Pre-Conference Workshops (NSE 4 to 7)

Arrive early in Orlando and attend one of 12 Pre-Conference Workshops being offered this year at Accelerate. The on-site Network Security Expert (NSE) Institute will offer Pre-Conference Workshops from the extensive catalogue of the official NSE training program. If you have been thinking about pursuing an NSE certification or taking your certification to the next level, this is an opportunity to do it at a great price. The most popular courses will be offered, ranging from NSE 4 to NSE 7 training. And as an Accelerate 2019 attendee, you will receive a free exam voucher to use at the on-site testing center.

Whether you attend a Pre-Conference Workshop or not, be sure to visit the NSE Institute in the Swan Resort during Accelerate.

Workshops will begin the morning of Sunday, April 7. You should plan to arrive in Orlando on Saturday, April 6.

You will have the option to attend one (1) of the following two-day workshops:

NSE 4 Level Courses

Choose between one of two NSE 4 Level courses to attend. Each course below is a two-day workshop:
FortiGate Security
In this hands-on course, you will learn how to use basic FortiGate features, including security profiles. In the interactive facilitated labs, you will explore firewall policies, user authentication, and how to protect your network using security profiles such as IPS, antivirus, and web filtering. These administration fundamentals will provide you with a solid understanding of how to implement basic network security.

FortiGate Infrastructure
In this interactive course, you will learn how to use advanced FortiGate networking and security. In interactive labs, you will explore features commonly applied in complex or larger enterprise or MSSP networks, such as advanced routing, transparent mode, redundant infrastructure, site-to-site IPsec VPN, SSO, web proxy, and diagnostics.

NSE 5 Level Courses

Choose between two NSE 5 Level courses to attend. Each course below is a two-day workshop:
In this hands-on class, you will learn the fundamentals of using FortiManager for centralized network administration of many FortiGate devices. In interactive labs, you will explore deployment strategies which include single or multiple ADOMs, device registration, policy packages, shared objects, installing configuration changes, provisioning FortiManager as a local FortiGuard distribution server, and troubleshoot the features that are critical to day-to-day use once deployed.

In this hands-on course, you will learn how to use FortiSIEM, and how to integrate FortiSIEM into your network infrastructure. You will learn about initial configurations, architecture, and the discovery of devices on the network. You will also learn how to collect performance information and aggregate it with syslog data to enrich the overall view of the health of the environment. Additionally, you will learn how to can use the configuration database to facilitate compliance audits.

NSE 6 Level Courses

Choose between one of three NSE 6 Level courses to attend. Each course below is a two-day workshop:

In this hands-on course, you will learn how to leverage the powerful and diverse capabilities of the FortiNAC system, and use best practices for achieving visibility, control, and response. In interactive labs, you will explore the administrative tasks necessary to achieve network visibility, control, and automated threat response. These fundamentals will provide you with a solid understanding of how to implement network visibility and security automation.

In this hands-on course, you will learn how to deploy, configure, and troubleshoot Fortinet's web application firewall, FortiWeb. Instructors will explain key concepts of web application security, and lead lab exercises in which you will explore protection and performance features. In the lab, you will experience traffic and attack simulations that use real web applications. You will work with simulations to learn how to distribute load from virtual servers to real servers, while enforcing logical parameters, inspecting flow, and securing HTTP session cookies.

In this hands-on course, you will learn how to use FortiMail to protect your network from existing email-borne threats, as well as FortiSandbox to detect and block emerging threats. In interactive labs, you will explore FortiMail's role as a specialized device, and how its features extend beyond FortiGate email filtering to provide both high-performance and in-depth security for business-critical communications. You will analyze email security challenges that administrators of small businesses and carriers face, and learn where and how to deploy, manage, and troubleshoot FortiMail.

NSE 7 Level Courses

Choose between one of five NSE 7 Level courses to attend. Each course below is a two-day workshop:

Enterprise Firewall Architecture
In this advanced hands-on class, you will learn how to implement, troubleshoot, and centrally manage an enterprise security infrastructure composed of multiple FortiGate, FortiManager, and FortiAnalyzer devices.

After completing this course, you will be able to:

  • Integrate FortiManager, FortiAnalyzer, and multiple FortiGate devices using the Fortinet Security Fabric
  • Centralize the management and monitoring of network security events
  • Optimize FortiGate resources
  • Diagnose and monitor user traffic using FortiGate debug tools
  • Troubleshoot issues with conserve mode, high CPU, firewall policies, session helpers, IPsec, FortiGuard, content inspection, routing, and HA
  • Harden the enterprise services
  • Simultaneously deploy IPsec tunnels to multiple sites using the FortiManager VPN console
  • Configure auto discovery VPN (ADVPN) to enable on-demand VPN tunnels between sites
  • Combine Open Shortest Path First (OSPF) and Border Gateway Protocol (BGP) to route the enterprise traffic
Secure Access

In this advanced hands-on course, you will learn how FortiOS, FortiAP, FortiSwitch, and FortiAuthenticator enable secure connectivity, no matter where users are located and how they connect. The course covers the deployment and troubleshooting of advanced authentication scenarios, along with best practices for securely connecting wireless and wired users.

After completing this course, you will be able to:

  • Configure advanced user authentication and authorization scenarios using RADIUS and LDAP
  • Troubleshoot user authentication and authorization problems
  • Implement two-factor authentication using digital certificates
  • Implement and troubleshoot single sign-on solutions integrating multiple single sign-on methods
  • Configure and troubleshoot IPsec dial-up and secure sockets layer (SSL) VPN access
  • Manage FortiSwitch devices using FortiLink
  • Configure Layer 2 authentication for wired and wireless users using 802.1.x
  • Secure the Layer 2 network
  • Secure the wireless network
  • Provide secure access to guest users
  • Implement single sign-on among multiple providers using FortiAuthenticator and SAML
Advanced Threat Protection

In this advanced hands-on course, you will learn how to protect an organization and improve its security against advanced threats that bypass traditional security controls. You will use FortiSandbox to detect threats that traditional antivirus products miss, and see how FortiSandbox dynamically generates local threat intelligence that can be shared throughout the network. You will combine multiple advanced threat protection (ATP) components—FortiGate, FortiMail, FortiWeb, and FortiClient—to leverage threat intelligence information and protect an organization end-to-end from advanced threats.

After completing this course, you will be able to:

  • Identify different types of cyberattacks
  • Identify threat actors and their motivations
  • Understand the anatomy of an attack—the kill chain
  • Identify the potentially vulnerable entry points in an enterprise network
  • Identify how the ATP framework works to break the kill chain
  • Identify the role of FortiSandbox in the ATP framework
  • Identify appropriate applications for sandboxing
  • Identify FortiSandbox architecture
  • Identify FortiSandbox key components
  • Identify the appropriate network topology requirements
  • Configure FortiSandbox
  • Monitor FortiSandbox operation
  • Configure FortiGate integration with FortiSandbox
  • Configure FortiMail integration with FortiSandbox
  • Configure FortiWeb integration with FortiSandbox
  • Configure FortiClient integration with FortiSandbox
  • Troubleshoot FortiSandbox-related issues
  • Perform analysis of outbreak events
  • Remediate outbreak events based on log and report analysis


Public Cloud Security
In this advanced hands-on course, you will learn about the different components of the top public cloud providers’ infrastructures and the security challenges these environments present, including high availability, auto-scaling, software-defined network (SDN) connectors, and how to manage traffic in the cloud with Fortinet products.

After completing this course, you will be able to:

  • Deploy FortiGate VM on Amazon Web Services (AWS) and Azure in single, high availability, and auto-scaling modes
  • Use security transit VPC and VNET
  • Use Fortinet templates to easily deploy complex environments
  • Deploy a FortiWeb in AWS
  • Use SDN connectors with cloud vendors
  • Integrate other Fortinet services and products with cloud vendors
For this advanced course, it is recommended that you have previous knowledge of cloud platforms and Fortinet VM products.


Private Cloud Security
This advanced hands-on course will provide an overview of the most common private cloud architectures, the security challenges these environments present and learn how to protect them with Fortinet solutions.

After completing this course, you will be able to:

  • VMware NSX
    • Deploy FortiGate-VMX
    • Work with SDN connectors
    • Integrate FortiManager and FortiAnalyzer
    • Implement micro-segmentation
  • OpenStack
    • Deploy regular FortiGate-VM
    • Integrate FortiGate-VM using ML2 plugin
    • Use FortiOS-VM with Fortinet metering services

Special Workshop

For this advanced course, attendees are expected to have NSE 4 level of expertise in Fortinet Solutions as it is a pre-requisite to attend this workshop.
Secure SD-WAN

This training purpose is to explore common SD-WAN deployment scenarios. From a single Enterprise site to multiple Datacenters we will build, improve and troubleshoot all challenges related to an SD- WAN deployment enabling the attendees to identify, define and implement the Fortinet Secure SD-WAN solution.

Reviewing real-life use cases, this training will present how to configure FortiGate and FortiManager SD-WAN features, how to integrate this into an existing network, how to adjust the environment in the light of new security and availability demands and finally how to scale this to thousands of devices solving the issues of today's complex and dynamic networks. 

After completing this course, you will be able to:

  • Identify SD-WAN drivers and when to use this technology
  • Differentiate between different SD-WAN use cases
  • Deploy Secure SD-WAN features on FortiGate
  • Execute Zero Touch Provisioning of a FortiGate using FortiManager
  • Integrate several locations using SD-WAN and dynamic routing features
  • Understand how to monitor and assess the health of an SD-WAN environment

Fast Track Workshops

Attend one of our Fast Track Workshops for an impactful hands-on experience focused on a particular Fortinet technology. Each workshop is based on a specific business or technology use case and provides you with an immediate understanding of the Fortinet solution.

Have you been considering Fortinet Network Security Expert (NSE) certification? Attend a Fast Track Workshop to gain a better understanding of the type of training you can expect as you progress through the eight levels of the NSE program. Although the Fast Track Workshops are designed for a technical audience, no previous Fortinet training is required before attending.

The following Fast Track Workshops will be offered to all Accelerate attendees:

Fortinet’s Management and Analytics solution—A Key Component to the Fabric

As enterprise networks have morphed and changed with digital transformation, once relied upon tools have become outdated and obsolete. Yet, many are still deployed alongside newer technology stacks, creating a complex environment that does not interoperate. Enterprises deploy an average of 32 different vendor solutions that lack shared threat intelligence—a cybersecurity hurdle that is often compounded with a lack of skilled cybersecurity personnel to manage these networks.

The Fortinet management and analytics solution provides a powerful automation-ready single pane of glass for management and visibility, advanced compliance reporting, and network-aware rapid response across on-premises, cloud, and hybrid environments. 

Attend this technical training workshop and gain hands-on experience implementing the solution's key capabilities and applying them to centrally manage a fictitious organization’s HQ and branch networks from a single pane of glass.

Powerful Security Information and Event Management with FortiSIEM

Effective security requires visibility of all the devices across the entire infrastructure in real time, with context. It must know what devices represent a threat along with their capability—so you can manage and remediate threats, not the noise multiple security tools create.  Fortinet’s multi-vendor Security Incident and Events Management (SIEM) solution, FortiSIEM, brings it all together by integrating NOC-SOC solutions to automate IT processes and security responses. Visibility, correlation, automated response, and remediation all come in a single, scalable solution. Using a FortiSIEM, the complexity of managing network and security operations is reduced, freeing resources, and improving breach detection. FortiSIEM provides the cross correlation, machine learning, and user entity and behavior analytics (UEBA) to improve overall response and effectively stop breaches before they occur.  

Attend this workshop to help understand the FortiSIEM architecture and powerful feature set. Gain experience running analytic searches to aid in the rapid detection and remediation of multiple security events. 

Cybersecurity for Safe, Reliable, Secure Industrial Control Systems (ICS)

Convergence is blurring the lines between IT and OT, creating an opportunity to improve the visibility, control, and situational awareness necessary for critical systems. Failure to take the wide range of security issues into account when converging these two different networks and networking philosophies can result in catastrophic network failures that risk critical systems as well as the well-being of workers and communities. The Fortinet Security Fabric represents the first-ever architectural security approach designed to dynamically adapt to unique needs of legacy OT environments while enabling the move towards modernizing these critical systems. Leveraging the Purdue Model for the security layers needed in OT, the multi-layered approach offered by the Fortinet Security Fabric provides broad, integrated, and automated protection against sophisticated threats. 

Attend this technical workshop to help understand the differences between securing IT and OT environments and the importance of active security. Gain hands-on experience applying the Fortinet Security Fabric to better secure operational technologies.

Creating a Comprehensive Security Fabric

Today's new world of networking requires a new approach to security. One that simply yet intelligently secures the entire infrastructure. One that delivers full visibility into every viable network segment and the devices and endpoints behind them. One that can seamlessly integrate with third-party solutions, enabling users to ubiquitously collect, share, and correlate threat intelligence. The Fortinet Security Fabric represents the first-ever architectural security approach designed to dynamically adapt to today's evolving IT infrastructure. This multi-layered approach provides broad, integrated, and automated protection against sophisticated threats.
Attend this technical training session and gain hands-on experience configuring a comprehensive Security Fabric including Fortinet products and Fortinet Fabric-Ready Partner products.

What’s New in FortiOS

More than a firewall operating system, FortiOS enables broad connectivity and awareness among security components, both within the network and from other disciplines, such as endpoint, management, and analytics. FortiOS has long been the heart of FortiGate next-generation firewalls , serving thousands of customers in every industry across the globe. The needs of this diverse customer base are widespread, and the more than 200 new features and capabilities are in response to our customers’ needs. Beyond its mission of enabling the Fortinet Security Fabric, FortiOS makes significant gains in these areas:  cloud, automation, Security-as-a-Service (SaaS), and SD-WAN.”
Attend this technical training session and hands-on workshop to learn more about the new key features FortiOS has to offer.

Fortifying the Enterprise Network with FortiGate

As security architects consider how to provide comprehensive threat protection for their enterprises, that includes intrusion prevention, web filtering, anti-malware, and application control, they face a major complexity hurdle managing point products with no integration and lack of visibility. 

FortiGate next-generation firewall (NGFW) utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance including encrypted traffic. FortiGate reduces complexity by integrating various point products into NGFW features with automated action and enhanced visibility into applications, users, and networks.

Attend this technical training session and gain hands-on experience fortifying the enterprise network with the Fortinet NGFW solution.

Constructing a Secure SD-WAN Architecture

As organizations transition to a digital business model, their network topologies are significantly impacted. The adoption of cloud services, the virtualization of the traditional network, and an increasingly mobile workforce accessing applications in the cloud, are accelerating advancements in wide-area networking technologies. The traditional wide-area network (WAN) is struggling to keep up because it relies on a static infrastructure of devices that simply cannot accommodate shifting, and often temporary resource allocation and workloads. Learn how software-defined networking (SDN) applies to software control of WANs in an enterprise environment.
Attend this technical training session and gain experience through actual configuration of virtualized products supporting WAN aggregation.

Detecting Zero-Day Threats with FortiSandbox

With a dynamic attack surface due to the rise of Internet of Things (IoT) and cloud services, it is clear that no single technology will be able to stop every threat. To protect your enterprise against sophisticated threats, it is important to establish a comprehensive and cohesive security infrastructure that is broad enough to cover all attack vectors, powerful enough to run the latest security technologies, and automated to keep pace with fast-moving attacks.
Attend this hands-on technical training workshop to learn how to detect and analyze advanced threats with FortiSandbox.

Streamlining Automation Using Web Services APIs 

As organizations transition to a digital business model, virtualization and cloud technologies play an increasing role. Speed, flexibility, elasticity, and integration are all critical features that cannot be inhibited when implementing an effective security strategy. Ultimately, it does not matter how fast you can deploy an appliance or VM if configuration is a manual process which requires a heavy administrative touch. Web services application programming interfaces (APIs) enable organizations to fully leverage the benefits of these dynamic architectures while offering an efficient communications method that promotes a robust and automated Security Fabric. Understanding the structure, function, and communication mechanisms of these APIs is critical for developing any custom interfaces.

Attend this hands-on technical training workshop and gain hands-on experience automating configuration and policy deployment on FortiManager and FortiGate.

Securing Your Network Access Infrastructure with FortiSwitch, FortiAP, and FortiLink

The number and types of network-connected devices continue to grow exponentially, presenting new vulnerabilities and increasing the attack surface. Addressing this trend requires much more than just network access control. It requires scanning for malware, preventing access to malicious websites, checking endpoint integrity, and controlling application usage while reducing complexity of network, application, and device management.

Fortinet's secure unified access solution provides comprehensive security on the network infrastructure. The tight integration between the FortiGate appliances, FortiSwitch devices, and FortiAP wireless access points enables a common security policy across the network, extending the protection of the firewall out to the edge.

FortiClient Integrated Endpoint Protection

Endpoints are frequently the target of initial compromise or attacks. FortiClient strengthens endpoint security through integrated visibility, control, and proactive defense. With the ability to discover, monitor, and assess endpoint risks, you can ensure endpoint compliance, mitigate risks, and reduce exposure. FortiClient proactively defends against advanced attacks. Its tight integration with the Security Fabric enables policy-based automation to contain threats and control outbreaks.

It provides advanced endpoint protection with pattern-based anti-malware, behavior-based exploit protection, web-filtering, and an application firewall. FortiClient natively integrates with FortiSandbox to detect zero-day threats and custom malware. It also provides secure remote access with built-in VPN, single sign-on, and two-factor authentication for added security.

Attend this technical training workshop to gain hands-on experience controlling endpoints using FortiClient EMS in mixed Windows and Linux environments, and see first-hand how FortiClient integrates with the Fortinet Security Fabric to protect your companies’ critical assets.

Securely Embrace the IoT Revolution with FortiNAC

The proliferation of Internet of Things (IoT), has made it necessary for organizations to improve their visibility into what is attached to their networks. They need to know every device and every user accessing their networks. IoT devices enable digital transformation initiatives and improve efficiency, flexibility, and optimization. However, they are inherently risky, with designs that prioritize low-cost over security. FortiNAC provides the network visibility to see everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses.

Attend this technical training workshop to discuss the security challenges that many customers face and to understand how the fundamental feature set of FortiNAC can address these challenges.

Using AI to Detect Web Application Threats

Cybercriminals are increasingly targeting public and internal web applications. Today, nearly half of all data breaches are caused by attacks targeting web application vulnerabilities. To protect organizations from such attacks, web application firewalls (WAFs) are the gold standard. However, some organizations may be reluctant to use these devices as they have a reputation for being resource-intensive, especially when it comes to quickly addressing false positive detections ito ensure that legitimate users and applications do not get blocked.

In this workshop, you will learn how FortiWeb’s new AI-based machine learning addresses these shortcomings, why it is better than application learning, and why signature-based protection alone is not enough.

Advanced Email Security Solution with FortiMail

Email is a critical tool for businesses, but it’s also a preferred delivery method for ransomware, phishing, and compromise attacks. According to the 2018 Verizon report, 49% of (non-POS) malware was installed via malicious email. FortiMail is tailored for advanced threat defense and shields users and data, from a wide range of cyber threats. These include the ever-growing volumes of unwanted spam, socially-engineered phishing and business email compromise, and accelerating variants of ransomware. FortiMail can also be used to protect sensitive data of all types, reducing the risk of inadvertent loss and/or non-compliance with regulations like HIPAA, PCI, GDPR, and more.

Attend this technical training session and gain hands-on experience protecting your organization against phishing, spam, malware, and advanced targeted attacks via email.

Business-Outcome-Driven Cloud Adoption with Secure SD-WAN 

SD-WAN is the most sought out technology in 2019 to replace legacy WAN edge products to embrace continuing growth in cloud applications. SD-WAN enables digital transformation with business aware application steering at lower WAN cost and improves the productivity of end users. FortiGate Secure SD-WAN combines best of breed SD-WAN with next-generation firewalls (NGFWs) to further reduce cost and complexity of the network infrastructure.

For the first time, Fortinet will unveil deeper integration for SD-WAN with LAN devices for an SD-Branch solution that is a unique differentiator in the crowded SD-WAN market.

Align Your Security and Business Goals with Intent-based Segmentation and Improve Your Security Posture 

If you are a network or security practitioner, you might think you can build an effective security architecture by deploying a robust perimeter firewall. But the perimeter has become less effective due to mobile computing and workloads migrating to multiple clouds on the WAN side. And on the LAN side, malware coming from trusted users, rogue APs, and Shadow IT each add another micro-perimeter that you must also now defend. As a result, the fortified perimeter has become the sum of all of the micro-perimeters tied to the growing number of devices consuming networked services across all locations. Segmentation is a good starting point to deal with this, but it lacks adaptive trust and advanced security.

In this session, you will discover the benefits of adopting this new approach and how you can build a robust and high-performance security architecture with intent-based segmentation. Intent-based segmentation intelligently segments IT assets in accordance with business intent, and employs adaptive trust, control, and automated threat protection to mitigate risks and achieve compliance with reduced complexity. 

SOAR with Security Fabric Single Pane of Glass 

Do you know what the leading cause of attack is? According to a recent Ponemon study, 52% of all breaches are a direct result of either system glitches or human errors. Security orchestration, automation and response (SOAR) solutions can help remediate these organizational issues.

In this session you will learn how FortiManager and FortiAnalyzer can orchestrate security fabric components, automate operations, and route incidents and vulnerabilities to appropriate resources. These solutions improve security incident response times, vulnerability management processes, and more importantly, provide real-time visibility into the overall network security posture to help protect against the leading cause of breaches—system glitches and human error.

How I Learned to Love Security Operations

Too few qualified staff, too many security tools, underrated threats, and high board expectations can make managing security operations a daunting task. This interactive session discusses and demonstrates how an integrated approach to advanced threats makes Gartner's CARTA model a reality. Learn how business critical services, security events, and workflows can be automated with the tools and vendors in your enterprise today, as well as how established and emerging tools like security information and event management (SIEM), sandboxing, user entity and behavior analytics (UEBA), and deception can assist an overworked CISO and security operations unit.

Cybersecurity Beyond the Power of Humans

FortiGuard Labs processes over 100 billion security events per day, representing data from the endpoint to the cloud. This gives us a unique and unprecedented view into the threat world. In this presentation you will get an overview of the current threat landscape including: what schemes bad actors employ to evade detection, recent cybercrime trends, and additional cyber threat trends.

You will get an overview of FortiGuard Labs' mature and leading-edge artificial intelligence (AI) and machine learning (ML) program that provides protection capabilities that feed into products across the Fortinet portfolio. Our AI/ML program continues to expand in breadth and depth and this update will showcase how we stay ahead of the pack.

Top 10 Proven Strategies for Building Cybersecurity Trust and Assurance

The role of the CISO and the pressures that it brings can be overwhelming, often adding incrased responsibilities for networking and security teams to produce quality results. Teams must work diligently and tirelessly collecting and analyzing cyber data across a rapidly growing attack surface, while at the same time, attempting to rationalize results and present details in simple business terms.

In this session, you will learn about the 10 proven strategies teams can use to create an environment of trust and assurance. Find out how the Fortinet Security Fabric can help CISOs along with network and security teams to set practical goals, simplify operations, and create an environment of trust and assurance.

How Cloud is Transforming the Data Center

Enterprises are increasingly adopting hybrid cloud architectures, integrating on-premises private clouds with public cloud resources to take advantage of the scale and performance benefits, yet consistent security is a top priority. FortiGate-VMs extend Security Fabric automation, visibility, and control to multi-cloud environments. Fortinet’s IPSec and secure sockets layer (SSL) VPNs allow enterprises to securely connect their on-premises networks to multiple clouds. 

This interactive session will demonstrate how Fortinet’s FortiGate virtual appliances can provide seamless security across the software defined data center(SDDC), private, public and hybrid clouds. 

Securing Applications in the Public Cloud

In this interactive session, you will learn about the security considerations, use cases, and Fortinet’s solutions for securing applications built in the public cloud. Learn about the use of virtual network segmentation and application control policies in the cloud, based on FortiGate-VM. Additionally, discover a variety of tools to secure cloud-based web applications and APIs. Get a sneak peek at the new Fortinet cloud security posture management and analytics capabilities designed to help customers protect from the leading cloud risk—cloud configuration mistakes.

Building Profitable CSP and MSSP Security Services with Fortinet

Session Speaker(s): Vinod Sundarraj, Sr. Director, CSP and MSSP Product Marketing, Christophe Volique, Director, MSSP Sales

Service Providers have begun to roll out 5G and Internet of Things (IoT) services around the world for the great opportunities it offers, but the road to 5G is also introducing new risks. Come learn how Fortinet is enabling communication service providers (CSPs) to build and secure new revenue-generating opportunities in 5G and IoT with our carrier solutions.Christophe Volique, Director, MSSP Sales

Enterprise customers increasingly are seeking new managed security service provider (MSSPs) services that complete their security needs while trying to adopt flexible spending options. You will also learn how Fortinet is enabling MSSPs to build Security-as-a-Service offerings through specific products and tailored consumption programs.

Risk Management for Cybersecurity in Operational Technology (OT) Environments

Plant managers and network analysts face an increasingly daunting challenge of managing cyber risk in the face of increasing threats and attacks. Keeping employee safety and process uptime are paramount priorities, yet how do you protect older, unpatched systems, respond to malware, and ensure a comprehensive approach to cybersecurity? 

Come learn how Fortinet’s Security Fabric is applied intelligently to manufacturing, energy, and transportation industries to enable compliance and risk mitigation. You will learn how the technologies for securing the IT side of the house can be adapted and applied to the OT side of the house. 

Building a Secure and Scalable Access Layer while Simplifying the Multiple Vendor Overlay

The access layer is the broadest attack surface in your network, and it is only getting worse with Internet of Things (IoT) devices entering the network. This session will cover how FortiSwitch and FortiAP secure access products integrate with the Security Fabric, making security a native part of your access technology. With FortiLink technology, you can extend the power of FortiGate to FortiSwitch and FortiAP, allowing everything to be managed and secured from a single interface. 

Come learn how Fortinet Secure Access can improve your network by delivering less hassle, fewer systems to configure, lower TCO, and a better overall experience.

Scaling and Securing Web and Email Solutions Moving to the Cloud

With organizations rapidly developing new web applications and migrating email and other services to the cloud, they have become much more agile. However, organizations must ensure their networks maintain security, governance, and a high-quality, consistent user experience, while leveraging the cloud to its fullest potential. 

In this session, you will learn how FortiWeb, FortiADC, and FortiMail can help secure and scale applications in and out of public, private, and Security-as-a-Service clouds, such as Microsoft Office 365, G-suite, Amazon Web Services, and Microsoft Azure.

Protecting Every User and Device on the Network

Today’s dynamic network infrastructures support employees, vendors, contractors, and guests, as well as laptops, smart phones, printers, and new Internet of Things (IoT) devices. Providing access while ensuring security is no easy task when off-network activity, malicious and negligent insiders, Shadow IT, and unsecure IoT risks challenge enterprise security teams. 

Come learn how the Fortinet Security Fabric can manage risk, including how FortiClient, FortiUEBA, FortiNAC, and FortiAuthenticator work together to deliver an integrated solution that protects every user and every device on your network. Provide the right level of access and security.

Amazon AWS: Partnering to Drive Growth and Monetization around Cloud Security with AWS & Fortinet

Learn how to grow your Business leveraging AWS - In this presentation, Amazon Web Services (AWS), the world’s most comprehensive and broadly adopted cloud platform, will discuss the advantages of Cloud and use cases that power customers infrastructure, make them more agile and lower costs. You will learn about the Shared Security Responsibility Model, the areas AWS provides security of the Cloud, what customers are responsible for in the cloud and where partners can drive additional value-add to solve these customer challenges. We will discuss the AWS Partner Network [APN] and market opportunity, how you can become a partner, and how you leverage the AWS Marketplace to transform your business and monetize on Cloud opportunities with specific use cases. Additionally, we will provide technical use cases on the various integrations Fortinet has on AWS to help drive enterprise customer adoption and their journey to the Cloud.

BackBox: Security Operations for Intelligent Automation

Most IT professionals have an overwhelming list of projects and upgrades they’d like to complete, if only they had the time. Instead, we spend most of our days dealing with urgent issues and addressing our ever-growing to-do list. But how much more could we get done if we managed to automate some of these “to-do” items? Even more pressing, what if these items are really mission-critical “must-haves”?

With all that is expected of IT and Security departments in today’s world, how can anyone be sure that the tasks required to be completed by their teams cannot be automated to save time, money and resources? In this discussion, we will show you how to improve efficiencies by automating a large number of your disaster recovery procedures, while validating that the procedures were completed correctly, and proactively automating many other additional tasks that might appear in the future.

Microsoft Azure: Dive Into Azure Networking: Azure vWAN and Fortinet’s Integration of SD-WAN Capabilities

Join this co-hosted demonstration from Srikumar, Microsoft Azure Architect, and Brian Page, Cloud Security Architect from Fortinet to learn the benefits of Microsoft Azure for customers and channel partners. You will also learn about joint solutions such as Azure vWAN with Fortinet SD-WAN , shared responsibility model and the role FortiGate, FortiWeb and FortiMail play in the model for Azure customers.

Intel: Security Edge to Cloud

This session will provide a backdrop of industry trends and how to think about the evolving landscape around threats and how to be prepared to respond with architectures that can adapt and detect no matter if you’re managing assets / IoT devices on the edge or if you’re looking to reap the benefits of hybrid / multi-cloud “securely”. We’ll provide high-level recommendations on what to look for in making these architecture decisions. Format to be presentation and panel combination. .


Fortinet—Leading a Retail Revolution

Session Speaker(s): Jim Overbeck, VP of Central U.S. and Retail Sales, Fortinet; James Roman, Director of Infrastructure and Security, Fiesta Restaurant Group, Inc.

Consumer interests, purchase patterns, and desire for flexibility is driving a Retail industry evolution, and their preferences change on a dime.  Retailers are looking to new technologies to stay connected, meet their customers’ needs in any channel, develop a dialogue with, and listen to their customers.  Retailers are trying to evolve their security by buying point solutions to secure the new connections, network traffic, and data that comes with those new technologies…but it’s hard for them to keep up and to stitch it all together.  Evolution is slow…so, Fortinet is leading a retail revolution.


Fortinet’s Security Fabric for Retail is a revolutionary solution with broad, integrated, and automated protection for wired and wireless connections, POS terminals, customer devices on the network, IoT devices, kiosks, big data, and more.  Fortinet has unique abilities to provide visibility into those connections, that traffic, the data at rest and in motion, and the customer analytics and insights that go with it.  In the cloud, in the store, or anywhere in between.  With zero-touch deployment and single pane of glass management on premise or in the cloud, Fortinet’s retail solutions can simplify deployments and provide the improved security coverage retailers need quickly, and with a lower TCO than point solutions. 


In this session, we will discuss how solutions such as Secure SD-WAN, FortiExtender, FortiDeploy, FortiProvision, and FortiManager are weaved into the Fortinet Retail Security Fabric to protect and defend the evolving retail store, network, and data.  Then, James Roman from Fiesta Restaurant Group will discuss how Fortinet has enabled them to make security a strategic enabler of Fiesta's digital revolution, improving operational efficiencies, the customer experience and helping them to stay ahead of competitors.


Meeting the Challenges of Healthcare Digitization

Session Speaker(s): Sonia Arista, National Healthcare Lead, Fortinet; Lynne A. Dunbrack, Research Vice President, IDC Health Insights, Tim Murphy, Information Security Administrator, Riverside Healthcare and Mark Plunkett, IT Manager, Maple Knoll Communities

Increased digital transformation in healthcare is challenging organizations with inconsistent and distributed security postures and controls. The adoption of next-generation technologies—mobile devices, cloud capabilities, and the Internet of Medical Things (IoMT) means that this new digital enablement requires nurses, doctors, clinicians, and caregivers to access secure patient data—no matter where they are or what device they are using. At the same time, the risk to personally identifiable information (PII) and electronic protected health information (ePHI) has never been greater, as black-market value of patient data stays at an all-time high.

As recent headlines about large-scale data breaches show, healthcare remains a top target for cyber criminals. In the 2018 Cost of a Data Breach Report, IBM and the Ponemon Institute found that data breach costs for healthcare organizations average $408 per record—the highest of any industry for the eighth straight year and nearly three times higher than the cross-industry average of $148 per record.

Join this interactive session and hear from the speakers as they discuss:

  • Struggles for visibility
  • Convergence of physical and digital security
  • Managing the growth and complexity of mergers and acquisitions
  • Automation to reduce resource constraints, drive consistent controls, and shorten time to remediate

State and Local Governments and Education (SLED)

Managing Digital Transformation Within State and Local Governments and Education

Session Speaker: Jeff Jennings, National SLED Practice Director, Fortinet

Emerging cyberthreats, the proliferation of Internet of Things (IoT) devices, smart building projects, and other challenges can overwhelm resource constrained IT staff. This panel discussion will explore the unique challenges that digital transformation presents for governments and educational institutions. Hear from practitioners who are managing digital transformation with network security strategies, such as segmentation and solutions that can see and classify everything on their networks including headless devices, and can control those devices and users, all while providing dynamic, automated responses to threats.

In this interactive session, you will learn about different aspects of digital transformation such as:

  • Managing the influx of IoT devices and other smart building initiatives and technologies
  • The convergence of physical and cybersecurity on campuses and in cities
  • Compliance concerns in a digital era, including NIST, CIPA, and FERPA
  • Operational planning from resource constraints to funding projects


Mitigating Risk and Fortifying Agency Security with Fortinet Federal

Session Speaker(s): Bob Fortna, President, Fortinet Federal

With the introduction of cloud computing, Internet of Things (IoT), and other emerging technologies, the federal government’s digital footprint is growing at an exponential rate. But as the amount of data continues to increase, so do the number of adversaries and vulnerabilities in the government’s networks.

As prime targets for the most sophisticated adversaries seeking to impact national security, public safety, and civilian services, federal governments require the most effective and comprehensive cybersecurity solutions available—while maintaining high performance. At the same time, they must work within mandated budget constraints, incorporate advancing technology, and remain open to the citizens they serve.

In this interactive session, you will hear from speakers as they discuss:

  • Detailed overview of U.S. Federal Government cyber priorities and programs 
  • Fortinet Federal’s approach to advancing federal agencies’ missions and cyber objectives
  • Fortinet Federal Partner Program: how Fortinet is creating a successful federal partner ecosystem to secure government networks

Operational Technology (OT)

The Journey to Digital Transformation: Securing Industrial Control Systems (ICS) and Operational Technology (OT)

Session Speaker: Rick Peters, Director, Operational Technology Global Enablement, Fortinet, Petra Rühl, Head of Security Innovations, Deutsche Telekom Germany and Stuart Gibson, Director, Cybersecurity, Alaska Airlines

A system crash on a manufacturing floor can stall production for hours and potentially cost a company millions in ruined product.  Even worse, having to reset an open furnace or a 10,000-gallon boiler processing caustic chemicals can have far more devastating consequences than temporarily losing access to an online printer.  Because the primary goals of an OT environment are ensuring the safety of employees and local communities and ensuring the constant availability and uptime of the network, connected devices, applications, and industrial control systems are often not consistently updated.


In this interactive session, experts will discuss security without compromising availability or safety so important to operational technology and critical infrastructure security.  Hear from Deutche Telekom and Alaska Airlines discussing lessons learned and how their experience can be leveraged to successfully secure OT environments. The session will also cover how the Fortinet Fabric solution will protect and defend the control system vulnerabilities in industries such as manufacturing, energy, utilities and transportation.

Service Providers

SD-WAN–Creating Value for Service Providers and Enterprises Alike
Session Speaker(s): Jonathan Nguyen-Duy, Vice President, Strategy & Analytics, Fortinet, Yulia Duryea, Director, Product Management, Windstream, Bob Schroeder, VP, Product Management, Charter, Bill Rumancik, Sr. Director - Enterprise Solutions, Hughes Network Systems and Peter VanDorp, Network & Server Administrator, Wellington Catholic District School Board
SD-WAN has moved from an innovative idea to the next must-have capability in a short span of time. With its ability to deliver an optimized networking experience to a broad set of customers at a reasonable cost, its growth prospects are dazzling. Not long-ago, SD-WAN was being evaluated by users and service providers as a standalone connectivity option, but the rapid growth of cloud-based services and an expanding set of use-cases is forcing a rethink of what additional capabilities are required to ensure it delivers on its promise.
In this moderated breakout session, you will hear two perspectives on SD-WAN. Join this session to hear from an enterprise user of SD-WAN and a service provider offering managed SD-WAN services share their views and decisions for determining SD-WAN strategies.

Financial Services

Enabling a Security Transformation
Session Speaker(s): Kevin Carney, VP of Global Financial Services, Fortinet; Bob Burkhardt, Director of Systems Engineering Global Financial Services, Fortinet
The financial services industry continues its radical shift in business models due to digital transformation. As a result, new cybersecurity models, tools, and architectures are required. Cybersecurity professionals are focused on 5 key challenges:
  1. Automation to improve security posture
  2. Visibility into the exponentially larger attack surface
  3. Consolidation away from point products
  4. Flexibility to take advantage of public, private, and hybrid cloud environments
  5. Reporting to meet the multiplying compliance requirements
In order to meet these challenges and enable new business advantage, a security transformation is taking place within the financial services industry. Join this interactive session to discover the four areas of transformation:
  1. Technical. Price, performance, and security of Fortinet solutions are the leading enterprise choice, as validated by multiple, independent third-parties. Discover the full spectrum of next-generation firewall (NGFW) capabilities and the portability of FortiOS.
  2. Financial. Cost reduction is an integral part of implementing a security transformation. See how Fortinet solutions not only reduce TCO, but have been proven at some of the largest banks around the world.
  3. Operational. Automation and orchestration is possible through JSON and REST APIs to and from Fortinet's central management infrastructure or directly to secure gateways. In addition, APIs enable orchestration via a programmable Security Fabric.
  4. Transition. Near zero-touch provisioning via automated scripts to convert firewall policies coupled with a robust training regimen ensures a successful security transformation.

EMEA Partner Breakout: Tailor-Made Programs to Increase Your Growth with Fortinet

Region: EMEA
Session Speaker(s): Joe Sarno, Sales Vice President, International Emerging, Fortinet; Yann Pradelle, Sales Vice President, Europe, Fortinet

In a fast-growing cybersecurity market, there is a need to adapt and evolve the partner program to help you grow your business with Fortinet. Learn how the new Fortinet Partner Program will help your customers recognize your competencies and select your company for its added value services.

Driving Sales and Services with the Cyber Threat Assessment Program

Region: All Regions
Session Speaker(s): Neil Matz, Manager, Product Marketing, Fortinet; Ben Bolen, Systems Engineer, Fortinet

The Cyber Threat Assessment Program (CTAP) is designed to help you convert prospects and expand your business within your existing accounts and give prospects an in-depth view of the current state of their network. 

During this session, you will learn how to pitch the CTAP as a pre-sales and renewal tool to help you land and expand your business, and how to build it into your business model to drive greater profitability.

FortiSIEM: MSSP Best Practices for Getting the Most out of Your SIEM

Session Speaker(s): Dante Mercurio, Manager Systems Engineering, MSSP and Service Enablement, StratoZen; Kevin Prince, Founder and CEO, StratoZen

From initial setup to automating operational functions, you will learn how to build managed security service provider (MSSP) services using FortiSIEM. Understand the top concerns and best practices to ensure your FortiSIEM instance is multitenant-capable, built properly for scale, and provides your desired business returns.

North America Partner Update: Transforming Your Profitability With Fortinet's Tailor-Made Programs

Session Speaker: Jon Bove, Vice President of North America Channels, Fortinet

The industry is changing, and Fortinet is leading the way to help you maximize your security practice, automate your offering, and bring overall operational efficiency to you and your team. Join us to learn more about what's in store for the Fortinet Partner Program, including new offerings like FortinetOne, our SSO SaaS platform, and the revolutionary services marketplace, making it easy for you to expand your footprint through partnerships. 

Partner Breakout: LATAM

Region: LATAM
Session Speaker: Pedro Paixão, General Manager and Vice President, Latin America, Fortinet

The industry is changing, and Fortinet is leading the way to help you maximize your security practice, automate your offering, and bring overall operational efficiency to you and your team. Join us to learn more about what's in store for the Fortinet Partner Program.

Partner Breakout: Japan

Region: Japan
Session Speaker: Norio Kubota, Country Manager and Vice President of Sales, Japan, Fortinet
The industry is changing, and Fortinet is leading the way to help you maximize your security practice, automate your offering, and bring overall operational efficiency to you and your team. Join us to learn more about what's in store for the Fortinet Partner Program.

Partner Breakout: APAC

Region: APAC

The industry is changing, and Fortinet is leading the way to help you maximize your security practice, automate your offering, and bring overall operational efficiency to you and your team. Join us to learn more about what's in store for the Fortinet Partner Program.

2019 E-rate Information Session and Q&A

Region: United States
Session Speaker: Jeff Jennings, National SLED Practice Director, Fortinet

Need some E-rate clarification? Want to learn how to develop the right opportunities and make sure you know your rights and responsibilities? Attendees will receive an update on issues effecting E-rate 2019 and look through the crystal ball to 2020. The session is designed to be interactive, and will include a live Q&A. 

SLED Small Group Session: Deep Dive into Analyzing Performance and Sharpening Your Attack Plan

Region: United States
Session Speaker: Jeff Jennings, National SLED Practice Director, Fortinet

This small group session is designed to take you on a deep-dive into the E-rate performance in 2019. You will come away knowing what you need to do to expand your reach and increase wins with Fortinet. 

Increase Your Footprint in SMB

Region: Distributor-Only
Session Speaker: Anne Bourgeois, Senior Director, EMEA Channel, Fortinet
There is still a huge opportunity for growth within the SMB segment for you. In a framework developed with and for distributors, learn how you can recruit new resellers, reactivate inactive ones, or simply develop sales and a footprint with targeted tactics and competitive offerings.
(Note: Distributor-only session)

Growing Your Business with Security Solutions for SMB

Session Speaker: Darius Goodall, Sr. Director, SMB Product Marketing, Fortinet
Security controls for the SMB are just as important as those for the Enterprise, but SMBs often overlook the importance because, “it can’t happen to them.” Yet we know that 61%* of breaches hit smaller businesses last year, up from the previous year's 53% – and in a lot of cases caused the business to shutter its doors. As a Fortinet Partner, this presents a great opportunity – combined with your expertise, Fortinet’s complete security solutions for the SMB offer your customers peace of mind and ease of management. Join this session to learn how we’ve evolved our solutions to leverage the cloud making deployment, management, and maintenance of infrastructure a snap! We’ll cover everything from Connected UTM updates, through Secure Productivity use cases, to how you can accelerate your business’ growth by leveraging Cloud Services – all helping you build that coveted consultative relationship with your customers.

SD-WAN Transforms to SD Branch – Taking Software Defined One Step Beyond

Session Speaker: Patrick Grillo, Senior Director, Solutions Marketing

The benefits of SD-WAN are clear as evidenced by the massive market opportunity being forecast over the next several years.  But as usual in a Wild, Wild West market not all SD-WAN solutions are equal.

Besides satisfying the wide area networking requirements of SD-WAN – optimizing application performance, direct Cloud access and reducing WAN costs – leading SD-WAN solutions should also have comprehensive security at the top of their feature list.  But that security capability should extend to the entire branch office infrastructure, not just the wide area connection.  That’s why SD-Branch is starting to take hold and should be part of your branch office transformation journey.

This session will focus on the key network and security features that any SD-Branch solution should have in ordered to be considered by your customers as well as compelling arguments why enterprises should be focused on the advantages of a single security posture across all of their network.  To coin a well-known phrase, there’s much to be gained by asking “You want fries with that”?


As the cybersecurity market and customer priorities continue to trend toward providing business outcomes, the security services space represents a massive opportunity for those partners that can differentiate themselves. But where and how do you focus your energy to take advantage? That depends on where you sit in the security operations center (SOC) life cycle.

To determine where you are in the SOC life cycle, think about whether you are a VAR or MSP moving to security services, or a mature MSSP looking to innovate and broaden customer wallet share. This year, we have put together a solid track of services-oriented breakouts that support your growth regardless of where you sit.

As an attendee of our MSSP track, you will learn more about market trends, new subscription and service enablement programs, multi-tenant management, automation best practices, SOC business strategies, and programs that help you staff your SOC. Each session is designed with a specific audience in mind, so no matter where you sit in your journey, you will find a session that will help you move to the next level.

101: Building the Next-Generation MSSP for Profitability and Efficiency

Session Speaker: Stephan Tallent, Sr. Director, MSSP

Get an in-depth look at trends in the MSSP market, including how to profit from the digital transformation, filling gaps in your service offering, along with updates and new service enablement programs for Fortinet MSSPs.  

103: Filling the Cybersecurity Skills Gap: Fortinet's Network Security Academy and Veteran's Program 

Session Speaker: Jay Garcia, Program Administrator, MSSP & Service Enablement

With a 0% unemployment rate among cybersecurity operators, customers and partners alike face a major challenge when it comes to finding qualified security professionals. During this track you will learn more about how Fortinet is working to fill the cybersecurity skills gap with the Fortinet Veterans Program and the Network Security Academy.

201: Becoming an MSP—Without the $ Investment

Beyond Managed Security—Managed Infrastructure.

Session Speaker(s): Jon Garside, Director, Product Marketing, Fortinet;  Darius Goodall, Senior Director, Product Marketing, Fortinet; Ben Wilson, Vice President, Product Management, R&D

Our presenters will discuss and demonstrate the ease in creating a full-service service provider business model, encompassing both network security and perimeter security. This session shows the journey to establishing your own “franchise” where the infrastructure is yours, the customer relationship is yours, and the partnership is transparent. Learn how Fortinet’s technology, clouds, and programs can be harnessed as the growth point of your business.

202: Adding an S to Your MSP – Building a Managed Detection and Response Practice

Session Speaker(s): Jon Garside, Director, Product Marketing, Fortinet; Glenn Ewing, Partner Service Manager, Fortinet; Eric Gravett, Chief Revenue Officer, StratoZen; Alex Ryals, Vice President of Security Solutions, Tech Data

Security as a Service is as relevant to SMB organizations as it is Enterprise – the business wants to purchase defined successful outcomes and assurance. In this session, the presenters show how partnership, technology and relationships can be harnessed to build an MSSP program with managed and co-managed SIEM. You’ll learn how to manage your customers’ multi-vendor security environment profitably and with scale and sustainability through a managed detection and response service program that can be built without upfront investment and offer the industry’s leading SLAs.

301: FortiSIEM: MSSP Best Practices for Getting the Most Out of Your SIEM

Session Speaker(s): Dante Mercurio, Manager, Systems Engineering; Kevin Prince, Founder and CEO, StratoZen

From initial setup to automating operational functions, our presenters will review how to build MSSP services using FortiSIEM by taking a look at top concerns and best practices to ensure your FortiSIEM instance is multitenant-capable, built properly for scale, and provides your desired business returns.

401: Mastering Efficiency: Security Orchestration, Automation, and Response for MSSPs

Session Speaker: Jim Hilving, Sr. Systems Engineer, MSSP

Learn how to build MSSP service automation into the Security Fabric using micro-services. Automation projects and reaching your goals of operational efficiency can be a challenge. The MSSP team can help you organize and reach these objectives no matter how high your level of operational maturity.