RISE ABOVE
AGENDA
JOIN US in 2020!

Agenda-at-a-Glance

Session Category: Network Security (NS)
In this interactive course, you will learn how to use advanced FortiGate networking and security. In interactive labs, you will explore features commonly applied in complex or larger enterprise or MSSP networks, such as advanced routing, transparent mode, redundant infrastructure, site-to-site IPsec VPN, SSO, web proxy, and diagnostics.
Session Category: Multi-Cloud Security (MCS)
This advanced hands-on course will provide an overview of the most common private cloud architectures, the security challenges these environments present and learn how to protect them with Fortinet solutions.
Session Category: Security Operations (SO)
In this advanced hands-on course, you will learn how to protect an organization and improve its security against advanced threats that bypass traditional security controls. You will use FortiSandbox to detect threats that traditional antivirus products miss, and see how FortiSandbox dynamically generates local threat intelligence that can be shared throughout the network. You will combine multiple advanced threat protection (ATP) components—FortiGate, FortiMail, FortiWeb, and FortiClient—to leverage threat intelligence information and protect an organization end-to-end from advanced threats.
Session Category: Network Security (NS)
This training purpose is to explore common SD-WAN deployment scenarios. From a single Enterprise site to multiple Datacenters we will build, improve and troubleshoot all challenges related to an SD- WAN deployment enabling the attendees to identify, define and implement the Fortinet Secure SD-WAN solution. Reviewing real-life use cases, this training will present how to configure FortiGate and FortiManager SD-WAN features, how to integrate this into an existing network, how to adjust the environment in the light of new security and availability demands and finally how to scale this to thousands of devices solving the issues of today's complex and dynamic networks. For this advanced course, attendees are expected to have NSE 4 level of expertise in Fortinet Solutions as it is a pre-requisite to attend this workshop.
Session Category: Network Security (NS)
In this hands-on course, you will learn how to use basic FortiGate features, including security profiles. In the interactive facilitated labs, you will explore firewall policies, user authentication, and how to protect your network using security profiles such as IPS, antivirus, and web filtering. These administration fundamentals will provide you with a solid understanding of how to implement basic network security.
Session Category: Device Access & App Security (DAS)
In this hands-on course, you will learn how to use FortiMail to protect your network from existing email-borne threats, as well as FortiSandbox to detect and block emerging threats. In interactive labs, you will explore FortiMail's role as a specialized device, and how its features extend beyond FortiGate email filtering to provide both high-performance and in-depth security for business-critical communications. You will analyze email security challenges that administrators of small businesses and carriers face, and learn where and how to deploy, manage, and troubleshoot FortiMail.
Session Category: Network Security (NS)
In this hands-on class, you will learn the fundamentals of using FortiManager for centralized network administration of many FortiGate devices. In interactive labs, you will explore deployment strategies which include single or multiple ADOMs, device registration, policy packages, shared objects, installing configuration changes, provisioning FortiManager as a local FortiGuard distribution server, and troubleshoot the features that are critical to day-to-day use once deployed.
Session Category: Device Access & App Security (DAS)
In this hands-on course, you will learn how to deploy, configure, and troubleshoot Fortinet's web application firewall, FortiWeb. Instructors will explain key concepts of web application security, and lead lab exercises in which you will explore protection and performance features. In the lab, you will experience traffic and attack simulations that use real web applications. You will work with simulations to learn how to distribute load from virtual servers to real servers, while enforcing logical parameters, inspecting flow, and securing HTTP session cookies.
Session Category: Network Security (NS)
In this hands-on course, you will learn how to leverage the powerful and diverse capabilities of the FortiNAC system, and use best practices for achieving visibility, control, and response. In interactive labs, you will explore the administrative tasks necessary to achieve network visibility, control, and automated threat response. These fundamentals will provide you with a solid understanding of how to implement network visibility and security automation.
Session Category: Security Operations (SO)
In this hands-on course, you will learn how to use FortiSIEM, and how to integrate FortiSIEM into your network infrastructure. You will learn about initial configurations, architecture, and the discovery of devices on the network. You will also learn how to collect performance information and aggregate it with syslog data to enrich the overall view of the health of the environment. Additionally, you will learn how to can use the configuration database to facilitate compliance audits.
Session Category: Multi-Cloud Security (MCS)
In this advanced hands-on course, you will learn about the different components of the top public cloud providers’ infrastructures and the security challenges these environments present, including high availability, auto-scaling, software-defined network (SDN) connectors, and how to manage traffic in the cloud with Fortinet products.
Session Category: Network Security (NS)
In this advanced hands-on class, you will learn how to implement, troubleshoot, and centrally manage an enterprise security infrastructure composed of multiple FortiGate, FortiManager, and FortiAnalyzer devices.
Session Category: Device Access & App Security (DAS)
In this advanced hands-on course, you will learn how FortiOS, FortiAP, FortiSwitch, and FortiAuthenticator enable secure connectivity, no matter where users are located and how they connect. The course covers the deployment and troubleshooting of advanced authentication scenarios, along with best practices for securely connecting wireless and wired users.
Session Category: Security Operations (SO)
In this advanced hands-on course, you will learn how to protect an organization and improve its security against advanced threats that bypass traditional security controls. You will use FortiSandbox to detect threats that traditional antivirus products miss, and see how FortiSandbox dynamically generates local threat intelligence that can be shared throughout the network. You will combine multiple advanced threat protection (ATP) components—FortiGate, FortiMail, FortiWeb, and FortiClient—to leverage threat intelligence information and protect an organization end-to-end from advanced threats.
Session Category: Network Security (NS)
In this hands-on class, you will learn the fundamentals of using FortiManager for centralized network administration of many FortiGate devices. In interactive labs, you will explore deployment strategies which include single or multiple ADOMs, device registration, policy packages, shared objects, installing configuration changes, provisioning FortiManager as a local FortiGuard distribution server, and troubleshoot the features that are critical to day-to-day use once deployed.
Session Category: Device Access & App Security (DAS)
In this hands-on course, you will learn how to use FortiMail to protect your network from existing email-borne threats, as well as FortiSandbox to detect and block emerging threats. In interactive labs, you will explore FortiMail's role as a specialized device, and how its features extend beyond FortiGate email filtering to provide both high-performance and in-depth security for business-critical communications. You will analyze email security challenges that administrators of small businesses and carriers face, and learn where and how to deploy, manage, and troubleshoot FortiMail.
Session Category: Network Security (NS)
In this hands-on course, you will learn how to leverage the powerful and diverse capabilities of the FortiNAC system, and use best practices for achieving visibility, control, and response. In interactive labs, you will explore the administrative tasks necessary to achieve network visibility, control, and automated threat response. These fundamentals will provide you with a solid understanding of how to implement network visibility and security automation.
Session Category: Device Access & App Security (DAS)
In this advanced hands-on course, you will learn how FortiOS, FortiAP, FortiSwitch, and FortiAuthenticator enable secure connectivity, no matter where users are located and how they connect. The course covers the deployment and troubleshooting of advanced authentication scenarios, along with best practices for securely connecting wireless and wired users.
Session Category: Network Security (NS)
In this advanced hands-on class, you will learn how to implement, troubleshoot, and centrally manage an enterprise security infrastructure composed of multiple FortiGate, FortiManager, and FortiAnalyzer devices.
Session Category: Network Security (NS)
In this hands-on course, you will learn how to use basic FortiGate features, including security profiles. In the interactive facilitated labs, you will explore firewall policies, user authentication, and how to protect your network using security profiles such as IPS, antivirus, and web filtering. These administration fundamentals will provide you with a solid understanding of how to implement basic network security.
Session Category: Multi-Cloud Security (MCS)
In this advanced hands-on course, you will learn about the different components of the top public cloud providers’ infrastructures and the security challenges these environments present, including high availability, auto-scaling, software-defined network (SDN) connectors, and how to manage traffic in the cloud with Fortinet products.
Session Category: Multi-Cloud Security (MCS)
This advanced hands-on course will provide an overview of the most common private cloud architectures, the security challenges these environments present and learn how to protect them with Fortinet solutions.
Session Category: Device Access & App Security (DAS)
In this hands-on course, you will learn how to deploy, configure, and troubleshoot Fortinet's web application firewall, FortiWeb. Instructors will explain key concepts of web application security, and lead lab exercises in which you will explore protection and performance features. In the lab, you will experience traffic and attack simulations that use real web applications. You will work with simulations to learn how to distribute load from virtual servers to real servers, while enforcing logical parameters, inspecting flow, and securing HTTP session cookies.
Session Category: Network Security (NS)
In this interactive course, you will learn how to use advanced FortiGate networking and security. In interactive labs, you will explore features commonly applied in complex or larger enterprise or MSSP networks, such as advanced routing, transparent mode, redundant infrastructure, site-to-site IPsec VPN, SSO, web proxy, and diagnostics.
Session Category: Network Security (NS)
This training purpose is to explore common SD-WAN deployment scenarios. From a single Enterprise site to multiple Datacenters we will build, improve and troubleshoot all challenges related to an SD- WAN deployment enabling the attendees to identify, define and implement the Fortinet Secure SD-WAN solution. Reviewing real-life use cases, this training will present how to configure FortiGate and FortiManager SD-WAN features, how to integrate this into an existing network, how to adjust the environment in the light of new security and availability demands and finally how to scale this to thousands of devices solving the issues of today's complex and dynamic networks. For this advanced course, attendees are expected to have NSE 4 level of expertise in Fortinet Solutions as it is a pre-requisite to attend this workshop.
Session Category: Security Operations (SO)
In this hands-on course, you will learn how to use FortiSIEM, and how to integrate FortiSIEM into your network infrastructure. You will learn about initial configurations, architecture, and the discovery of devices on the network. You will also learn how to collect performance information and aggregate it with syslog data to enrich the overall view of the health of the environment. Additionally, you will learn how to can use the configuration database to facilitate compliance audits.

6:00 PM - 9:00 PM

8:00 AM - 9:00 AM

9:00 AM - 12:00 PM

12:00 PM - 1:30 PM

12:00 PM - 6:00 PM

Session Category: Network Security (NS)
Do you know what the leading cause of attack is? According to a recent Ponemon study, 52% of all breaches are a direct result of either system glitches or human errors. Security orchestration, automation and response (SOAR) solutions can help remediate these organizational issues. In this session you will learn how FortiManager and FortiAnalyzer can orchestrate security fabric components, automate operations, and route incidents and vulnerabilities to appropriate resources. These solutions improve security incident response times, vulnerability management processes, and more importantly, provide real-time visibility into the overall network security posture to help protect against the leading cause of breaches—system glitches and human error.
Session Category: Device Access & App Security (DAS)
30% of breaches resulted from insiders, and 42% companies admitted having their endpoints breached in the last year. Enterprise security personnel need to protect endpoints, ensure visibility across devices, user activities, and mitigate insider risk. Come learn how FortiClient, FortiInsight User, Entity Behavioral Analytics (UEBA) integrate with the Security Fabric to deliver visibility across endpoint and user behavior, proactively protects endpoint, and detect potential insider threat before risk escalates to incidents and thus preventing breach.
Session Category: Multi-Cloud Security (MCS)
In this interactive session, you will learn about the security considerations, use cases, and Fortinet’s solutions for securing applications built in the public cloud. Learn about the use of virtual network segmentation and application control policies in the cloud, based on FortiGate-VM. Additionally, discover a variety of tools to secure cloud-based web applications and APIs. Get a sneak peek at the new Fortinet cloud security posture management and analytics capabilities designed to help customers protect from the leading cloud risk—cloud configuration mistakes.
Session Category: Network Security (NS)
Plant managers and network analysts face an increasingly daunting challenge of managing cyber risk in the face of increasing threats and attacks. Keeping employee safety and process uptime are paramount priorities, yet how do you protect older, unpatched systems, respond to malware, and ensure a comprehensive approach to cybersecurity? Come learn how Fortinet’s Security Fabric is applied intelligently to manufacturing, energy, and transportation industries to enable compliance and risk mitigation. You will learn how the technologies for securing the IT side of the house can be adapted and applied to the OT side of the house.
Session Category: Network Security (NS)
SD-WAN is the most sought out technology in 2019 to replace legacy WAN edge products to embrace continuing growth in cloud applications. SD-WAN enables digital transformation with business aware application steering at lower WAN cost and improves the productivity of end users. FortiGate Secure SD-WAN combines best of breed SD-WAN with next-generation firewalls (NGFWs) to further reduce cost and complexity of the network infrastructure. For the first time, Fortinet will unveil deeper integration for SD-WAN with LAN devices for an SD-Branch solution that is a unique differentiator in the crowded SD-WAN market.
Session Category: Industry
With the introduction of cloud computing, Internet of Things (IoT), and other emerging technologies, the federal government’s digital footprint is growing at an exponential rate. But as the amount of data continues to increase, so do the number of adversaries and vulnerabilities in the government’s networks. As prime targets for the most sophisticated adversaries seeking to impact national security, public safety, and civilian services, federal governments require the most effective and comprehensive cybersecurity solutions available—while maintaining high performance. At the same time, they must work within mandated budget constraints, incorporate advancing technology, and remain open to the citizens they serve. In this interactive session, you will hear from speakers as they discuss: Detailed overview of U.S. Federal Government cyber priorities and programs Fortinet Federal’s approach to advancing federal agencies’ missions and cyber objectives Fortinet Federal Partner Program: how Fortinet is creating a successful federal partner ecosystem to secure government networks
Session Category: Device Access & App Security (DAS)
The access layer is the broadest attack surface in your network, and it is only getting worse with Internet of Things (IoT) devices entering the network. This session will cover how FortiSwitch and FortiAP secure access products integrate with the Security Fabric, making security a native part of your access technology. With FortiLink technology, you can extend the power of FortiGate to FortiSwitch and FortiAP, allowing everything to be managed and secured from a single interface. Come learn how Fortinet Secure Access can improve your network by delivering less hassle, fewer systems to configure, lower TCO, and a better overall experience.
Session Category: Security Operations (SO)
Too few qualified staff, too many security tools, underrated threats, and high board expectations can make managing security operations a daunting task. This interactive session discusses and demonstrates how an integrated approach to advanced threats makes Gartner's CARTA model a reality. Learn how business critical services, security events, and workflows can be automated with the tools and vendors in your enterprise today, as well as how established and emerging tools like security information and event management (SIEM), sandboxing, user entity and behavior analytics (UEBA), and deception can assist an overworked CISO and security operations unit.
Session Category: Platinum Sponsor

Learn how to grow your Business leveraging AWS - In this presentation, Amazon Web Services (AWS), the world’s most comprehensive and broadly adopted cloud platform, will discuss the advantages of Cloud and use cases that power customers infrastructure, make them more agile and lower costs.  You will learn about the Shared Security Responsibility Model, the areas AWS provides security of the Cloud, what customers are responsible for in the cloud and where partners can drive additional value-add to solve these customer challenges.  We will discuss the AWS Partner Network [APN] and market opportunity, how you can become a partner, and how you leverage the AWS Marketplace to transform your business and monetize on Cloud opportunities with specific use cases.  Additionally, we will provide technical use cases on the various integrations Fortinet has on AWS to help drive enterprise customer adoption and their journey to the Cloud.

Session Category: Industry
Consumer interests, purchase patterns, and desire for flexibility is driving a Retail industry evolution, and their preferences change on a dime. Retailers are looking to new technologies to stay connected, meet their customers’ needs in any channel, develop a dialogue with, and listen to their customers. Retailers are trying to evolve their security by buying point solutions to secure the new connections, network traffic, and data that comes with those new technologies…but it’s hard for them to keep up and to stitch it all together. Evolution is slow…so, Fortinet is leading a retail revolution.
 
Fortinet’s Security Fabric for Retail is a revolutionary solution with broad, integrated, and automated protection for wired and wireless connections, POS terminals, customer devices on the network, IoT devices, kiosks, big data, and more. Fortinet has unique abilities to provide visibility into those connections, that traffic, the data at rest and in motion, and the customer analytics and insights that go with it. In the cloud, in the store, or anywhere in between. With zero-touch deployment and single pane of glass management on premise or in the cloud, Fortinet’s retail solutions can simplify deployments and provide the improved security coverage retailers need quickly, and with a lower TCO than point solutions.
 
In this session, we will discuss how solutions such as Secure SD-WAN, FortiExtender, FortiDeploy, FortiProvision, and FortiManager are weaved into the Fortinet Retail Security Fabric to protect and defend the evolving retail store, network, and data. Then, James Roman from Fiesta Restaurant Group, Inc. will discuss how Fortinet has enabled them to make security a strategic enabler of their digital revolution, improving operational efficiencies, the customer experience and helping them to stay ahead of competitors.
Session Category: Partner
Get an in-depth look at trends in the MSSP market, including how to profit from the digital transformation, filling gaps in your service offering, along with updates and new service enablement programs for Fortinet MSSPs.
Session Category: Partner
There is still a huge opportunity for growth within the SMB segment for you. In a framework developed with and for distributors, learn how you can recruit new resellers, reactivate inactive ones, or simply develop sales and a footprint with targeted tactics and competitive offerings. (Note: Distributor-only session)
Session Category: Partner
Security controls for the SMB are just as important as those for the Enterprise, but SMBs often overlook the importance because, “it can’t happen to them.” Yet we know that 61%* of breaches hit smaller businesses last year, up from the previous year's 53% – and in a lot of cases caused the business to shutter its doors. As a Fortinet Partner, this presents a great opportunity – combined with your expertise, Fortinet’s complete security solutions for the SMB offer your customers peace of mind and ease of management. Join this session to learn how we’ve evolved our solutions to leverage the cloud making deployment, management, and maintenance of infrastructure a snap! We’ll cover everything from Connected UTM updates, through Secure Productivity use cases, to how you can accelerate your business’ growth by leveraging Cloud Services – all helping you build that coveted consultative relationship with your customers. * Verizon Data Breach Investigation Report
Session Category: Network Security (NS)
Convergence is blurring the lines between IT and OT, creating an opportunity to improve the visibility, control, and situational awareness necessary for critical systems. Failure to take the wide range of security issues into account when converging these two different networks and networking philosophies can result in catastrophic network failures that risk critical systems as well as the well-being of workers and communities. The Fortinet Security Fabric represents the first-ever architectural security approach designed to dynamically adapt to unique needs of legacy OT environments while enabling the move towards modernizing these critical systems. Leveraging the Purdue Model for the security layers needed in OT, the multi-layered approach offered by the Fortinet Security Fabric provides broad, integrated, and automated protection against sophisticated threats. Attend this technical workshop to help understand the differences between securing IT and OT environments and the importance of active security. Gain hands-on experience applying the Fortinet Security Fabric to better secure operational technologies.
Session Category: Network Security (NS)
As security architects consider how to provide comprehensive threat protection for their enterprises, that includes intrusion prevention, web filtering, anti-malware, and application control, they face a major complexity hurdle managing point products with no integration and lack of visibility. FortiGate next-generation firewall (NGFW) utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance including encrypted traffic. FortiGate reduces complexity by integrating various point products into NGFW features with automated action and enhanced visibility into applications, users, and networks. Attend this technical training session and gain hands-on experience fortifying the enterprise network with the Fortinet NGFW solution
Session Category: Device Access & App Security (DAS)
With a dynamic attack surface due to the rise of Internet of Things (IoT) and cloud services, it is clear that no single technology will be able to stop every threat. To protect your enterprise against sophisticated threats, it is important to establish a comprehensive and cohesive security infrastructure that is broad enough to cover all attack vectors, powerful enough to run the latest security technologies, and automated to keep pace with fast-moving attacks. Attend this hands-on technical training workshop to learn how to detect and analyze advanced threats with FortiSandbox.
Session Category: Network Security (NS)
The proliferation of Internet of Things (IoT), has made it necessary for organizations to improve their visibility into what is attached to their networks. They need to know every device and every user accessing their networks. IoT devices enable digital transformation initiatives and improve efficiency, flexibility, and optimization. However, they are inherently risky, with designs that prioritize low-cost over security. FortiNAC provides the network visibility to see everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses. Attend this technical training workshop to discuss the security challenges that many customers face and to understand how the fundamental feature set of FortiNAC can address these challenges.
Session Category: Network Security (NS)
As organizations transition to a digital business model, their network topologies are significantly impacted. The adoption of cloud services, the virtualization of the traditional network, and an increasingly mobile workforce accessing applications in the cloud, are accelerating advancements in wide-area networking technologies. The traditional wide-area network (WAN) is struggling to keep up because it relies on a static infrastructure of devices that simply cannot accommodate shifting, and often temporary resource allocation and workloads. Learn how software-defined networking (SDN) applies to software control of WANs in an enterprise environment. Attend this technical training session and gain experience through actual configuration of virtualized products supporting WAN aggregation.
Session Category: Security Operations (SO)
Effective security requires visibility of all the devices across the entire infrastructure in real time, with context. It must know what devices represent a threat along with their capability—so you can manage and remediate threats, not the noise multiple security tools create. Fortinet’s multi-vendor Security Incident and Events Management (SIEM) solution, FortiSIEM, brings it all together by integrating NOC-SOC solutions to automate IT processes and security responses. Visibility, correlation, automated response, and remediation all come in a single, scalable solution. Using a FortiSIEM, the complexity of managing network and security operations is reduced, freeing resources, and improving breach detection. FortiSIEM provides the cross correlation, machine learning, and user entity and behavior analytics (UEBA) to improve overall response and effectively stop breaches before they occur. Attend this workshop to help understand the FortiSIEM architecture and powerful feature set. Gain experience running analytic searches to aid in the rapid detection and remediation of multiple security events.
Session Category: Network Security (NS)
The number and types of network-connected devices continue to grow exponentially, presenting new vulnerabilities and increasing the attack surface. Addressing this trend requires much more than just network access control. It requires scanning for malware, preventing access to malicious websites, checking endpoint integrity, and controlling application usage while reducing complexity of network, application, and device management. Fortinet's secure unified access solution provides comprehensive security on the network infrastructure. The tight integration between the FortiGate appliances, FortiSwitch devices, and FortiAP wireless access points enables a common security policy across the network, extending the protection of the firewall out to the edge.
Session Category: Device Access & App Security (DAS)
Email is a critical tool for businesses, but it’s also a preferred delivery method for ransomware, phishing, and compromise attacks. According to the 2018 Verizon report, 49% of (non-POS) malware was installed via malicious email. FortiMail is tailored for advanced threat defense and shields users and data, from a wide range of cyber threats. These include the ever-growing volumes of unwanted spam, socially-engineered phishing and business email compromise, and accelerating variants of ransomware. FortiMail can also be used to protect sensitive data of all types, reducing the risk of inadvertent loss and/or non-compliance with regulations like HIPAA, PCI, GDPR, and more. Attend this technical training session and gain hands-on experience protecting your organization against phishing, spam, malware, and advanced targeted attacks via email.
Session Category: Network Security (NS)
As organizations transition to a digital business model, virtualization and cloud technologies play an increasing role. Speed, flexibility, elasticity, and integration are all critical features that cannot be inhibited when implementing an effective security strategy. Ultimately, it does not matter how fast you can deploy an appliance or VM if configuration is a manual process which requires a heavy administrative touch. Web services application programming interfaces (APIs) enable organizations to fully leverage the benefits of these dynamic architectures while offering an efficient communications method that promotes a robust and automated Security Fabric. Understanding the structure, function, and communication mechanisms of these APIs is critical for developing any custom interfaces. Attend this hands-on technical training workshop and gain hands-on experience automating configuration and policy deployment on FortiManager and FortiGate.
Session Category: Network Security (NS)
More than a firewall operating system, FortiOS enables broad connectivity and awareness among security components, both within the network and from other disciplines, such as endpoint, management, and analytics. FortiOS has long been the heart of FortiGate next-generation firewalls , serving thousands of customers in every industry across the globe. The needs of this diverse customer base are widespread, and the more than 200 new features and capabilities are in response to our customers’ needs. Beyond its mission of enabling the Fortinet Security Fabric, FortiOS makes significant gains in these areas: cloud, automation, Security-as-a-Service (SaaS), and SD-WAN.” Attend this technical training session and hands-on workshop to learn more about the new key features FortiOS has to offer.
Session Category: Device Access & App Security (DAS)
Cybercriminals are increasingly targeting public and internal web applications. Today, nearly half of all data breaches are caused by attacks targeting web application vulnerabilities. To protect organizations from such attacks, web application firewalls (WAFs) are the gold standard. However, some organizations may be reluctant to use these devices as they have a reputation for being resource-intensive, especially when it comes to quickly addressing false positive detections ito ensure that legitimate users and applications do not get blocked. In this workshop, you will learn how FortiWeb’s new AI-based machine learning addresses these shortcomings, why it is better than application learning, and why signature-based protection alone is not enough.
Session Category: Device Access & App Security (DAS)
Endpoints are frequently the target of initial compromise or attacks. FortiClient strengthens endpoint security through integrated visibility, control, and proactive defense. With the ability to discover, monitor, and assess endpoint risks, you can ensure endpoint compliance, mitigate risks, and reduce exposure. FortiClient proactively defends against advanced attacks. Its tight integration with the Security Fabric enables policy-based automation to contain threats and control outbreaks. It provides advanced endpoint protection with pattern-based anti-malware, behavior-based exploit protection, web-filtering, and an application firewall. FortiClient natively integrates with FortiSandbox to detect zero-day threats and custom malware. It also provides secure remote access with built-in VPN, single sign-on, and two-factor authentication for added security. Attend this technical training workshop to gain hands-on experience controlling endpoints using FortiClient EMS in mixed Windows and Linux environments, and see first-hand how FortiClient integrates with the Fortinet Security Fabric to protect your companies’ critical assets.
Session Category: Security Operations (SO)
As enterprise networks have morphed and changed with digital transformation, once relied upon tools have become outdated and obsolete. Yet, many are still deployed alongside newer technology stacks, creating a complex environment that does not interoperate. Enterprises deploy an average of 32 different vendor solutions that lack shared threat intelligence—a cybersecurity hurdle that is often compounded with a lack of skilled cybersecurity personnel to manage these networks. The Fortinet management and analytics solution provides a powerful automation-ready single pane of glass for management and visibility, advanced compliance reporting, and network-aware rapid response across on-premises, cloud, and hybrid environments. Attend this technical training workshop and gain hands-on experience implementing the solution's key capabilities and applying them to centrally manage a fictitious organization’s HQ and branch networks from a single pane of glass.
Session Category: Network Security (NS)
Today's new world of networking requires a new approach to security. One that simply yet intelligently secures the entire infrastructure. One that delivers full visibility into every viable network segment and the devices and endpoints behind them. One that can seamlessly integrate with third-party solutions, enabling users to ubiquitously collect, share, and correlate threat intelligence. The Fortinet Security Fabric represents the first-ever architectural security approach designed to dynamically adapt to today's evolving IT infrastructure. This multi-layered approach provides broad, integrated, and automated protection against sophisticated threats. Attend this technical training session and gain hands-on experience configuring a comprehensive Security Fabric including Fortinet products and Fortinet Fabric-Ready Partner products.
Session Category: Device Access & App Security (DAS)

Today’s dynamic network infrastructures support employees, vendors, contractors, and guests, as well as laptops, smart phones, printers, and new Internet of Things (IoT) devices. Providing access while ensuring security is no easy task when weak passwords, Shadow IT, and unsecure IoT risks challenge enterprise security teams.

Come learn how the Fortinet Security Fabric can manage risk, including how FortiNAC, and FortiAuthenticator work together to deliver an integrated solution that protects every user and every device on your network. Provide the right level of access and security.

Session Category: Security Operations (SO)
The role of the CISO and the pressures that it brings can be overwhelming, often adding incrased responsibilities for networking and security teams to produce quality results. Teams must work diligently and tirelessly collecting and analyzing cyber data across a rapidly growing attack surface, while at the same time, attempting to rationalize results and present details in simple business terms. In this session, you will learn about the 10 proven strategies teams can use to create an environment of trust and assurance. Find out how the Fortinet Security Fabric can help CISOs along with network and security teams to set practical goals, simplify operations, and create an environment of trust and assurance.
Session Category: Network Security (NS)
Service Providers have begun to roll out 5G and Internet of Things (IoT) services around the world for the great opportunities it offers, but the road to 5G is also introducing new risks. Come learn how Fortinet is enabling communication service providers (CSPs) to build and secure new revenue-generating opportunities in 5G and IoT with our carrier solutions.

Enterprise customers increasingly are seeking new managed security service provider (MSSPs) services that complete their security needs while trying to adopt flexible spending options. You will also learn how Fortinet is enabling MSSPs to build Security-as-a-Service offerings through specific products and tailored consumption programs.
Session Category: Network Security (NS)
If you are a network or security practitioner, you might think you can build an effective security architecture by deploying a robust perimeter firewall. But the perimeter has become less effective due to mobile computing and workloads migrating to multiple clouds on the WAN side. And on the LAN side, malware coming from trusted users, rogue APs, and Shadow IT each add another micro-perimeter that you must also now defend. As a result, the fortified perimeter has become the sum of all of the micro-perimeters tied to the growing number of devices consuming networked services across all locations. Segmentation is a good starting point to deal with this, but it lacks adaptive trust and advanced security. In this session, you will discover the benefits of adopting this new approach and how you can build a robust and high-performance security architecture with intent-based segmentation. Intent-based segmentation intelligently segments IT assets in accordance with business intent, and employs adaptive trust, control, and automated threat protection to mitigate risks and achieve compliance with reduced complexity.
Session Category: Platinum Sponsor
Most IT professionals have an overwhelming list of projects and upgrades they’d like to complete, if only they had the time. Instead, we spend most of our days dealing with urgent issues and addressing our ever-growing to-do list. But how much more could we get done if we managed to automate some of these “to-do” items? Even more pressing, what if these items are really mission-critical “must-haves”?
 
With all that is expected of IT and Security departments in today’s world, how can anyone be sure that the tasks required to be completed by their teams cannot be automated to save time, money and resources? In this discussion, we will show you how to improve efficiencies by automating a large number of your disaster recovery procedures, while validating that the procedures were completed correctly, and proactively automating many other additional tasks that might appear in the future.
Session Category: Industry
Emerging cyber threats, the proliferation of Internet of Things (IoT) devices, smart building projects, and other challenges can overwhelm resource-constrained IT staff. This panel discussion will explore the unique challenges that digital transformation presents for governments and educational institutions. Hear from practitioners who are managing digital transformation with network security strategies, such as segmentation and solutions that can see and classify everything on their networks including headless devices, and can control those devices and users, all while providing dynamic, automated responses to threats.
 
In this interactive session, you will learn about different aspects of digital transformation such as:
 
Managing the influx of IoT devices and other smart building initiatives and technologies The convergence of physical and cybersecurity on campuses and in cities Compliance concerns in a digital era, including NIST, CIPA, and FERPA Operational planning from resource constraints to funding projects
Session Category: Security Operations (SO)
Enterprises are increasingly adopting hybrid cloud architectures, integrating on-premises private clouds with public cloud resources to take advantage of the scale and performance benefits, yet consistent security is a top priority. FortiGate-VMs extend Security Fabric automation, visibility, and control to multi-cloud environments. Fortinet’s IPSec and secure sockets layer (SSL) VPNs allow enterprises to securely connect their on-premises networks to multiple clouds. This interactive session will demonstrate how Fortinet’s FortiGate virtual appliances can provide seamless security across the software defined data center(SDDC), private, public and hybrid clouds.
Session Category: Security Operations (SO)
FortiGuard Labs processes over 100 billion security events per day, representing data from the endpoint to the cloud. This gives us a unique and unprecedented view into the threat world. In this presentation you will get an overview of the current threat landscape including: what schemes bad actors employ to evade detection, recent cybercrime trends, and additional cyber threat trends. You will get an overview of FortiGuard Labs' mature and leading-edge artificial intelligence (AI) and machine learning (ML) program that provides protection capabilities that feed into products across the Fortinet portfolio. Our AI/ML program continues to expand in breadth and depth and this update will showcase how we stay ahead of the pack.
Session Category: Industry
A system crash on a manufacturing floor can stall production for hours and potentially cost a company millions in ruined product. Even worse, having to reset an open furnace or a 10,000-gallon boiler processing caustic chemicals can have far more devastating consequences than temporarily losing access to an online printer. Because the primary goals of an OT environment are ensuring the safety of employees and local communities and ensuring the constant availability and uptime of the network, connected devices, applications, and industrial control systems are often not consistently updated. In this interactive session, experts will discuss security without compromising availability or safety so important to operational technology and critical infrastructure security. Hear from Deutche Telekom and Alaska Airlines discussing lessons learned and how their experience can be leveraged to successfully secure OT environments. The session will also cover how the Fortinet Fabric solution will protect and defend the control system vulnerabilities in industries such as manufacturing, energy, utilities and transportation.
Session Category: Device Access & App Security (DAS)
With organizations rapidly developing new web applications and migrating email and other services to the cloud, they have become much more agile. However, organizations must ensure their networks maintain security, governance, and a high-quality, consistent user experience, while leveraging the cloud to its fullest potential. In this session, you will learn how FortiWeb, FortiADC, and FortiMail can help secure and scale applications in and out of public, private, and Security-as-a-Service clouds, such as Microsoft Office 365, G-suite, Amazon Web Services, and Microsoft Azure.
Session Category: Partner
Learn how you can leverage the power of Fortinet’s Fabric Agent to strengthen your customer networks, including how FortiClient Fabric Agent work with the all the key components in the Security Fabric to deliver an integrated solution that protects every user and device on the network, while providing the right level of visibility, dynamic access control and security. We’ll discuss how to identify an opportunity, review the most successful use cases, and how you can use integrated endpoint protection as another way to create a consultative relationship with your customers.
Session Category: Partner
Elastic infrastructure, applications, and the growing number of branch offices and IoT devices on the edge are unearthing significant security and networking opportunities for partners. In this partner-centric session, understand how you can build profitable practices, services, and solutions with Fortinet’s products available in public cloud. We’ll share partner deployment guidance for top use cases and paths to monetization. Learn about Fortinet’s Cloud Channel Initiative for partners that accelerates your journey to cloud across technical enablement, sales enablement and ‘Go to Market’. Kudelski, a Fortinet partner will show how they are launching solutions based on public cloud.
Session Category: Device Access & App Security (DAS)
Email is a critical tool for businesses, but it’s also a preferred delivery method for ransomware, phishing, and compromise attacks. According to the 2018 Verizon report, 49% of (non-POS) malware was installed via malicious email. FortiMail is tailored for advanced threat defense and shields users and data, from a wide range of cyber threats. These include the ever-growing volumes of unwanted spam, socially-engineered phishing and business email compromise, and accelerating variants of ransomware. FortiMail can also be used to protect sensitive data of all types, reducing the risk of inadvertent loss and/or non-compliance with regulations like HIPAA, PCI, GDPR, and more. Attend this technical training session and gain hands-on experience protecting your organization against phishing, spam, malware, and advanced targeted attacks via email.
Session Category: Network Security (NS)
As organizations transition to a digital business model, their network topologies are significantly impacted. The adoption of cloud services, the virtualization of the traditional network, and an increasingly mobile workforce accessing applications in the cloud, are accelerating advancements in wide-area networking technologies. The traditional wide-area network (WAN) is struggling to keep up because it relies on a static infrastructure of devices that simply cannot accommodate shifting, and often temporary resource allocation and workloads. Learn how software-defined networking (SDN) applies to software control of WANs in an enterprise environment. Attend this technical training session and gain experience through actual configuration of virtualized products supporting WAN aggregation.
Session Category: Network Security (NS)
As security architects consider how to provide comprehensive threat protection for their enterprises, that includes intrusion prevention, web filtering, anti-malware, and application control, they face a major complexity hurdle managing point products with no integration and lack of visibility. FortiGate next-generation firewall (NGFW) utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance including encrypted traffic. FortiGate reduces complexity by integrating various point products into NGFW features with automated action and enhanced visibility into applications, users, and networks. Attend this technical training session and gain hands-on experience fortifying the enterprise network with the Fortinet NGFW solution
Session Category: Network Security (NS)
More than a firewall operating system, FortiOS enables broad connectivity and awareness among security components, both within the network and from other disciplines, such as endpoint, management, and analytics. FortiOS has long been the heart of FortiGate next-generation firewalls , serving thousands of customers in every industry across the globe. The needs of this diverse customer base are widespread, and the more than 200 new features and capabilities are in response to our customers’ needs. Beyond its mission of enabling the Fortinet Security Fabric, FortiOS makes significant gains in these areas: cloud, automation, Security-as-a-Service (SaaS), and SD-WAN.” Attend this technical training session and hands-on workshop to learn more about the new key features FortiOS has to offer.
Session Category: Device Access & App Security (DAS)
With a dynamic attack surface due to the rise of Internet of Things (IoT) and cloud services, it is clear that no single technology will be able to stop every threat. To protect your enterprise against sophisticated threats, it is important to establish a comprehensive and cohesive security infrastructure that is broad enough to cover all attack vectors, powerful enough to run the latest security technologies, and automated to keep pace with fast-moving attacks. Attend this hands-on technical training workshop to learn how to detect and analyze advanced threats with FortiSandbox.
Session Category: Network Security (NS)
The number and types of network-connected devices continue to grow exponentially, presenting new vulnerabilities and increasing the attack surface. Addressing this trend requires much more than just network access control. It requires scanning for malware, preventing access to malicious websites, checking endpoint integrity, and controlling application usage while reducing complexity of network, application, and device management. Fortinet's secure unified access solution provides comprehensive security on the network infrastructure. The tight integration between the FortiGate appliances, FortiSwitch devices, and FortiAP wireless access points enables a common security policy across the network, extending the protection of the firewall out to the edge.
Session Category: Device Access & App Security (DAS)
Endpoints are frequently the target of initial compromise or attacks. FortiClient strengthens endpoint security through integrated visibility, control, and proactive defense. With the ability to discover, monitor, and assess endpoint risks, you can ensure endpoint compliance, mitigate risks, and reduce exposure. FortiClient proactively defends against advanced attacks. Its tight integration with the Security Fabric enables policy-based automation to contain threats and control outbreaks. It provides advanced endpoint protection with pattern-based anti-malware, behavior-based exploit protection, web-filtering, and an application firewall. FortiClient natively integrates with FortiSandbox to detect zero-day threats and custom malware. It also provides secure remote access with built-in VPN, single sign-on, and two-factor authentication for added security. Attend this technical training workshop to gain hands-on experience controlling endpoints using FortiClient EMS in mixed Windows and Linux environments, and see first-hand how FortiClient integrates with the Fortinet Security Fabric to protect your companies’ critical assets.
Session Category: Network Security (NS)
As organizations transition to a digital business model, virtualization and cloud technologies play an increasing role. Speed, flexibility, elasticity, and integration are all critical features that cannot be inhibited when implementing an effective security strategy. Ultimately, it does not matter how fast you can deploy an appliance or VM if configuration is a manual process which requires a heavy administrative touch. Web services application programming interfaces (APIs) enable organizations to fully leverage the benefits of these dynamic architectures while offering an efficient communications method that promotes a robust and automated Security Fabric. Understanding the structure, function, and communication mechanisms of these APIs is critical for developing any custom interfaces. Attend this hands-on technical training workshop and gain hands-on experience automating configuration and policy deployment on FortiManager and FortiGate.
Session Category: Security Operations (SO)
Effective security requires visibility of all the devices across the entire infrastructure in real time, with context. It must know what devices represent a threat along with their capability—so you can manage and remediate threats, not the noise multiple security tools create. Fortinet’s multi-vendor Security Incident and Events Management (SIEM) solution, FortiSIEM, brings it all together by integrating NOC-SOC solutions to automate IT processes and security responses. Visibility, correlation, automated response, and remediation all come in a single, scalable solution. Using a FortiSIEM, the complexity of managing network and security operations is reduced, freeing resources, and improving breach detection. FortiSIEM provides the cross correlation, machine learning, and user entity and behavior analytics (UEBA) to improve overall response and effectively stop breaches before they occur. Attend this workshop to help understand the FortiSIEM architecture and powerful feature set. Gain experience running analytic searches to aid in the rapid detection and remediation of multiple security events.
Session Category: Device Access & App Security (DAS)
Cybercriminals are increasingly targeting public and internal web applications. Today, nearly half of all data breaches are caused by attacks targeting web application vulnerabilities. To protect organizations from such attacks, web application firewalls (WAFs) are the gold standard. However, some organizations may be reluctant to use these devices as they have a reputation for being resource-intensive, especially when it comes to quickly addressing false positive detections ito ensure that legitimate users and applications do not get blocked. In this workshop, you will learn how FortiWeb’s new AI-based machine learning addresses these shortcomings, why it is better than application learning, and why signature-based protection alone is not enough.
Session Category: Network Security (NS)
The proliferation of Internet of Things (IoT), has made it necessary for organizations to improve their visibility into what is attached to their networks. They need to know every device and every user accessing their networks. IoT devices enable digital transformation initiatives and improve efficiency, flexibility, and optimization. However, they are inherently risky, with designs that prioritize low-cost over security. FortiNAC provides the network visibility to see everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses. Attend this technical training workshop to discuss the security challenges that many customers face and to understand how the fundamental feature set of FortiNAC can address these challenges.
Session Category: Network Security (NS)
Convergence is blurring the lines between IT and OT, creating an opportunity to improve the visibility, control, and situational awareness necessary for critical systems. Failure to take the wide range of security issues into account when converging these two different networks and networking philosophies can result in catastrophic network failures that risk critical systems as well as the well-being of workers and communities. The Fortinet Security Fabric represents the first-ever architectural security approach designed to dynamically adapt to unique needs of legacy OT environments while enabling the move towards modernizing these critical systems. Leveraging the Purdue Model for the security layers needed in OT, the multi-layered approach offered by the Fortinet Security Fabric provides broad, integrated, and automated protection against sophisticated threats. Attend this technical workshop to help understand the differences between securing IT and OT environments and the importance of active security. Gain hands-on experience applying the Fortinet Security Fabric to better secure operational technologies.
Session Category: Multi-Cloud Security (MCS)
Selecting the right technologies for your cloud applications is no easy task. The decisions are critical and the choices endless. How do you compare features? How do you identify and prioritize capabilities like high availability, elasticity for workload adaptation, scalability and the need for automation of your security operations? The key is matching the needs of your application to your cloud infrastructure options. In this session, the Fortinet Cloud Architecture team will share the lessons learned in over dozens of implementations.
Session Category: Sponsor

Join this co-hosted demonstration from Srikumar, Microsoft Azure Architect, and Brian Page, Cloud Security Architect from Fortinet to learn the benefits of Microsoft Azure for customers and channel partners. You will also learn about joint solutions such as Azure vWAN with Fortinet SD-WAN , shared responsibility model and the role FortiGate, FortiWeb and FortiMail play in the model for Azure customers.

Session Category: Industry
Increased digital transformation in healthcare is challenging organizations with inconsistent and distributed security postures and controls. The adoption of next-generation technologies—mobile devices, cloud capabilities, and the Internet of Medical Things (IoMT) means that this new digital enablement requires nurses, doctors, clinicians, and caregivers to access secure patient data—no matter where they are or what device they are using. At the same time, the risk to personally identifiable information (PII) and electronic protected health information (ePHI) has never been greater, as black-market value of patient data stays at an all-time high. As recent headlines about large-scale data breaches show, healthcare remains a top target for cyber criminals. In the 2018 Cost of a Data Breach Report, IBM and the Ponemon Institute found that data breach costs for healthcare organizations average $408 per record—the highest of any industry for the eighth straight year and nearly three times higher than the cross-industry average of $148 per record. Join this interactive session and hear from the speakers as they discuss: Struggles for visibility Convergence of physical and digital security Managing the growth and complexity of mergers and acquisitions Automation to reduce resource constraints, drive consistent controls, and shorten time to remediate
Session Category: Partner
Security as a Service is as relevant to SMB organizations as it is Enterprise – the business wants to purchase defined successful outcomes and assurance. In this session, the presenters show how partnership, technology and relationships can be harnessed to build an MSSP program with managed and co-managed SIEM. You’ll learn how to manage your customers’ multi-vendor security environment profitably and with scale and sustainability through a managed detection and response service program that can be built without upfront investment and offer the industry’s leading SLAs.
Session Category: Partner
The benefits of SD-WAN are clear as evidenced by the massive market opportunity being forecast over the next several years. But as usual in a Wild, Wild West market not all SD-WAN solutions are equal.

Besides satisfying the wide area networking requirements of SD-WAN – optimizing application performance, direct Cloud access and reducing WAN costs – leading SD-WAN solutions should also have comprehensive security at the top of their feature list. But that security capability should extend to the entire branch office infrastructure, not just the wide area connection. That’s why SD-Branch is starting to take hold and should be part of your branch office transformation journey.

This session will focus on the key network and security features that any SD-Branch solution should have in ordered to be considered by your customers as well as compelling arguments why enterprises should be focused on the advantages of a single security posture across all of their network. To coin a well-known phrase, there’s much to be gained by asking “You want fries with that”?
Session Category: Partner
With a 0% unemployment rate among cybersecurity operators, customers and partners alike face a major challenge when it comes to finding qualified security professionals. During this track you will learn more about how Fortinet is working to fill the cybersecurity skills gap with the Fortinet Veterans Program and the Network Security Academy.

6:30 PM - 11:00 PM

8:00 AM - 9:00 AM

9:00 AM - 12:00 PM

12:00 PM - 1:30 PM

12:00 PM - 6:00 PM

Session Category: Network Security (NS)
Do you know what the leading cause of attack is? According to a recent Ponemon study, 52% of all breaches are a direct result of either system glitches or human errors. Security orchestration, automation and response (SOAR) solutions can help remediate these organizational issues. In this session you will learn how FortiManager and FortiAnalyzer can orchestrate security fabric components, automate operations, and route incidents and vulnerabilities to appropriate resources. These solutions improve security incident response times, vulnerability management processes, and more importantly, provide real-time visibility into the overall network security posture to help protect against the leading cause of breaches—system glitches and human error.
Session Category: Device Access & App Security (DAS)
30% of breaches resulted from insiders, and 42% companies admitted having their endpoints breached in the last year. Enterprise security personnel need to protect endpoints, ensure visibility across devices, user activities, and mitigate insider risk. Come learn how FortiClient, FortiInsight User, Entity Behavioral Analytics (UEBA) integrate with the Security Fabric to deliver visibility across endpoint and user behavior, proactively protects endpoint, and detect potential insider threat before risk escalates to incidents and thus preventing breach.
Session Category: Security Operations (SO)
Too few qualified staff, too many security tools, underrated threats, and high board expectations can make managing security operations a daunting task. This interactive session discusses and demonstrates how an integrated approach to advanced threats makes Gartner's CARTA model a reality. Learn how business critical services, security events, and workflows can be automated with the tools and vendors in your enterprise today, as well as how established and emerging tools like security information and event management (SIEM), sandboxing, user entity and behavior analytics (UEBA), and deception can assist an overworked CISO and security operations unit.
Session Category: Network Security (NS)
SD-WAN is the most sought out technology in 2019 to replace legacy WAN edge products to embrace continuing growth in cloud applications. SD-WAN enables digital transformation with business aware application steering at lower WAN cost and improves the productivity of end users. FortiGate Secure SD-WAN combines best of breed SD-WAN with next-generation firewalls (NGFWs) to further reduce cost and complexity of the network infrastructure. For the first time, Fortinet will unveil deeper integration for SD-WAN with LAN devices for an SD-Branch solution that is a unique differentiator in the crowded SD-WAN market.
Session Category: Network Security (NS)
Plant managers and network analysts face an increasingly daunting challenge of managing cyber risk in the face of increasing threats and attacks. Keeping employee safety and process uptime are paramount priorities, yet how do you protect older, unpatched systems, respond to malware, and ensure a comprehensive approach to cybersecurity? Come learn how Fortinet’s Security Fabric is applied intelligently to manufacturing, energy, and transportation industries to enable compliance and risk mitigation. You will learn how the technologies for securing the IT side of the house can be adapted and applied to the OT side of the house.
Session Category: Platinum Sponsor

This session will provide a backdrop of industry trends and how to think about the evolving landscape around threats and how to be prepared to respond with architectures that can adapt and detect no matter if you’re managing assets / IoT devices on the edge or if you’re looking to reap the benefits of hybrid / multi-cloud  “securely”.  We’ll provide high-level recommendations on what to look for in making these architecture decisions. Format to be presentation and panel combination.

 

Session Category: Device Access & App Security (DAS)
The access layer is the broadest attack surface in your network, and it is only getting worse with Internet of Things (IoT) devices entering the network. This session will cover how FortiSwitch and FortiAP secure access products integrate with the Security Fabric, making security a native part of your access technology. With FortiLink technology, you can extend the power of FortiGate to FortiSwitch and FortiAP, allowing everything to be managed and secured from a single interface. Come learn how Fortinet Secure Access can improve your network by delivering less hassle, fewer systems to configure, lower TCO, and a better overall experience.
Session Category: Multi-Cloud Security (MCS)
Enterprises are increasingly adopting hybrid cloud architectures, integrating on-premises private clouds with public cloud resources to take advantage of the scale and performance benefits, yet consistent security is a top priority. FortiGate-VMs extend Security Fabric automation, visibility, and control to multi-cloud environments. Fortinet’s IPSec and secure sockets layer (SSL) VPNs allow enterprises to securely connect their on-premises networks to multiple clouds. This interactive session will demonstrate how Fortinet’s FortiGate virtual appliances can provide seamless security across the software defined data center(SDDC), private, public and hybrid clouds.
Session Category: Industry
The financial services industry continues its radical shift in business models due to digital transformation. As a result, new cybersecurity models, tools, and architectures are required. Cybersecurity professionals are focused on 5 key challenges: Automation to improve security posture Visibility into the exponentially larger attack surface Consolidation away from point products Flexibility to take advantage of public, private, and hybrid cloud environments Reporting to meet the multiplying compliance requirements In order to meet these challenges and enable new business advantage, a security transformation is taking place within the financial services industry. Join this interactive session to discover the four areas of transformation: Technical. Price, performance, and security of Fortinet solutions are the leading enterprise choice, as validated by multiple, independent third-parties. Discover the full spectrum of next-generation firewall (NGFW) capabilities and the portability of FortiOS. Financial. Cost reduction is an integral part of implementing a security transformation. See how Fortinet solutions not only reduce TCO, but have been proven at some of the largest banks around the world. Operational. Automation and orchestration is possible through JSON and REST APIs to and from Fortinet's central management infrastructure or directly to secure gateways. In addition, APIs enable orchestration via a programmable Security Fabric. Transition. Near zero-touch provisioning via automated scripts to convert firewall policies coupled with a robust training regimen ensures a successful security transformation.
Session Category: Partner
Already, we’ve seen OT deal sizes in the tens of millions – so how do you position your business to take advantage? Join this session to learn the differences between IT and OT customers, the ingredients for building out your OT practice, and how Fortinet’s Security Fabric positions you to take your share of the market.
Session Category: Partner
In a fast-growing cybersecurity market, there is a need to adapt and evolve the partner program to help you grow your business with Fortinet. Learn how the new Fortinet Partner Program will help your customers recognize your competencies and select your company for its added value services.
Session Category: Partner
Making IT-driven changes in OT-based environments introduces major risk to critical infrastructure that drives pipelines, energy grids, and manufacturing supply chains. OT customers need help improving their security posture by integrating IT to stay competitive and increase their resilience against cyberattacks.
Session Category: Partner
From initial setup to automating operational functions, you will learn how to build managed security service provider (MSSP) services using FortiSIEM. Understand the top concerns and best practices to ensure your FortiSIEM instance is multitenant-capable, built properly for scale, and provides your desired business returns.
Session Category: Partner
Security controls for the SMB are just as important as those for the Enterprise, but SMBs often overlook the importance because, “it can’t happen to them.” Yet we know that 61%* of breaches hit smaller businesses last year, up from the previous year's 53% – and in a lot of cases caused the business to shutter its doors.

As a Fortinet Partner, this presents a great opportunity – combined with your expertise, Fortinet’s complete security solutions for the SMB offer your customers peace of mind and ease of management. Join this session to learn how we’ve evolved our solutions to leverage the cloud making deployment, management, and maintenance of infrastructure a snap! We’ll cover everything from Connected UTM updates, through Secure Productivity use cases, to how you can accelerate your business’ growth by leveraging Cloud Services – all helping you build that coveted consultative relationship with your customers.
* Verizon Data Breach Investigation Report
Session Category: Device Access & App Security (DAS)
Endpoints are frequently the target of initial compromise or attacks. FortiClient strengthens endpoint security through integrated visibility, control, and proactive defense. With the ability to discover, monitor, and assess endpoint risks, you can ensure endpoint compliance, mitigate risks, and reduce exposure. FortiClient proactively defends against advanced attacks. Its tight integration with the Security Fabric enables policy-based automation to contain threats and control outbreaks. It provides advanced endpoint protection with pattern-based anti-malware, behavior-based exploit protection, web-filtering, and an application firewall. FortiClient natively integrates with FortiSandbox to detect zero-day threats and custom malware. It also provides secure remote access with built-in VPN, single sign-on, and two-factor authentication for added security. Attend this technical training workshop to gain hands-on experience controlling endpoints using FortiClient EMS in mixed Windows and Linux environments, and see first-hand how FortiClient integrates with the Fortinet Security Fabric to protect your companies’ critical assets.
Session Category: Network Security (NS)
As security architects consider how to provide comprehensive threat protection for their enterprises, that includes intrusion prevention, web filtering, anti-malware, and application control, they face a major complexity hurdle managing point products with no integration and lack of visibility. FortiGate next-generation firewall (NGFW) utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance including encrypted traffic. FortiGate reduces complexity by integrating various point products into NGFW features with automated action and enhanced visibility into applications, users, and networks. Attend this technical training session and gain hands-on experience fortifying the enterprise network with the Fortinet NGFW solution
Session Category: Device Access & App Security (DAS)
Email is a critical tool for businesses, but it’s also a preferred delivery method for ransomware, phishing, and compromise attacks. According to the 2018 Verizon report, 49% of (non-POS) malware was installed via malicious email. FortiMail is tailored for advanced threat defense and shields users and data, from a wide range of cyber threats. These include the ever-growing volumes of unwanted spam, socially-engineered phishing and business email compromise, and accelerating variants of ransomware. FortiMail can also be used to protect sensitive data of all types, reducing the risk of inadvertent loss and/or non-compliance with regulations like HIPAA, PCI, GDPR, and more. Attend this technical training session and gain hands-on experience protecting your organization against phishing, spam, malware, and advanced targeted attacks via email.
Session Category: Security Operations (SO)
Effective security requires visibility of all the devices across the entire infrastructure in real time, with context. It must know what devices represent a threat along with their capability—so you can manage and remediate threats, not the noise multiple security tools create. Fortinet’s multi-vendor Security Incident and Events Management (SIEM) solution, FortiSIEM, brings it all together by integrating NOC-SOC solutions to automate IT processes and security responses. Visibility, correlation, automated response, and remediation all come in a single, scalable solution. Using a FortiSIEM, the complexity of managing network and security operations is reduced, freeing resources, and improving breach detection. FortiSIEM provides the cross correlation, machine learning, and user entity and behavior analytics (UEBA) to improve overall response and effectively stop breaches before they occur. Attend this workshop to help understand the FortiSIEM architecture and powerful feature set. Gain experience running analytic searches to aid in the rapid detection and remediation of multiple security events.
Session Category: Network Security (NS)
More than a firewall operating system, FortiOS enables broad connectivity and awareness among security components, both within the network and from other disciplines, such as endpoint, management, and analytics. FortiOS has long been the heart of FortiGate next-generation firewalls , serving thousands of customers in every industry across the globe. The needs of this diverse customer base are widespread, and the more than 200 new features and capabilities are in response to our customers’ needs. Beyond its mission of enabling the Fortinet Security Fabric, FortiOS makes significant gains in these areas: cloud, automation, Security-as-a-Service (SaaS), and SD-WAN.” Attend this technical training session and hands-on workshop to learn more about the new key features FortiOS has to offer.
Session Category: Network Security (NS)
The proliferation of Internet of Things (IoT), has made it necessary for organizations to improve their visibility into what is attached to their networks. They need to know every device and every user accessing their networks. IoT devices enable digital transformation initiatives and improve efficiency, flexibility, and optimization. However, they are inherently risky, with designs that prioritize low-cost over security. FortiNAC provides the network visibility to see everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses. Attend this technical training workshop to discuss the security challenges that many customers face and to understand how the fundamental feature set of FortiNAC can address these challenges.
Session Category: Network Security (NS)
Convergence is blurring the lines between IT and OT, creating an opportunity to improve the visibility, control, and situational awareness necessary for critical systems. Failure to take the wide range of security issues into account when converging these two different networks and networking philosophies can result in catastrophic network failures that risk critical systems as well as the well-being of workers and communities. The Fortinet Security Fabric represents the first-ever architectural security approach designed to dynamically adapt to unique needs of legacy OT environments while enabling the move towards modernizing these critical systems. Leveraging the Purdue Model for the security layers needed in OT, the multi-layered approach offered by the Fortinet Security Fabric provides broad, integrated, and automated protection against sophisticated threats. Attend this technical workshop to help understand the differences between securing IT and OT environments and the importance of active security. Gain hands-on experience applying the Fortinet Security Fabric to better secure operational technologies.
Session Category: Network Security (NS)
As organizations transition to a digital business model, virtualization and cloud technologies play an increasing role. Speed, flexibility, elasticity, and integration are all critical features that cannot be inhibited when implementing an effective security strategy. Ultimately, it does not matter how fast you can deploy an appliance or VM if configuration is a manual process which requires a heavy administrative touch. Web services application programming interfaces (APIs) enable organizations to fully leverage the benefits of these dynamic architectures while offering an efficient communications method that promotes a robust and automated Security Fabric. Understanding the structure, function, and communication mechanisms of these APIs is critical for developing any custom interfaces. Attend this hands-on technical training workshop and gain hands-on experience automating configuration and policy deployment on FortiManager and FortiGate.
Session Category: Device Access & App Security (DAS)
Cybercriminals are increasingly targeting public and internal web applications. Today, nearly half of all data breaches are caused by attacks targeting web application vulnerabilities. To protect organizations from such attacks, web application firewalls (WAFs) are the gold standard. However, some organizations may be reluctant to use these devices as they have a reputation for being resource-intensive, especially when it comes to quickly addressing false positive detections ito ensure that legitimate users and applications do not get blocked. In this workshop, you will learn how FortiWeb’s new AI-based machine learning addresses these shortcomings, why it is better than application learning, and why signature-based protection alone is not enough.
Session Category: Network Security (NS)
As organizations transition to a digital business model, their network topologies are significantly impacted. The adoption of cloud services, the virtualization of the traditional network, and an increasingly mobile workforce accessing applications in the cloud, are accelerating advancements in wide-area networking technologies. The traditional wide-area network (WAN) is struggling to keep up because it relies on a static infrastructure of devices that simply cannot accommodate shifting, and often temporary resource allocation and workloads. Learn how software-defined networking (SDN) applies to software control of WANs in an enterprise environment. Attend this technical training session and gain experience through actual configuration of virtualized products supporting WAN aggregation.
Session Category: Device Access & App Security (DAS)
With a dynamic attack surface due to the rise of Internet of Things (IoT) and cloud services, it is clear that no single technology will be able to stop every threat. To protect your enterprise against sophisticated threats, it is important to establish a comprehensive and cohesive security infrastructure that is broad enough to cover all attack vectors, powerful enough to run the latest security technologies, and automated to keep pace with fast-moving attacks. Attend this hands-on technical training workshop to learn how to detect and analyze advanced threats with FortiSandbox.
Session Category: Network Security (NS)
The number and types of network-connected devices continue to grow exponentially, presenting new vulnerabilities and increasing the attack surface. Addressing this trend requires much more than just network access control. It requires scanning for malware, preventing access to malicious websites, checking endpoint integrity, and controlling application usage while reducing complexity of network, application, and device management. Fortinet's secure unified access solution provides comprehensive security on the network infrastructure. The tight integration between the FortiGate appliances, FortiSwitch devices, and FortiAP wireless access points enables a common security policy across the network, extending the protection of the firewall out to the edge.
Session Category: Security Operations (SO)
As enterprise networks have morphed and changed with digital transformation, once relied upon tools have become outdated and obsolete. Yet, many are still deployed alongside newer technology stacks, creating a complex environment that does not interoperate. Enterprises deploy an average of 32 different vendor solutions that lack shared threat intelligence—a cybersecurity hurdle that is often compounded with a lack of skilled cybersecurity personnel to manage these networks. The Fortinet management and analytics solution provides a powerful automation-ready single pane of glass for management and visibility, advanced compliance reporting, and network-aware rapid response across on-premises, cloud, and hybrid environments. Attend this technical training workshop and gain hands-on experience implementing the solution's key capabilities and applying them to centrally manage a fictitious organization’s HQ and branch networks from a single pane of glass.
Session Category: Network Security (NS)
Today's new world of networking requires a new approach to security. One that simply yet intelligently secures the entire infrastructure. One that delivers full visibility into every viable network segment and the devices and endpoints behind them. One that can seamlessly integrate with third-party solutions, enabling users to ubiquitously collect, share, and correlate threat intelligence. The Fortinet Security Fabric represents the first-ever architectural security approach designed to dynamically adapt to today's evolving IT infrastructure. This multi-layered approach provides broad, integrated, and automated protection against sophisticated threats. Attend this technical training session and gain hands-on experience configuring a comprehensive Security Fabric including Fortinet products and Fortinet Fabric-Ready Partner products.
Session Category: Industry
This small group session is designed to take you on a deep-dive into the E-rate performance in 2019. You will come away knowing what you need to do to expand your reach and increase wins with Fortinet.
Session Category: Network Security (NS)
Service Providers have begun to roll out 5G and Internet of Things (IoT) services around the world for the great opportunities it offers, but the road to 5G is also introducing new risks. Come learn how Fortinet is enabling communication service providers (CSPs) to build and secure new revenue-generating opportunities in 5G and IoT with our carrier solutions.

Enterprise customers increasingly are seeking new managed security service provider (MSSPs) services that complete their security needs while trying to adopt flexible spending options. You will also learn how Fortinet is enabling MSSPs to build Security-as-a-Service offerings through specific products and tailored consumption programs.
Session Category: Device Access & App Security (DAS)
With organizations rapidly developing new web applications and migrating email and other services to the cloud, they have become much more agile. However, organizations must ensure their networks maintain security, governance, and a high-quality, consistent user experience, while leveraging the cloud to its fullest potential. In this session, you will learn how FortiWeb, FortiADC, and FortiMail can help secure and scale applications in and out of public, private, and Security-as-a-Service clouds, such as Microsoft Office 365, G-suite, Amazon Web Services, and Microsoft Azure.
Session Category: Multi-Cloud Security (MCS)
In this interactive session, you will learn about the security considerations, use cases, and Fortinet’s solutions for securing applications built in the public cloud. Learn about the use of virtual network segmentation and application control policies in the cloud, based on FortiGate-VM. Additionally, discover a variety of tools to secure cloud-based web applications and APIs. Get a sneak peek at the new Fortinet cloud security posture management and analytics capabilities designed to help customers protect from the leading cloud risk—cloud configuration mistakes.
Session Category: Device Access & App Security (DAS)

Today’s dynamic network infrastructures support employees, vendors, contractors, and guests, as well as laptops, smart phones, printers, and new Internet of Things (IoT) devices. Providing access while ensuring security is no easy task when weak passwords, Shadow IT, and unsecure IoT risks challenge enterprise security teams.

Come learn how the Fortinet Security Fabric can manage risk, including how FortiNAC, and FortiAuthenticator work together to deliver an integrated solution that protects every user and every device on your network. Provide the right level of access and security.

Session Category: Security Operations (SO)
FortiGuard Labs processes over 100 billion security events per day, representing data from the endpoint to the cloud. This gives us a unique and unprecedented view into the threat world. In this presentation you will get an overview of the current threat landscape including: what schemes bad actors employ to evade detection, recent cybercrime trends, and additional cyber threat trends. You will get an overview of FortiGuard Labs' mature and leading-edge artificial intelligence (AI) and machine learning (ML) program that provides protection capabilities that feed into products across the Fortinet portfolio. Our AI/ML program continues to expand in breadth and depth and this update will showcase how we stay ahead of the pack.
Session Category: Network Security (NS)
If you are a network or security practitioner, you might think you can build an effective security architecture by deploying a robust perimeter firewall. But the perimeter has become less effective due to mobile computing and workloads migrating to multiple clouds on the WAN side. And on the LAN side, malware coming from trusted users, rogue APs, and Shadow IT each add another micro-perimeter that you must also now defend. As a result, the fortified perimeter has become the sum of all of the micro-perimeters tied to the growing number of devices consuming networked services across all locations. Segmentation is a good starting point to deal with this, but it lacks adaptive trust and advanced security. In this session, you will discover the benefits of adopting this new approach and how you can build a robust and high-performance security architecture with intent-based segmentation. Intent-based segmentation intelligently segments IT assets in accordance with business intent, and employs adaptive trust, control, and automated threat protection to mitigate risks and achieve compliance with reduced complexity.
Session Category: Platinum Sponsor
In this session, you will learn how two technology leaders, Symantec and Fortinet, are working together to enhance essential security controls to provide customers with enterprise-class capabilities across endpoint, network, and cloud. We will outline the unique product integrations that will deliver better security outcomes for our customers by harnessing distinctive innovations from both Symantec and Fortinet in an integrated solution that is easy to use and deploy. This integrated solution provides the essential elements that are critical to enforce a Zero Trust security framework.
Session Category: Security Operations (SO)
The role of the CISO and the pressures that it brings can be overwhelming, often adding incrased responsibilities for networking and security teams to produce quality results. Teams must work diligently and tirelessly collecting and analyzing cyber data across a rapidly growing attack surface, while at the same time, attempting to rationalize results and present details in simple business terms. In this session, you will learn about the 10 proven strategies teams can use to create an environment of trust and assurance. Find out how the Fortinet Security Fabric can help CISOs along with network and security teams to set practical goals, simplify operations, and create an environment of trust and assurance.
Session Category: Industry
SD-WAN has moved from an innovative idea to the next must-have capability in a short span of time. With its ability to deliver an optimized networking experience to a broad set of customers at a reasonable cost, its growth prospects are dazzling. Not long-ago, SD-WAN was being evaluated by users and service providers as a standalone connectivity option, but the rapid growth of cloud-based services and an expanding set of use-cases is forcing a rethink of what additional capabilities are required to ensure it delivers on its promise. In this moderated breakout session, you will hear two perspectives on SD-WAN. Join this session to hear from an enterprise user of SD-WAN and a service provider offering managed SD-WAN services share their views and decisions for determining SD-WAN strategies.
Session Category: Partner
Learn how to build MSSP service automation into the Security Fabric using micro-services. Enabling automation projects and reaching your operational efficiency goals can be a challenge. The managed security services provider (MSSP) team can help you organize and reach these objectives no matter how high your level of operational maturity.
Session Category: Partner
The industry is changing, and Fortinet is leading the way to help you maximize your security practice, automate your offering, and bring overall operational efficiency to you and your team. Join us to learn more about what's in store for the Fortinet Partner Program.
Session Category: Partner
The Cyber Threat Assessment Program (CTAP) is designed to help you convert prospects and expand your business within your existing accounts and give prospects an in-depth view of the current state of their network. During this session, you will learn how to pitch the CTAP as a pre-sales and renewal tool to help you land and expand your business, and how to build it into your business model to drive greater profitability.
Session Category: Network Security (NS)
As organizations transition to a digital business model, virtualization and cloud technologies play an increasing role. Speed, flexibility, elasticity, and integration are all critical features that cannot be inhibited when implementing an effective security strategy. Ultimately, it does not matter how fast you can deploy an appliance or VM if configuration is a manual process which requires a heavy administrative touch. Web services application programming interfaces (APIs) enable organizations to fully leverage the benefits of these dynamic architectures while offering an efficient communications method that promotes a robust and automated Security Fabric. Understanding the structure, function, and communication mechanisms of these APIs is critical for developing any custom interfaces. Attend this hands-on technical training workshop and gain hands-on experience automating configuration and policy deployment on FortiManager and FortiGate.
Session Category: Network Security (NS)
As organizations transition to a digital business model, their network topologies are significantly impacted. The adoption of cloud services, the virtualization of the traditional network, and an increasingly mobile workforce accessing applications in the cloud, are accelerating advancements in wide-area networking technologies. The traditional wide-area network (WAN) is struggling to keep up because it relies on a static infrastructure of devices that simply cannot accommodate shifting, and often temporary resource allocation and workloads. Learn how software-defined networking (SDN) applies to software control of WANs in an enterprise environment. Attend this technical training session and gain experience through actual configuration of virtualized products supporting WAN aggregation.
Session Category: Device Access & App Security (DAS)
With a dynamic attack surface due to the rise of Internet of Things (IoT) and cloud services, it is clear that no single technology will be able to stop every threat. To protect your enterprise against sophisticated threats, it is important to establish a comprehensive and cohesive security infrastructure that is broad enough to cover all attack vectors, powerful enough to run the latest security technologies, and automated to keep pace with fast-moving attacks. Attend this hands-on technical training workshop to learn how to detect and analyze advanced threats with FortiSandbox.
Session Category: Network Security (NS)
As security architects consider how to provide comprehensive threat protection for their enterprises, that includes intrusion prevention, web filtering, anti-malware, and application control, they face a major complexity hurdle managing point products with no integration and lack of visibility. FortiGate next-generation firewall (NGFW) utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance including encrypted traffic. FortiGate reduces complexity by integrating various point products into NGFW features with automated action and enhanced visibility into applications, users, and networks. Attend this technical training session and gain hands-on experience fortifying the enterprise network with the Fortinet NGFW solution
Session Category: Device Access & App Security (DAS)
Cybercriminals are increasingly targeting public and internal web applications. Today, nearly half of all data breaches are caused by attacks targeting web application vulnerabilities. To protect organizations from such attacks, web application firewalls (WAFs) are the gold standard. However, some organizations may be reluctant to use these devices as they have a reputation for being resource-intensive, especially when it comes to quickly addressing false positive detections ito ensure that legitimate users and applications do not get blocked. In this workshop, you will learn how FortiWeb’s new AI-based machine learning addresses these shortcomings, why it is better than application learning, and why signature-based protection alone is not enough.
Session Category: Device Access & App Security (DAS)
Email is a critical tool for businesses, but it’s also a preferred delivery method for ransomware, phishing, and compromise attacks. According to the 2018 Verizon report, 49% of (non-POS) malware was installed via malicious email. FortiMail is tailored for advanced threat defense and shields users and data, from a wide range of cyber threats. These include the ever-growing volumes of unwanted spam, socially-engineered phishing and business email compromise, and accelerating variants of ransomware. FortiMail can also be used to protect sensitive data of all types, reducing the risk of inadvertent loss and/or non-compliance with regulations like HIPAA, PCI, GDPR, and more. Attend this technical training session and gain hands-on experience protecting your organization against phishing, spam, malware, and advanced targeted attacks via email.
Session Category: Network Security (NS)
Convergence is blurring the lines between IT and OT, creating an opportunity to improve the visibility, control, and situational awareness necessary for critical systems. Failure to take the wide range of security issues into account when converging these two different networks and networking philosophies can result in catastrophic network failures that risk critical systems as well as the well-being of workers and communities. The Fortinet Security Fabric represents the first-ever architectural security approach designed to dynamically adapt to unique needs of legacy OT environments while enabling the move towards modernizing these critical systems. Leveraging the Purdue Model for the security layers needed in OT, the multi-layered approach offered by the Fortinet Security Fabric provides broad, integrated, and automated protection against sophisticated threats. Attend this technical workshop to help understand the differences between securing IT and OT environments and the importance of active security. Gain hands-on experience applying the Fortinet Security Fabric to better secure operational technologies.
Session Category: Network Security (NS)
The proliferation of Internet of Things (IoT), has made it necessary for organizations to improve their visibility into what is attached to their networks. They need to know every device and every user accessing their networks. IoT devices enable digital transformation initiatives and improve efficiency, flexibility, and optimization. However, they are inherently risky, with designs that prioritize low-cost over security. FortiNAC provides the network visibility to see everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses. Attend this technical training workshop to discuss the security challenges that many customers face and to understand how the fundamental feature set of FortiNAC can address these challenges.
Session Category: Device Access & App Security (DAS)
Endpoints are frequently the target of initial compromise or attacks. FortiClient strengthens endpoint security through integrated visibility, control, and proactive defense. With the ability to discover, monitor, and assess endpoint risks, you can ensure endpoint compliance, mitigate risks, and reduce exposure. FortiClient proactively defends against advanced attacks. Its tight integration with the Security Fabric enables policy-based automation to contain threats and control outbreaks. It provides advanced endpoint protection with pattern-based anti-malware, behavior-based exploit protection, web-filtering, and an application firewall. FortiClient natively integrates with FortiSandbox to detect zero-day threats and custom malware. It also provides secure remote access with built-in VPN, single sign-on, and two-factor authentication for added security. Attend this technical training workshop to gain hands-on experience controlling endpoints using FortiClient EMS in mixed Windows and Linux environments, and see first-hand how FortiClient integrates with the Fortinet Security Fabric to protect your companies’ critical assets.
Session Category: Network Security (NS)
More than a firewall operating system, FortiOS enables broad connectivity and awareness among security components, both within the network and from other disciplines, such as endpoint, management, and analytics. FortiOS has long been the heart of FortiGate next-generation firewalls , serving thousands of customers in every industry across the globe. The needs of this diverse customer base are widespread, and the more than 200 new features and capabilities are in response to our customers’ needs. Beyond its mission of enabling the Fortinet Security Fabric, FortiOS makes significant gains in these areas: cloud, automation, Security-as-a-Service (SaaS), and SD-WAN.” Attend this technical training session and hands-on workshop to learn more about the new key features FortiOS has to offer.
Session Category: Network Security (NS)
The number and types of network-connected devices continue to grow exponentially, presenting new vulnerabilities and increasing the attack surface. Addressing this trend requires much more than just network access control. It requires scanning for malware, preventing access to malicious websites, checking endpoint integrity, and controlling application usage while reducing complexity of network, application, and device management. Fortinet's secure unified access solution provides comprehensive security on the network infrastructure. The tight integration between the FortiGate appliances, FortiSwitch devices, and FortiAP wireless access points enables a common security policy across the network, extending the protection of the firewall out to the edge.
Session Category: Security Operations (SO)
Effective security requires visibility of all the devices across the entire infrastructure in real time, with context. It must know what devices represent a threat along with their capability—so you can manage and remediate threats, not the noise multiple security tools create. Fortinet’s multi-vendor Security Incident and Events Management (SIEM) solution, FortiSIEM, brings it all together by integrating NOC-SOC solutions to automate IT processes and security responses. Visibility, correlation, automated response, and remediation all come in a single, scalable solution. Using a FortiSIEM, the complexity of managing network and security operations is reduced, freeing resources, and improving breach detection. FortiSIEM provides the cross correlation, machine learning, and user entity and behavior analytics (UEBA) to improve overall response and effectively stop breaches before they occur. Attend this workshop to help understand the FortiSIEM architecture and powerful feature set. Gain experience running analytic searches to aid in the rapid detection and remediation of multiple security events.
Session Category: Partner
The industry is changing, and Fortinet is leading the way to help you maximize your security practice, automate your offering, and bring overall operational efficiency to you and your team. Join us to learn more about what's in store for the Fortinet Partner Program and how we're making it easy for you to expand your business!
Session Category: Partner
The industry is changing, and Fortinet is leading the way to help you maximize your security practice, automate your offering, and bring overall operational efficiency to you and your team. Join us to learn more about what's in store for the Fortinet Partner Program.
Session Category: Partner
The industry is changing, and Fortinet is leading the way to help you maximize your security practice, automate your offering, and bring overall operational efficiency to you and your team. Join us to learn more about what's in store for the Fortinet Partner Program.
Session Category: Partner
The industry is changing, and Fortinet is leading the way to help you maximize your security practice, automate your offering, and bring overall operational efficiency to you and your team. Join us to learn more about what's in store for the Fortinet Partner Program.

7:00 PM - 10:00 PM