reg.fortinetaccelerate.com Open in urlscan Pro
35.164.246.48  Public Scan

Submitted URL: https://apps.global.fortinet.com/e/er?s=3049749&lid=2087&elqTrackId=b05b3f67148a45a4b54a6ec6fb7f3684&elq=53dc4ea86a7c4158abb52627...
Effective URL: https://reg.fortinetaccelerate.com/flow/fortinet/accelerate2022/sessioncatalog/page/sessioncatalog?search.sessiontracks=16389156376...
Submission: On March 02 via api from SE — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Cookie Policy
This site uses cookies to provide you with a more responsive and personalized
service. By using this site and clicking on the "Accept" button, you agree to
our use of cookies. Please read our Privacy Policy for more information on the
types of cookies we use and how to delete or block them. Learn more
DeclineAccept
 * Login


FILTERS

Clear

Search
 * widgets.catalog.result.title.heart.solidSession Tracks
   
   PartnerPartner
   
   VerticalVertical
   
   BusinessBusiness
   
   TechnicalTechnical
   
   Fortinet Fabric StoryFortinet Fabric Story
 * widgets.catalog.result.title.heart.solidSession Topic
   
   Work from AnywhereWork from Anywhere
   
   Securing Digital Acceleration (Networks) Securing Digital Acceleration
   (Networks)
   
   Preventing Ransomware Preventing Ransomware
   
   Security FabricSecurity Fabric
   
   OT SecurityOT Security
   
   Zero Trust AccessZero Trust Access
   
   Security-Driven Networking Security-Driven Networking
   
   Adaptive Cloud Security Adaptive Cloud Security
   
   RetailRetail
   
   Financial Services Financial Services
   
   HealthcareHealthcare
   
   Service Provider Service Provider
   
   Security Operations Security Operations
   
   EducationEducation
   
   OTOT
   
   FederalFederal
   
   Ransomware ProtectionRansomware Protection
   
   Securing the Application JourneySecuring the Application Journey
 * widgets.catalog.result.title.heart.solidRegion
   
   AmericasAmericas
   
   APACAPAC
   
   EMEAEMEA

Technical ×
71 sessions


AMERICAS

 * Breakout
   Technical
   Security Operations
   Day 2
   Americas
   Augment Your SOC with Fortinet Managed Security Operations Services
   Expand
   Click to favorite
   
   In this session we will describe how Fortinet’s Security Operations portfolio
   of Managed Services supports your end-to-end Monitoring and Response needs by
   complementing the SOC to help overcome challenges such as keeping tabs on a
   changing threat...Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Technical
   Security Operations
   Day 2
   Americas
   Automate Security Operations to Transform Your SOC
   Expand
   Click to favorite
   
   Today's Enterprise SOC is burdened with a large volume of alerts, manual
   processes, and many disparate legacy SOC tools. A SOC needs to be equipped
   with modern technologies in order to successfully defend and protect against
   today's attacks. In...Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Technical
   Adaptive Cloud Security
   Day 2
   Americas
   Automation: The Key Element for a Safer, Simpler and More Effective
   Multi-Cloud Life-Cycle Management
   Expand
   Click to favorite
   
   Cloud environments have become very complex organisms, where provisioning is
   expected to last just for a few seconds, therefore saving human power which
   gets translated into money-saving and increased effectiveness. Most
   organizations struggle...Show more
   
   Session Tracks: Technical
   Session Topic: Adaptive Cloud Security
 * Breakout
   Technical
   Zero Trust Access
   Day 2
   Americas
   Brokering Authentication in a Multiple Identity Provider Environment
   Expand
   Click to favorite
   
   There are many common use cases requiring different end-users to be
   authenticated against different Identity Providers (IdPs) For example, a
   school system that uses separate Microsoft Azure tenants for each school
   where each tenant is a different...Show more
   
   Session Tracks: Technical
   Session Topic: Zero Trust Access
 * Breakout
   Technical
   Security-Driven Networking
   Day 2
   Americas
   Cloud Security Web Gateway
   Expand
   Click to favorite
   
   In this session, we will discuss the future of converged security and
   networking. From Secure Web Gateway, client browser Isolation, ZTNA, and
   cloud-delivered NGFW, the Fortinet platform provides a complete solution for
   any organization. Join us...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Technical
   Security-Driven Networking
   Day 2
   Americas
   Delivering Enterprise-Grade Security at Any Edge at Any Scale
   Expand
   Click to favorite
   
   Be the first to find out more about the latest Next Gen NGFW in the FortiGate
   mid-range and High-end platforms and enhance your Enterprise-Grade security
   by deploying some of the latest Security services from FortiOS 7.2. We will
   introduce you to...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Technical
   Security Operations
   Day 2
   Americas
   Delivering New Intelligence and Insights to Proactively Hunt for Threats
   Before They Emerge Using Deception
   Expand
   Click to favorite
   
   Sophisticated cyberattacks often happen during downtimes and when least
   expected. Today's enterprises must be vigilant to proactively detect and hunt
   for suspicious activities and perform reconnaissance across their digital
   attack surface to avoid...Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Technical
   Security Operations
   Day 2
   Americas
   Demystifying Network Detection Response with FortiNDR
   Expand
   Click to favorite
   
   Is Network Detection Response (NDR) the next hype cycle in Cyber Security?
   What are the key challenges in SecOps and where does NDR fit into the big
   picture? Is ML/AI-based detection aiding detection or does it have its flaws?
   In this session,...Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Technical
   Security Operations
   Day 2
   Americas
   Expanding Core Attack Surface Protections to Defend Against Ransomware
   Attacks
   Expand
   Click to favorite
   
   Sophisticated outbreaks demand quick action from many points across the
   attack surface, from initial vulnerability detection and exploit prevention,
   to post-exploit defusion and incident response. In this session, we'll
   introduce new capabilities...Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Technical
   Security-Driven Networking
   Day 2
   Americas
   LAN Edge – Secure and Automated
   Expand
   Click to favorite
   
   Automate your Enterprise Wired and Wireless LAN. Check out Fortinet's
   seamlessly integrated and scalable LAN Edge solutions with cutting-edge
   FortiAP and FortiSwitch hardware, zero-touch provisioning, integration with
   Security Fabric and AI-Driven...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Technical
   Security Operations
   Day 2
   Americas
   Machine Learning Fueled Automated Endpoint Protection Across the Security
   Ecosystem
   Expand
   Click to favorite
   
   Learn how FortiEDR can dynamically classify incidents utilizing machine
   learning and apply customized eXtended incident response recipes across the
   entire security ecosystem.Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Technical
   Zero Trust Access
   Day 2
   Americas
   Managing Risk with Adaptive Authentication in FortiToken Cloud
   Expand
   Click to favorite
   
   Multi-factor authentication provides more security than password-only logins,
   but it comes at the cost of inconvenience for end-users. The adaptive
   authentication feature uses the available information regarding a login
   attempt (e.g., time of day,...Show more
   
   Session Tracks: Technical
   Session Topic: Zero Trust Access
 * Breakout
   Technical
   Zero Trust Access
   Day 2
   Americas
   Modernizing Your Performance Monitoring to Digital Experience Monitoring
   Expand
   Click to favorite
   
   In this session, we'll explore how network teams may not own the entirety of
   a user connection but will ultimately be responsible for the digital
   experience. Users may be operating from the office, on the move, or, as is
   increasingly the case, at...Show more
   
   Session Tracks: Technical
   Session Topic: Zero Trust Access
 * Breakout
   Technical
   Security-Driven Networking
   Day 2
   Americas
   Modernizing Your WAN Edge with Fortinet Secure SD-WAN
   Expand
   Click to favorite
   
   The most versatile solution in the market just received its most significant
   update to date. Fortinet Secure SD-WAN makes it easier than ever to modernize
   your WAN edge and converge your Work From Anywhere (WFA) users wherever they
   are located...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Technical
   Adaptive Cloud Security
   Day 2
   Americas
   Protecting APIs and Using Machine Learning to Quickly Identify Real Threats
   Expand
   Click to favorite
   
   The digital transformation and the pandemic accelerated the use of
   applications in pretty much every aspect of our lives. This is driving the
   proliferation of APIs creating an entirely new attack surface organizations
   now need to protect. In this...Show more
   
   Session Tracks: Technical
   Session Topic: Adaptive Cloud Security
 * Breakout
   Technical
   Zero Trust Access
   Day 2
   Americas
   Protecting Your Enterprise Modern-day Hybrid Workplace with Zero Trust
   Expand
   Click to favorite
   
   With the onset of mass remote working, the hybrid workplace has weakened the
   approach to perimeter security. Applications are moving from the data center
   to cloud, and users are connecting from anywhere and everywhere. This
   transition to...Show more
   
   Session Tracks: Technical
   Session Topic: Zero Trust Access
 * Breakout
   Technical
   Adaptive Cloud Security
   Day 2
   Americas
   Reducing the Signal to Noise Ratio from Cloud Security Services such as
   Microsoft Defender & Amazon GuardDuty
   Expand
   Click to favorite
   
   As cloud workloads are being deployed at a rapid pace, keeping up with
   security is increasingly challenging. In order to get the best security
   coverage across the growing number of workloads, Security professionals
   choose to utilize cloud-native...Show more
   
   Session Tracks: Technical
   Session Topic: Adaptive Cloud Security
 * Breakout
   Technical
   Security-Driven Networking
   Day 2
   Americas
   Securing OT Networks from Evolving Cyber-threats
   Expand
   Click to favorite
   
   Digital innovation and transformation impact every business and organization.
   Some of these businesses and organizations may be part of critical
   infrastructure or national critical infrastructure and depend on technologies
   like industrial...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Technical
   Adaptive Cloud Security
   Day 2
   Americas
   Securing SaaS Application Data & Access (O365 example)
   Expand
   Click to favorite
   
   All enterprises rely on the use of SaaS applications like Office 365 to
   empower their workforce and deliver business results. This means storing the
   company's sensitive data in 3rd party systems that are accessible on the
   Internet. In this...Show more
   
   Session Tracks: Technical
   Session Topic: Adaptive Cloud Security
 * Breakout
   Technical
   Zero Trust Access
   Day 2
   Americas
   Securing the New Normal - Securing the Extended Enterprise to Home
   Expand
   Click to favorite
   
   Working from home can be both positive and negative. For organizations and
   administrators, the flexibility needed can also extend the attack surface.
   Considerations around competing for limited bandwidth for business-critical
   apps through to...Show more
   
   Session Tracks: Technical
   Session Topic: Zero Trust Access
 * Breakout
   Technical
   Adaptive Cloud Security
   Day 2
   Americas
   Security That Fits Modern Cloud-native Application Development
   Expand
   Click to favorite
   
   Application development has moved from a monolithic to a cloud-native
   architecture built using micro-services, containers, continuous
   integration/deployment, and other DevOps tools/ practices. The old ways of
   scanning the application for security...Show more
   
   Session Tracks: Technical
   Session Topic: Adaptive Cloud Security
 * Breakout
   Technical
   Security-Driven Networking
   Day 2
   Americas
   Single Pane Operation Across On-premises, Clouds and Anywhere
   Expand
   Click to favorite
   
   As enterprises adopt cloud infrastructure and speed up their digital
   transformation, users expect to be able to access all workloads from
   anywhere. To achieve this network teams have to manage resources across
   on-prem locations and the cloud, and...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Technical
   Adaptive Cloud Security
   Day 2
   Americas
   Solving the SAP Security Gap through Application-aware Networking
   Expand
   Click to favorite
   
   SAP is the lifeblood application that runs the enterprise. Be it financial,
   inventory, logistics, SAP runs most major operational aspects of the
   organization. Considering its importance, SAP is very often one of the most
   vulnerable applications a...Show more
   
   Session Tracks: Technical
   Session Topic: Adaptive Cloud Security
 * Breakout
   Technical
   Zero Trust Access
   Day 2
   Americas
   Work from Anywhere with Secure Unified Communications
   Expand
   Click to favorite
   
   Join us to learn about our new FortiVoice Cloud! FortiVoice Cloud offers
   robust and secure cloud communications without the purchase and maintenance
   of PBX hardware. Its subscription-based services reduce IT resource needs and
   enable quick...Show more
   
   Session Tracks: Technical
   Session Topic: Zero Trust Access


APAC

 * Breakout
   Technical
   Security Operations
   APAC
   Augment Your SOC with Fortinet Managed Security Operations Services
   Expand
   Click to favorite
   
   In this session we will describe how Fortinet’s Security Operations portfolio
   of Managed Services supports your end-to-end Monitoring and Response needs by
   complementing the SOC to help overcome challenges such as keeping tabs on a
   changing threat...Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Technical
   Security Operations
   APAC
   Automate Security Operations to Transform Your SOC
   Expand
   Click to favorite
   
   Today's Enterprise SOC is burdened with a large volume of alerts, manual
   processes, and many disparate legacy SOC tools. A SOC needs to be equipped
   with modern technologies in order to successfully defend and protect against
   today's attacks. In...Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Technical
   Adaptive Cloud Security
   APAC
   Automation: The Key Element for a Safer, Simpler and More Effective
   Multi-Cloud Life-Cycle Management
   Expand
   Click to favorite
   
   Cloud environments have become very complex organisms, where provisioning is
   expected to last just for a few seconds, therefore saving human power which
   gets translated into money-saving and increased effectiveness. Most
   organizations struggle...Show more
   
   Session Tracks: Technical
   Session Topic: Adaptive Cloud Security
 * Breakout
   Technical
   Zero Trust Access
   APAC
   Brokering Authentication in a Multiple Identity Provider Environment
   Expand
   Click to favorite
   
   There are many common use cases requiring different end-users to be
   authenticated against different Identity Providers (IdPs) For example, a
   school system that uses separate Microsoft Azure tenants for each school
   where each tenant is a different...Show more
   
   Session Tracks: Technical
   Session Topic: Zero Trust Access
 * Breakout
   Technical
   Security-Driven Networking
   APAC
   Cloud Security Web Gateway
   Expand
   Click to favorite
   
   In this session, we will discuss the future of converged security and
   networking. From Secure Web Gateway, client browser Isolation, ZTNA, and
   cloud-delivered NGFW, the Fortinet platform provides a complete solution for
   any organization. Join us...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Technical
   Security-Driven Networking
   APAC
   Delivering Enterprise-Grade Security at Any Edge at Any Scale
   Expand
   Click to favorite
   
   Be the first to find out more about the latest Next Gen NGFW in the FortiGate
   mid-range and High-end platforms and enhance your Enterprise-Grade security
   by deploying some of the latest Security services from FortiOS 7.2. We will
   introduce you to...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Technical
   Security Operations
   APAC
   Delivering New Intelligence and Insights to Proactively Hunt for Threats
   Before They Emerge Using Deception
   Expand
   Click to favorite
   
   Sophisticated cyberattacks often happen during downtimes and when least
   expected. Today's enterprises must be vigilant to proactively detect and hunt
   for suspicious activities and perform reconnaissance across their digital
   attack surface to avoid...Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Technical
   Security Operations
   APAC
   Demystifying Network Detection Response with FortiNDR
   Expand
   Click to favorite
   
   Is Network Detection Response (NDR) the next hype cycle in Cyber Security?
   What are the key challenges in SecOps and where does NDR fit into the big
   picture? Is ML/AI-based detection aiding detection or does it have its flaws?
   In this session,...Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Technical
   Security Operations
   APAC
   Expanding Core Attack Surface Protections to Defend Against Ransomware
   Attacks
   Expand
   Click to favorite
   
   Sophisticated outbreaks demand quick action from many points across the
   attack surface, from initial vulnerability detection and exploit prevention,
   to post-exploit defusion and incident response. In this session, we'll
   introduce new capabilities...Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Technical
   Security-Driven Networking
   APAC
   LAN Edge – Secure and Automated
   Expand
   Click to favorite
   
   Automate your Enterprise Wired and Wireless LAN. Check out Fortinet's
   seamlessly integrated and scalable LAN Edge solutions with cutting-edge
   FortiAP and FortiSwitch hardware, zero-touch provisioning, integration with
   Security Fabric and AI-Driven...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Technical
   Security Operations
   APAC
   Machine Learning Fueled Automated Endpoint Protection Across the Security
   Ecosystem
   Expand
   Click to favorite
   
   Learn how FortiEDR can dynamically classify incidents utilizing machine
   learning and apply customized eXtended incident response recipes across the
   entire security ecosystem.Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Technical
   Zero Trust Access
   APAC
   Managing Risk with Adaptive Authentication in FortiToken Cloud
   Expand
   Click to favorite
   
   Multi-factor authentication provides more security than password-only logins,
   but it comes at the cost of inconvenience for end-users. The adaptive
   authentication feature uses the available information regarding a login
   attempt (e.g., time of day,...Show more
   
   Session Tracks: Technical
   Session Topic: Zero Trust Access
 * Breakout
   Technical
   Zero Trust Access
   APAC
   Modernizing Your Performance Monitoring to Digital Experience Monitoring
   Expand
   Click to favorite
   
   In this session, we'll explore how network teams may not own the entirety of
   a user connection but will ultimately be responsible for the digital
   experience. Users may be operating from the office, on the move, or, as is
   increasingly the case, at...Show more
   
   Session Tracks: Technical
   Session Topic: Zero Trust Access
 * Breakout
   Technical
   Security-Driven Networking
   APAC
   Modernizing Your WAN Edge with Fortinet Secure SD-WAN
   Expand
   Click to favorite
   
   The most versatile solution in the market just received its most significant
   update to date. Fortinet Secure SD-WAN makes it easier than ever to modernize
   your WAN edge and converge your Work From Anywhere (WFA) users wherever they
   are located...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Technical
   Adaptive Cloud Security
   APAC
   Protecting APIs and Using Machine Learning to Quickly Identify Real Threats
   Expand
   Click to favorite
   
   The digital transformation and the pandemic accelerated the use of
   applications in pretty much every aspect of our lives. This is driving the
   proliferation of APIs creating an entirely new attack surface organizations
   now need to protect. In this...Show more
   
   Session Tracks: Technical
   Session Topic: Adaptive Cloud Security
 * Breakout
   Technical
   Zero Trust Access
   APAC
   Protecting Your Enterprise Modern-day Hybrid Workplace with Zero Trust
   Expand
   Click to favorite
   
   With the onset of mass remote working, the hybrid workplace has weakened the
   approach to perimeter security. Applications are moving from the data center
   to cloud, and users are connecting from anywhere and everywhere. This
   transition to...Show more
   
   Session Tracks: Technical
   Session Topic: Zero Trust Access
 * Breakout
   Technical
   Adaptive Cloud Security
   APAC
   Reducing the Signal to Noise Ratio from Cloud Security Services such as
   Microsoft Defender & Amazon GuardDuty
   Expand
   Click to favorite
   
   As cloud workloads are being deployed at a rapid pace, keeping up with
   security is increasingly challenging. In order to get the best security
   coverage across the growing number of workloads, Security professionals
   choose to utilize cloud-native...Show more
   
   Session Tracks: Technical
   Session Topic: Adaptive Cloud Security
 * Breakout
   Technical
   Security-Driven Networking
   APAC
   Securing OT Networks from Evolving Cyber-threats
   Expand
   Click to favorite
   
   Digital innovation and transformation impact every business and organization.
   Some of these businesses and organizations may be part of critical
   infrastructure or national critical infrastructure and depend on technologies
   like industrial...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Technical
   Zero Trust Access
   APAC
   Securing the New Normal - Securing the Extended Enterprise to Home
   Expand
   Click to favorite
   
   Working from home can be both positive and negative. For organizations and
   administrators, the flexibility needed can also extend the attack surface.
   Considerations around competing for limited bandwidth for business-critical
   apps through to...Show more
   
   Session Tracks: Technical
   Session Topic: Zero Trust Access
 * Breakout
   Technical
   Adaptive Cloud Security
   APAC
   Security That Fits Modern Cloud-native Application Development
   Expand
   Click to favorite
   
   Application development has moved from a monolithic to a cloud-native
   architecture built using micro-services, containers, continuous
   integration/deployment, and other DevOps tools/ practices. The old ways of
   scanning the application for security...Show more
   
   Session Tracks: Technical
   Session Topic: Adaptive Cloud Security
 * Breakout
   Technical
   Security-Driven Networking
   APAC
   Single Pane Operation Across On-premises, Clouds and Anywhere
   Expand
   Click to favorite
   
   As enterprises adopt cloud infrastructure and speed up their digital
   transformation, users expect to be able to access all workloads from
   anywhere. To achieve this network teams have to manage resources across
   on-prem locations and the cloud, and...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Technical
   Adaptive Cloud Security
   APAC
   Solving the SAP Security Gap through Application-aware Networking
   Expand
   Click to favorite
   
   SAP is the lifeblood application that runs the enterprise. Be it financial,
   inventory, logistics, SAP runs most major operational aspects of the
   organization. Considering its importance, SAP is very often one of the most
   vulnerable applications a...Show more
   
   Session Tracks: Technical
   Session Topic: Adaptive Cloud Security
 * Breakout
   Technical
   Zero Trust Access
   APAC
   Work from Anywhere with Secure Unified Communications
   Expand
   Click to favorite
   
   Join us to learn about our new FortiVoice Cloud! FortiVoice Cloud offers
   robust and secure cloud communications without the purchase and maintenance
   of PBX hardware. Its subscription-based services reduce IT resource needs and
   enable quick...Show more
   
   Session Tracks: Technical
   Session Topic: Zero Trust Access


EMEA

 * Breakout
   Technical
   Security Operations
   EMEA
   Augment Your SOC with Fortinet Managed Security Operations Services
   Expand
   Click to favorite
   
   In this session we will describe how Fortinet’s Security Operations portfolio
   of Managed Services supports your end-to-end Monitoring and Response needs by
   complementing the SOC to help overcome challenges such as keeping tabs on a
   changing threat...Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Technical
   Security Operations
   EMEA
   Automate Security Operations to Transform Your SOC
   Expand
   Click to favorite
   
   Today's Enterprise SOC is burdened with a large volume of alerts, manual
   processes, and many disparate legacy SOC tools. A SOC needs to be equipped
   with modern technologies in order to successfully defend and protect against
   today's attacks. In...Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Technical
   Adaptive Cloud Security
   EMEA
   Automation: The Key Element for a Safer, Simpler and More Effective
   Multi-Cloud Life-Cycle Management
   Expand
   Click to favorite
   
   Cloud environments have become very complex organisms, where provisioning is
   expected to last just for a few seconds, therefore saving human power which
   gets translated into money-saving and increased effectiveness. Most
   organizations struggle...Show more
   
   Session Tracks: Technical
   Session Topic: Adaptive Cloud Security
 * Breakout
   Technical
   Zero Trust Access
   EMEA
   Brokering Authentication in a Multiple Identity Provider Environment
   Expand
   Click to favorite
   
   There are many common use cases requiring different end-users to be
   authenticated against different Identity Providers (IdPs) For example, a
   school system that uses separate Microsoft Azure tenants for each school
   where each tenant is a different...Show more
   
   Session Tracks: Technical
   Session Topic: Zero Trust Access
 * Breakout
   Technical
   Security-Driven Networking
   EMEA
   Cloud Security Web Gateway
   Expand
   Click to favorite
   
   In this session, we will discuss the future of converged security and
   networking. From Secure Web Gateway, client browser Isolation, ZTNA, and
   cloud-delivered NGFW, the Fortinet platform provides a complete solution for
   any organization. Join us...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Technical
   Security-Driven Networking
   EMEA
   Delivering Enterprise-Grade Security at Any Edge at Any Scale
   Expand
   Click to favorite
   
   Be the first to find out more about the latest Next Gen NGFW in the FortiGate
   mid-range and High-end platforms and enhance your Enterprise-Grade security
   by deploying some of the latest Security services from FortiOS 7.2. We will
   introduce you to...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Technical
   Security Operations
   EMEA
   Delivering New Intelligence and Insights to Proactively Hunt for Threats
   Before They Emerge Using Deception
   Expand
   Click to favorite
   
   Sophisticated cyberattacks often happen during downtimes and when least
   expected. Today's enterprises must be vigilant to proactively detect and hunt
   for suspicious activities and perform reconnaissance across their digital
   attack surface to avoid...Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Technical
   Security Operations
   EMEA
   Demystifying Network Detection Response with FortiNDR
   Expand
   Click to favorite
   
   Is Network Detection Response (NDR) the next hype cycle in Cyber Security?
   What are the key challenges in SecOps and where does NDR fit into the big
   picture? Is ML/AI-based detection aiding detection or does it have its flaws?
   In this session,...Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Technical
   Security Operations
   EMEA
   Expanding Core Attack Surface Protections to Defend Against Ransomware
   Attacks
   Expand
   Click to favorite
   
   Sophisticated outbreaks demand quick action from many points across the
   attack surface, from initial vulnerability detection and exploit prevention,
   to post-exploit defusion and incident response. In this session, we'll
   introduce new capabilities...Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Technical
   Security-Driven Networking
   EMEA
   LAN Edge – Secure and Automated
   Expand
   Click to favorite
   
   Automate your Enterprise Wired and Wireless LAN. Check out Fortinet's
   seamlessly integrated and scalable LAN Edge solutions with cutting-edge
   FortiAP and FortiSwitch hardware, zero-touch provisioning, integration with
   Security Fabric and AI-Driven...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Technical
   Security Operations
   EMEA
   Machine Learning Fueled Automated Endpoint Protection Across the Security
   Ecosystem
   Expand
   Click to favorite
   
   Learn how FortiEDR can dynamically classify incidents utilizing machine
   learning and apply customized eXtended incident response recipes across the
   entire security ecosystem.Show more
   
   Session Tracks: Technical
   Session Topic: Security Operations
 * Breakout
   Technical
   Zero Trust Access
   EMEA
   Managing Risk with Adaptive Authentication in FortiToken Cloud
   Expand
   Click to favorite
   
   Multi-factor authentication provides more security than password-only logins,
   but it comes at the cost of inconvenience for end-users. The adaptive
   authentication feature uses the available information regarding a login
   attempt (e.g., time of day,...Show more
   
   Session Tracks: Technical
   Session Topic: Zero Trust Access
 * Breakout
   Technical
   Zero Trust Access
   EMEA
   Modernizing Your Performance Monitoring to Digital Experience Monitoring
   Expand
   Click to favorite
   
   In this session, we'll explore how network teams may not own the entirety of
   a user connection but will ultimately be responsible for the digital
   experience. Users may be operating from the office, on the move, or, as is
   increasingly the case, at...Show more
   
   Session Tracks: Technical
   Session Topic: Zero Trust Access
 * Breakout
   Technical
   Security-Driven Networking
   EMEA
   Modernizing Your WAN Edge with Fortinet Secure SD-WAN
   Expand
   Click to favorite
   
   The most versatile solution in the market just received its most significant
   update to date. Fortinet Secure SD-WAN makes it easier than ever to modernize
   your WAN edge and converge your Work From Anywhere (WFA) users wherever they
   are located...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Technical
   Adaptive Cloud Security
   EMEA
   Protecting APIs and Using Machine Learning to Quickly Identify Real Threats
   Expand
   Click to favorite
   
   The digital transformation and the pandemic accelerated the use of
   applications in pretty much every aspect of our lives. This is driving the
   proliferation of APIs creating an entirely new attack surface organizations
   now need to protect. In this...Show more
   
   Session Tracks: Technical
   Session Topic: Adaptive Cloud Security
 * Breakout
   Technical
   Zero Trust Access
   EMEA
   Protecting Your Enterprise Modern-day Hybrid Workplace with Zero Trust
   Expand
   Click to favorite
   
   With the onset of mass remote working, the hybrid workplace has weakened the
   approach to perimeter security. Applications are moving from the data center
   to cloud, and users are connecting from anywhere and everywhere. This
   transition to...Show more
   
   Session Tracks: Technical
   Session Topic: Zero Trust Access
 * Breakout
   Technical
   Adaptive Cloud Security
   EMEA
   Reducing the Signal to Noise Ratio from Cloud Security Services such as
   Microsoft Defender & Amazon GuardDuty
   Expand
   Click to favorite
   
   As cloud workloads are being deployed at a rapid pace, keeping up with
   security is increasingly challenging. In order to get the best security
   coverage across the growing number of workloads, Security professionals
   choose to utilize cloud-native...Show more
   
   Session Tracks: Technical
   Session Topic: Adaptive Cloud Security
 * Breakout
   Technical
   Security-Driven Networking
   EMEA
   Securing OT Networks from Evolving Cyber-threats
   Expand
   Click to favorite
   
   Digital innovation and transformation impact every business and organization.
   Some of these businesses and organizations may be part of critical
   infrastructure or national critical infrastructure and depend on technologies
   like industrial...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Technical
   Adaptive Cloud Security
   EMEA
   Securing SaaS Application Data & Access (O365 example)
   Expand
   Click to favorite
   
   All enterprises rely on the use of SaaS applications like Office 365 to
   empower their workforce and deliver business results. This means storing the
   company's sensitive data in 3rd party systems that are accessible on the
   Internet. In this...Show more
   
   Session Tracks: Technical
   Session Topic: Adaptive Cloud Security
 * Breakout
   Technical
   Zero Trust Access
   EMEA
   Securing the New Normal - Securing the Extended Enterprise to Home
   Expand
   Click to favorite
   
   Working from home can be both positive and negative. For organizations and
   administrators, the flexibility needed can also extend the attack surface.
   Considerations around competing for limited bandwidth for business-critical
   apps through to...Show more
   
   Session Tracks: Technical
   Session Topic: Zero Trust Access
 * Breakout
   Technical
   Adaptive Cloud Security
   EMEA
   Security That Fits Modern Cloud-native Application Development
   Expand
   Click to favorite
   
   Application development has moved from a monolithic to a cloud-native
   architecture built using micro-services, containers, continuous
   integration/deployment, and other DevOps tools/ practices. The old ways of
   scanning the application for security...Show more
   
   Session Tracks: Technical
   Session Topic: Adaptive Cloud Security
 * Breakout
   Technical
   Security-Driven Networking
   EMEA
   Single Pane Operation Across On-premises, Clouds and Anywhere
   Expand
   Click to favorite
   
   As enterprises adopt cloud infrastructure and speed up their digital
   transformation, users expect to be able to access all workloads from
   anywhere. To achieve this network teams have to manage resources across
   on-prem locations and the cloud, and...Show more
   
   Session Tracks: Technical
   Session Topic: Security-Driven Networking
 * Breakout
   Technical
   Adaptive Cloud Security
   EMEA
   Solving the SAP Security Gap through Application-aware Networking
   Expand
   Click to favorite
   
   SAP is the lifeblood application that runs the enterprise. Be it financial,
   inventory, logistics, SAP runs most major operational aspects of the
   organization. Considering its importance, SAP is very often one of the most
   vulnerable applications a...Show more
   
   Session Tracks: Technical
   Session Topic: Adaptive Cloud Security
 * Breakout
   Technical
   Zero Trust Access
   EMEA
   Work from Anywhere with Secure Unified Communications
   Expand
   Click to favorite
   
   Join us to learn about our new FortiVoice Cloud! FortiVoice Cloud offers
   robust and secure cloud communications without the purchase and maintenance
   of PBX hardware. Its subscription-based services reduce IT resource needs and
   enable quick...Show more
   
   Session Tracks: Technical
   Session Topic: Zero Trust Access





--------------------------------------------------------------------------------


Check us out on Facebook Check us out on Instagram Check us out on Twitter Check
us out on LinkedIn Check us out on YouTube

© 2022. All rights reserved.

Powered by    Powered by RainFocus


"
×
We Value Your Privacy
Settings
NextRoll, Inc. ("NextRoll") and our advertising partners use cookies and similar
technologies on this site and use personal data (e.g., your IP address). If you
consent, the cookies, device identifiers, or other information can be stored or
accessed on your device for the purposes described below. You can click "Allow
All" or "Decline All" or click Settings above to customize your consent.
NextRoll and our advertising partners process personal data to: ● Store and/or
access information on a device; ● Create a personalized content profile; ●
Select personalised content; ● Personalized ads, ad measurement and audience
insights; ● Product development. For some of the purposes above, our advertising
partners: ● Use precise geolocation data. Some of our partners rely on their
legitimate business interests to process personal data. View our advertising
partners if you wish to provide or deny consent for specific partners, review
the purposes each partner believes they have a legitimate interest for, and
object to such processing.
If you select Decline All, you will still be able to view content on this site
and you will still receive advertising, but the advertising will not be tailored
for you. You may change your setting whenever you see the Manage consent
preferences on this site.
Decline All
Allow All
Manage consent preferences