibility Over Modern Networks with Digital
   Experience Monitoring
   Expand
   Click to favorite
   
   Organizations no longer own all the infrastructure their employee traffic
   transverses but are still responsible for the end-to-end employee experience.
   Network teams are shifting focus from traditional network performance
   monitoring to...Show more
   
   Session Tracks: Business
   Session Topic: Securing Digital Acceleration (Networks)
 * Breakout
   Partner
   Day 2
   Americas
   GSI Growth Opportunities in 5G-Enabled Industrial Environments
   Expand
   Click to favorite
   
   Enterprises, and specifically OT-rich enterprises in many verticals, are
   early adopters of 5G as a technology to enable and accelerate Industry 4.0,
   automation, agility, safety, and overall innovation in their products,
   services, and operations...Show more
   
   Session Tracks: Partner
 * Breakout
   Partner
   Americas
   GSIs: Monetizing Fortinet End-to-End Zero Trust Architecture
   Expand
   Click to favorite
   
   Organizations need to simultaneously support accelerated digital business
   initiatives and the growth of remote working, while protecting their users,
   data, and applications against an aggressive threat landscape. This
   represents both a challenge...Show more
   
   Session Tracks: Partner
 * Breakout
   Vertical
   Federal
   Americas
   How Government Is Putting Trust in Cybersecurity
   Expand
   Click to favorite
   
   Protection and security come in many different forms. From moats surrounding
   castles to armed forces watching over citizens to chief information security
   officers ensuring data security, the need to protect is ever prevalent.
   However, now in the...Show more
   
   Session Tracks: Vertical
   Session Topic: Federal
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   Day 2
   Americas
   Improve LAN Edge Performance and Security with Intelligence Throughout the
   Fabric
   Expand
   Click to favorite
   
   IT groups are looking for ways to unburden staff from day-to-day tactical
   efforts for a more strategic focus. While Artificial Intelligence with
   Machine Learning gets most of the hype, there are varying levels and areas
   for intelligence...Show more
   
   Session Tracks: Business
   Session Topic: Securing Digital Acceleration (Networks)
 * Breakout
   Vertical
   OT
   Americas
   Industrial Security for Power Utilities with the Fortinet Security Fabric:
   Power Utility Customer Panel
   Expand
   Click to favorite
   
   Power utilities are essential for public health, ecosystem protection, and
   economic strength. As utilities transform, digital security is necessary to
   protect the legacy and modern equipment which serve citizens and communities.
   As operational...Show more
   
   Session Tracks: Vertical
   Session Topic: OT
 * Breakout
   Partner
   Day 2
   Americas
   Industry Solutions To Drive Growth with Fortinet
   Expand
   Click to favorite
   
   Fortinet offers the most comprehensive solutions to help industries
   accelerate security, maximize productivity, preserve user experience, and
   lower total cost of ownership. Join us to learn about the industry solutions,
   tools, and resources...Show more
   
   Session Tracks: Partner
 * Breakout
   Technical
   Security-Driven Networking
   Day 2
   Americas
   LAN Edge – Secure and Automated
   Expand
   Click to favorite
   
   Automate your Enterprise Wired and Wireless LAN. Check out Fortinet's
   seamlessly integrated and scalable LAN Edge solutions with cutting-edge
   FortiAP and FortiSwitch hardware, zero-touch provisioning, integration with
   Security Fabric and AI-Driven...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Technical
   Security Operations
   Day 2
   Americas
   Machine Learning Fueled Automated Endpoint Protection Across the Security
   Ecosystem
   Expand
   Click to favorite
   
   Learn how FortiEDR can dynamically classify incidents utilizing machine
   learning and apply customized eXtended incident response recipes across the
   entire security ecosystem.Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Technical
   Zero Trust Access
   Day 2
   Americas
   Managing Risk with Adaptive Authentication in FortiToken Cloud
   Expand
   Click to favorite
   
   Multi-factor authentication provides more security than password-only logins,
   but it comes at the cost of inconvenience for end-users. The adaptive
   authentication feature uses the available information regarding a login
   attempt (e.g., time of day,...Show more
   
   Session Tracks: Technical
   Session Topic: Zero Trust Access
 * Breakout
   Vertical
   OT
   Americas
   Manufacturing Customer Panel: Digital Security for Legacy and Modern
   Manufacturing
   Expand
   Click to favorite
   
   The future of digital security for manufacturing industrial controls and
   SCADA systems will be governed by readiness. As digital transformation
   increases the number and type of devices connecting to the network, such as
   smart sensors, valves, and...Show more
   
   Session Tracks: Vertical
   Session Topic: OT
 * Breakout
   Technical
   Zero Trust Access
   Day 2
   Americas
   Modernizing Your Performance Monitoring to Digital Experience Monitoring
   Expand
   Click to favorite
   
   In this session, we'll explore how network teams may not own the entirety of
   a user connection but will ultimately be responsible for the digital
   experience. Users may be operating from the office, on the move, or, as is
   increasingly the case, at...Show more
   
   Session Tracks: Technical
   Session Topic: Zero Trust Access
 * Breakout
   Technical
   Security-Driven Networking
   Day 2
   Americas
   Modernizing Your WAN Edge with Fortinet Secure SD-WAN
   Expand
   Click to favorite
   
   The most versatile solution in the market just received its most significant
   update to date. Fortinet Secure SD-WAN makes it easier than ever to modernize
   your WAN edge and converge your Work From Anywhere (WFA) users wherever they
   are located...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Vertical
   Healthcare
   Americas
   Protect Connected Medical Devices and Networks Against Ransomware and
   Evolving Threats
   Expand
   Click to favorite
   
   Healthcare and Life Sciences organizations are developing strategies and
   tactical plans to defend against Ransomware and evolving threats impacting
   the entire ecosystem. Fortinet Healthcare team will engage customers in a
   fireside chat to talk...Show more
   
   Session Tracks: Vertical
   Session Topic: Healthcare
 * Breakout
   Technical
   Adaptive Cloud Security
   Day 2
   Americas
   Protecting APIs and Using Machine Learning to Quickly Identify Real Threats
   Expand
   Click to favorite
   
   The digital transformation and the pandemic accelerated the use of
   applications in pretty much every aspect of our lives. This is driving the
   proliferation of APIs creating an entirely new attack surface organizations
   now need to protect. In this...Show more
   
   Session Tracks: Technical
   Session Topic: Adaptive Cloud Security
 * Breakout
   Technical
   Zero Trust Access
   Day 2
   Americas
   Protecting Your Enterprise Modern-day Hybrid Workplace with Zero Trust
   Expand
   Click to favorite
   
   With the onset of mass remote working, the hybrid workplace has weakened the
   approach to perimeter security. Applications are moving from the data center
   to cloud, and users are connecting from anywhere and everywhere. This
   transition to...Show more
   
   Session Tracks: Technical
   Session Topic: Zero Trust Access
 * Breakout
   Technical
   Adaptive Cloud Security
   Day 2
   Americas
   Reducing the Signal to Noise Ratio from Cloud Security Services such as
   Microsoft Defender & Amazon GuardDuty
   Expand
   Click to favorite
   
   As cloud workloads are being deployed at a rapid pace, keeping up with
   security is increasingly challenging. In order to get the best security
   coverage across the growing number of workloads, Security professionals
   choose to utilize cloud-native...Show more
   
   Session Tracks: Technical
   Session Topic: Adaptive Cloud Security
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   Day 2
   Americas
   SD-WAN and 5G/LTE Are Here To Transform The WAN Edge. Do You Have The Right
   Solution?
   Expand
   Click to favorite
   
   Digital transformation and work-from-anywhere are creating many edges for
   organizations to support. These edges are causing major challenges for
   organizations to deliver superior quality of experience and effective
   security posture. At the same...Show more
   
   Session Tracks: Business
   Session Topic: Securing Digital Acceleration (Networks)
 * Breakout
   Business
   Work from Anywhere
   Day 2
   Americas
   Secure and Efficient Communications in a Hybrid World
   Expand
   Click to favorite
   
   Digital innovation is rapidly changing the way people communicate. The shift
   to remote working during the pandemic has further driven the demand for
   network infrastructure and connectivity rapidly. The need for communication
   tools to keep...Show more
   
   Session Tracks: Business
   Session Topic: Work from Anywhere
 * Breakout
   Business
   Securing the Application Journey
   Day 2
   Americas
   Securing CI/CD Pipeline
   Expand
   Click to favorite
   
   The way in which software applications are developed has changed
   significantly over the past 10 years. Traditionally, SW applications relied
   on monolithic SW architectures that contained all the core functions and
   features of an application in a...Show more
   
   Session Tracks: Business
   Session Topic: Securing the Application Journey
 * Breakout
   Fortinet Fabric Story
   Americas
   Securing Digital Acceleration Across All Application Journeys
   Expand
   Click to favorite
   
   Many organizations have expedited their application journey to the cloud in
   response to external factors such as the need to support digital acceleration
   efforts or the push to enable employees to work from anywhere (WFA). Often
   organizations have...Show more
   
   Session Tracks: Fortinet Fabric Story
 * Breakout
   Vertical
   Education
   Americas
   Securing Education with the Fortinet Security Fabric
   Expand
   Click to favorite
   
   The threat landscape is continuously evolving in the education sector.
   Investing in comprehensive cybersecurity strategies not only protects
   sensitive data and infrastructure but can also help reduce costs down the
   line. During this customer...Show more
   
   Session Tracks: Vertical
   Session Topic: Education
 * Breakout
   Fortinet Fabric Story
   OT Security
   Americas
   Securing OT in the Face of Digital Transformation
   Expand
   Click to favorite
   
   The attack surface for OT environments is expanding because Digital
   Transformation often requires taking data out of industrial assets to deliver
   outcomes in the cloud and because the pandemic requires more remote
   connectivity to industrial...Show more
   
   Session Tracks: Fortinet Fabric Story
   Session Topic: OT Security
 * Breakout
   Technical
   Security-Driven Networking
   Day 2
   Americas
   Securing OT Networks from Evolving Cyber-threats
   Expand
   Click to favorite
   
   Digital innovation and transformation impact every business and organization.
   Some of these businesses and organizations may be part of critical
   infrastructure or national critical infrastructure and depend on technologies
   like industrial...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Technical
   Adaptive Cloud Security
   Day 2
   Americas
   Securing SaaS Application Data & Access (O365 example)
   Expand
   Click to favorite
   
   All enterprises rely on the use of SaaS applications like Office 365 to
   empower their workforce and deliver business results. This means storing the
   company's sensitive data in 3rd party systems that are accessible on the
   Internet. In this...Show more
   
   Session Tracks: Technical
   Session Topic: Adaptive Cloud Security
 * Breakout
   Business
   Securing the Application Journey
   Day 2
   Americas
   Securing SAP and Oracle ERP Deployments
   Expand
   Click to favorite
   
   ERP systems are the definition of mission-critical. If you were to ask a CISO
   where do they hide the crown jewels, where do they keep their most critical
   data – most likely the answer would be in their ERP system. ERP or Enterprise
   Resource...Show more
   
   Session Tracks: Business
   Session Topic: Securing the Application Journey
 * Breakout
   Vertical
   Service Provider
   Americas
   Securing the 5G Ecosystem
   Expand
   Click to favorite
   
   The successful deployment of 5G networks and services will require the
   implementation of security at all points in the 5G ecosystem. For Service
   Providers building a new 5G-enabled revenue stream, there must be careful
   thought and consideration...Show more
   
   Session Tracks: Vertical
   Session Topic: Service Provider
 * Breakout
   Business
   Securing the Application Journey
   Day 2
   Americas
   Securing the Full Web Application and API Attack Surface
   Expand
   Click to favorite
   
   Are you fully protecting the web application and API attack surface? The
   cyber skills shortage can lead to inadequately deployed security solutions.
   Like a sports car that never gets past first gear, too often the full
   capabilities of security...Show more
   
   Session Tracks: Business
   Session Topic: Securing the Application Journey
 * Breakout
   Vertical
   Retail
   Americas
   Securing the Future of Retail with Fortinet
   Expand
   Click to favorite
   
   In retail, it’s all about the experience, and consistent delivery is key.
   Businesses are always looking to gain competitive advantages by accelerating
   digital transformation, embracing new technologies, bolstering supply chains
   and gaining...Show more
   
   Session Tracks: Vertical
   Session Topic: Retail

Show more


APAC

 * Breakout
   Technical
   Security Operations
   APAC
   Augment Your SOC with Fortinet Managed Security Operations Services
   Expand
   Click to favorite
   
   In this session we will describe how Fortinet’s Security Operations portfolio
   of Managed Services supports your end-to-end Monitoring and Response needs by
   complementing the SOC to help overcome challenges such as keeping tabs on a
   changing threat...Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Business
   Ransomware Protection
   APAC
   Augment Your Team with Ransomware Experts
   Expand
   Click to favorite
   
   Coming SoonShow more
   
   Session Tracks: Business
   Session Topic: Ransomware Protection
 * Breakout
   Technical
   Security Operations
   APAC
   Automate Security Operations to Transform Your SOC
   Expand
   Click to favorite
   
   Today's Enterprise SOC is burdened with a large volume of alerts, manual
   processes, and many disparate legacy SOC tools. A SOC needs to be equipped
   with modern technologies in order to successfully defend and protect against
   today's attacks. In...Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Vertical
   APAC
   Automation is Key to Driving Secure Business Growth in the Technology Sector
   Expand
   Click to favorite
   
   Fast-growth companies rely on technology to either differentiate or
   completely create themselves in the marketplace. To keep pace with the rate
   of change in disparate, cloud-centric environments, technology-driven
   organizations need to be able to...Show more
   
   Session Tracks: Vertical
 * Breakout
   Technical
   Adaptive Cloud Security
   APAC
   Automation: The Key Element for a Safer, Simpler and More Effective
   Multi-Cloud Life-Cycle Management
   Expand
   Click to favorite
   
   Cloud environments have become very complex organisms, where provisioning is
   expected to last just for a few seconds, therefore saving human power which
   gets translated into money-saving and increased effectiveness. Most
   organizations struggle...Show more
   
   Session Tracks: Technical
   Session Topic: Adaptive Cloud Security
 * Breakout
   Technical
   Zero Trust Access
   APAC
   Brokering Authentication in a Multiple Identity Provider Environment
   Expand
   Click to favorite
   
   There are many common use cases requiring different end-users to be
   authenticated against different Identity Providers (IdPs) For example, a
   school system that uses separate Microsoft Azure tenants for each school
   where each tenant is a different...Show more
   
   Session Tracks: Technical
   Session Topic: Zero Trust Access
 * Breakout
   Partner
   APAC
   Building a Successful Security Practice with Fortinet Engage
   Expand
   Click to favorite
   
   Hear from our global channel leadership team about the exciting things coming
   for the Engage Partner Program, what the Fortinet Fabric means for your
   business, and how we continue to support our channel to drive profitability
   and expertise.Show more
   
   Session Tracks: Partner
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   APAC
   Building the Right Strategy to Secure the Next-Generation of Web
   Expand
   Click to favorite
   
   Web traffic comprises an increasing volume of the total traffic for many
   organizations. As a result, the Web continues to be one of the top attack
   vectors for delivering today’s rapidly evolving threats. In addition,
   web-based attacks have become...Show more
   
   Session Tracks: Business
   Session Topic: Securing Digital Acceleration (Networks)
 * Breakout
   Partner
   APAC
   Cloud Enterprise Business Transformation with GSIs
   Expand
   Click to favorite
   
   Organizations are increasingly deploying a variety of workloads across
   multiple clouds. In turn, business-critical data and services are
   increasingly scattered across this distributed infrastructure. Using the
   shared responsibility model as a...Show more
   
   Session Tracks: Partner
 * Breakout
   Technical
   Security-Driven Networking
   APAC
   Cloud Security Web Gateway
   Expand
   Click to favorite
   
   In this session, we will discuss the future of converged security and
   networking. From Secure Web Gateway, client browser Isolation, ZTNA, and
   cloud-delivered NGFW, the Fortinet platform provides a complete solution for
   any organization. Join us...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Business
   Ransomware Protection
   APAC
   Continuously and Proactively Monitor for Ransomware 24x7x365
   Expand
   Click to favorite
   
   Even with all of the best security solutions deployed for the prevention and
   detection of threats, someone needs to watch over security as a whole,
   investigate alerts and respond to confirmed incidents. Unfortunately,
   according to Gartner, 78% of...Show more
   
   Session Tracks: Business
   Session Topic: Ransomware Protection
 * Breakout
   Technical
   Security-Driven Networking
   APAC
   Delivering Enterprise-Grade Security at Any Edge at Any Scale
   Expand
   Click to favorite
   
   Be the first to find out more about the latest Next Gen NGFW in the FortiGate
   mid-range and High-end platforms and enhance your Enterprise-Grade security
   by deploying some of the latest Security services from FortiOS 7.2. We will
   introduce you to...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Technical
   Security Operations
   APAC
   Delivering New Intelligence and Insights to Proactively Hunt for Threats
   Before They Emerge Using Deception
   Expand
   Click to favorite
   
   Sophisticated cyberattacks often happen during downtimes and when least
   expected. Today's enterprises must be vigilant to proactively detect and hunt
   for suspicious activities and perform reconnaissance across their digital
   attack surface to avoid...Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Technical
   Security Operations
   APAC
   Demystifying Network Detection Response with FortiNDR
   Expand
   Click to favorite
   
   Is Network Detection Response (NDR) the next hype cycle in Cyber Security?
   What are the key challenges in SecOps and where does NDR fit into the big
   picture? Is ML/AI-based detection aiding detection or does it have its flaws?
   In this session,...Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Business
   Ransomware Protection
   APAC
   Detect Ransomware Along the Cyber Kill Chain - Part II
   Expand
   Click to favorite
   
   As much as organizations try to prevent cybercriminals from gaining a
   foothold within their organization, that is unsustainable over an extended
   period of time, given the sophistication of many of today's multi-stage
   ransomware campaigns...Show more
   
   Session Tracks: Business
   Session Topic: Ransomware Protection
 * Breakout
   Business
   Preventing Ransomware
   APAC
   Detect Ransomware Along the Cyber Kill Chain - Part I
   Expand
   Click to favorite
   
   This session will discuss how ransomware operators are designing campaigns
   and weaponizing payloads to evade traditional security controls and
   successfully insert components within unsuspecting organizations. It will
   further outline advanced...Show more
   
   Session Tracks: Business
   Session Topic: Preventing Ransomware
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   APAC
   Don’t Let a Simple Configuration Error Open the Door for Hackers
   Expand
   Click to favorite
   
   The rapidly changing security threat landscape requires organizations of all
   sizes to become more agile, proactive, and in control of their security
   fabric. Accelerate the convergence of network and security with centralized
   management and...Show more
   
   Session Tracks: Business
   Session Topic: Securing Digital Acceleration (Networks)
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   APAC
   Don't Let Hackers Derail Business Growth: Fortify Your Network
   Expand
   Click to favorite
   
   Enterprise networks are under enormous pressure to allow users to connect to
   any application from any location using any device creating and exposing many
   edges in the hybrid IT architecture. Legacy firewalls were never designed to
   provide...Show more
   
   Session Tracks: Business
   Session Topic: Securing Digital Acceleration (Networks)
 * Breakout
   Technical
   Security Operations
   APAC
   Expanding Core Attack Surface Protections to Defend Against Ransomware
   Attacks
   Expand
   Click to favorite
   
   Sophisticated outbreaks demand quick action from many points across the
   attack surface, from initial vulnerability detection and exploit prevention,
   to post-exploit defusion and incident response. In this session, we'll
   introduce new capabilities...Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Vertical
   Federal
   APAC
   Federal Cybersecurity as a Team Sport
   Expand
   Click to favorite
   
   Cybersecurity is a top-of-mind issue for Federal managers, employees, and
   citizens alike. While there are dedicated security professionals within
   agencies, every user bears some responsibility for ensuring security. No
   agency arguably has enough...Show more
   
   Session Tracks: Vertical
   Session Topic: Federal
 * Breakout
   Business
   Work from Anywhere
   APAC
   FortiEDR, the First and Last Line of Defense
   Expand
   Click to favorite
   
   Before the pandemic, 70% of endpoints were outside the traditional network
   once a week and 54% more than twice a week. Today, the percentage of those
   endpoints at home or away in other places five days a week is considerably
   higher. According to a...Show more
   
   Session Tracks: Business
   Session Topic: Work from Anywhere
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   APAC
   Gain User-to-Application Visibility Over Modern Networks with Digital
   Experience Monitoring
   Expand
   Click to favorite
   
   Organizations no longer own all the infrastructure their employee traffic
   transverses but are still responsible for the end-to-end employee experience.
   Network teams are shifting focus from traditional network performance
   monitoring to...Show more
   
   Session Tracks: Business
   Session Topic: Securing Digital Acceleration (Networks)
 * Breakout
   Partner
   APAC
   GSI Growth Opportunities in 5G-Enabled Industrial Environments
   Expand
   Click to favorite
   
   Enterprises, and specifically OT-rich enterprises in many verticals, are
   early adopters of 5G as a technology to enable and accelerate Industry 4.0,
   automation, agility, safety, and overall innovation in their products,
   services, and operations...Show more
   
   Session Tracks: Partner
 * Breakout
   Partner
   APAC
   GSIs: Monetizing Fortinet End-to-End Zero Trust Architecture
   Expand
   Click to favorite
   
   Organizations need to simultaneously support accelerated digital business
   initiatives and the growth of remote working, while protecting their users,
   data, and applications against an aggressive threat landscape. This
   represents both a challenge...Show more
   
   Session Tracks: Partner
 * Breakout
   Vertical
   Federal
   APAC
   How Government Is Putting Trust in Cybersecurity
   Expand
   Click to favorite
   
   Protection and security come in many different forms. From moats surrounding
   castles to armed forces watching over citizens to chief information security
   officers ensuring data security, the need to protect is ever prevalent.
   However, now in the...Show more
   
   Session Tracks: Vertical
   Session Topic: Federal
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   APAC
   Improve LAN Edge Performance and Security with Intelligence Throughout the
   Fabric
   Expand
   Click to favorite
   
   IT groups are looking for ways to unburden staff from day-to-day tactical
   efforts for a more strategic focus. While Artificial Intelligence with
   Machine Learning gets most of the hype, there are varying levels and areas
   for intelligence...Show more
   
   Session Tracks: Business
   Session Topic: Securing Digital Acceleration (Networks)
 * Breakout
   Vertical
   OT
   APAC
   Industrial Security for Power Utilities with the Fortinet Security Fabric:
   Power Utility Customer Panel
   Expand
   Click to favorite
   
   Power utilities are essential for public health, ecosystem protection, and
   economic strength. As utilities transform, digital security is necessary to
   protect the legacy and modern equipment which serve citizens and communities.
   As operational...Show more
   
   Session Tracks: Vertical
   Session Topic: OT
 * Breakout
   Technical
   Security-Driven Networking
   APAC
   LAN Edge – Secure and Automated
   Expand
   Click to favorite
   
   Automate your Enterprise Wired and Wireless LAN. Check out Fortinet's
   seamlessly integrated and scalable LAN Edge solutions with cutting-edge
   FortiAP and FortiSwitch hardware, zero-touch provisioning, integration with
   Security Fabric and AI-Driven...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Technical
   Security Operations
   APAC
   Machine Learning Fueled Automated Endpoint Protection Across the Security
   Ecosystem
   Expand
   Click to favorite
   
   Learn how FortiEDR can dynamically classify incidents utilizing machine
   learning and apply customized eXtended incident response recipes across the
   entire security ecosystem.Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Technical
   Zero Trust Access
   APAC
   Managing Risk with Adaptive Authentication in FortiToken Cloud
   Expand
   Click to favorite
   
   Multi-factor authentication provides more security than password-only logins,
   but it comes at the cost of inconvenience for end-users. The adaptive
   authentication feature uses the available information regarding a login
   attempt (e.g., time of day,...Show more
   
   Session Tracks: Technical
   Session Topic: Zero Trust Access
 * Breakout
   Vertical
   OT
   APAC
   Manufacturing Customer Panel: Digital Security for Legacy and Modern
   Manufacturing
   Expand
   Click to favorite
   
   The future of digital security for manufacturing industrial controls and
   SCADA systems will be governed by readiness. As digital transformation
   increases the number and type of devices connecting to the network, such as
   smart sensors, valves, and...Show more
   
   Session Tracks: Vertical
   Session Topic: OT
 * Breakout
   Technical
   Zero Trust Access
   APAC
   Modernizing Your Performance Monitoring to Digital Experience Monitoring
   Expand
   Click to favorite
   
   In this session, we'll explore how network teams may not own the entirety of
   a user connection but will ultimately be responsible for the digital
   experience. Users may be operating from the office, on the move, or, as is
   increasingly the case, at...Show more
   
   Session Tracks: Technical
   Session Topic: Zero Trust Access
 * Breakout
   Technical
   Security-Driven Networking
   APAC
   Modernizing Your WAN Edge with Fortinet Secure SD-WAN
   Expand
   Click to favorite
   
   The most versatile solution in the market just received its most significant
   update to date. Fortinet Secure SD-WAN makes it easier than ever to modernize
   your WAN edge and converge your Work From Anywhere (WFA) users wherever they
   are located...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Vertical
   Healthcare
   APAC
   Protect Connected Medical Devices and Networks Against Ransomware and
   Evolving Threats
   Expand
   Click to favorite
   
   Healthcare and Life Sciences organizations are developing strategies and
   tactical plans to defend against Ransomware and evolving threats impacting
   the entire ecosystem. Fortinet Healthcare team will engage customers in a
   fireside chat to talk...Show more
   
   Session Tracks: Vertical
   Session Topic: Healthcare
 * Breakout
   Technical
   Adaptive Cloud Security
   APAC
   Protecting APIs and Using Machine Learning to Quickly Identify Real Threats
   Expand
   Click to favorite
   
   The digital transformation and the pandemic accelerated the use of
   applications in pretty much every aspect of our lives. This is driving the
   proliferation of APIs creating an entirely new attack surface organizations
   now need to protect. In this...Show more
   
   Session Tracks: Technical
   Session Topic: Adaptive Cloud Security
 * Breakout
   Technical
   Zero Trust Access
   APAC
   Protecting Your Enterprise Modern-day Hybrid Workplace with Zero Trust
   Expand
   Click to favorite
   
   With the onset of mass remote working, the hybrid workplace has weakened the
   approach to perimeter security. Applications are moving from the data center
   to cloud, and users are connecting from anywhere and everywhere. This
   transition to...Show more
   
   Session Tracks: Technical
   Session Topic: Zero Trust Access
 * Breakout
   Technical
   Adaptive Cloud Security
   APAC
   Reducing the Signal to Noise Ratio from Cloud Security Services such as
   Microsoft Defender & Amazon GuardDuty
   Expand
   Click to favorite
   
   As cloud workloads are being deployed at a rapid pace, keeping up with
   security is increasingly challenging. In order to get the best security
   coverage across the growing number of workloads, Security professionals
   choose to utilize cloud-native...Show more
   
   Session Tracks: Technical
   Session Topic: Adaptive Cloud Security
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   APAC
   SD-WAN and 5G/LTE Are Here To Transform The WAN Edge. Do You Have The Right
   Solution?
   Expand
   Click to favorite
   
   Digital transformation and work-from-anywhere are creating many edges for
   organizations to support. These edges are causing major challenges for
   organizations to deliver superior quality of experience and effective
   security posture. At the same...Show more
   
   Session Tracks: Business
   Session Topic: Securing Digital Acceleration (Networks)
 * Breakout
   Business
   Work from Anywhere
   APAC
   Secure and Efficient Communications in a Hybrid World
   Expand
   Click to favorite
   
   Digital innovation is rapidly changing the way people communicate. The shift
   to remote working during the pandemic has further driven the demand for
   network infrastructure and connectivity rapidly. The need for communication
   tools to keep...Show more
   
   Session Tracks: Business
   Session Topic: Work from Anywhere
 * Breakout
   Business
   Securing the Application Journey
   APAC
   Securing CI/CD Pipeline
   Expand
   Click to favorite
   
   The way in which software applications are developed has changed
   significantly over the past 10 years. Traditionally, SW applications relied
   on monolithic SW architectures that contained all the core functions and
   features of an application in a...Show more
   
   Session Tracks: Business
   Session Topic: Securing the Application Journey
 * Breakout
   Fortinet Fabric Story
   APAC
   Securing Digital Acceleration Across All Application Journeys
   Expand
   Click to favorite
   
   Many organizations have expedited their application journey to the cloud in
   response to external factors such as the need to support digital acceleration
   efforts or the push to enable employees to work from anywhere (WFA). Often
   organizations have...Show more
   
   Session Tracks: Fortinet Fabric Story
 * Breakout
   Vertical
   Education
   APAC
   Securing Education with the Fortinet Security Fabric
   Expand
   Click to favorite
   
   The threat landscape is continuously evolving in the education sector.
   Investing in comprehensive cybersecurity strategies not only protects
   sensitive data and infrastructure but can also help reduce costs down the
   line. During this customer...Show more
   
   Session Tracks: Vertical
   Session Topic: Education
 * Breakout
   Fortinet Fabric Story
   OT Security
   APAC
   Securing OT in the Face of Digital Transformation
   Expand
   Click to favorite
   
   The attack surface for OT environments is expanding because Digital
   Transformation often requires taking data out of industrial assets to deliver
   outcomes in the cloud and because the pandemic requires more remote
   connectivity to industrial...Show more
   
   Session Tracks: Fortinet Fabric Story
   Session Topic: OT Security
 * Breakout
   Technical
   Security-Driven Networking
   APAC
   Securing OT Networks from Evolving Cyber-threats
   Expand
   Click to favorite
   
   Digital innovation and transformation impact every business and organization.
   Some of these businesses and organizations may be part of critical
   infrastructure or national critical infrastructure and depend on technologies
   like industrial...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Business
   Securing the Application Journey
   APAC
   Securing SAP and Oracle ERP Deployments
   Expand
   Click to favorite
   
   ERP systems are the definition of mission-critical. If you were to ask a CISO
   where do they hide the crown jewels, where do they keep their most critical
   data – most likely the answer would be in their ERP system. ERP or Enterprise
   Resource...Show more
   
   Session Tracks: Business
   Session Topic: Securing the Application Journey
 * Breakout
   Vertical
   Service Provider
   APAC
   Securing the 5G Ecosystem
   Expand
   Click to favorite
   
   The successful deployment of 5G networks and services will require the
   implementation of security at all points in the 5G ecosystem. For Service
   Providers building a new 5G-enabled revenue stream, there must be careful
   thought and consideration...Show more
   
   Session Tracks: Vertical
   Session Topic: Service Provider
 * Breakout
   Business
   Securing the Application Journey
   APAC
   Securing the Full Web Application and API Attack Surface
   Expand
   Click to favorite
   
   Are you fully protecting the web application and API attack surface? The
   cyber skills shortage can lead to inadequately deployed security solutions.
   Like a sports car that never gets past first gear, too often the full
   capabilities of security...Show more
   
   Session Tracks: Business
   Session Topic: Securing the Application Journey
 * Breakout
   Vertical
   Retail
   APAC
   Securing the Future of Retail with Fortinet
   Expand
   Click to favorite
   
   In retail, it’s all about the experience, and consistent delivery is key.
   Businesses are always looking to gain competitive advantages by accelerating
   digital transformation, embracing new technologies, bolstering supply chains
   and gaining...Show more
   
   Session Tracks: Vertical
   Session Topic: Retail
 * Breakout
   Technical
   Zero Trust Access
   APAC
   Securing the New Normal - Securing the Extended Enterprise to Home
   Expand
   Click to favorite
   
   Working from home can be both positive and negative. For organizations and
   administrators, the flexibility needed can also extend the attack surface.
   Considerations around competing for limited bandwidth for business-critical
   apps through to...Show more
   
   Session Tracks: Technical
   Session Topic: Zero Trust Access
 * Breakout
   Vertical
   Financial Services
   APAC
   Security Driven Networking for the Financial Services Industry
   Expand
   Click to favorite
   
   Today’s financial services customers are squarely in the crosshairs, 300%
   more likely to be targeted by cyberattacks than any other industry – and the
   financial and regulatory implications of being breached are bigger than ever.
   Join the members...Show more
   
   Session Tracks: Vertical
   Session Topic: Financial Services

Show more


EMEA

 * Breakout
   Technical
   Security Operations
   EMEA
   Augment Your SOC with Fortinet Managed Security Operations Services
   Expand
   Click to favorite
   
   In this session we will describe how Fortinet’s Security Operations portfolio
   of Managed Services supports your end-to-end Monitoring and Response needs by
   complementing the SOC to help overcome challenges such as keeping tabs on a
   changing threat...Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Business
   Ransomware Protection
   EMEA
   Augment Your Team with Ransomware Experts
   Expand
   Click to favorite
   
   Coming SoonShow more
   
   Session Tracks: Business
   Session Topic: Ransomware Protection
 * Breakout
   Technical
   Security Operations
   EMEA
   Automate Security Operations to Transform Your SOC
   Expand
   Click to favorite
   
   Today's Enterprise SOC is burdened with a large volume of alerts, manual
   processes, and many disparate legacy SOC tools. A SOC needs to be equipped
   with modern technologies in order to successfully defend and protect against
   today's attacks. In...Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Vertical
   EMEA
   Automation is Key to Driving Secure Business Growth in the Technology Sector
   Expand
   Click to favorite
   
   Fast-growth companies rely on technology to either differentiate or
   completely create themselves in the marketplace. To keep pace with the rate
   of change in disparate, cloud-centric environments, technology-driven
   organizations need to be able to...Show more
   
   Session Tracks: Vertical
 * Breakout
   Technical
   Adaptive Cloud Security
   EMEA
   Automation: The Key Element for a Safer, Simpler and More Effective
   Multi-Cloud Life-Cycle Management
   Expand
   Click to favorite
   
   Cloud environments have become very complex organisms, where provisioning is
   expected to last just for a few seconds, therefore saving human power which
   gets translated into money-saving and increased effectiveness. Most
   organizations struggle...Show more
   
   Session Tracks: Technical
   Session Topic: Adaptive Cloud Security
 * Breakout
   Technical
   Zero Trust Access
   EMEA
   Brokering Authentication in a Multiple Identity Provider Environment
   Expand
   Click to favorite
   
   There are many common use cases requiring different end-users to be
   authenticated against different Identity Providers (IdPs) For example, a
   school system that uses separate Microsoft Azure tenants for each school
   where each tenant is a different...Show more
   
   Session Tracks: Technical
   Session Topic: Zero Trust Access
 * Breakout
   Partner
   EMEA
   Building a Successful Security Practice with Fortinet Engage
   Expand
   Click to favorite
   
   Hear from our global channel leadership team about the exciting things coming
   for the Engage Partner Program, what the Fortinet Fabric means for your
   business, and how we continue to support our channel to drive profitability
   and expertise.Show more
   
   Session Tracks: Partner
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   EMEA
   Building the Right Strategy to Secure the Next-Generation of Web
   Expand
   Click to favorite
   
   Web traffic comprises an increasing volume of the total traffic for many
   organizations. As a result, the Web continues to be one of the top attack
   vectors for delivering today’s rapidly evolving threats. In addition,
   web-based attacks have become...Show more
   
   Session Tracks: Business
   Session Topic: Securing Digital Acceleration (Networks)
 * Breakout
   Partner
   EMEA
   Cloud Enterprise Business Transformation with GSIs
   Expand
   Click to favorite
   
   Organizations are increasingly deploying a variety of workloads across
   multiple clouds. In turn, business-critical data and services are
   increasingly scattered across this distributed infrastructure. Using the
   shared responsibility model as a...Show more
   
   Session Tracks: Partner
 * Breakout
   Technical
   Security-Driven Networking
   EMEA
   Cloud Security Web Gateway
   Expand
   Click to favorite
   
   In this session, we will discuss the future of converged security and
   networking. From Secure Web Gateway, client browser Isolation, ZTNA, and
   cloud-delivered NGFW, the Fortinet platform provides a complete solution for
   any organization. Join us...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Business
   Ransomware Protection
   EMEA
   Continuously and Proactively Monitor for Ransomware 24x7x365
   Expand
   Click to favorite
   
   Even with all of the best security solutions deployed for the prevention and
   detection of threats, someone needs to watch over security as a whole,
   investigate alerts and respond to confirmed incidents. Unfortunately,
   according to Gartner, 78% of...Show more
   
   Session Tracks: Business
   Session Topic: Ransomware Protection
 * Breakout
   Technical
   Security-Driven Networking
   EMEA
   Delivering Enterprise-Grade Security at Any Edge at Any Scale
   Expand
   Click to favorite
   
   Be the first to find out more about the latest Next Gen NGFW in the FortiGate
   mid-range and High-end platforms and enhance your Enterprise-Grade security
   by deploying some of the latest Security services from FortiOS 7.2. We will
   introduce you to...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Technical
   Security Operations
   EMEA
   Delivering New Intelligence and Insights to Proactively Hunt for Threats
   Before They Emerge Using Deception
   Expand
   Click to favorite
   
   Sophisticated cyberattacks often happen during downtimes and when least
   expected. Today's enterprises must be vigilant to proactively detect and hunt
   for suspicious activities and perform reconnaissance across their digital
   attack surface to avoid...Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Technical
   Security Operations
   EMEA
   Demystifying Network Detection Response with FortiNDR
   Expand
   Click to favorite
   
   Is Network Detection Response (NDR) the next hype cycle in Cyber Security?
   What are the key challenges in SecOps and where does NDR fit into the big
   picture? Is ML/AI-based detection aiding detection or does it have its flaws?
   In this session,...Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Business
   Ransomware Protection
   EMEA
   Detect Ransomware Along the Cyber Kill Chain - Part II
   Expand
   Click to favorite
   
   As much as organizations try to prevent cybercriminals from gaining a
   foothold within their organization, that is unsustainable over an extended
   period of time, given the sophistication of many of today's multi-stage
   ransomware campaigns...Show more
   
   Session Tracks: Business
   Session Topic: Ransomware Protection
 * Breakout
   Business
   Ransomware Protection
   EMEA
   Detect Ransomware Along the Cyber Kill Chain - Part I
   Expand
   Click to favorite
   
   This session will discuss how ransomware operators are designing campaigns
   and weaponizing payloads to evade traditional security controls and
   successfully insert components within unsuspecting organizations. It will
   further outline advanced...Show more
   
   Session Tracks: Business
   Session Topic: Ransomware Protection
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   EMEA
   Don’t Let a Simple Configuration Error Open the Door for Hackers
   Expand
   Click to favorite
   
   The rapidly changing security threat landscape requires organizations of all
   sizes to become more agile, proactive, and in control of their security
   fabric. Accelerate the convergence of network and security with centralized
   management and...Show more
   
   Session Tracks: Business
   Session Topic: Securing Digital Acceleration (Networks)
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   EMEA
   Don't Let Hackers Derail Business Growth: Fortify Your Network
   Expand
   Click to favorite
   
   Enterprise networks are under enormous pressure to allow users to connect to
   any application from any location using any device creating and exposing many
   edges in the hybrid IT architecture. Legacy firewalls were never designed to
   provide...Show more
   
   Session Tracks: Business
   Session Topic: Securing Digital Acceleration (Networks)
 * Breakout
   Technical
   Security Operations
   EMEA
   Expanding Core Attack Surface Protections to Defend Against Ransomware
   Attacks
   Expand
   Click to favorite
   
   Sophisticated outbreaks demand quick action from many points across the
   attack surface, from initial vulnerability detection and exploit prevention,
   to post-exploit defusion and incident response. In this session, we'll
   introduce new capabilities...Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Vertical
   Federal
   EMEA
   Federal Cybersecurity as a Team Sport
   Expand
   Click to favorite
   
   Cybersecurity is a top-of-mind issue for Federal managers, employees, and
   citizens alike. While there are dedicated security professionals within
   agencies, every user bears some responsibility for ensuring security. No
   agency arguably has enough...Show more
   
   Session Tracks: Vertical
   Session Topic: Federal
 * Breakout
   Business
   Work from Anywhere
   EMEA
   FortiEDR, the First and Last Line of Defense
   Expand
   Click to favorite
   
   Before the pandemic, 70% of endpoints were outside the traditional network
   once a week and 54% more than twice a week. Today, the percentage of those
   endpoints at home or away in other places five days a week is considerably
   higher. According to a...Show more
   
   Session Tracks: Business
   Session Topic: Work from Anywhere
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   EMEA
   Gain User-to-Application Visibility Over Modern Networks with Digital
   Experience Monitoring
   Expand
   Click to favorite
   
   Organizations no longer own all the infrastructure their employee traffic
   transverses but are still responsible for the end-to-end employee experience.
   Network teams are shifting focus from traditional network performance
   monitoring to...Show more
   
   Session Tracks: Business
   Session Topic: Securing Digital Acceleration (Networks)
 * Breakout
   Partner
   EMEA
   GSI Growth Opportunities in 5G-Enabled Industrial Environments
   Expand
   Click to favorite
   
   Enterprises, and specifically OT-rich enterprises in many verticals, are
   early adopters of 5G as a technology to enable and accelerate Industry 4.0,
   automation, agility, safety, and overall innovation in their products,
   services, and operations...Show more
   
   Session Tracks: Partner
 * Breakout
   Partner
   EMEA
   GSIs: Monetizing Fortinet End-to-End Zero Trust Architecture
   Expand
   Click to favorite
   
   Organizations need to simultaneously support accelerated digital business
   initiatives and the growth of remote working, while protecting their users,
   data, and applications against an aggressive threat landscape. This
   represents both a challenge...Show more
   
   Session Tracks: Partner
 * Breakout
   Vertical
   Federal
   EMEA
   How Government Is Putting Trust in Cybersecurity
   Expand
   Click to favorite
   
   Protection and security come in many different forms. From moats surrounding
   castles to armed forces watching over citizens to chief information security
   officers ensuring data security, the need to protect is ever prevalent.
   However, now in the...Show more
   
   Session Tracks: Vertical
   Session Topic: Federal
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   EMEA
   Improve LAN Edge Performance and Security with Intelligence Throughout the
   Fabric
   Expand
   Click to favorite
   
   IT groups are looking for ways to unburden staff from day-to-day tactical
   efforts for a more strategic focus. While Artificial Intelligence with
   Machine Learning gets most of the hype, there are varying levels and areas
   for intelligence...Show more
   
   Session Tracks: Business
   Session Topic: Securing Digital Acceleration (Networks)
 * Breakout
   Vertical
   OT
   EMEA
   Industrial Security for Power Utilities with the Fortinet Security Fabric:
   Power Utility Customer Panel
   Expand
   Click to favorite
   
   Power utilities are essential for public health, ecosystem protection, and
   economic strength. As utilities transform, digital security is necessary to
   protect the legacy and modern equipment which serve citizens and communities.
   As operational...Show more
   
   Session Tracks: Vertical
   Session Topic: OT
 * Breakout
   Technical
   Security-Driven Networking
   EMEA
   LAN Edge – Secure and Automated
   Expand
   Click to favorite
   
   Automate your Enterprise Wired and Wireless LAN. Check out Fortinet's
   seamlessly integrated and scalable LAN Edge solutions with cutting-edge
   FortiAP and FortiSwitch hardware, zero-touch provisioning, integration with
   Security Fabric and AI-Driven...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Technical
   Security Operations
   EMEA
   Machine Learning Fueled Automated Endpoint Protection Across the Security
   Ecosystem
   Expand
   Click to favorite
   
   Learn how FortiEDR can dynamically classify incidents utilizing machine
   learning and apply customized eXtended incident response recipes across the
   entire security ecosystem.Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Technical
   Zero Trust Access
   EMEA
   Managing Risk with Adaptive Authentication in FortiToken Cloud
   Expand
   Click to favorite
   
   Multi-factor authentication provides more security than password-only logins,
   but it comes at the cost of inconvenience for end-users. The adaptive
   authentication feature uses the available information regarding a login
   attempt (e.g., time of day,...Show more
   
   Session Tracks: Technical
   Session Topic: Zero Trust Access
 * Breakout
   Vertical
   OT
   EMEA
   Manufacturing Customer Panel: Digital Security for Legacy and Modern
   Manufacturing
   Expand
   Click to favorite
   
   The future of digital security for manufacturing industrial controls and
   SCADA systems will be governed by readiness. As digital transformation
   increases the number and type of devices connecting to the network, such as
   smart sensors, valves, and...Show more
   
   Session Tracks: Vertical
   Session Topic: OT
 * Breakout
   Technical
   Zero Trust Access
   EMEA
   Modernizing Your Performance Monitoring to Digital Experience Monitoring
   Expand
   Click to favorite
   
   In this session, we'll explore how network teams may not own the entirety of
   a user connection but will ultimately be responsible for the digital
   experience. Users may be operating from the office, on the move, or, as is
   increasingly the case, at...Show more
   
   Session Tracks: Technical
   Session Topic: Zero Trust Access
 * Breakout
   Technical
   Security-Driven Networking
   EMEA
   Modernizing Your WAN Edge with Fortinet Secure SD-WAN
   Expand
   Click to favorite
   
   The most versatile solution in the market just received its most significant
   update to date. Fortinet Secure SD-WAN makes it easier than ever to modernize
   your WAN edge and converge your Work From Anywhere (WFA) users wherever they
   are located...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Vertical
   Healthcare
   EMEA
   Protect Connected Medical Devices and Networks Against Ransomware and
   Evolving Threats
   Expand
   Click to favorite
   
   Healthcare and Life Sciences organizations are developing strategies and
   tactical plans to defend against Ransomware and evolving threats impacting
   the entire ecosystem. Fortinet Healthcare team will engage customers in a
   fireside chat to talk...Show more
   
   Session Tracks: Vertical
   Session Topic: Healthcare
 * Breakout
   Technical
   Adaptive Cloud Security
   EMEA
   Protecting APIs and Using Machine Learning to Quickly Identify Real Threats
   Expand
   Click to favorite
   
   The digital transformation and the pandemic accelerated the use of
   applications in pretty much every aspect of our lives. This is driving the
   proliferation of APIs creating an entirely new attack surface organizations
   now need to protect. In this...Show more
   
   Session Tracks: Technical
   Session Topic: Adaptive Cloud Security
 * Breakout
   Technical
   Zero Trust Access
   EMEA
   Protecting Your Enterprise Modern-day Hybrid Workplace with Zero Trust
   Expand
   Click to favorite
   
   With the onset of mass remote working, the hybrid workplace has weakened the
   approach to perimeter security. Applications are moving from the data center
   to cloud, and users are connecting from anywhere and everywhere. This
   transition to...Show more
   
   Session Tracks: Technical
   Session Topic: Zero Trust Access
 * Breakout
   Technical
   Adaptive Cloud Security
   EMEA
   Reducing the Signal to Noise Ratio from Cloud Security Services such as
   Microsoft Defender & Amazon GuardDuty
   Expand
   Click to favorite
   
   As cloud workloads are being deployed at a rapid pace, keeping up with
   security is increasingly challenging. In order to get the best security
   coverage across the growing number of workloads, Security professionals
   choose to utilize cloud-native...Show more
   
   Session Tracks: Technical
   Session Topic: Adaptive Cloud Security
 * Breakout
   Business
   Securing Digital Acceleration (Networks)
   EMEA
   SD-WAN and 5G/LTE Are Here To Transform The WAN Edge. Do You Have The Right
   Solution?
   Expand
   Click to favorite
   
   Digital transformation and work-from-anywhere are creating many edges for
   organizations to support. These edges are causing major challenges for
   organizations to deliver superior quality of experience and effective
   security posture. At the same...Show more
   
   Session Tracks: Business
   Session Topic: Securing Digital Acceleration (Networks)
 * Breakout
   Business
   Work from Anywhere
   EMEA
   Secure and Efficient Communications in a Hybrid World
   Expand
   Click to favorite
   
   Digital innovation is rapidly changing the way people communicate. The shift
   to remote working during the pandemic has further driven the demand for
   network infrastructure and connectivity rapidly. The need for communication
   tools to keep...Show more
   
   Session Tracks: Business
   Session Topic: Work from Anywhere
 * Breakout
   Business
   Securing the Application Journey
   EMEA
   Securing CI/CD Pipeline
   Expand
   Click to favorite
   
   The way in which software applications are developed has changed
   significantly over the past 10 years. Traditionally, SW applications relied
   on monolithic SW architectures that contained all the core functions and
   features of an application in a...Show more
   
   Session Tracks: Business
   Session Topic: Securing the Application Journey
 * Breakout
   Fortinet Fabric Story
   EMEA
   Securing Digital Acceleration Across All Application Journeys
   Expand
   Click to favorite
   
   Many organizations have expedited their application journey to the cloud in
   response to external factors such as the need to support digital acceleration
   efforts or the push to enable employees to work from anywhere (WFA). Often
   organizations have...Show more
   
   Session Tracks: Fortinet Fabric Story
 * Breakout
   Vertical
   Education
   EMEA
   Securing Education with the Fortinet Security Fabric
   Expand
   Click to favorite
   
   The threat landscape is continuously evolving in the education sector.
   Investing in comprehensive cybersecurity strategies not only protects
   sensitive data and infrastructure but can also help reduce costs down the
   line. During this customer...Show more
   
   Session Tracks: Vertical
   Session Topic: Education
 * Breakout
   Fortinet Fabric Story
   OT Security
   EMEA
   Securing OT in the Face of Digital Transformation
   Expand
   Click to favorite
   
   The attack surface for OT environments is expanding because Digital
   Transformation often requires taking data out of industrial assets to deliver
   outcomes in the cloud and because the pandemic requires more remote
   connectivity to industrial...Show more
   
   Session Tracks: Fortinet Fabric Story
   Session Topic: OT Security
 * Breakout
   Technical
   Security-Driven Networking
   EMEA
   Securing OT Networks from Evolving Cyber-threats
   Expand
   Click to favorite
   
   Digital innovation and transformation impact every business and organization.
   Some of these businesses and organizations may be part of critical
   infrastructure or national critical infrastructure and depend on technologies
   like industrial...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Technical
   Adaptive Cloud Security
   EMEA
   Securing SaaS Application Data & Access (O365 example)
   Expand
   Click to favorite
   
   All enterprises rely on the use of SaaS applications like Office 365 to
   empower their workforce and deliver business results. This means storing the
   company's sensitive data in 3rd party systems that are accessible on the
   Internet. In this...Show more
   
   Session Tracks: Technical
   Session Topic: Adaptive Cloud Security
 * Breakout
   Business
   Securing the Application Journey
   EMEA
   Securing SAP and Oracle ERP Deployments
   Expand
   Click to favorite
   
   ERP systems are the definition of mission-critical. If you were to ask a CISO
   where do they hide the crown jewels, where do they keep their most critical
   data – most likely the answer would be in their ERP system. ERP or Enterprise
   Resource...Show more
   
   Session Tracks: Business
   Session Topic: Securing the Application Journey
 * Breakout
   Vertical
   Service Provider
   EMEA
   Securing the 5G Ecosystem
   Expand
   Click to favorite
   
   The successful deployment of 5G networks and services will require the
   implementation of security at all points in the 5G ecosystem. For Service
   Providers building a new 5G-enabled revenue stream, there must be careful
   thought and consideration...Show more
   
   Session Tracks: Vertical
   Session Topic: Service Provider
 * Breakout
   Business
   Securing the Application Journey
   EMEA
   Securing the Full Web Application and API Attack Surface
   Expand
   Click to favorite
   
   Are you fully protecting the web application and API attack surface? The
   cyber skills shortage can lead to inadequately deployed security solutions.
   Like a sports car that never gets past first gear, too often the full
   capabilities of security...Show more
   
   Session Tracks: Business
   Session Topic: Securing the Application Journey
 * Breakout
   Vertical
   Retail
   EMEA
   Securing the Future of Retail with Fortinet
   Expand
   Click to favorite
   
   In retail, it’s all about the experience, and consistent delivery is key.
   Businesses are always looking to gain competitive advantages by accelerating
   digital transformation, embracing new technologies, bolstering supply chains
   and gaining...Show more
   
   Session Tracks: Vertical
   Session Topic: Retail
 * Breakout
   Technical
   Zero Trust Access
   EMEA
   Securing the New Normal - Securing the Extended Enterprise to Home
   Expand
   Click to favorite
   
   Working from home can be both positive and negative. For organizations and
   administrators, the flexibility needed can also extend the attack surface.
   Considerations around competing for limited bandwidth for business-critical
   apps through to...Show more
   
   Session Tracks: Technical
   Session Topic: Zero Trust Access

Show more
Featured Sessions


WORK FROM ANYWHERE

Uncover the framework for how the Fortinet Security Fabric enables a unique and
complete WFA solution that supports organizations and their employees with an
innovative, yet sensible approach to this complex issue.


OT SECURITY

Find out how Fortinet products differentiate in OT and how our OT ecosystem of
fabric-ready partners extend the capabilities.


SECURING DIGITAL ACCELERATION NETWORKS

Discover Fortinet’s unique approach to security-driven networking to enable
best-in-class convergence to provide a consistent security and digital
experience across all network edges.


SECURING DIGITAL ACCELERATION APPLICATIONS

Learn about the key considerations for developing a robust and secure digital
acceleration strategy for all your application journeys.


PREVENTING RANSOMWARE

Gain deep perspectives from your peers about ransomware, including the top
methods cyber criminals used to gain access to their organization.


EVERYWHERE YOU NEED IT

See why the Fortinet Security Fabric has become the reference model for
Gartner’s Cybersecurity Mesh Architecture (CSMA).

Questions? Contact Us




 * About
 * Event FAQ's
 * Privacy Policy

 * 
 * 
 * 
 * 
   © 2021. All rights reserved.




"
×
We Value Your Privacy
Settings
NextRoll, Inc. ("NextRoll") and our advertising partners use cookies and similar
technologies on this site and use personal data (e.g., your IP address). If you
consent, the cookies, device identifiers, or other information can be stored or
accessed on your device for the purposes described below. You can click "Allow
All" or "Decline All" or click Settings above to customize your consent.
NextRoll and our advertising partners process personal data to: ● Store and/or
access information on a device; ● Create a personalized content profile; ●
Select personalised content; ● Personalized ads, ad measurement and audience
insights; ● Product development. For some of the purposes above, our advertising
partners: ● Use precise geolocation data. Some of our partners rely on their
legitimate business interests to process personal data. View our advertising
partners if you wish to provide or deny consent for specific partners, review
the purposes each partner believes they have a legitimate interest for, and
object to such processing.
If you select Decline All, you will still be able to view content on this site
and you will still receive advertising, but the advertising will not be tailored
for you. You may change your setting whenever you see the Manage consent
preferences on this site.
Decline All
Allow All
Manage consent preferences