Pre-Conference Workshops (NSE 4 to 7)

Arrive early in Orlando and attend one of 12 Pre-Conference Workshops being offered this year at Accelerate. The on-site NSE Institute will offer Pre-Conference Workshops from the extensive catalogue of the official NSE training program. If you have been thinking about pursuing NSE certification or taking your certification to the next level, this is a great opportunity to do it at a great price. The most popular courses will be offered, ranging from NSE 4 to NSE 7 training. And as an Accelerate 2019 attendee, you will receive a free exam voucher to be used at the on-site testing center.

Whether you attend a Pre-Conference Workshop or not, be sure to visit the NSE Institute in the Swan Resort during Accelerate 2019.

Workshops will begin on the morning of April 7th. You should plan to arrive in Orlando on Saturday, April 6.

You will have the option to attend one (1) of the following two-day workshops:

NSE 4 Level Courses

Choose between 1 of 2 NSE 4 Level courses to attend. Each individual course below is a two-day workshop:
FortiGate Security
In this hands-on course, you will learn how to use basic FortiGate features, including security profiles. In the interactive facilitated labs, you will explore firewall policies, user authentication, and how to protect your network using security profiles such as IPS, antivirus, and web filtering. These administration fundamentals will provide you with a solid understanding of how to implement basic network security.

FortiGate Infrastructure
In this interactive course, you will learn how to use advanced FortiGate networking and security. In interactive labs, you will explore features commonly applied in complex or larger enterprise or MSSP networks, such as advanced routing, transparent mode, redundant infrastructure, site-to-site IPsec VPN, SSO, web proxy, and diagnostics.

NSE 5 Level Courses

Choose between 1 of 3 NSE 5 Level courses to attend. Each individual course below is a two-day workshop:
In this hands-on class, you will learn the fundamentals of using FortiManager for centralized network administration of many FortiGate devices. In interactive labs, you will explore deployment strategies which include single or multiple ADOMs, device registration, policy packages, shared objects, installing configuration changes, provisioning FortiManager as a local FortiGuard Distribution Server, and troubleshoot the features that are critical to day-to-day use once it’s deployed.

In this hands-on course, you will learn how to use FortiSIEM, and how to integrate FortiSIEM into your network infrastructure. You will learn about initial configurations, architecture, and the discovery of devices on the network. You will also learn how to collect performance information and aggregate it with syslog data to enrich the overall view of the health of the environment. Additionally, you will learn how you can use the configuration database to greatly facilitate compliance audits.

NSE 6 Level Courses

Choose between 1 of 2 NSE 6 Level courses to attend. Each individual course below is a two-day workshop:

In this hands-on course, you will learn how to leverage the powerful and diverse capabilities of the FortiNAC system, using best practices for achieving visibility, control, and response. In interactive labs, you will explore the administrative tasks necessary to achieve network visibility, control, and automated threat response. These fundamentals will provide you with a solid understanding of how to implement network visibility and security automation.

In this hands-on course, you will learn how to deploy, configure, and troubleshoot Fortinet's web application firewall: FortiWeb. Instructors will explain key concepts of web application security, and lead lab exercises in which you will explore protection and performance features. In the lab, you will experience traffic and attack simulations that use real web applications. You will work with simulations to learn how to distribute load from virtual servers to real servers, while enforcing logical parameters, inspecting flow, and securing HTTP session cookies.

In this hands-on course, you will learn how to use FortiMail to protect your network from existing email-borne threats, as well as use FortiSandbox to detect and block emerging threats. In interactive labs, you will explore FortiMail's role as a specialized device, and how its features extend beyond FortiGate email filtering to provide both high-performance and in-depth security for business-critical communications. You will analyze email security challenges that administrators of small businesses and carriers face, and learn where and how to deploy, manage, and troubleshoot FortiMail.

NSE 7 Level Courses

Choose between 1 of 5 NSE 7 Level courses to attend. Each individual course below is a two-day workshop:

Enterprise Firewall Architecture
In this advanced hands-on class, you will learn how to implement, troubleshoot, and centrally manage an enterprise security infrastructure composed of multiple FortiGate, FortiManager and FortiAnalyzer devices.

After completing this course, you will be able to:

  • Integrate FortiManager, FortiAnalyzer, and multiple FortiGate devices using Fortinet's security fabric
  • Centralize the management and monitoring of network security events
  • Optimize FortiGate resources
  • Diagnose and monitor user traffic using FortiGate debug tools
  • Troubleshoot issues with conserve mode, high CPU, firewall policies, session helpers, IPsec, FortiGuard, content inspection, routing, and HA
  • Harden the enterprise services
  • Simultaneously deploy IPsec tunnels to multiple sites using the FortiManager VPN console
  • Configure ADVPN to enable on-demand VPN tunnels between sites
  • Combine OSPF and BGP to route the enterprise traffic
Secure Access

In this advanced hands-on course, you will learn how FortiOS, FortiAP, FortiSwitch, and FortiAuthenticator enable secure connectivity, no matter where users are located and how they are connecting. The course covers the deployment and troubleshooting of advanced authentication scenarios, together with best practices for securely connecting wireless and wired users.

After completing this course, you will be able to:

  • Configure advanced user authentication and authorization scenarios using RADIUS and LDAP
  • Troubleshoot user authentication and authorization problems
  • Implement two-factor authentication using digital certificates
  • Implement and troubleshoot single sign-on solutions integrating multiple single sign-on methods
  • Configure and troubleshoot IPsec dial-up and SSL VPN access
  • Manage FortiSwitch devices using FortiLink
  • Configure layer 2 authentication for wired and wireless users using 802.1.x
  • Secure the layer 2 network
  • Secure the wireless network
  • Provide secure access to guest users
  • Implement single sign-on among multiple providers using FortiAuthenticator and SAML
Advance Threat Protection

In this advanced hands-on course, you will learn how to protect an organization and improve its security against advance threats that bypass traditional security controls. You will use FortiSandbox to detect threats that traditional antivirus product miss and see how FortiSandbox dynamically generates local threat intelligence, which can be shared throughout the network. You will combine multiple advanced threat protection (ATP) components—FortiGate, FortiMail, FortiWeb, and FortiClient—to leverage this threat intelligence information to protect an organization end-to-end, from advanced threats.

After completing this course, you will be able to:

  • Identify different types of cyber attacks
  • Identify threat actors and their motivations
  • Understand the anatomy of an attack—the kill chain
  • Identify the potentially vulnerable entry points in an Enterprise network
  • Identify how the ATP framework works to break the kill chain
  • Identify the role of FortiSandbox in the ATP framework
  • Identify appropriate applications for sandboxing
  • Identify FortiSandbox architecture
  • Identify FortiSandbox key components
  • Identify the appropriate network topology requirements
  • Configure FortiSandbox
  • Monitor FortiSandbox operation
  • Configure FortiGate integration with FortiSandbox
  • Configure FortiMail integration with FortiSandbox
  • Configure FortiWeb integration with FortiSandbox
  • Configure FortiClient integration with FortiSandbox
  • Troubleshoot FortiSandbox-related issues
  • Perform analysis of outbreak events
  • Remediate outbreak events based on log and report analysis

Public Cloud Security
In this advanced hands-on course, you will learn about the different components of the top public cloud providers’ infrastructures and the security challenges these environments present, including high availability, auto-scaling, SDN connectors and how to manage traffic in the cloud with Fortinet products. After completing this course, you will be able to:

  • Deploy FortiGate VM on AWS and Azure in single, high availability and auto-scaling modes
  • Use security transit VPC and Vnet
  • Use Fortinet templates to easily deploy complex environments
  • Deploy a FortiWeb in AWS
  • Use SDN connectors with cloud vendors
  • Integrate other Fortinet services and products with cloud vendors
For this advanced course, it is recommended that you have previous knowledge of cloud platforms and VM Fortinet products.

Private Cloud Security
This advanced hands-on course will provide an overview of the most common private cloud architectures, the security challenges these environments present and learn how to protect them with Fortinet solutions. After completing this course, you will be able to:

  • VMware NSX
    • Deploy FortiGate-VMX
    • Work with SDN connectors
    • Integrate FortiManager and FortiAnalyzer
    • Implement micro-segmentation
  • OpenStack
    • Deploy regular FortiGate-VM
    • Integrate FortiGate-VM using ML2 Plugin
    • Use FortiOS-VM with Fortinet Metering Services

Fast Track Workshops

Attend one of our Fast Track workshops for an impactful hands-on experience on a particular Fortinet technology. Each workshop is based on a specific business or technology use case and provides you with an immediate understanding of the Fortinet solution.

Have you been considering Fortinet NSE Certification? Attend a Fast Track workshop to gain a better understanding of the type of training you can expect as you progress through the 8 levels of the Network Security Expert (NSE) program. Although the Fast Track workshops are designed for a technical audience, no previous Fortinet training is required before attending.

The following Fast Track Workshops will be offered to all Accelerate attendees:

Creating a Comprehensive Security Fabric

Today's new world of networking requires a new approach to security. One that simply yet intelligently secures the entire infrastructure. One that delivers full visibility into every viable network segment and the devices and endpoints behind them. One that can seamlessly integrate with third-party solutions, enabling users to ubiquitously collect, share and correlate threat intelligence. The Fortinet Security Fabric represents the first-ever architectural security approach designed to dynamically adapt to today's evolving IT infrastructure. This multi-layered approach provides broad, integrated, and automated protection against sophisticated threats. Attend this technical training session and gain hands-on experience configuring a comprehensive security fabric including Fortinet products and Fortinet Fabric-Ready Partner products.

What’s New in FortiOS

More than a firewall operating system, FortiOS enables broad connectivity and awareness among security components, both within the network and from other disciplines, such as endpoint, management, and analytics.  The FortiOS has been the heart of FortiGate next-generation firewalls for years now, serving thousands of customers in every industry across the globe. The needs of this diverse customer base are widespread, and the more than 200 new features and capabilities are in response to our customers’ needs. Beyond its mission of enabling the Fortinet Security Fabric, FortiOS makes significant gains in three areas: third-generation network security, SD-WAN, and Fabric integration that unlocks automation. Attend this technical training session and hands-on workshop to learn more about the key new features the FortiOS has to offer.

Fortifying the Enterprise Network (NGFW)

As security architects consider how to provide comprehensive threat protection for their enterprises, including intrusion prevention, web filtering, anti-malware and application control, they face a major complexity hurdle managing these point products with no integration and lack of visibility. Gartner estimates that by 2019, 80% of enterprise traffic will be encrypted and 50% of attacks targeting enterprise will be hidden in encrypted traffic.

FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance including encrypted traffic. FortiGate reduces complexity by integrating various point products into NGFW features with automated action and enhanced visibility into applications, users and network. Attend this technical training session and gain hands-on experience fortifying the enterprise network with Fortinet NGFW solution.

Constructing a Secure SD-WAN Architecture

As organizations transition to a digital business model, their network topologies are significantly impacted. The adoption of cloud services, the virtualization of the traditional network, and an increasingly mobile workforce accessing applications in the cloud are accelerating advancements in wide area networking technologies. The traditional wide area network (WAN) is struggling to keep up because it relies on a static infrastructure of devices that simply can't accommodate shifting, and often temporary resource allocation and workloads. Learn how software-defined networking (SDN) applies to software control of wide area networks in an enterprise environment. Attend this technical training session and gain experience through actual configuration of virtualized products supporting WAN aggregation.

Detecting Zero-Day Threats with FortiSandbox

With a dynamic attack surface due to the rise of IoT and cloud services, it's clear that no single technology will be able to stop every threat. To protect your enterprise against sophisticated threats, it is important to establish a comprehensive and cohesive security infrastructure that is broad enough to cover all attack vectors, powerful enough to run the latest security technologies, and automated to keep pace with fast-moving attacks. Attend this hands-on technical training workshop to learn how to detect and analyze advanced threats with FortiSandbox.

Centralized Management with FortiManager

As networks continue to evolve, organizations struggle to keep ahead. Too many solutions with varying management tools strain already overworked security teams. FortiManager provides a single-pane-of-glass for visibility across the entire Fortinet Security Fabric. FortiManager also lets you maintain control over your FortiGate, FortiSwitch, and FortiAP topologies through an easy-to-use and centralized management console. Learn how to easily control the deployment of security policies, FortiGuard content security updates, firmware revisions, and individual configurations for thousands of FortiOS-enabled devices.

Streamlining Automation Using Web Services APIs (FNDN)

As organizations transition to a digital business model, virtualization and cloud technologies play an increasing role. Speed, Flexibility, Elasticity and Integration are all critical features that cannot be inhibited when implementing an effective security strategy. Ultimately it doesn’t matter how fast you can deploy an appliance or VM if configuration is a manual process which requires a heavy administrative touch. Web Services APIs enable organizations to fully leverage the benefits of these dynamic architectures while offering an efficient communications method that promotes a robust and automated Security Fabric. Understanding the structure, function and communication mechanisms of these APIs is critical for developing any custom interfaces. Attend this hands-on technical training workshop and gain hands-on experience automating configuration and policy deployment on FortiManager and FortiGate.

Attack Methodologies

In this hands-on workshop you will take on the role of a threat actor and will try to breach a fictitious organization to search for and steal information. The idea behind the workshop is that in order to understand how to protect an organization from a breach you must first understand your enemy and the tools and methodologies they use.

Defense Methodologies

Just as cybercriminals follow a well-defined attack methodology to gain access to critical assets within an organization, these organizations must develop and follow a defense methodology to effectively counter those efforts. One popular defense methodology is the NIST Cybersecurity Framework which provides guidelines towards best practices and standards to promote the protection of critical infrastructure. Additionally, it provides a perfect context to define and display the distinct advantages of the Fortinet Security Fabric.

Attend this technical training workshop and gain hands-on experience configuring a comprehensive Security Fabric including Fortinet products and Fortinet Fabric-Ready Partner products and learn how to customize the Security Fabric to develop a Defense Methodology that is optimal for your individual requirements.

Securing your Network Access Infrastructure with FortiSwitch, FortiAP & FortiLink

The number and types of network-connected devices continue to grow exponentially, presenting new vulnerabilities and increasing the attack surface. Addressing this trend requires much more than just network access control. It requires scanning for malware, preventing access to malicious websites, checking endpoint integrity, and controlling application usage while reducing complexity of network, application, and device management.

Fortinet's Secure Unified Access solution provides comprehensive security on the network infrastructure. The tight integration between the FortiGate appliances, FortiSwitch devices, and FortiAP Wireless Access Points enables a common security policy across the network, extending the protection of the firewall out to the edge.

FortiClient Integrated Endpoint Protection

Endpoints are frequently the target of initial compromise or attacks. One recent study found that 30% of breaches involved malware being installed on endpoints. FortiClient strengthens endpoint security through integrated visibility, control, and proactive defense. With the ability to discover, monitor, and assess endpoint risks, you can ensure endpoint compliance, mitigate risks, and reduce exposure. FortiClient proactively defends against advanced attacks. Its tight integration with the Security Fabric enables policy-based automation to contain threats and control outbreaks.

FortiClient is more than advanced endpoint protection. As an integrated agent, FortiClient contains three key modules: Fabric Agent for security Fabric connectivity, the endpoint security modules, and the secure remote access modules. Fabric Agent shares endpoint telemetry with the Security Fabric and delivers broad endpoint visibility, compliance control, and vulnerability management. It provides advanced endpoint protection with pattern-based anti-malware, behavior-based exploit protection, web-filtering, and an application firewall. FortiClient natively integrates with FortiSandbox to detect zero-day threats and custom malware. FortiClient also provides secure remote access with built-in VPN, single-sign-on, and two-factor authentication for added security.

Attend this technical training workshop to gain hands-on experience controlling endpoints using FortiClient EMS in mixed Windows & Linux environments and see first-hand how FortiClient integrates with the Fortinet Security Fabric to protect your companies’ critical assets.

Securely Embrace the IoT Revolution with FortiNAC

The proliferation of Internet of Things (IoT), has made it necessary for organizations to improve their visibility into what is attached to their networks. They need to know every device and every user accessing their networks. IoT devices enable digital transformation initiatives and improve efficiency, flexibility, and optimization. However, they are inherently untrustworthy, with designs that prioritize low-cost over security. FortiNAC provides the network visibility to see everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses.

Using AI to Detect Web Application Threats

Cybercriminals are increasingly targeting public and internal web applications. Today, nearly half of all data breaches are caused by attacks targeting web application vulnerabilities. To protect organizations from such attacks, Web Application Firewalls (WAFs) are the gold standard. However, some organizations may be reluctant to use these devices as they have a reputation for being very resource-intensive, especially when it comes to quickly addressing false positive detections in order to ensure that legitimate users and applications don’t get blocked.

In this workshop we will see how FortiWeb’s new AI-based Machine Learning addresses these shortcomings, why it is better than Application Learning and why signature-based protection alone is not enough.

Advanced Email Security Solution with FortiMail

Email is a critical tool for businesses, but it’s also a preferred delivery method for ransomware, phishing, and compromise attacks. According to the 2018 Verizon report, 49% of (non-POS) malware was installed via malicious email. FortiMail is tailored for advanced threat defense and shields users and data, from a wide range of cyber threats. These include the ever-growing volumes of unwanted spam, socially-engineered phishing and business email compromise, accelerating variants of ransomware and other malware. FortiMail can also be used to protect sensitive data of all types, reducing the risk of inadvertent loss and/or non-compliance with regulations like HIPAA, PCI, GDPR, and more.

Attend this technical training session and gain hands-on experience protecting your organization against phishing, spam, malware and advanced targeted attacks via email.

Business Outcome Driven Cloud Adoption with Secure SD-WAN 

SD-WAN is the most sought out technology in 2019 to replace legacy WAN edge products to embrace continuing growth in cloud applications. SD-WAN enables digital transformation with business aware application steering at lower WAN cost and improves the productivity of end users. Though SD-WAN is a networking technology, in recent Gartner survey 72% of customers have raised concerns about security with direct internet access. FortiGate Secure SD-WAN combines best of breed SD-WAN with NGFW to further reduce cost and complexity of the network infrastructure. For the first time, We will also unveil deeper integration for SD-WAN with LAN devices with SD-Branch solution which is a unique differentiator in the crowded SD-WAN market.

Align your security and business goals with Intent-based Segmentation and improve your security posture 

If you are a network or security practitioner, you might think you can build an effective security architecture by deploying a robust perimeter firewall. But the perimeter has become less effective due to mobile computing and workloads migrating to multiple clouds on the WAN side. And on the LAN side, malware coming from trusted users, rogue APs, and Shadow IT each add another micro-perimeter that you must also now defend. As a result, the fortified perimeter has become the sum of all of the micro-perimeters tied to the growing number of devices consuming networked services across all locations. To deal with all this, segmentation is a good starting point but it lacks adaptive trust and advanced security. In this session, we will share with you the benefits of adopting this new approach and how you can build a robust and high-performance security architecture with Intent-based Segmentation. Intent-based Segmentation intelligently segments IT-assets in accordance with a business intent, employs adaptive trust and control and automated threat protection to mitigate risks and achieve compliance with reduced complexity. 

SOAR with Security Fabric Single Plane of Glass 

Do you know what the leading cause of attack is? According to a recent Ponemon study - 52% of all breaches are a direct result of either System Glitches or Human Errors!

In this session you will learn how FortiManager/FortiAnalyzer can orchestrate security fabric components, automate operations, route incidents and vulnerabilities to appropriate resources  to improve security incident response times, vulnerability management process, and more importantly provide Realtime visibility into the overall network security posture – to help protect against the leading cause of breaches – System Glitches and Human error.

How I learned to love Security Operations

Too few people, too many tools, an underrated threat and high board expectations.  This interactive session discusses and demonstrates how an integrated approach to advanced threats makes Gartner's CARTA model a reality. It will show how business critical services, security events and workflows can be automated with the tools and vendors in your enterprise today, as well as how established and emerging tools like SIEM, Sandbox, UEBA and Deception assist an overworked CISO and security operations unit.

Cybersecurity Beyond the Power of Humans

FortiGuard Labs processes over 100 BILLION security events per day, representing data from the endpoint to the cloud. This gives us a unique and unprecedented view into the threat world. In this presentation we will cover the current threat landscape: what are the schemes that bad actors employ to evade detection; what other cybercriminal activity are we seeing, and other cyber threat trends. In conclusion you will get an overview of FortiGuard Labs mature and leading-edge artificial intelligence and machine learning program that provides protection capabilities that feed into products across the Fortinet portfolio. Our AI/ML program continues to expand in breadth and depth and this update will showcase how we stay ahead of the pack.

Top 10 Proven Strategies for Building Cybersecurity Trust and Assurance

The role of the CISO and the pressures that it brings can be overwhelming, some of these pressures gets pushed down to Networking & Security teams. Teams must hence work diligently and tirelessly collecting, analyzing cyber data across a rapidly growing attack surface, at the same time, attempting to rationalize everything and present the details in simple business terms. In this session, we will explore these 10 Proven Strategies and explain how the Fortinet Security Fabric can help the CISO and network/security teams to set practical goals, simplify operations, and create an environment of trust and assurance.

How Cloud is Transforming the Data Center

This interactive session will demonstrate how Fortinet’s FortiGate virtual appliances can provide seamless security across the software defined data center (SDDC), private, public and hybrid clouds.  FortiGate-VMs extend security fabric automation, visibility and control to multi-cloud environments.  Fortinet’s IPSec/SSL VPNs allow enterprises securely connect their on-premises networks to multiple clouds.  Enterprises are increasingly adopting hybrid cloud architectures, integrating on-premises private clouds with public cloud resources to take advantage of the scale and performance benefits, yet consistent security is a top priority. 

Securing Applications in the Public cloud

In this interactive session we will review the security considerations, Fortinet’s solutions and use cases for securing applications built in the public cloud. we will review the use of virtual network segmentation and app-control policies in the cloud based on FortiGate-VM, we will review various tools to secure web applications and API;s in the cloud and lastly we will reveal new cloud security posture management and analytics capabilities Fortinet is introducing can help customers protect from the top risk – cloud configuration mistakes.

Building Profitable CSP and MSSP Security Services with Fortinet

Service Providers have begun to roll out 5G and IoT services around the world but the road to 5G is bringing in new risks along with great opportunities. Come learn how Fortinet is enabling CSPs to build and secure new revenue generating opportunities in 5G and IoT with our carrier solutions.

Enterprise customers increasingly are seeking new MSSPs services that complete their security needs while MSSPs are trying to adopt flexible spending options. This session will also cover how we’re enabling MSSPs build Security-as-a-service offerings through specific products and tailored consumption programs.

Accelerate your Business with Cloud Management and Services

Your business is becoming ‘Cloudier’ by the day. Applications are moving to the cloud at an accelerating rate. Visibility and management of your deployed customer assets must follow. Learn how Fortinet can help accelerate your business into the cloud era with an update of our SaaS Security Applications and Cloud Management services offerings.

Risk management for Cybersecurity in Operational Technology (OT) Environments

Plant managers and network analysts face an increasingly daunting challenge of managing cyber risk in the face of increasing threats and attacks.  Keeping employee safety and process uptime are paramount priorities, yet how do they protect older, unpatched systems, respond to malware, and ensure a comprehensive approach to cybersecurity?  Come learn how Fortinet’s Security Fabric is applied intelligently to manufacturing, energy, and transportation industries to enable compliance and risk mitigation.  We’ll walk through how the technologies for securing the IT side of the house are adapted and applied to the OT side of the house. 

Building a secure and scalable access layer while simplifying the multiple vendor overlay

The access layer is the broadest attack surface in your network, and it’s only getting worse with IoT devices entering the network.  This session will cover how Fortinet’s FortiSwitch and FortiAP Secure Access products integrate into our security fabric to make security a native part of your access technology.  With our FortiLink technology, we can extend the power of the FortiGate into the FortiSwitch and FortiAP products, allowing everything to be managed and secured from a single interface.  Less hassle, less systems to configure, lower TCO and a better overall experience, come hear how Fortinet Secure Access can improve your network.

Scaling and Securing web and mail solutions moving to the cloud

With organizations rapidly develop new web applications and move email and other services to the cloud businesses become much more agile.  However organizations must still maintain security, governance and most importantly a high quality and consistent user experience, while leveraging the cloud to its fullest potential.  In this session, we will explore how FortiWeb, FortiADC and FortiMail help secure and scale applications in and out of public, private and SaaS clouds like Office 365, G-suite, AWS, Azure and more.

Protecting every user and device on the network

Today’s dynamic network infrastructures support employees, vendors, contractors, and guests, as well as laptops, smart phones, printers, and new IoT devices.  Providing access while ensuring security is no easy task; off-network activity, malicious and negligent insiders, shadow IT, and insecure IoT all challenge Enterprise security personnel.  Come learn how Fortinet’s Security Fabric can manage risk, including an understanding of how FortiClient, FortiUEBA, FortiNAC, and FortiAuthenticator work together to deliver an integrated solution that protects every user and every device on your network, providing the right level of access and security.


Fortinet—Leading a Retail Revolution

Session Speaker(s): Jim Overbeck, VP of Central US and Retail Sales, Fortinet, Joe Felz, Sr. Director of Field Marketing, Fortinet

Consumer interests, purchase patterns, and desire for flexibility is driving a Retail industry evolution, and their preferences change on a dime.  Retailers are looking to new technologies to stay connected, meet their customers’ needs in any channel, develop a dialogue with, and listen to their customers.  Retailers are trying to evolve their security by buying point solutions to secure the new connections, network traffic, and data that comes with those new technologies…but it’s hard for them to keep up and to stitch it all together.  Evolution is slow…so, Fortinet is leading a retail revolution.  

Fortinet’s Security Fabric for Retail is a revolutionary solution with broad, integrated, and automated protection for wired and wireless connections, POS terminals, customer devices on the network, IoT devices, kiosks, big data, and more.  Fortinet has unique abilities to provide visibility into those connections, that traffic, the data at rest and in motion, and the customer analytics and insights that go with it.  In the cloud, in the store, or anywhere in between.  With zero-touch deployment and single pane of glass management on premise or in the cloud, Fortinet’s retail solutions can simplify deployments and provide the improved security coverage retailers need quickly, and with a lower TCO than point solutions.  

In this session, retail industry experts will demonstrate how solutions such as Secure SD-WAN, FortiExtender, FortiDeploy, FortiProvision, and FortiManager are weaved into the Fortinet Retail Security Fabric to protect and defend the evolving retail store, network, and data.  The session will include a leading retailer that will discuss how Fortinet has enabled them to make security a strategic enabler of its digital revolution, improving operational efficiencies and helping them to stay ahead of competitors.


Meeting the Challenges of Healthcare Digitization

Session Speaker(s): Sonia Arista, National Healthcare Lead, Fortinet, Lynne A. Dunbrack, Research Vice President, IDC Health Insights

Increased digital transformation in healthcare is challenging organizations with inconsistent and distributed security postures and controls. The adoption of next-generation technologies—mobile devices, cloud capabilities, and the Internet of Medical Things (IoMT) means that this new digital enablement requires nurses, doctors, clinicians, and caregivers to access secure patient data—no matter where they are or what device they’re using. At the same time, the risk to personally identifiable information (PII) and electronic protected health information (ePHI) has never been greater, as black-market value of patient data stays at an all-time high.

As recent headlines about large-scale data breaches show, healthcare remains a top target for cyber criminals. In their 2018 Cost of a Data Breach Report, IBM and the Ponemon Institute found that data breach costs for healthcare organizations average $408 per record—the highest of any industry for the eighth straight year and nearly three times higher than the cross-industry average of $148 per record.

In this interactive session, some topics the speakers will address are:

  • Struggles for Visibility
  • Convergence of Physical and Digital Security
  • Managing the Growth and Complexity of Mergers and Acquisitions
  • Automation to reduce resource constraints, drive consistent controls, and shorten time to remediate

State and Local Goverments and Education

Managing Digital Transformation Within State and Local Governments and Education

Session Speaker: Jeff Jennings, National SLED Practice Director, Fortinet

Emerging cyber threats, the proliferation of IoT devices, smart building projects and other challenges can overwhelm resource constrained IT staff. This panel discussion will explore the unique challenges that digital transformation presents for governments and educational institutions. We’ll talk with practitioners who are managing the digital transformation with network security strategies such as segmentation and solutions that can see and classify everything on their networks, including headless devices, and control those devices and users, all while providing dynamic, automated responses to threats.

In this interactive session, speakers will discuss different aspects of the digital transformation such as:

  • Managing the influx of IoT devices and other smart building initiatives and technologies
  • The convergence of physical and cyber security on campuses and in cities
  • Compliance concerns in a digital era, including NIST, CIPA and FERPA
  • Operational planning from resource constraints to funding projects


Mitigating Risk and Fortifying Agency Security with Fortinet Federal

Session Speaker(s): Bob Fortna, President, Fortinet Federal, Marty Griffith, Sr. Director, Channel, Fortinet Federal

With the introduction of cloud computing, Internet of Things (IOT), and other emerging technologies, the federal government’s digital footprint is growing at an exponential rate.  But as the amount of data continues to increase, so do the number of adversaries and vulnerabilities in the government’s networks.

As prime targets for the most sophisticated adversaries seeking to impact national security, public safety and civilian services, federal governments require the most effective and comprehensive cybersecurity solutions available — while maintaining high performance.  At the same time, they must work within mandated budget constraints, incorporate advancing technology, and remain open to the citizens they serve.

In this interactive session, the speakers will address such topics as:

  • Detailed overview of U.S. Federal Government cyber priorities and programs 
  • Fortinet Federal’s approach to advancing federal agencies’ missions and cyber objectives
  • Fortinet Federal Partner Program: How Fortinet is creating a successful federal partner ecosystem to secure government networks


The Journey to Digital Transformation:  Securing Industrial Control Systems and Operational Technology (OT)

Session Speaker: Rick Peters, Director, Operational Technology Global Enablement, Fortinet

A system crash on a manufacturing floor can stall production for hours and potentially cost a company millions in ruined product. Even worse, having to reset an open furnace or a 10,000-gallon boiler processing caustic chemicals can have far more devastating consequences than temporarily losing access to an online printer. Because the primary goals of an OT environment are ensuring the safety of employees and local communities and ensuring the constant availability and uptime of the network, connected devices, applications, and industrial control systems are often not consistently updated.

In this interactive session, experts will discuss security without compromising availability or safety so important to operational technology and critical infrastructure security.  Hear from a panel of industry experts discussing lessons learned and how their experience can be leveraged to successfully secure OT environments.    The session will also cover how the Fortinet Fabric solution will protect and defend the control system vulnerabilities in industries such as manufacturing, energy, utilities and transportation.


SD-WAN - Coming to a Service Provider Near You
SD-WAN has moved from cool idea to the next must have capability in a very short span of time. With its ability to deliver an optimized networking experience to a broad set of customers at a reasonable cost, it’s growth prospects are dazzling. However, building a service-provider optimized SD-WAN business requires the right set of capabilities and positioning. This session will explore the technology, operational needs, market conditions and differentiation required to launch a competitive SP delivered SD-WAN service.

Financial Services

Enabling a Security Transformation
Session Speaker(s):  Kevin Carney, VP of Global Financial Services, Fortinet, Bob Burkhardt, Director of Systems Engineering Global Financial Services, Fortinet
The Financial Services industry continues its radical shift in business models due to digital transformation. As a result, new cyber security models, tools, and architectures are required. Cyber security professionals are focused on 5 key challenges:
  1. Automation to improve their security posture
  2. Visibility into their exponentially larger attack surface
  3. Consolidation away from point products
  4. Flexibility to take advantage of public, private, and hybrid cloud environments
  5. Reporting to meet the multiplying compliance requirements
In order to meet these challenges and enable new business advantage, a security transformation is taking place within the financial services area. This interactive session will focus on 4 areas of transformation:
  1. Technical: Price, Performance, and Security of the Fortinet solutions continue to be the Enterprise leader as validated by multiple, independent third-parties. The full spectrum of NGFW capabilities and the portability of the ubiquitoous FortiOS will also be discussed.
  2. Financial: Radical cost reduction becomes an integral part of building the security transformation and the Fortinet solution set not only enables this, but has been proven at some of the largest banks around the world.
  3. Operational: Automation and orchestration is possible through JSON and REST API to/from Fortinet's central management infrastructure or directly to security gateways. In addition, APIs enable orchestration via a programmable security fabric.
  4. Transition: Near zero touch provisioning via automated scripts to convert firewall policies coupled with a robust training regimen ensures that the security transformation will be successful.

Tailor-Made Partner Programs to Increase Your Growth with Fortinet

Region: EMEA
Session Speaker(s): Joe Sarno, Sales Vice President, International Emerging, Fortinet, Yann Pradelle, Sales Vice President, Europe, Fortinet

In a fast growing cybersecurity market, there is a need to adapt and evolve our partner Program to help you grow your business with Fortinet. Learn how the new Fortinet Partner Program will help your customers recognize your competencies and select your company for its added value services.

Using the Power of the Security Fabric to Win New Logos

Region: All Regions
Session Speaker: Carl Cayton, Director, Systems Engineering, Fortinet

Hear from a panel of peers of how they leveraged the power of the Fabric to add new logos to their book of business – and grow revenue their current customer base too.

Land and Expand with Fortinet – the Renewals Opportunity

Region: All Regions

If you're not taking advantage of the renewals opportunity, you're leaving easy money on the table - never mind the ability to create even more stickiness with your customers. This session will focus on positioning you and Fortinet at renewal time, provide an overview of the tools available, and how to upsell and cross sell your way into your customer's business.

Security and Agility Within GDPR

Region: EMEA
Session Speaker(s): Patrick Grillo, Senior Director Solutions Marketing, Fortinet

Why, with GDPR rapidly approaching its first anniversary of becoming the law of the land, are major data breaches still happening at organizations that are concerned by the regulations?

While there are probably as many different reasons for the breaches as the number of breaches themselves, part of the problem is the confusion over the regulations themselves:  was GDPR about data privacy or data protection?  While you can argue that they are one in the same, early observations show that most organizations focused on data privacy because this was the most visible aspect of compliance – how a web site was requesting permission to use personal data or notification of cookie behavior and access to data privacy policies.  Data protection, the behind the scenes technology, took a back seat to data privacy because most organizations already had some degree of cyber-security technology in place.

This session will focus on why a modern cyber-security infrastructure is necessary and how GDPR compliance can be a strategic selling strategy.

Driving Sales and Services with the Cyber Threat Assessment Program

Region: All Regions
Session Speaker(s): Neil Matz, Manager, Product Marketing, Fortinet, Ben Bolen, Systems Engineer, Fortinet

The Cyber Threat Assessment Program (CTAP) is designed to help you convert prospects and expand your business within your existing accounts and give prospects an in-depth view of the current state of their network. 

During this session, we'll focus on how to pitch the CTAP as a pre-sales and renewal tool to help you land and expand your business, and how to build it into your business model to drive greater profitability.

FortiSIEM: MSSP Best Practices for Getting the Most out of Your SIEM

Session Speaker(s): Dante Mercurio, Manager Systems Engineering, MSSP and Service Enablement, StratoZen, Kevin Prince, Founder and CEO, StratoZen

From initial setup to automating operational functions, our presenters will review how to build MSSP services using FortiSIEM by taking a look at top concerns and best practices to ensure your FortiSIEM instance is multitenant- capable, built properly for scale, and provides your desired business returns.

Mastering Efficiency: Security Orchestration, Automation, and Response for MSSPs

Session Speaker(s): Jim Hilving, Senior Systems Engineer, MSSP, Fortinet

Learn how to build MSSP service automation into the Security Fabric using micro-services. Automation projects and reaching your goals of operational efficiency can be a challenge. The MSSP team can help you organize and reach these objectives no matter how high your level of operational maturity. 

North America Partner Update: Transforming Your Profitability With Fortinet's Tailor-Made Programs

Session Speaker: Jon Bove, Vice President of North America Channels, Fortinet

The industry is changing, and Fortinet is leading the way to help you maximize your security practice, automate your offering, and bring overall operational efficiency to you and your team. Join us to learn more about what's in store for the Fortinet Partner Program, including new offerings like FortinetOne, our SSO SaaS platform, and the revolutionary Services Marketplace, making it easy for you to expand your footprint through partnerships. 

Partner Breakout - EMEA

Region: EMEA
Session Speaker: Anne Bourgeois, Senior Director, Channel, EMEA, Fortinet
The industry is changing, and Fortinet is leading the way to help you maximize your security practice, automate your offering, and bring overall operational efficiency to you and your team. Join us to learn more about what's in store for the Fortinet Partner Program.

Partner Breakout - LATAM

Region: LATAM
Session Speaker: Pedro Paixão, General Manager and Vice President, Latin America, Fortinet

The industry is changing, and Fortinet is leading the way to help you maximize your security practice, automate your offering, and bring overall operational efficiency to you and your team. Join us to learn more about what's in store for the Fortinet Partner Program.

Partner Breakout – Japan

Region: Japan
Session Speaker: Norio Kubota, Country Manager and Vice President of Sales, Japan, Fortinet
The industry is changing, and Fortinet is leading the way to help you maximize your security practice, automate your offering, and bring overall operational efficiency to you and your team. Join us to learn more about what's in store for the Fortinet Partner Program.

Partner Breakout – APAC

Region: APAC

The industry is changing, and Fortinet is leading the way to help you maximize your security practice, automate your offering, and bring overall operational efficiency to you and your team. Join us to learn more about what's in store for the Fortinet Partner Program.

2019 E-rate Information Session and Q&A

Region: United States
Session Speaker: Jeff Jennings, National SLED Practice Director, Fortinet

Need some E-rate clarification? Want to learn how to develop the right opportunities- and make sure you know your rights and responsibilities? Attendees will receive an update on issues effecting E-rate 2019 and look through the crystal ball to 2020. The session is designed to be interactive, and will include a live Q&A. 

SLED Small Group Session: Deep Dive into Analyzing Performance and Sharpening Your Attack Plan

Region: United States
Session Speaker: Jeff Jennings, National SLED Practice Director, Fortinet

This small group session is designed to take partners on a deep-dive into the E-rate performance in 2019. You'll come away knowing what you need to do to expand your reach and increase wins with Fortinet. 

Increase Your Footprint in SMB

Region: Distributor-Only
Session Speaker: Anne Bourgeois, Senior Director, EMEA Channel, Fortinet
There is still a huge opportunity for growth within the SMB segment for you! In a framework developed with and for distributors, learn how you can recruit new resellers, reactivate inactive ones or simply develop sales and a footprint with targeted tactics and competitive offerings.
(Note: Distributor-only session)


As the cyber security market and customer priorities continue to trend toward providing business outcomes, the security services space represents a massive opportunity for those partners that can differentiate themselves. But where and how do you focus your energy to take advantage? That depends on where you sit in the SOC life cycle.

To answer this, think about whether you are a VAR or MSP moving to security services; or a mature MSSP looking to innovate and broaden customer wallet share?  That's how you determine where you are in the SOC life cycle, and this year for Accelerate 2019 we’ve put together a solid track of services-oriented breakouts that support your growth regardless of where you sit.

As an attendee of our MSSP track, you'll learn more about market trends, new subscription and service enablement programs, multi-tenant management, automation best practices, SOC business strategies, and programs that help you staff your SOC. We've designed each session with a specific audience in mind, so no matter where you sit in your journey, you'll find a session that will help you move to the next level!

101: Building the Next Generation MSSP for Profitability and Efficiency

Session Speaker: Stephan Tallent, Sr. Director, MSSP

Stephan Tallent, Sr. Director MSSP & Service Enablement, discusses trends in the MSSP market, profiting from the digital transformation, filling gaps in your service offering, updates and new service enablement programs for Fortinet MSSPs.  

102: Services Marketplace: Expanding Your Footprint Through Partnerships

Session Speaker(s): Darius Goodall, Sr. Director, Product Management; Lief Koepsel, Senior Director, Channel

Large or small, your business is poised for growth with our new Fortinet Services Marketplace. Learn more about our new hub for services - through Fortinet and through our trusted partners.

103: Filling the Cyber Security Skills Gap: Fortinet's Network Security Academy and Veteran's Program 

Session Speaker: Jay Garcia, Program Administrator, MSSP & Service Enablement

With a 0% unemployment rate among cyber security operators, customers and partners alike face a major challenge when it comes to finding qualified security professionals. During this track you will learn more about how Fortinet is working to fill the cyber security skills gap with the Fortinet Veterans Program and the Network Security Academy.

201: Becoming an MSP – Without the $ Investment

Session Speaker(s): Jon Garside, Director, Product Marketing, Fortinet, Darius Goodall, Senior Director, Product Marketing, Fortinet; Ben Wilson, Vice President, Product Management, R&D

Beyond Managed Security – Managed Infrastructure. Our presenters will discuss and demonstrate the ease in creating a full-service service provider business model, encompassing both network security and perimeter security. This session shows the journey to establishing your own “franchise” where the infrastructure is yours, the customer relationship is yours, and the partnership is transparent. Learn how Fortinet’s technology, clouds, and programs can be harnessed as the growth point of your business.

301: FortiSIEM: MSSP Best Practices for Getting the Most Out of Your SIEM

Session Speaker(s): Dante Mercurio, Manager, Systems Engineering, Kevin Prince, Founder and CEO, StratoZen

From initial setup to automating operational functions, our presenters will review how to build MSSP services using FortiSIEM by taking a look at top concerns and best practices to ensure your FortiSIEM instance is multitenant- capable, built properly for scale, and provides your desired business returns.

401: Mastering Efficiency: Security Orchestration, Automation, and Response for MSSPs

Session Speaker: Jim Hilving, Sr. Systems Engineer, MSSP

Learn how to build MSSP service automation into the Security Fabric using micro-services. Automation projects and reaching your goals of operational efficiency can be a challenge. The MSSP team can help you organize and reach these objectives no matter how high your level of operational maturity.