Session Category: Security Driven Networking

In this course, participants will learn how to deploy, administrate, and troubleshoot a secured SD-WAN solution. After completing this course, your will be able to: Configure SD-WAN for Internet access Configure SD-WAN for the communication with branch offices Troubleshoot SD-WAN implementations Use FortiManager to centrally manage a SD-WAN solution Configure ADVPN to enable on-demand VPN tunnels between sites.

Note: This is a pre-paid session. Pre-Registration is required.

Session Category: Security Driven Networking

FortiOS provides several tools that help with troubleshooting both hardware and software issues. The objective of this 2-day workshop is to learn how to establish a baseline, define the problem, and create a troubleshooting plan. It is also helpful to understand the logic behind some of the built-in debugging tools and when to use them. The content of this workshop will include troubleshooting methodologies, introduction to diagnostic commands, high availability best practices, SD-WAN Health Diagnostics, troubleshooting IPsec VPN and FortiOS routing.

Note: This is a pre-paid session. Pre-Registration is required.

Session Category: Security Driven Networking

The NSE 8 Immersion is an all hands-on lab that students preparing for the NSE 8 practical exam can do to get an exam-like experience. Based on the previous NSE 8 practical exam, students will be tasked with completing the lab in a challenging learning environment. Fortinet products in the lab include FortiGate, FortiManager, FortiAnalyzer, FortiWeb, FortiMail, FortiADC, FortiAuthenticator, and FortiSandbox. During the sessions, an NSE8 certified instructor is available for questions and to help gain knowledge in getting prepared for becoming NSE 8 certified.

Note: This is a pre-paid session. Pre-Registration is required.

Session Category: Security Driven Networking

In this course, students will learn how to implement, troubleshoot, and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices. After completing this course, participants will be able to: Integrate FortiManager, FortiAnalyzer, and multiple FortiGate devices using the Fortinet Security Fabric Centralize the management and monitoring of network security events Optimize FortiGate resources Diagnose and monitor user traffic using FortiGate debug tools Troubleshoot issues with conserve mode, high CPU, firewall policies, session helpers, IPsec, FortiGuard, content inspection, routing, and HA Harden the enterprise services Simultaneously deploy IPsec tunnels to multiple sites using the FortiManager VPN console Configure ADVPN to enable on-demand VPN tunnels between sites Combine OSPF and BGP to route the enterprise traffic.

Note: This is a pre-paid session. Pre-Registration is required.

This session will take place in two rooms - 129/130 & 123 (CCIB, Level P1)

Session Category: Dynamic Cloud Security

In this advanced, hands-on, class, you will learn about the different components that make up the infrastructures of the top public cloud providers, and the security challenges these environments present, including high availability (HA), auto-scaling, software-defined network (SDN) connectors, and how to manage traffic in the cloud with Fortinet products. After completing this course, you will be able to: Deploy a FortiGate VM on Amazon Web Services (AWS) and Azure in single, HA, and auto-scaling modes Use Fortinet templates to easily deploy complex environments Deploy FortiWeb in AWS and Azure Use SDN connectors with cloud vendors Integrate other Fortinet services and products with cloud vendors.

Note: This is a pre-paid session. Pre-Registration is required.

Session Category: Zero Trust Network Access

In this course, you will learn how to leverage the powerful and diverse capabilities of the FortiNAC system, using best practices for achieving visibility, control, and response. In interactive labs, you will explore the administrative tasks necessary to achieve network visibility, control, and automated threat response. These fundamentals will provide you with a solid understanding of how to implement network visibility and security automation. After completing this course, you should be able to: Configure a FortiNAC system to achieve network visibility Leverage the control capabilities for network access and automated policy enforcement Combine the visibility and control features with security device integrations to automate threat responses to security risks.

Note: This is a pre-paid session. Pre-Registration is required.

Session Category: AI Driven Security Operations

In this course, you will learn how to use FortiSIEM, and how to integrate FortiSIEM into your network awareness infrastructure. You will learn about initial configurations, architecture, and the discovery of devices on the network. You will also learn how to collect performance information and aggregate it with syslog data to enrich the overall view of the health of the environment. Additionally, you will learn how you can use the configuration database to greatly facilitate compliance audits. After completing these courses, you will be able to: Identify business drivers for using SIEM tools Describe SIEM and PAM concepts Describe key features of FortiSIEM Understand how collectors, workers, and supervisors work together Create new users and custom roles Describe the discovery process Perform real-time, historic structured searches Group and aggregate search results Examine performance metrics Create custom incident rules Export CMDB information Describe what Windows Agents are used for Understand how the Windows Agent Manager works in various deployment models Understand FortiSIEM Linux File Monitoring Agent.

Note: This is a pre-paid session. Pre-Registration is required.

Session Category: Security Driven Networking

In this course, you will learn how to use basic FortiGate features, including security profiles. In interactive labs, you will explore firewall policies, security fabric, user authentication, SSL VPN, dial-up IPsec VPN, and how to protect your network using security profiles such as IPS, antivirus, web filtering, application control, and more. These administration fundamentals will provide you with a solid understanding of how to implement basic network security. After completing this course, you should be able to: Deploy the appropriate operation mode for your network Use the GUI and CLI for administration Identify the characteristics of the Fortinet Security Fabric Control network access to configured networks using firewall policies Apply port forwarding, source NAT, and destination NAT Authenticate users using firewall policies Understand encryption functions and certificates Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies FortiGate Security Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports Fight hacking and denial of service (DoS) Offer an SSL VPN for secure access to your private network Implement a dialup IPsec VPN tunnel between FortiGate and FortiClient Collect and interpret log entries.

Note: This is a pre-paid session. Pre-Registration is required.

Session Category: Security Driven Networking

In this two-day class, you will learn the fundamentals of using FortiManager for centralized network administration of many FortiGate devices. In interactive labs, you will explore deployment strategies, which include single or multiple ADOMs, device registration, policy packages, shared objects, installing configuration changes, provisioning FortiManager as a local FortiGuard distribution server, and troubleshooting the features that are critical to day-to-day use after you deploy FortiManager. After completing this course, you will be able to: Describe the key features and capabilities of FortiManager Deploy administrative domains (ADOMs) to support multiple customers on a single FortiManager Restrict concurrent ADOM access by using workspaces and workflow mode Use provisioning templates for device-level changes across many devices Identify the synchronization states and manage the revision history of managed devices Manage firewall policies across multiple FortiGate devices using policy packages with shared and dynamic objects Deploy policies and objects from the global ADOM to multiple ADOMs Understand Security Fabric integration with FortiManager Deploy SD-WAN using central management FortiManager Describe high-availability (HA), backup, and recovery options for FortiManager Manage the firmware of supported devices centrally Offer a local FortiGuard distribution server to your Fortinet devices Diagnose and troubleshoot import and installation issues.

Note: This is a pre-paid session. Pre-Registration is required.

Session Category: Security Driven Networking

In this course, you will learn how to use advanced FortiGate networking and security. Topics include features commonly applied in complex or larger enterprise or MSSP networks, such as advanced routing, transparent mode, redundant infrastructure, site-to-site IPsec VPN, single sign-on (SSO), web proxy, and diagnostics. After completing this course, you should be able to: Analyze a FortiGate route table Route packets using policy-based and static routes for multipath and load-balanced deployments Configure SD-WAN to load balance traffic between multiple WAN links effectively Inspect traffic transparently, forwarding as a Layer 2 device Divide FortiGate into two or more virtual devices, each operating as an independent FortiGate, by configuring virtual domains (VDOMs) Establish an IPsec VPN tunnel between two FortiGate devices Compare policy-based to route-based IPsec VPN Implement a meshed or partially redundant VPN Diagnose failed IKE exchanges Offer Fortinet Single Sign-On (FSSO) access to network services, integrated with Microsoft Active Directory (AD) Deploy FortiGate devices as an HA cluster for fault tolerance and high performance Deploy implicit and explicit proxy with firewall policies, authentication, and caching Diagnose and correct common problems.

 

Note: This is a pre-paid session. Pre-Registration is required.

Session Category: Zero Trust Network Access

In this course, participants will learn how FortiOS, FortiAP, FortiSwitch, and FortiAuthenticator enable secure connectivity, no matter where users are located and how they are connecting. The course covers the deployment and troubleshooting of advanced authentication scenarios, together with best practices for securely connecting wireless and wired users. After completing this course, participants should be able to: Configure advanced user authentication and authorization scenarios using RADIUS and LDAP Troubleshoot user authentication and authorization problems Implement two-factor authentication using digital certificates Manage FortiSwitch devices using FortiLink Configure layer 2 authentications for wired and wireless users using 802.1.x Secure the layer 2 network Secure the wireless network Provide secure access to guest users.

Note: This is a pre-paid session. Pre-Registration is required.

Session Category: Security Driven Networking

FortiOS provides several tools that help with troubleshooting both hardware and software issues. The objective of this 2-day workshop is to learn how to establish a baseline, define the problem, and create a troubleshooting plan. It is also helpful to understand the logic behind some of the built-in debugging tools and when to use them. The content of this workshop will include troubleshooting methodologies, introduction to diagnostic commands, high availability best practices, SD-WAN Health Diagnostics, troubleshooting IPsec VPN and FortiOS routing.

Note: This is a pre-paid session. Pre-Registration is required.

Session Category: Zero Trust Network Access

In this course, participants will learn how FortiOS, FortiAP, FortiSwitch, and FortiAuthenticator enable secure connectivity, no matter where users are located and how they are connecting. The course covers the deployment and troubleshooting of advanced authentication scenarios, together with best practices for securely connecting wireless and wired users. After completing this course, participants should be able to: Configure advanced user authentication and authorization scenarios using RADIUS and LDAP Troubleshoot user authentication and authorization problems Implement two-factor authentication using digital certificates Manage FortiSwitch devices using FortiLink Configure layer 2 authentications for wired and wireless users using 802.1.x Secure the layer 2 network Secure the wireless network Provide secure access to guest users.

Note: This is a pre-paid session. Pre-Registration is required.

Session Category: Zero Trust Network Access

In this course, you will learn how to leverage the powerful and diverse capabilities of the FortiNAC system, using best practices for achieving visibility, control, and response. In interactive labs, you will explore the administrative tasks necessary to achieve network visibility, control, and automated threat response. These fundamentals will provide you with a solid understanding of how to implement network visibility and security automation. After completing this course, you should be able to: Configure a FortiNAC system to achieve network visibility Leverage the control capabilities for network access and automated policy enforcement Combine the visibility and control features with security device integrations to automate threat responses to security risks

Session Category: Security Driven Networking

In this course, you will learn how to use advanced FortiGate networking and security. Topics include features commonly applied in complex or larger enterprise or MSSP networks, such as advanced routing, transparent mode, redundant infrastructure, site-to-site IPsec VPN, single sign-on (SSO), web proxy, and diagnostics. After completing this course, you should be able to: Analyze a FortiGate route table Route packets using policy-based and static routes for multipath and load-balanced deployments Configure SD-WAN to load balance traffic between multiple WAN links effectively Inspect traffic transparently, forwarding as a Layer 2 device Divide FortiGate into two or more virtual devices, each operating as an independent FortiGate, by configuring virtual domains (VDOMs) Establish an IPsec VPN tunnel between two FortiGate devices Compare policy-based to route-based IPsec VPN Implement a meshed or partially redundant VPN Diagnose failed IKE exchanges Offer Fortinet Single Sign-On (FSSO) access to network services, integrated with Microsoft Active Directory (AD) Deploy FortiGate devices as an HA cluster for fault tolerance and high performance Deploy implicit and explicit proxy with firewall policies, authentication, and caching Diagnose and correct common problems.

Note: This is a pre-paid session. Pre-Registration is required.

Session Category: Security Driven Networking

In this two-day class, you will learn the fundamentals of using FortiManager for centralized network administration of many FortiGate devices. In interactive labs, you will explore deployment strategies, which include single or multiple ADOMs, device registration, policy packages, shared objects, installing configuration changes, provisioning FortiManager as a local FortiGuard distribution server, and troubleshooting the features that are critical to day-to-day use after you deploy FortiManager. After completing this course, you will be able to: Describe the key features and capabilities of FortiManager Deploy administrative domains (ADOMs) to support multiple customers on a single FortiManager Restrict concurrent ADOM access by using workspaces and workflow mode Use provisioning templates for device-level changes across many devices Identify the synchronization states and manage the revision history of managed devices Manage firewall policies across multiple FortiGate devices using policy packages with shared and dynamic objects Deploy policies and objects from the global ADOM to multiple ADOMs Understand Security Fabric integration with FortiManager Deploy SD-WAN using central management FortiManager Describe high-availability (HA), backup, and recovery options for FortiManager Manage the firmware of supported devices centrally Offer a local FortiGuard distribution server to your Fortinet devices Diagnose and troubleshoot import and installation issues.

Note: This is a pre-paid session. Pre-Registration is required.

Session Category: Security Driven Networking

The NSE 8 Immersion is an all hands-on lab that students preparing for the NSE 8 practical exam can do to get an exam-like experience. Based on the previous NSE 8 practical exam, students will be tasked with completing the lab in a challenging learning environment. Fortinet products in the lab include FortiGate, FortiManager, FortiAnalyzer, FortiWeb, FortiMail, FortiADC, FortiAuthenticator, and FortiSandbox. During the sessions, an NSE8 certified instructor is available for questions and to help gain knowledge in getting prepared for becoming NSE 8 certified.

Note: This is a pre-paid session. Pre-Registration is required.

Session Category: Security Driven Networking

In this course, you will learn how to use basic FortiGate features, including security profiles. In interactive labs, you will explore firewall policies, security fabric, user authentication, SSL VPN, dial-up IPsec VPN, and how to protect your network using security profiles such as IPS, antivirus, web filtering, application control, and more. These administration fundamentals will provide you with a solid understanding of how to implement basic network security. After completing this course, you should be able to: Deploy the appropriate operation mode for your network Use the GUI and CLI for administration Identify the characteristics of the Fortinet Security Fabric Control network access to configured networks using firewall policies Apply port forwarding, source NAT, and destination NAT Authenticate users using firewall policies Understand encryption functions and certificates Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies FortiGate Security Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports Fight hacking and denial of service (DoS) Offer an SSL VPN for secure access to your private network Implement a dialup IPsec VPN tunnel between FortiGate and FortiClient Collect and interpret log entries.

Note: This is a pre-paid session. Pre-Registration is required.

Session Category: Security Driven Networking

In this course, students will learn how to implement, troubleshoot, and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices. After completing this course, participants will be able to: Integrate FortiManager, FortiAnalyzer, and multiple FortiGate devices using the Fortinet Security Fabric Centralize the management and monitoring of network security events Optimize FortiGate resources Diagnose and monitor user traffic using FortiGate debug tools Troubleshoot issues with conserve mode, high CPU, firewall policies, session helpers, IPsec, FortiGuard, content inspection, routing, and HA Harden the enterprise services Simultaneously deploy IPsec tunnels to multiple sites using the FortiManager VPN console Configure ADVPN to enable on-demand VPN tunnels between sites Combine OSPF and BGP to route the enterprise traffic.

Note: This is a pre-paid session. Pre-Registration is required.

This session will take place in two rooms - 129/130 & 123 (CCIB, Level P1)

Session Category: AI Driven Security Operations

In this course, you will learn how to use FortiSIEM, and how to integrate FortiSIEM into your network awareness infrastructure. You will learn about initial configurations, architecture, and the discovery of devices on the network. You will also learn how to collect performance information and aggregate it with syslog data to enrich the overall view of the health of the environment. Additionally, you will learn how you can use the configuration database to greatly facilitate compliance audits. After completing these courses, you will be able to: Identify business drivers for using SIEM tools Describe SIEM and PAM concepts Describe key features of FortiSIEM Understand how collectors, workers, and supervisors work together Create new users and custom roles Describe the discovery process Perform real-time, historic structured searches Group and aggregate search results Examine performance metrics Create custom incident rules Export CMDB information Describe what Windows Agents are used for Understand how the Windows Agent Manager works in various deployment models Understand FortiSIEM Linux File Monitoring Agent.

Note: This is a pre-paid session. Pre-Registration is required.

Session Category: Dynamic Cloud Security

In this advanced, hands-on, class, you will learn about the different components that make up the infrastructures of the top public cloud providers, and the security challenges these environments present, including high availability (HA), auto-scaling, software-defined network (SDN) connectors, and how to manage traffic in the cloud with Fortinet products. After completing this course, you will be able to: Deploy a FortiGate VM on Amazon Web Services (AWS) and Azure in single, HA, and auto-scaling modes Use Fortinet templates to easily deploy complex environments Deploy FortiWeb in AWS and Azure Use SDN connectors with cloud vendors Integrate other Fortinet services and products with cloud vendors

Session Category: Security Driven Networking

In this course, participants will learn how to deploy, administrate, and troubleshoot a secured SD-WAN solution. After completing this course, your will be able to: Configure SD-WAN for Internet access Configure SD-WAN for the communication with branch offices Troubleshoot SD-WAN implementations Use FortiManager to centrally manage a SD-WAN solution Configure ADVPN to enable on-demand VPN tunnels between sites.

Note: This is a pre-paid session. Pre-Registration is required.

Session Category: Security Fabric
The Fortinet Security Fabric delivers Broad, Integrated, and Automated capabilities to provide customers with end-to-end protection and operational efficiencies across their network. Find out how the Fortinet Security Fabric just got better with FortiOS 6.4.
Session Category: AI Driven Security Operations
We know that the broad attack surface, accelerating threat landscape and proliferation of security products makes it difficult for the SOC teams to keep up with the required investigation and response to security-related alerts; especially give the shortage of cyber security skills in the industry. As Gartner notes in their 2019 Market Guide, Security Orchestration Automation & Response (SOAR) tools significantly enhance security operations activities like threat detection and response by providing machine-powered assistance to human analysts to improve the efficiency and consistency of people and processes. Join us in this session, to learn more around: How Fortinet addresses SOAR for the Security Fabric Fortinet’s standalone SOAR offering for mature SOC teams Customer story for Fortinet’s standalone SOAR offering
Session Category: AI Driven Security Operations
Advanced attacks typically take only minutes if not seconds to infect and compromise your endpoints. While the first generation EDR tools can improve time to detection, they generate too many alerts and requires manual response, driving up security operations cost and have other negative impact on business. With the recent acquisition of enSilo, Fortinet is introducing the new advanced endpoint protection with EDR. Join this session to learn how FortiEDR (enSilo) can help you stop the breach in real time, automatically and efficiently, without the alert fatigue and other pain associated with first generation manual EDR.
Session Category: Verticals
Power and utilities CEOs are not taking the risk of cyberattacks and damaged infrastructure lightly. From generation through distribution, protecting critical infrastructure against cyber-attacks while ensuring physical safety and productivity is a top priority. This session, in the form of an interactive panel discussion, will explore the key cybersecurity issues facing the sector including convergence with IT and the particular challenges this brings.
Session Category: Security Driven Networking
Fortinet pioneered Secure SD-WAN and now marked as the fastest growing SD-WAN vendor among 60 vendors in the industry with its unique security-driven networking approach of combining best of breed SD-WAN, Next Generation Firewall and Advance routing in one powerful offering. We are excited to announce new innovations in WAN Edge, Orchestration and SD-WAN ASIC to enable best user and application experience with best security posture. The “Power of one” with FortiGate WAN Edge is already at your fingertips – take advantage of them today.
Session Category: Verticals

The coming of 5G is exciting and promising for both Mobile Network Operators (MNOs) and Enterprises. 5G deploys new technologies and capabilities that enable new industry and vertical use cases for enterprises. These will drive innovation and growth for both the enterprise and the MNO. In the wake of the 5G era, security has even a bigger and more important role to play is securing and enabling these new capabilities and use cases. This session will provide an introduction to the role security plays in 5G use cases and technology as a business enabler and a revenue generator.

Session Category: Sponsors
Join BackBox as we take a deep dive into intelligently automating the management and validation of your Fortinet device configurations, deep application monitoring as well as addressing the overwhelming task of upgrading these devices. Learn how implementing an Intelligent Automation solution will help to increase an organization’s operational efficiency, reliability and visibility while significantly reducing overall risk.
Session Category: Dynamic Cloud Security
Fortinet is the Cloud Security Vendor of choice to thousands of customers worldwide. In this session we will briefly review Fortinet's Unique Cloud Security Strategy and Offerings and offer a fresh view into best practices for securing cloud based infrastructures and workloads. we will match solution capabilities to known cloud security frameworks and identify functional and operational -not so obvious- areas customers must address protecting their cloud data and applications. Workload Protection, Intrusion Detection, CSPM, Distributed Cloud SD-WAN.
Session Category: Partner/Channel

Discover our focus areas, how to compete in your territory and the investments we are making to help you drive growth in your country. Led by our Sales Vice-Presidents, this session will help you discover your 2020 route to success!

Session Category: Zero Trust Network Access

The proliferation of Internet of Things (IoT) devices, has made it necessary for organizations to improve their visibility into what is attached to their networks. They need to know every device and every user accessing their networks. IoT devices enable digital transformation initiatives and improve efficiency, flexibility, and optimization. However, they are inherently untrustworthy, with designs that prioritize low-cost over security. FortiNAC provides the network visibility to see everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses. Attend this technical training workshop to gain hands-on experience configuring FortiNAC to secure IoT devices within the Fortinet Security Fabric.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: Zero Trust Network Access

Endpoints are frequently the target of initial compromise or attacks. One recent study found that 30% of breaches involved malware being installed on endpoints. Fortinet strengthens endpoint security through integrated visibility, control, and proactive defense. With the ability to discover, monitor, and assess endpoint risks, you can ensure endpoint compliance, mitigate risks, and reduce exposure. FortiClient is more than advanced endpoint protection. As an integrated agent, FortiClient contains three key modules; Fabric Agent for security Fabric connectivity, the endpoint security modules and the secure remote access modules. Fabric Agent shares endpoint telemetry with the Security Fabric and delivers broad endpoint visibility, compliance control and vulnerability management. It provides advanced endpoint protection with pattern-based anti-malware, behavior-based exploit protection, web-filtering, and an application firewall. FortiClient natively integrates with FortiSandbox to detect zero-day threats and custom malware. FortiClient also provides secure remote access with built-in VPN, single-sign-on, and two-factor authentication for added security. FortiEDR (enSilo) is a next-gen endpoint security solution that packs a broad set of EDR capabilities with easy deployment and use. FortiEDR offers certified NGAV, automated EDR, threat hunting, forensics and virtual patching capabilities all in one single agent to prevent breaches and comply with regulations like PCI/DSS and HIPAA. The lightweight agent is managed by an easy-to-use management console for pre and post infection capabilities. FortiEDR features multi-tenant management in the cloud, on-premise, and hybrid. Attend this technical training workshop to gain hands-on experience controlling endpoints using Fortinet Advanced Endpoint Protection tools in mixed Windows & Linux environments and see first-hand how these solutions integrate with the Fortinet Security Fabric to protect your company’s critical assets.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: Security Driven Networking

Email is a critical tool for businesses. But it’s also a preferred delivery method for ransomware, phishing, and compromise attacks. According to the 2018 Verizon report, 49% of (non-POS) malware was installed via malicious email. Gartner asserts that "Advanced threats (such as ransomware and business email compromise) are easily the signature-based and reputation-based prevention mechanisms that a secure email gateway (SEG) has traditionally used. FortiMail replaces incumbent secure email gateways with a product tailored for advanced threat defense. FortiMail email security shields users, and ultimately data, from a wide range of cyber threats. These include: ever growing volumes of unwanted spam, socially-engineered phishing and business email compromise, accelerating variants of ransomware and other malware, increasingly targeted attacks from adversaries of all kinds, and more. At the same time, FortiMail can be used to protect sensitive data of all types, reducing the risk of inadvertent loss and/or non-compliance with regulations like HIPAA, PCI, GDPR, and more. Attend this technical training workshop and gain hands-on experience protecting your organization against phishing, spam, malware and advanced targeted attacks via email.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: AI Driven Security Operations

Cyberattacks are a 24/7 reality. The complexity and growth of the enterprise estate – Infrastructure, Applications, VM’s, Cloud, Endpoints and IoT means the attack surface grows exponentially. Coupled with a skills shortage, and resource constraints, security becomes everybody’s problem but visibility, event correlation and remediation are other people’s responsibility. Effective security requires visibility – all the devices, all the infrastructure in realtime – but also with context – what devices represent a threat, what is their capability so you manage the threat the business faces, not the noise multiple security tools create. FortiSIEM - Fortinet’s Multivendor Security Incident and Events Management solution brings it all together by integrating NOC-SOC Solutions to Automate IT Processes and Security Responses. Visibility, Correlation, Automated Response and Remediation in a single, scalable solution. Using a FortiSIEM, the complexity of managing network and security operations is reduced, freeing resources, improving breach detection. Worldwide 80% of breaches go undetected because of skills shortage and event information ‘noise’. FortiSIEM provides the cross correlation, applies machine learning and UEBA to improve response, to stop breaches before they occur. Use this Hands-on technical training to familiarize yourself with the Powerful Security Incident and Event Management capabilities of a FortiSIEM.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: AI Driven Security Operations

With a dynamic attack surface due to the rise of IoT and cloud services, it's clear that no single technology will be able to stop every threat. To protect your enterprise against sophisticated threats, it is important to establish a comprehensive and cohesive security infrastructure that is broad enough to cover all attack vectors, powerful enough to run the latest security technologies, and automated to keep pace with fast-moving attacks. Attend this hands-on technical training workshop to learn how to detect and analyze advanced threats with FortiSandbox.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: Dynamic Cloud Security
Organizations are increasingly deploying a variety of workloads across multiple clouds. In turn, business-critical data and services are increasingly scattered across this distributed infrastructure. Using the shared responsibility model as a guiding principle, enterprises rely on cloud providers to protect the network, storage, and computing layers, while enterprises own the security. This drives a need for solutions that complement traditional physical appliance form factors which provide visibility and maintain consistent security policy as workloads, users and data migrate to more agile, elastic, and virtualized infrastructure. Attend this technical training workshop and gain hands-on experience configuring virtual NGFWs and Application Gateways utilizing Fortinet products to protect public cloud resources.
Session Category: Security Driven Networking

As organizations transition to a digital business model, their network topologies are significantly impacted. The adoption of cloud services, the virtualization of the traditional network, and an increasingly mobile workforce accessing applications in the cloud are accelerating advancements in wide area networking technologies. The traditional wide area network (WAN) is struggling to keep up because it relies on a static infrastructure of devices that simply can't accommodate shifting, and often temporary resource allocation and workloads. Attend this technical training workshop to learn how software-defined networking (SDN) applies to software control of wide area networks in an enterprise environment. Gain hands-on experience through actual configuration of virtualized products supporting WAN aggregation, both directly configuring the FortiGates, as well as doing the configurations remotely through FortiManager.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: Zero Trust Network Access

Enterprise networking and security teams are struggling with evolving their WAN and branch office IT architecture to support digital transformation. A typical branch office consists of multiple point products creating both security and complexity challenges. IT teams are looking to consolidate these point products to increase agility and save money, while improving the security and visibility of network access at the branch office. Fortinet’s secure access architecture powered by FortiLink is uniquely suited to SD-Branch deployments with ethernet switch and wireless access point management built into the same platform that drives our Secure SD-WAN solution, the FortiGate and FortiOS. Come learn how this common platform enables you to have all of the compelling features of Fortinet’s SD-WAN extended directly to branch network access through FortiSwitch, FortiAP and FortiLink, including global security policies enforced by an industry leading security platform in FortiGate.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: Security Driven Networking

As security architects consider how to provide comprehensive threat protection for their enterprises, including intrusion prevention, web filtering, anti-malware and application control, they face a major complexity hurdle managing these point products with no integration and lack of visibility. On top of that, Gartner estimates that by 2019, 80% of enterprise traffic will be encrypted and 50% of attacks targeting enterprise will be hidden in encrypted traffic. FortiGate reduces complexity by integrating various point products into NGFW features with automated action and enhanced visibility into applications, users and network. FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance including encrypted cloud access. Attend this technical training workshop and gain hands-on experience fortifying the enterprise network with Fortinet NGFW solution.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: AI Driven Security Operations

FortiSOAR™ is a holistic and enterprise-built security orchestration and security automation workbench that empowers security operation teams. FortiSOAR™ increases a team’s effectiveness by increasing efficiency, allowing for response in near real time. In this session, you’ll learn how FortiSOAR™ takes your security operation team to the next level by automating the incident response process and facilitating collaboration, behind a single console to power it all.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: AI Driven Security Operations

Today, more than ever, businesses are measured by the value of their data. This includes product designs, patents, and corporate financial records. The most critical, and most valuable data, is the confidential information of your customers, including credentials, and credit cards. Secure access, including, transmission, processing, and storage of all of this sensitive data is critical to the success of any business. Failing to protect this information will not only cost a business in direct, immediate losses, but also in fines, legal liabilities, and an erosion of customer loyalty. To assist businesses with protecting this valuable information, the Payment Card Industry Data Security Standard (PCI DSS) was introduced. PCI DSS standards ensure that all businesses that accept payment card, or other e-commerce, transactions have the tools to securely accept, process, transmit, and store, this information in a secure environment. FortiWeb provides the tools and resources to address many specific requirements of PCI DSS compliance. Not only does FortiWeb provide the basic HTTP/HTTPS firewall functions, but also allows you to address areas such as secure access, data encryption during transmission, sensitive data masking, and vulnerability scanning. Machine Learning helps to ensure your applications are protected from Zero Day threats.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: Dynamic Cloud Security

Kubernetes, an open source container management system, has surged in popularity in the past several years and has been adopted by the largest enterprises in a wide range of industries. As organisations are increasingly deploying Kubernetes clusters in production environments, Kubernetes network security has become of paramount importance. Calico is an open source networking and network security solution for a broad range of platforms including Kubernetes, OpenShift, and Docker EE. It is trusted and running in production at large enterprises including SaaS providers, financial services companies, and manufacturers. The largest public cloud providers have selected Calico to provide network security for their hosted Kubernetes services (Amazon EKS, Azure AKS, Google GKE, and IBM IKS) running across tens of thousands of clusters. The Tigera (the company behind project Calico) and Fortinet joint solution extends firewalls to Kubernetes clusters. It will enable customers to enforce network security policies for traffic into and out of the Kubernetes cluster (North/South traffic) as well as traffic between pods within the cluster (East/West traffic). Attend this hands-on workshop to gain experience with basic and advanced networking and network security for Kubernetes. Additionally, you will gain hands-on experience deploying FortiManager and Calico Enterprise to protect Kubernetes clusters.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: Dynamic Cloud Security

In a public cloud environment like AWS, organisations are leaning towards multiple-VPC design to provide better segmentation between the different applications. When they want secure connectivity between the different applications and their on-premises network, they also look for a centralized security posture. While VPC peering and VPN connectivity to the on-premises network provide a solution, it gets cumbersome when the number of VPCs and branch offices increase. This drives a need for a solution which can simplify and secure the connectivity between multiple VPCs and on-premises network. Due to the increase in the number of web-based applications in AWS and the shared security responsibility model in the cloud, a scalable Web Application Firewall solution increases customer’s confidence to deploy in public cloud environment. Attend this technical workshop to gain hands-on experience to learn how Fortinet’s integration with Transit Gateway solves the need for secure connectivity between multiple VPCs and how Fortinet’s WAF solution protects customer’s web applications in a highly available manner with in-built fault tolerance that provides tight integration with AWS’s native tools.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: Security Driven Networking

Digital transformation is happening actively across Industries, as a result it also introduces advanced cybersecurity threats. Traditional security architectures are proving futile, and many organizations struggle to protect themselves because they lack the skills and resources to combat these threats. Fortinet provides a superior protection against these advanced threats with a Broad, Integrated and Automated approach with its Security Fabric. A key component of the Fabric is Management and Analytics, that’s used for effective security management. This Fast Track covers FortiManager and FortiAnalyzer, part of the Management and Analytics solution. In this Fast Track attendees will see how the solution provides powerful automation-ready single pane of glass management and visibility, advanced compliance reporting, and network-aware rapid response.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: AI Driven Security Operations
Did you know that many of the cutting edge AI-based technologies developed at Fortinet are making their way out of our research labs and into your organizations? Join us as we discuss the range of advanced security technologies - from mature (Sandbox) to emerging (UEBA, Deception and Deep Neural Networks/AI-based solution)- designed to combat advanced cyber threats. Receive expert guidance on when, where and why to consider each so that you can add the right automated, custom threat intelligence to your Security Fabric.
Session Category: Security Fabric
Do you struggle with multiple vendor products on your network that aren't integrated together? Are you concerned about the complexity of operating these tools? Fabric Management Center (FMC) a core part of the Fortinet Security Fabric simplifies operations by automating workflows across Operations teams. It comes with flexible deployment and pricing options for customers across segments – SMB, Mid-Market & Enterprises. Join us for this presentation to learn more about Fabric Management Center, covering: 1. Key Use Cases we see Customers across segments leverage 2. FortiManager & FortiAnalyzer – What’s New in 6.4 3. Customer Story around how FMC has helped in their deployment
Session Category: Security Fabric
Are you consolidating network management and security services to Fortinet’s Cloud-delivered Services? Learn how a Sigle Pane, Holistic Views and Deep, Scaled Functionality from FortiCloud and its associated portals can simplify and enhance the operation and management of your Fortinet Product and Service Eco-System.
Session Category: Zero Trust Network Access
With the proliferation of devices on the network and the movement of employees, vendors, and guests across networks, controlling who and what connects to your network is both more challenging and more important for maintaining security. Come learn how you can keep your network safe and secure from IoT devices, stolen passwords, and unpatched laptops. Know who and what is connecting and allow them policy-based, least-access privileges. Guest presenters will share real-world experiences with the solution.
Session Category: Security Driven Networking
Learn from your peers how they took control of their network edge and achieved simplification, cost reduction and cloud ready branches with Fortinet Secure SD-WAN. They share key takeaways from real world deployment to deliver best user experience, network visibility and security promise without compromising on performance with FortiGate as WAN edge appliances. Having addressed critical network and security challenges with Fortinet Secure SD-WAN, they focus on ROI with cost reduction of infrastructure by 3x, WAN cost by 30% and IT tickets by 90% across branch offices and datacenters. In addition to zero touch deployment, centralized configuration and provisioning, they highlight use cases on rapid network and security issue resolutions achieved with real-time and historical analytics on a single pane of glass visibility.
Session Category: Security Driven Networking
Driven by the need to build agile and cost-optimized IT infrastructure that can scale  in line with ever changing needs of application demands, organizations are building hyperscale application delivery architectures. Gartner estimates that by 2025, enterprise data centers will have five times more computational capacity per physical area (square feet) than today. Technologies such as Internet of Things (IoT), business intelligence (BI), are driving the need for continued innovation and pushing data center architectures further to their limits. Security need to keep pace, but traditional security appliances that are based on off-the-shelf hardware have become the Achilles' heel to inhibit growth of any business. In this session, you will learn, how enterprises and cloud providers can build security-driven hyper scale architectures with Fortinet’s SPU powered network firewalls to enable protected and optimized E-commerce services and delivery of elephant flows over secure backbones.
Session Category: Sponsors
Grupo Recoletas has 18 hospitals and health centers distributed in a tight geographic area. Hear how they deployed the Corsa Security-Fortinet integration to solve the challenge of 100% traffic inspection even for encrypted traffic. In this session, we will cover: 1. How Next Generation security features can all be used without impacting network performance, 2. Leveraging your Fortinet SSL/TLS inspection capabilities, 3. Easy steps to follow for network security virtualization
Session Category: Dynamic Cloud Security
As Enterprises and Service Providers increasingly adopt Private Cloud technologies to build compute infrastructures, virtual firewall solutions help apply consistent security across a variety of deployments. In this session you will learn how Private Cloud FortiGate VM enables key use cases such as segmentation, security automation and integrations with VMWare NSX/NSX-T as well as virtualized edge security. In addition to that you'll also get an overview of the latest in the FortiGate-VM Product line.
Session Category: Partner/Channel

Discover Fortinet Engage, our brand new partner program which will take our relationship to the next level. This is a must-attend session to understand how it will support your growth by leveraging new Fortinet consumption models enabling you to capitalize on existing customers and land new ones. Find out about the flexible options that will suit your business.

Session Category: Sponsors

Learn how to grow your Business leveraging AWS - In this presentation, Amazon Web Services (AWS), the world’s most comprehensive and broadly adopted cloud platform, will discuss the advantages of Cloud and use cases that power customers infrastructure, make them more agile and lower costs. You will learn about the Shared Security Responsibility Model, the areas AWS provides security of the Cloud, what customers are responsible for in the cloud and where partners can drive additional value-add to solve these customer challenges. We will discuss the AWS Partner Network [APN] and market opportunity, how you can become a partner, and how you leverage the AWS Marketplace to transform your business and monetize on Cloud opportunities with specific use cases. Additionally, we will provide technical use cases on the various integrations Fortinet has on AWS to help drive enterprise customer adoption and their journey to the Cloud.

Session Category: Security Fabric

Fortinet understands the challenges that customers face in maintaining visibility and automated control over their network as the threat and risk landscape changes. The Fortinet Security Fabric delivers key capabilities to protect your organization. In this session, we will dive into best practices and approaches to help our customers safeguard their organizations and mitigate risks.

Session Category: Verticals

The financial services industry continues its radical shift in business models due to digital transformation. As a result, new cybersecurity models, tools, and architectures are required. In this interactive panel session, learn how two leading Financial Services firms are implementing Secure SD-WAN and Internal Network Segmentation respectively to enable new business advantage, optimize costs, and deliver enhanced efficiency.

Session Category: Zero Trust Network Access
Join this session to learn how to leverage FortiClient Fabric Agent as part of your Zero-trust network access strategy and to gain visibility, control as well as secure access for users everywhere including the remote, roaming and branch users. Plus, learn how Fabric Agent can activate your internal segmentation strategy down to the endpoints.
Session Category: Dynamic Cloud Security
Modern applications require more than basic Web Application Firewall (WAF) controls. The increasing use of Web applications and APIs to deliver mission-critical business capabilities creates an ever-evolving attack surface that must be defended. In this session, we will look at how FortiWeb's advanced threat detection capabilities, enhanced with Machine Learning to automatically adapt to the real world behavior of your application and your users, protect the mission-critical Web applications that your organization depends on.
Session Category: Security Driven Networking
Branch locations are tough to manage remotely while keeping them secure. The good news is that customers deploying Secure SD-WAN now have the opportunity to extend that security and management into the network of branch locations that lack IT staff. Learn how the Fortinet Secure SD-Branch solution improves the security of the branch network while also making it easier to deploy, configure, and manage. Guest presenters will share real-world experiences with the solution.
Session Category: AI Driven Security Operations
How do I automate monitoring and response among Fortinet products? Can I extend that automation to multivendor environments? What options do I have for orchestration as well as automation? Join us as we discuss how organizations at all stages of security maturity can take advantage of Security Orchestration, Automation and Response capabilities to ease the burden on IT and SOC teams while improving risk management with the help of FortiAnalyzer, FortiSIEM and FortiSOAR.
Session Category: Verticals
Managed SD-WAN service is the fastest growing area in network services, growing at 76% CAGR. In this session, you will learn about managed SD-WAN services market opportunity and key service provider requirements. We will share the key challenges organizations are looking to address and get deeper insights into how to pick the right SD-WAN solution for providing managed services. You will learn how Fortinet Secure SD-WAN provides a smart connectivity platform to deliver differentiated value-add services at scale.
Session Category: Dynamic Cloud Security
As Gartner notes in their 2019 Market Guide for Email Security, "Security and risk management (SRM) leaders must revisit their organizations’ email security architecture in the light of current email threats." In this session we will look at the primary customer challenges and best practice solutions including advanced threats like ransomware, phishing, business email compromise and more; the move to cloud email systems like Microsoft Office 365 and Google G-suite; data privacy in compliance with industry regulations such as PCI, HIPAA, GDPR and similar.
Session Category: Partner/Channel

Securing renewal business allows you to increase your customer retention and improve the customer journey. Attendees will learn how to best identify the business and leverage the opportunities to upsell and cross-sell with Fortinet solutions.

Note: This session is located outside the CCIB at the Hilton Hotel (adjacent to the CCIB). Ballroom A - Ground Floor. 

Session Category: Partner/Channel

The new Fortinet Engage Partner Program allows you to choose your go-to-market approach. During this session, we'll deep-dive into the new MSSP opportunity, what the requirements and benefits are, trends and market opportunities, flexible and profitable service models, capabilities to build and expand differentiated service offerings and how you can leverage it to grow your business.

Session Category: Zero Trust Network Access

Endpoints are frequently the target of initial compromise or attacks. One recent study found that 30% of breaches involved malware being installed on endpoints. Fortinet strengthens endpoint security through integrated visibility, control, and proactive defense. With the ability to discover, monitor, and assess endpoint risks, you can ensure endpoint compliance, mitigate risks, and reduce exposure. FortiClient is more than advanced endpoint protection. As an integrated agent, FortiClient contains three key modules; Fabric Agent for security Fabric connectivity, the endpoint security modules and the secure remote access modules. Fabric Agent shares endpoint telemetry with the Security Fabric and delivers broad endpoint visibility, compliance control and vulnerability management. It provides advanced endpoint protection with pattern-based anti-malware, behavior-based exploit protection, web-filtering, and an application firewall. FortiClient natively integrates with FortiSandbox to detect zero-day threats and custom malware. FortiClient also provides secure remote access with built-in VPN, single-sign-on, and two-factor authentication for added security. FortiEDR (enSilo) is a next-gen endpoint security solution that packs a broad set of EDR capabilities with easy deployment and use. FortiEDR offers certified NGAV, automated EDR, threat hunting, forensics and virtual patching capabilities all in one single agent to prevent breaches and comply with regulations like PCI/DSS and HIPAA. The lightweight agent is managed by an easy-to-use management console for pre and post infection capabilities. FortiEDR features multi-tenant management in the cloud, on-premise, and hybrid. Attend this technical training workshop to gain hands-on experience controlling endpoints using Fortinet Advanced Endpoint Protection tools in mixed Windows & Linux environments and see first-hand how these solutions integrate with the Fortinet Security Fabric to protect your company’s critical assets.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: Security Driven Networking

As organizations transition to a digital business model, their network topologies are significantly impacted. The adoption of cloud services, the virtualization of the traditional network, and an increasingly mobile workforce accessing applications in the cloud are accelerating advancements in wide area networking technologies. The traditional wide area network (WAN) is struggling to keep up because it relies on a static infrastructure of devices that simply can't accommodate shifting, and often temporary resource allocation and workloads. Attend this technical training workshop to learn how software-defined networking (SDN) applies to software control of wide area networks in an enterprise environment. Gain hands-on experience through actual configuration of virtualized products supporting WAN aggregation, both directly configuring the FortiGates, as well as doing the configurations remotely through FortiManager.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: Zero Trust Network Access

Enterprise networking and security teams are struggling with evolving their WAN and branch office IT architecture to support digital transformation. A typical branch office consists of multiple point products creating both security and complexity challenges. IT teams are looking to consolidate these point products to increase agility and save money, while improving the security and visibility of network access at the branch office. Fortinet’s secure access architecture powered by FortiLink is uniquely suited to SD-Branch deployments with ethernet switch and wireless access point management built into the same platform that drives our Secure SD-WAN solution, the FortiGate and FortiOS. Come learn how this common platform enables you to have all of the compelling features of Fortinet’s SD-WAN extended directly to branch network access through FortiSwitch, FortiAP and FortiLink, including global security policies enforced by an industry leading security platform in FortiGate.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: AI Driven Security Operations

With a dynamic attack surface due to the rise of IoT and cloud services, it's clear that no single technology will be able to stop every threat. To protect your enterprise against sophisticated threats, it is important to establish a comprehensive and cohesive security infrastructure that is broad enough to cover all attack vectors, powerful enough to run the latest security technologies, and automated to keep pace with fast-moving attacks. Attend this hands-on technical training workshop to learn how to detect and analyze advanced threats with FortiSandbox.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: AI Driven Security Operations

Today, more than ever, businesses are measured by the value of their data. This includes product designs, patents, and corporate financial records. The most critical, and most valuable data, is the confidential information of your customers, including credentials, and credit cards. Secure access, including, transmission, processing, and storage of all of this sensitive data is critical to the success of any business. Failing to protect this information will not only cost a business in direct, immediate losses, but also in fines, legal liabilities, and an erosion of customer loyalty. To assist businesses with protecting this valuable information, the Payment Card Industry Data Security Standard (PCI DSS) was introduced. PCI DSS standards ensure that all businesses that accept payment card, or other e-commerce, transactions have the tools to securely accept, process, transmit, and store, this information in a secure environment. FortiWeb provides the tools and resources to address many specific requirements of PCI DSS compliance. Not only does FortiWeb provide the basic HTTP/HTTPS firewall functions, but also allows you to address areas such as secure access, data encryption during transmission, sensitive data masking, and vulnerability scanning. Machine Learning helps to ensure your applications are protected from Zero Day threats.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: Security Driven Networking

As security architects consider how to provide comprehensive threat protection for their enterprises, including intrusion prevention, web filtering, anti-malware and application control, they face a major complexity hurdle managing these point products with no integration and lack of visibility. On top of that, Gartner estimates that by 2019, 80% of enterprise traffic will be encrypted and 50% of attacks targeting enterprise will be hidden in encrypted traffic. FortiGate reduces complexity by integrating various point products into NGFW features with automated action and enhanced visibility into applications, users and network. FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance including encrypted cloud access. Attend this technical training workshop and gain hands-on experience fortifying the enterprise network with Fortinet NGFW solution.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: AI Driven Security Operations

FortiSOAR™ is a holistic and enterprise-built security orchestration and security automation workbench that empowers security operation teams. FortiSOAR™ increases a team’s effectiveness by increasing efficiency, allowing for response in near real time. In this session, you’ll learn how FortiSOAR™ takes your security operation team to the next level by automating the incident response process and facilitating collaboration, behind a single console to power it all.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: AI Driven Security Operations

Cyberattacks are a 24/7 reality. The complexity and growth of the enterprise estate – Infrastructure, Applications, VM’s, Cloud, Endpoints and IoT means the attack surface grows exponentially. Coupled with a skills shortage, and resource constraints, security becomes everybody’s problem but visibility, event correlation and remediation are other people’s responsibility. Effective security requires visibility – all the devices, all the infrastructure in realtime – but also with context – what devices represent a threat, what is their capability so you manage the threat the business faces, not the noise multiple security tools create. FortiSIEM - Fortinet’s Multivendor Security Incident and Events Management solution brings it all together by integrating NOC-SOC Solutions to Automate IT Processes and Security Responses. Visibility, Correlation, Automated Response and Remediation in a single, scalable solution. Using a FortiSIEM, the complexity of managing network and security operations is reduced, freeing resources, improving breach detection. Worldwide 80% of breaches go undetected because of skills shortage and event information ‘noise’. FortiSIEM provides the cross correlation, applies machine learning and UEBA to improve response, to stop breaches before they occur. Use this Hands-on technical training to familiarize yourself with the Powerful Security Incident and Event Management capabilities of a FortiSIEM.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: Zero Trust Network Access

The proliferation of Internet of Things (IoT) devices, has made it necessary for organizations to improve their visibility into what is attached to their networks. They need to know every device and every user accessing their networks. IoT devices enable digital transformation initiatives and improve efficiency, flexibility, and optimization. However, they are inherently untrustworthy, with designs that prioritize low-cost over security. FortiNAC provides the network visibility to see everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses. Attend this technical training workshop to gain hands-on experience configuring FortiNAC to secure IoT devices within the Fortinet Security Fabric.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: Security Driven Networking

Email is a critical tool for businesses. But it’s also a preferred delivery method for ransomware, phishing, and compromise attacks. According to the 2018 Verizon report, 49% of (non-POS) malware was installed via malicious email. Gartner asserts that "Advanced threats (such as ransomware and business email compromise) are easily the signature-based and reputation-based prevention mechanisms that a secure email gateway (SEG) has traditionally used. FortiMail replaces incumbent secure email gateways with a product tailored for advanced threat defense. FortiMail email security shields users, and ultimately data, from a wide range of cyber threats. These include: ever growing volumes of unwanted spam, socially-engineered phishing and business email compromise, accelerating variants of ransomware and other malware, increasingly targeted attacks from adversaries of all kinds, and more. At the same time, FortiMail can be used to protect sensitive data of all types, reducing the risk of inadvertent loss and/or non-compliance with regulations like HIPAA, PCI, GDPR, and more. Attend this technical training workshop and gain hands-on experience protecting your organization against phishing, spam, malware and advanced targeted attacks via email.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: Dynamic Cloud Security

Organizations are increasingly deploying a variety of workloads across multiple clouds. In turn, business-critical data and services are increasingly scattered across this distributed infrastructure. Using the shared responsibility model as a guiding principle, enterprises rely on cloud providers to protect the network, storage, and computing layers, while enterprises own the security. This drives a need for solutions that complement traditional physical appliance form factors which provide visibility and maintain consistent security policy as workloads, users and data migrate to more agile, elastic, and virtualized infrastructure. Attend this technical training workshop and gain hands-on experience configuring virtual NGFWs and Application Gateways utilizing Fortinet products to protect public cloud resources.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: AI Driven Security Operations
We know that the broad attack surface, accelerating threat landscape and proliferation of security products makes it difficult for the SOC teams to keep up with the required investigation and response to security-related alerts; especially give the shortage of cyber security skills in the industry. As Gartner notes in their 2019 Market Guide, Security Orchestration Automation & Response (SOAR) tools significantly enhance security operations activities like threat detection and response by providing machine-powered assistance to human analysts to improve the efficiency and consistency of people and processes. Join us in this session, to learn more around: How Fortinet addresses SOAR for the Security Fabric Fortinet’s standalone SOAR offering for mature SOC teams Customer story for Fortinet’s standalone SOAR offering
Session Category: Verticals
The coming of 5G is exciting and promising for both Mobile Network Operators (MNOs) and Enterprises. 5G deploys new technologies and capabilities that enable new industry and vertical use cases for enterprises. These will drive innovation and growth for both the enterprise and the MNO. In the wake of the 5G era, security has even a bigger and more important role to play is securing and enabling these new capabilities and use cases. This session will provide an introduction to the role security plays in 5G use cases and technology as a business enabler and a revenue generator.
Session Category: AI Driven Security Operations
Advanced attacks typically take only minutes if not seconds to infect and compromise your endpoints. While the first generation EDR tools can improve time to detection, they generate too many alerts and requires manual response, driving up security operations cost and have other negative impact on business. With the recent acquisition of enSilo, Fortinet is introducing the new advanced endpoint protection with EDR. Join this session to learn how FortiEDR (enSilo) can help you stop the breach in real time, automatically and efficiently, without the alert fatigue and other pain associated with first generation manual EDR.
Session Category: Security Driven Networking
Fortinet pioneered Secure SD-WAN and now marked as the fastest growing SD-WAN vendor among 60 vendors in the industry with its unique security-driven networking approach of combining best of breed SD-WAN, Next Generation Firewall and Advance routing in one powerful offering. We are excited to announce new innovations in WAN Edge, Orchestration and SD-WAN ASIC to enable best user and application experience with best security posture. The “Power of one” with FortiGate WAN Edge is already at your fingertips – take advantage of them today.
Session Category: Sponsors

Digital Transformation is accelerating with AI, Blockchain, IoT, 5G and other exponentially growing technologies.  Very popular is the notion of the 4.0 Industrial Revolution. While mainly used in the context of the Industrial Sector, its impact spans across many industries, especially where Services are at the center of business. This session discusses Digitalization and Technology Innovations like Augmented Reality, Blockchain, 5G and others related to the future of expertise.

Session Category: Dynamic Cloud Security
Fortinet is the Cloud Security Vendor of choice to thousands of customers worldwide. In this session we will briefly review Fortinet's Unique Cloud Security Strategy and Offerings and offer a fresh view into best practices for securing cloud based infrastructures and workloads. we will match solution capabilities to known cloud security frameworks and identify functional and operational -not so obvious- areas customers must address protecting their cloud data and applications. Workload Protection, Intrusion Detection, CSPM, Distributed Cloud SD-WAN.
Session Category: Security Fabric
The Fortinet Security Fabric delivers Broad, Integrated, and Automated capabilities to provide customers with end-to-end protection and operational efficiencies across their network. Find out how the Fortinet Security Fabric just got better with FortiOS 6.4.
Session Category: Partner/Channel

Small business continues to be Fortinet’s backbone and has been since the beginning. Partners targeting small business customers are invited to discover the small business market opportunities to grow in EMEA. Get inspired by our CISO bureau speakers and learn more about the market trends and tendencies along with the complex threats that we will all face in the future.

Note: This session is located outside the CCIB at the Hilton Hotel (adjacent to the CCIB). Ballroom B/C - Ground Floor.

Session Category: Zero Trust Network Access

Endpoints are frequently the target of initial compromise or attacks. One recent study found that 30% of breaches involved malware being installed on endpoints. Fortinet strengthens endpoint security through integrated visibility, control, and proactive defense. With the ability to discover, monitor, and assess endpoint risks, you can ensure endpoint compliance, mitigate risks, and reduce exposure. FortiClient is more than advanced endpoint protection. As an integrated agent, FortiClient contains three key modules; Fabric Agent for security Fabric connectivity, the endpoint security modules and the secure remote access modules. Fabric Agent shares endpoint telemetry with the Security Fabric and delivers broad endpoint visibility, compliance control and vulnerability management. It provides advanced endpoint protection with pattern-based anti-malware, behavior-based exploit protection, web-filtering, and an application firewall. FortiClient natively integrates with FortiSandbox to detect zero-day threats and custom malware. FortiClient also provides secure remote access with built-in VPN, single-sign-on, and two-factor authentication for added security. FortiEDR (enSilo) is a next-gen endpoint security solution that packs a broad set of EDR capabilities with easy deployment and use. FortiEDR offers certified NGAV, automated EDR, threat hunting, forensics and virtual patching capabilities all in one single agent to prevent breaches and comply with regulations like PCI/DSS and HIPAA. The lightweight agent is managed by an easy-to-use management console for pre and post infection capabilities. FortiEDR features multi-tenant management in the cloud, on-premise, and hybrid. Attend this technical training workshop to gain hands-on experience controlling endpoints using Fortinet Advanced Endpoint Protection tools in mixed Windows & Linux environments and see first-hand how these solutions integrate with the Fortinet Security Fabric to protect your company’s critical assets.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: Zero Trust Network Access

The proliferation of Internet of Things (IoT) devices, has made it necessary for organizations to improve their visibility into what is attached to their networks. They need to know every device and every user accessing their networks. IoT devices enable digital transformation initiatives and improve efficiency, flexibility, and optimization. However, they are inherently untrustworthy, with designs that prioritize low-cost over security. FortiNAC provides the network visibility to see everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses. Attend this technical training workshop to gain hands-on experience configuring FortiNAC to secure IoT devices within the Fortinet Security Fabric.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: Security Driven Networking

As security architects consider how to provide comprehensive threat protection for their enterprises, including intrusion prevention, web filtering, anti-malware and application control, they face a major complexity hurdle managing these point products with no integration and lack of visibility. On top of that, Gartner estimates that by 2019, 80% of enterprise traffic will be encrypted and 50% of attacks targeting enterprise will be hidden in encrypted traffic. FortiGate reduces complexity by integrating various point products into NGFW features with automated action and enhanced visibility into applications, users and network. FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance including encrypted cloud access. Attend this technical training workshop and gain hands-on experience fortifying the enterprise network with Fortinet NGFW solution.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: AI Driven Security Operations

With a dynamic attack surface due to the rise of IoT and cloud services, it's clear that no single technology will be able to stop every threat. To protect your enterprise against sophisticated threats, it is important to establish a comprehensive and cohesive security infrastructure that is broad enough to cover all attack vectors, powerful enough to run the latest security technologies, and automated to keep pace with fast-moving attacks. Attend this hands-on technical training workshop to learn how to detect and analyze advanced threats with FortiSandbox.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: Zero Trust Network Access

Enterprise networking and security teams are struggling with evolving their WAN and branch office IT architecture to support digital transformation. A typical branch office consists of multiple point products creating both security and complexity challenges. IT teams are looking to consolidate these point products to increase agility and save money, while improving the security and visibility of network access at the branch office. Fortinet’s secure access architecture powered by FortiLink is uniquely suited to SD-Branch deployments with ethernet switch and wireless access point management built into the same platform that drives our Secure SD-WAN solution, the FortiGate and FortiOS. Come learn how this common platform enables you to have all of the compelling features of Fortinet’s SD-WAN extended directly to branch network access through FortiSwitch, FortiAP and FortiLink, including global security policies enforced by an industry leading security platform in FortiGate.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: Security Driven Networking

Email is a critical tool for businesses. But it’s also a preferred delivery method for ransomware, phishing, and compromise attacks. According to the 2018 Verizon report, 49% of (non-POS) malware was installed via malicious email. Gartner asserts that "Advanced threats (such as ransomware and business email compromise) are easily the signature-based and reputation-based prevention mechanisms that a secure email gateway (SEG) has traditionally used. FortiMail replaces incumbent secure email gateways with a product tailored for advanced threat defense. FortiMail email security shields users, and ultimately data, from a wide range of cyber threats. These include: ever growing volumes of unwanted spam, socially-engineered phishing and business email compromise, accelerating variants of ransomware and other malware, increasingly targeted attacks from adversaries of all kinds, and more. At the same time, FortiMail can be used to protect sensitive data of all types, reducing the risk of inadvertent loss and/or non-compliance with regulations like HIPAA, PCI, GDPR, and more. Attend this technical training workshop and gain hands-on experience protecting your organization against phishing, spam, malware and advanced targeted attacks via email.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: AI Driven Security Operations

Cyberattacks are a 24/7 reality. The complexity and growth of the enterprise estate – Infrastructure, Applications, VM’s, Cloud, Endpoints and IoT means the attack surface grows exponentially. Coupled with a skills shortage, and resource constraints, security becomes everybody’s problem but visibility, event correlation and remediation are other people’s responsibility. Effective security requires visibility – all the devices, all the infrastructure in realtime – but also with context – what devices represent a threat, what is their capability so you manage the threat the business faces, not the noise multiple security tools create. FortiSIEM - Fortinet’s Multivendor Security Incident and Events Management solution brings it all together by integrating NOC-SOC Solutions to Automate IT Processes and Security Responses. Visibility, Correlation, Automated Response and Remediation in a single, scalable solution. Using a FortiSIEM, the complexity of managing network and security operations is reduced, freeing resources, improving breach detection. Worldwide 80% of breaches go undetected because of skills shortage and event information ‘noise’. FortiSIEM provides the cross correlation, applies machine learning and UEBA to improve response, to stop breaches before they occur. Use this Hands-on technical training to familiarize yourself with the Powerful Security Incident and Event Management capabilities of a FortiSIEM.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: AI Driven Security Operations

FortiSOAR™ is a holistic and enterprise-built security orchestration and security automation workbench that empowers security operation teams. FortiSOAR™ increases a team’s effectiveness by increasing efficiency, allowing for response in near real time. In this session, you’ll learn how FortiSOAR™ takes your security operation team to the next level by automating the incident response process and facilitating collaboration, behind a single console to power it all.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: Dynamic Cloud Security

Organizations are increasingly deploying a variety of workloads across multiple clouds. In turn, business-critical data and services are increasingly scattered across this distributed infrastructure. Using the shared responsibility model as a guiding principle, enterprises rely on cloud providers to protect the network, storage, and computing layers, while enterprises own the security. This drives a need for solutions that complement traditional physical appliance form factors which provide visibility and maintain consistent security policy as workloads, users and data migrate to more agile, elastic, and virtualized infrastructure. Attend this technical training workshop and gain hands-on experience configuring virtual NGFWs and Application Gateways utilizing Fortinet products to protect public cloud resources.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: AI Driven Security Operations

Today, more than ever, businesses are measured by the value of their data. This includes product designs, patents, and corporate financial records. The most critical, and most valuable data, is the confidential information of your customers, including credentials, and credit cards. Secure access, including, transmission, processing, and storage of all of this sensitive data is critical to the success of any business. Failing to protect this information will not only cost a business in direct, immediate losses, but also in fines, legal liabilities, and an erosion of customer loyalty. To assist businesses with protecting this valuable information, the Payment Card Industry Data Security Standard (PCI DSS) was introduced. PCI DSS standards ensure that all businesses that accept payment card, or other e-commerce, transactions have the tools to securely accept, process, transmit, and store, this information in a secure environment. FortiWeb provides the tools and resources to address many specific requirements of PCI DSS compliance. Not only does FortiWeb provide the basic HTTP/HTTPS firewall functions, but also allows you to address areas such as secure access, data encryption during transmission, sensitive data masking, and vulnerability scanning. Machine Learning helps to ensure your applications are protected from Zero Day threats.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: Security Driven Networking

As organizations transition to a digital business model, their network topologies are significantly impacted. The adoption of cloud services, the virtualization of the traditional network, and an increasingly mobile workforce accessing applications in the cloud are accelerating advancements in wide area networking technologies. The traditional wide area network (WAN) is struggling to keep up because it relies on a static infrastructure of devices that simply can't accommodate shifting, and often temporary resource allocation and workloads. Attend this technical training workshop to learn how software-defined networking (SDN) applies to software control of wide area networks in an enterprise environment. Gain hands-on experience through actual configuration of virtualized products supporting WAN aggregation, both directly configuring the FortiGates, as well as doing the configurations remotely through FortiManager.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: Security Driven Networking

Digital transformation is happening actively across Industries, as a result it also introduces advanced cybersecurity threats. Traditional security architectures are proving futile, and many organizations struggle to protect themselves because they lack the skills and resources to combat these threats. Fortinet provides a superior protection against these advanced threats with a Broad, Integrated and Automated approach with its Security Fabric. A key component of the Fabric is Management and Analytics, that’s used for effective security management. This Fast Track covers FortiManager and FortiAnalyzer, part of the Management and Analytics solution. In this Fast Track attendees will see how the solution provides powerful automation-ready single pane of glass management and visibility, advanced compliance reporting, and network-aware rapid response.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: Dynamic Cloud Security

Kubernetes, an open source container management system, has surged in popularity in the past several years and has been adopted by the largest enterprises in a wide range of industries. As organisations are increasingly deploying Kubernetes clusters in production environments, Kubernetes network security has become of paramount importance. Calico is an open source networking and network security solution for a broad range of platforms including Kubernetes, OpenShift, and Docker EE. It is trusted and running in production at large enterprises including SaaS providers, financial services companies, and manufacturers. The largest public cloud providers have selected Calico to provide network security for their hosted Kubernetes services (Amazon EKS, Azure AKS, Google GKE, and IBM IKS) running across tens of thousands of clusters. The Tigera (the company behind project Calico) and Fortinet joint solution extends firewalls to Kubernetes clusters. It will enable customers to enforce network security policies for traffic into and out of the Kubernetes cluster (North/South traffic) as well as traffic between pods within the cluster (East/West traffic). Attend this hands-on workshop to gain experience with basic and advanced networking and network security for Kubernetes. Additionally, you will gain hands-on experience deploying FortiManager and Calico Enterprise to protect Kubernetes clusters.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: Dynamic Cloud Security

In a public cloud environment like AWS, organisations are leaning towards multiple-VPC design to provide better segmentation between the different applications. When they want secure connectivity between the different applications and their on-premises network, they also look for a centralized security posture. While VPC peering and VPN connectivity to the on-premises network provide a solution, it gets cumbersome when the number of VPCs and branch offices increase. This drives a need for a solution which can simplify and secure the connectivity between multiple VPCs and on-premises network. Due to the increase in the number of web-based applications in AWS and the shared security responsibility model in the cloud, a scalable Web Application Firewall solution increases customer’s confidence to deploy in public cloud environment. Attend this technical workshop to gain hands-on experience to learn how Fortinet’s integration with Transit Gateway solves the need for secure connectivity between multiple VPCs and how Fortinet’s WAF solution protects customer’s web applications in a highly available manner with in-built fault tolerance that provides tight integration with AWS’s native tools.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: Partner/Channel

Learn more about Fortinet’s SMB positioning in EMEA and how Fortinet continues to lead the SB market. Get a bigger piece of the pie with the new dedicated program that will support your growth and that is adapted to your MSSP and Cloud aspirations.

Note: This session is located outside the CCIB at the Hilton Hotel (adjacent to the CCIB). Ballroom B/C - Ground Floor. 

Session Category: Security Fabric

Do you struggle with multiple vendor products on your network that aren't integrated together? Are you concerned about the complexity of operating these tools? Fabric Management Center (FMC) a core part of the Fortinet Security Fabric simplifies operations by automating workflows across Operations teams. It comes with flexible deployment and pricing options for customers across segments – SMB, Mid-Market & Enterprises. Join us for this presentation to learn more about Fabric Management Center, covering: 1. Key Use Cases we see Customers across segments leverage 2. FortiManager & FortiAnalyzer – What’s New in 6.4 3. Customer Story around how FMC has helped in their deployment

Session Category: Dynamic Cloud Security

As Enterprises and Service Providers increasingly adopt Private Cloud technologies to build compute infrastructures, virtual firewall solutions help apply consistent security across a variety of deployments. In this session you will learn how Private Cloud FortiGate VM enables key use cases such as segmentation, security automation and integrations with VMWare NSX/NSX-T as well as virtualized edge security. In addition to that you'll also get an overview of the latest in the FortiGate-VM Product line.

Session Category: AI Driven Security Operations
Did you know that many of the cutting edge AI-based technologies developed at Fortinet are making their way out of our research labs and into your organizations? Join us as we discuss the range of advanced security technologies - from mature (Sandbox) to emerging (UEBA, Deception and Deep Neural Networks/AI-based solution)- designed to combat advanced cyber threats. Receive expert guidance on when, where and why to consider each so that you can add the right automated, custom threat intelligence to your Security Fabric.
Session Category: Security Driven Networking
Driven by the need to build agile and cost-optimized IT infrastructure that can scale  in line with ever changing needs of application demands, organizations are building hyperscale application delivery architectures. Gartner estimates that by 2025, enterprise data centers will have five times more computational capacity per physical area (square feet) than today. Technologies such as Internet of Things (IoT), business intelligence (BI), are driving the need for continued innovation and pushing data center architectures further to their limits. Security need to keep pace, but traditional security appliances that are based on off-the-shelf hardware have become the Achilles' heel to inhibit growth of any business. In this session, you will learn, how enterprises and cloud providers can build security-driven hyper scale architectures with Fortinet’s SPU powered network firewalls to enable protected and optimized E-commerce services and delivery of elephant flows over secure backbones.
Session Category: Zero Trust Network Access
With the proliferation of devices on the network and the movement of employees, vendors, and guests across networks, controlling who and what connects to your network is both more challenging and more important for maintaining security. Come learn how you can keep your network safe and secure from IoT devices, stolen passwords, and unpatched laptops. Know who and what is connecting and allow them policy-based, least-access privileges. Guest presenters will share real-world experiences with the solution.
Session Category: Security Driven Networking
Learn from your peers how they took control of their network edge and achieved simplification, cost reduction and cloud ready branches with Fortinet Secure SD-WAN. They share key takeaways from real world deployment to deliver best user experience, network visibility and security promise without compromising on performance with FortiGate as WAN edge appliances. Having addressed critical network and security challenges with Fortinet Secure SD-WAN, they focus on ROI with cost reduction of infrastructure by 3x, WAN cost by 30% and IT tickets by 90% across branch offices and datacenters. In addition to zero touch deployment, centralized configuration and provisioning, they highlight use cases on rapid network and security issue resolutions achieved with real-time and historical analytics on a single pane of glass visibility.
Session Category: Security Fabric
Are you consolidating network management and security services to Fortinet’s Cloud-delivered Services? Learn how a Sigle Pane, Holistic Views and Deep, Scaled Functionality from FortiCloud and its associated portals can simplify and enhance the operation and management of your Fortinet Product and Service Eco-System.
Session Category: Dynamic Cloud Security
As Gartner notes in their 2019 Market Guide for Email Security, "Security and risk management (SRM) leaders must revisit their organizations’ email security architecture in the light of current email threats." In this session we will look at the primary customer challenges and best practice solutions including advanced threats like ransomware, phishing, business email compromise and more; the move to cloud email systems like Microsoft Office 365 and Google G-suite; data privacy in compliance with industry regulations such as PCI, HIPAA, GDPR and similar.
Session Category: AI Driven Security Operations
How do I automate monitoring and response among Fortinet products? Can I extend that automation to multivendor environments? What options do I have for orchestration as well as automation? Join us as we discuss how organizations at all stages of security maturity can take advantage of Security Orchestration, Automation and Response capabilities to ease the burden on IT and SOC teams while improving risk management with the help of FortiAnalyzer, FortiSIEM and FortiSOAR.
Session Category: Verticals
Managed SD-WAN service is the fastest growing area in network services, growing at 76% CAGR. In this session, you will learn about managed SD-WAN services market opportunity and key service provider requirements. We will share the key challenges organizations are looking to address and get deeper insights into how to pick the right SD-WAN solution for providing managed services. You will learn how Fortinet Secure SD-WAN provides a smart connectivity platform to deliver differentiated value-add services at scale.
Session Category: Verticals
Although OT is most frequently associated with manufacturing and critical infrastructure, it also has a presence in a number of different verticals. This session, in the form of a panel discussion, will look at the role of OT across vertical markets.
Session Category: Zero Trust Network Access
Join this session to learn how to leverage FortiClient Fabric Agent as part of your Zero-trust network access strategy and to gain visibility, control as well as secure access for users everywhere including the remote, roaming and branch users. Plus, learn how Fabric Agent can activate your internal segmentation strategy down to the endpoints.
Session Category: Security Fabric

Fortinet understands the challenges that customers face in maintaining visibility and automated control over their network as the threat and risk landscape changes. The Fortinet Security Fabric delivers key capabilities to protect your organization. In this session, we will dive into best practices and approaches to help our customers safeguard their organizations and mitigate risks.

Session Category: Security Driven Networking
Branch locations are tough to manage remotely while keeping them secure. The good news is that customers deploying Secure SD-WAN now have the opportunity to extend that security and management into the network of branch locations that lack IT staff. Learn how the Fortinet Secure SD-Branch solution improves the security of the branch network while also making it easier to deploy, configure, and manage. Guest presenters will share real-world experiences with the solution.
Session Category: Dynamic Cloud Security
Modern applications require more than basic Web Application Firewall (WAF) controls. The increasing use of Web applications and APIs to deliver mission-critical business capabilities creates an ever-evolving attack surface that must be defended. In this session, we will look at how FortiWeb's advanced threat detection capabilities, enhanced with Machine Learning to automatically adapt to the real world behavior of your application and your users, protect the mission-critical Web applications that your organization depends on.
Session Category: Partner/Channel

The new Fortinet Engage Partner Program allows you to choose your go-to-market approach. During this session, we'll deep-dive into the new Marketplace opportunity, what the requirements and benefits are and how you can leverage it to grow your business.

Session Category: Zero Trust Network Access

The proliferation of Internet of Things (IoT) devices, has made it necessary for organizations to improve their visibility into what is attached to their networks. They need to know every device and every user accessing their networks. IoT devices enable digital transformation initiatives and improve efficiency, flexibility, and optimization. However, they are inherently untrustworthy, with designs that prioritize low-cost over security. FortiNAC provides the network visibility to see everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses. Attend this technical training workshop to gain hands-on experience configuring FortiNAC to secure IoT devices within the Fortinet Security Fabric.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: AI Driven Security Operations

Today, more than ever, businesses are measured by the value of their data. This includes product designs, patents, and corporate financial records. The most critical, and most valuable data, is the confidential information of your customers, including credentials, and credit cards. Secure access, including, transmission, processing, and storage of all of this sensitive data is critical to the success of any business. Failing to protect this information will not only cost a business in direct, immediate losses, but also in fines, legal liabilities, and an erosion of customer loyalty. To assist businesses with protecting this valuable information, the Payment Card Industry Data Security Standard (PCI DSS) was introduced. PCI DSS standards ensure that all businesses that accept payment card, or other e-commerce, transactions have the tools to securely accept, process, transmit, and store, this information in a secure environment. FortiWeb provides the tools and resources to address many specific requirements of PCI DSS compliance. Not only does FortiWeb provide the basic HTTP/HTTPS firewall functions, but also allows you to address areas such as secure access, data encryption during transmission, sensitive data masking, and vulnerability scanning. Machine Learning helps to ensure your applications are protected from Zero Day threats.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: Zero Trust Network Access

Enterprise networking and security teams are struggling with evolving their WAN and branch office IT architecture to support digital transformation. A typical branch office consists of multiple point products creating both security and complexity challenges. IT teams are looking to consolidate these point products to increase agility and save money, while improving the security and visibility of network access at the branch office. Fortinet’s secure access architecture powered by FortiLink is uniquely suited to SD-Branch deployments with ethernet switch and wireless access point management built into the same platform that drives our Secure SD-WAN solution, the FortiGate and FortiOS. Come learn how this common platform enables you to have all of the compelling features of Fortinet’s SD-WAN extended directly to branch network access through FortiSwitch, FortiAP and FortiLink, including global security policies enforced by an industry leading security platform in FortiGate.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: Dynamic Cloud Security

Organizations are increasingly deploying a variety of workloads across multiple clouds. In turn, business-critical data and services are increasingly scattered across this distributed infrastructure. Using the shared responsibility model as a guiding principle, enterprises rely on cloud providers to protect the network, storage, and computing layers, while enterprises own the security. This drives a need for solutions that complement traditional physical appliance form factors which provide visibility and maintain consistent security policy as workloads, users and data migrate to more agile, elastic, and virtualized infrastructure. Attend this technical training workshop and gain hands-on experience configuring virtual NGFWs and Application Gateways utilizing Fortinet products to protect public cloud resources.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: AI Driven Security Operations

Cyberattacks are a 24/7 reality. The complexity and growth of the enterprise estate – Infrastructure, Applications, VM’s, Cloud, Endpoints and IoT means the attack surface grows exponentially. Coupled with a skills shortage, and resource constraints, security becomes everybody’s problem but visibility, event correlation and remediation are other people’s responsibility. Effective security requires visibility – all the devices, all the infrastructure in realtime – but also with context – what devices represent a threat, what is their capability so you manage the threat the business faces, not the noise multiple security tools create. FortiSIEM - Fortinet’s Multivendor Security Incident and Events Management solution brings it all together by integrating NOC-SOC Solutions to Automate IT Processes and Security Responses. Visibility, Correlation, Automated Response and Remediation in a single, scalable solution. Using a FortiSIEM, the complexity of managing network and security operations is reduced, freeing resources, improving breach detection. Worldwide 80% of breaches go undetected because of skills shortage and event information ‘noise’. FortiSIEM provides the cross correlation, applies machine learning and UEBA to improve response, to stop breaches before they occur. Use this Hands-on technical training to familiarize yourself with the Powerful Security Incident and Event Management capabilities of a FortiSIEM.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: Zero Trust Network Access

Endpoints are frequently the target of initial compromise or attacks. One recent study found that 30% of breaches involved malware being installed on endpoints. Fortinet strengthens endpoint security through integrated visibility, control, and proactive defense. With the ability to discover, monitor, and assess endpoint risks, you can ensure endpoint compliance, mitigate risks, and reduce exposure. FortiClient is more than advanced endpoint protection. As an integrated agent, FortiClient contains three key modules; Fabric Agent for security Fabric connectivity, the endpoint security modules and the secure remote access modules. Fabric Agent shares endpoint telemetry with the Security Fabric and delivers broad endpoint visibility, compliance control and vulnerability management. It provides advanced endpoint protection with pattern-based anti-malware, behavior-based exploit protection, web-filtering, and an application firewall. FortiClient natively integrates with FortiSandbox to detect zero-day threats and custom malware. FortiClient also provides secure remote access with built-in VPN, single-sign-on, and two-factor authentication for added security. FortiEDR (enSilo) is a next-gen endpoint security solution that packs a broad set of EDR capabilities with easy deployment and use. FortiEDR offers certified NGAV, automated EDR, threat hunting, forensics and virtual patching capabilities all in one single agent to prevent breaches and comply with regulations like PCI/DSS and HIPAA. The lightweight agent is managed by an easy-to-use management console for pre and post infection capabilities. FortiEDR features multi-tenant management in the cloud, on-premise, and hybrid. Attend this technical training workshop to gain hands-on experience controlling endpoints using Fortinet Advanced Endpoint Protection tools in mixed Windows & Linux environments and see first-hand how these solutions integrate with the Fortinet Security Fabric to protect your company’s critical assets.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: Security Driven Networking

As organizations transition to a digital business model, their network topologies are significantly impacted. The adoption of cloud services, the virtualization of the traditional network, and an increasingly mobile workforce accessing applications in the cloud are accelerating advancements in wide area networking technologies. The traditional wide area network (WAN) is struggling to keep up because it relies on a static infrastructure of devices that simply can't accommodate shifting, and often temporary resource allocation and workloads. Attend this technical training workshop to learn how software-defined networking (SDN) applies to software control of wide area networks in an enterprise environment. Gain hands-on experience through actual configuration of virtualized products supporting WAN aggregation, both directly configuring the FortiGates, as well as doing the configurations remotely through FortiManager.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: Security Driven Networking

As security architects consider how to provide comprehensive threat protection for their enterprises, including intrusion prevention, web filtering, anti-malware and application control, they face a major complexity hurdle managing these point products with no integration and lack of visibility. On top of that, Gartner estimates that by 2019, 80% of enterprise traffic will be encrypted and 50% of attacks targeting enterprise will be hidden in encrypted traffic. FortiGate reduces complexity by integrating various point products into NGFW features with automated action and enhanced visibility into applications, users and network. FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance including encrypted cloud access. Attend this technical training workshop and gain hands-on experience fortifying the enterprise network with Fortinet NGFW solution.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: Security Driven Networking

Email is a critical tool for businesses. But it’s also a preferred delivery method for ransomware, phishing, and compromise attacks. According to the 2018 Verizon report, 49% of (non-POS) malware was installed via malicious email. Gartner asserts that "Advanced threats (such as ransomware and business email compromise) are easily the signature-based and reputation-based prevention mechanisms that a secure email gateway (SEG) has traditionally used. FortiMail replaces incumbent secure email gateways with a product tailored for advanced threat defense. FortiMail email security shields users, and ultimately data, from a wide range of cyber threats. These include: ever growing volumes of unwanted spam, socially-engineered phishing and business email compromise, accelerating variants of ransomware and other malware, increasingly targeted attacks from adversaries of all kinds, and more. At the same time, FortiMail can be used to protect sensitive data of all types, reducing the risk of inadvertent loss and/or non-compliance with regulations like HIPAA, PCI, GDPR, and more. Attend this technical training workshop and gain hands-on experience protecting your organization against phishing, spam, malware and advanced targeted attacks via email.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: AI Driven Security Operations

FortiSOAR™ is a holistic and enterprise-built security orchestration and security automation workbench that empowers security operation teams. FortiSOAR™ increases a team’s effectiveness by increasing efficiency, allowing for response in near real time. In this session, you’ll learn how FortiSOAR™ takes your security operation team to the next level by automating the incident response process and facilitating collaboration, behind a single console to power it all.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start. 

Session Category: AI Driven Security Operations

With a dynamic attack surface due to the rise of IoT and cloud services, it's clear that no single technology will be able to stop every threat. To protect your enterprise against sophisticated threats, it is important to establish a comprehensive and cohesive security infrastructure that is broad enough to cover all attack vectors, powerful enough to run the latest security technologies, and automated to keep pace with fast-moving attacks. Attend this hands-on technical training workshop to learn how to detect and analyze advanced threats with FortiSandbox.

Note: Attendees who have pre-registered for this workshop will be held a seat for this session. If you are not registered and would like to participate you may wait to see if any seats become available 5 minutes prior to the workshop start.