Get Ready to Learn

Check out the all-new Voice of the Customer track and learn how Fortinet customers (like University of Buffalo, USI and Wellington Catholic District) have tackled some of the most difficult security challenges with ease.

The Technical track takes you deep into the technology that makes Fortinet products and solutions best-in-class. And don't miss the Fast Track Workshops. Peruse the catalog and get ready to deepen your skills, knowledge, and expertise.

Conference Workshops offer you some of the best hands-on training around. Need to troubleshoot SD-WAN? There's a workshop for that. Want to acquire the necessary tools to sell and support a Fortinet Universal ZTNA solution? Don't miss the Technical Enablement Series on Universal ZTNA. There's over 15 workshops to choose from, taught be professional instructors to help you gain unique insights and instructions.

Session registration will open in early March so you can create your perfect agenda.

Name Description Track More Info
Conference Workshops
Solving the Financial Services Cybersecurity Challenge

The financial services sector is a high-value target for cyberattacks. Financial services are the world’s most-attacked industry and face constant intrusion attempts. Protecting this sensitive data for business and compliance reasons is an important consideration. Also, achieving this goal is complicated by a continually expanding attack surface with new technologies being continuously launched through digital innovation initiatives.

To maintain competitiveness, financial Cybersecurity teams need visibility to achieve cost savings, operational efficiency, and compliance reporting. But better security should not come at the expense of network performance, as consumers and businesses increasingly demand real-time access to every offering, from online and mobile banking to high-frequency trading. At the same time, institutions must control costs and optimize operational efficiency to remain competitive in an industry with many players.

Fortinet cybersecurity solutions for financial services cover several use cases with comprehensive protection. The performance of FortiGate high-end firewalls meets the specialized needs of electronic trading infrastructures, and the Fortinet Security Fabric covers the entire organization with a multilayered defense, with centralized policy controls, all visible on a single pane of glass. Additionally, Fortinet supports connectivity at branch locations with secure networking solutions that are scalable and fast.

Attend this hands-on technical training workshop to learn how Fortinet solutions can protect financial institutions against advanced threats and help to solve the financial cybersecurity challenge.

Conference Workshops
Advanced Threat Protection for the Healthcare Industry

The healthcare industry is in a unique and particularly vulnerable position when it comes to cybersecurity. Providers face substantial regulation around privacy and data security, while hackers have much to gain from patient data. Recent statistics put the black market value of healthcare records at ten times that of credit card information.

Attackers aren’t just motivated by potential financial rewards either. Several large data breaches have been attributed to state actors collecting data for suspected espionage purposes. Protected health information (PHI) can be used to build rich personal profiles in the wrong hands.

Healthcare encompasses a wide range of organizations and IT environments, from Hospitals and Insurance providers to Pharmaceutical and Medical Device manufacturers. Fortinet’s Advanced Threat Protection is flexible and provides comprehensive defenses in heterogeneous deployments. While ATP may look different for an insurance company than for a remote clinic, the idea is the same: block known threats immediately, detect unknown threats with sandboxing, and share intelligence on new threats.

Fortinet’s solutions deliver advanced, real-time threat protection for endpoints both pre- and post-infection. It proactively reduces the attack surface, prevents malware infection, detects and defuses potential threats in real-time, and can automate response and remediation procedures.

This workshop will cover Fortinet’s ZTNA, NGFW, and SD-WAN solutions that are relevant to HealthCare and Life Sciences.

Participants who attend this workshop will learn how to:
•    Reduce complexity with industry-leading security effectiveness
•    Enhance visibility with automated actions
•    Configure FortiClient EMS to apply ZTNA tags to endpoints that FortiGate can use to control access to subnets and corporate assets dynamically
•    Configuring FortiEDR pre- and post-execution scanning policies
•    Filter, sort, and, view events in FortiEDR
•    Implement application control and traffic shaping over SD-WAN

Conference Workshops
The Future of the NSE Certification Program

During this presentation, you will see a preview of the upcoming changes to the NSE certification program. The most important changes include adding more role-based training, simplifying the program structure and rules, and expanding to include multiple certifications per level.

You will learn how these changes will affect your current NSE certifications and the requirements for Fortinet partners to maintain and upgrade their current Fortinet Engage status.

This session is particularly interesting to Fortinet partners and individuals wanting to achieve or renew NSE certifications.

Conference Workshops
Digital Security for Digital-age Education

The digital transformation of the education environment has empowered schools & universities with new methods and tools to learn, teach and conduct research. However, that same technology increases the attack surface and introduces security risks, which makes campus networks vulnerable to cyber threats and security breaches. 

The challenge is finding the right security posture that protects resources and users and provides a collaborative learning environment. Fortinet is well-positioned to accompany schools, universities, and colleges on their digital journey with security transformation provided by the Fortinet Security Fabric. 

The Fortinet Security Fabric consists of a wide set of technologies that work together and are supported by a single source of threat intelligence (FortiGuard Labs) to eliminate security gaps in the network and respond to any attack vector.

Attend this hands-on technical training workshop to learn how Fortinet can help you find the right balance between an open and secure academic environment, by providing intelligent network security for a safe learning environment.

Conference Workshops
Reduce the Complexity of Operations with the Fabric Management Center

The rapid embrace of digital innovation has made networks and network security much more complex—and vulnerable. While malicious cyberattacks remain a serious problem, 48% of all breaches last year came from benign sources that could have been prevented. Moreover, 75% of network outages and performance issues result from misconfiguration errors. In this regard, a network security strategy that prioritizes network automation can help reduce one of the leading causes of cyber risk and downtime—human error and misconfigurations.

As a key part of the Security Fabric, the Fortinet Fabric Management Center (made up of FortiManager and FortiAnalyzer) simplifies operations by addressing this core challenge of network infrastructure teams across small, medium, or large enterprises.

In this Fast Track Workshop, attendees will gain hands-on experience and see how the solution provides centralized management, network automation, and orchestration, and Security Fabric analytics.

Conference Workshops
Protecting Retailers Against Cyber Attacks and Threats

In this workshop, participants learn how to deploy and manage the Fortinet retail cybersecurity solution.

Retailers present cyber criminals with an attractive target. Customer payment data is transmitted across the network and stored on-premises and in public and private clouds. At the same time, the arrival of omnichannel customer experiences creates challenges in-branch retail locations where customers demand high performance and secure connections. Faced with acute cybersecurity staffing shortages, retailers struggle to cover all their security gaps—something that is exacerbated by the proliferation of point security products and the advanced threat landscape.

Fortinet offers retailers a broad set of network and security technologies that are seamlessly integrated and automated with the Fortinet Security Fabric. High-performance solutions with both best-in-class network and security capabilities address a wide range of retail use cases.

Fortinet provides retailers with transparent visibility and real-time security workflows, and threat-intelligence sharing. This level of integration also unlocks automation that enables lean network and security teams to work more efficiently and faster while also allowing them to reduce risk—all at a low total cost of ownership (TCO).

Participants who attend this workshop will learn how to:
•    Configure SD-WAN between multiple sites
•    Configure and manage the Fortinet Security Fabric
•    Provide real-time security for the entire network

Conference Workshops
Hands On Training (HOT) Workshop: FortiPortal

FortiPortal provides a comprehensive set of security management and analytics within a multi-tenant, multi-tier management framework. This enables MSSPs to give their customers controlled access to configuration and analytics.  Enterprises and Education can use FortiPortal to delegate a limited set of management and analytic capabilities to business units, departments, colleges, and so on. This workshop shows key FortiPortal concepts to implement a self-service portal for customer ADOMs.

It is recommended that you have an understanding of the topics covered in the following courses or have equivalent experience:

NSE 4 FortiGate Security
NSE 4 FortiGate Infrastructure
NSE 5 FortiManager

Conference Workshops
Hands On Training (HOT) Workshop: FortiOS Dynamic Routing

This workshop presents the dynamic routing modules from NSE 7 Enterprise Firewall, with in-depth examples of FortiOS configurations for BGP and OSPF.

It is recommended that you have an understanding of the topics covered in the following courses or have equivalent experience:

NSE 4 FortiGate Security
NSE 4 FortiGate Infrastructure

Conference Workshops
Hands On Training (HOT) Workshop: FortiManager IPsec Templates

This workshop shows how FortiManager IPsec templates can be used to standardize an IPsec VPN topology configuration for consistency and scalability, the use of IPsec templates is contrasted with VPN Manager pane for a similar deployment. Automation and orchestration are increasingly implemented for NGFW and SD-WAN, FortiManager templates provide a no-code alternative to scripting and third-party orchestration technologies, which is fully integrated into the product.

It is recommended that you have an understanding of the topics covered in the following courses or have equivalent experience:

NSE 4 FortiGate Security
NSE 4 FortiGate Infrastructure
NSE 5 FortiManager

Conference Workshops
Educational Challenge: Threat Hunting Using Mitre ATT&CK™ to Identify Adversarial Behaviors

No alerts have been detected but are there adversaries on AcmeCorp's network? In this educational challenge, you will take on the role of a security analyst and be asked to identify any threats undetected on AcmeCorp's network. To do this, you will make use of Mitre ATT&CK™, which is a knowledge base of adversary behavior based on real-world observations.

ATT&CK™ allows analysts to hunt for behavior patterns rather than artifacts such as hashes, IPs, or Domains.  Why is this important? Well, according to 'The Pyramid of Pain' by David Bianco, while it is very easy for attackers to change these artifacts, it is much harder for them to change their Tactics, Techniques, and Procedures (TTPs). Therefore, TTPs are a more reliable way of identifying adversary behavior.

The challenge is set up with several exercises set around the technical goals the adversary is trying to achieve (ATT&CK™ Tactics), for example, Initial Access, Persistence, Privilege Escalation, Command, and Control. You will be asked to detect any techniques being used by an adversary to achieve these goals.

The workshop will use FortiAnalzyer and FortiSIEM for analytics and reporting, and for data sources, it will use FortiGate, FortiWeb, FortiDeceptor, FortiMail, and FortiSandbox.

Conference Workshops
Technical Enablement Series: Universal ZTNA

Zero Trust Network Access (ZTNA) is a capability within Zero Trust Access (ZTA) that controls access to applications. It extends the principles of ZTA to verify users and devices before every application session. ZTNA confirms that they meet the organization’s policy to access that application.

Fortinet’s unique approach, delivering Universal ZTNA as part of the FortiGate Next-Generation Firewall (NGFW), makes it uniquely flexible, covering users when they are remote or in the office. Universal ZTNA capabilities are automatically enabled on any device or service running FortiOS 7.0 and higher, including hardware appliances, virtual machines in clouds, and the FortiSASE service.

During the group discussion, participants will acquire the tools necessary to sell and support a Fortinet Universal ZTNA solution, including how to:

•    Identify Universal ZTNA sales opportunities.
•    Design a variety of deployment scenarios.
•    Scope and size a Universal ZTNA solution.
•    Deploy Universal ZTNA in both new and existing environments.

In the hands-on lab, students will use Fortinet products to:

•    Integrate FortiClient Endpoint Management Server (EMS) into Security Fabric.
•    Configure EMS Zero Trust tags, policies, and rules to protect corporate and remote users.
•    Configure FortiGate ZTNA HTTPS Access Proxy for secure remote access to applications.
•    Configure FortiGate ZTNA IP/MAC Based Access Control policies for On-net dynamic access.

Conference Workshops
Cybersecurity for Safe, Reliable, Secure Industrial Control Systems (ICS)

Connections between IT and operational technology (OT) systems are no longer air-gapped, introducing the potential for hackers to penetrate industrial control systems, risking the safety and availability of critical infrastructure.  Security for OT requires visibility, control, and analytics to meet safety and availability requirements.

Convergence is blurring the lines between IT and OT, creating an opportunity to improve critical systems' visibility, control, and situational awareness. Failure to take the wide range of security issues into account when converging these two very different networks and networking philosophies can result in catastrophic network failures that risk critical systems and the life and well-being of workers and communities.

In this workshop, participants learn about the Fortinet Security Fabric, the first-ever architectural security approach designed to adapt dynamically to the unique needs of legacy OT environments while enabling the move toward modernizing these critical systems. Leveraging the Purdue Model for the security layers needed in OT, the multi-layered approach provided by the Security Fabric provides broad, integrated, and automated protection against sophisticated threats.

Participants who attend this workshop will learn how to:
•    Introduce the OT business drivers and security priorities
•    Understand the differences between IT and OT and the importance of actively securing OT environments 
•    Leverage the Purdue Model to support the needs of an OT environment
•    Apply the Security Fabric to secure OT
•    Expand the Security Fabric and enhance the value of Fabric-ready partners

Conference Workshops
Learn the Best Practices to Becoming a Fast Track Instructor (SD-WAN Lab) Conference Workshops
Hands On Training (HOT) Workshop: OT Security

The convergence of OT and IT impacts the security of industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems. These systems are exposed to an expanding threat landscape as the air gap is removed.

This workshop looks at how FortiGate and FortiNAC are deployed to provide visibility, control, and analytics within OT environments.

It is recommended that you have an understanding of the topics covered in the following courses, or have equivalent experience: NSE 4 FortiGate Security

Conference Workshops
Hands On Training (HOT) Workshop: SD-WAN Troubleshooting

This workshop presents the troubleshooting exercises from NSE 7 SD-WAN training. Participants will troubleshoot SD-WAN routing and rule matching issues on an advanced IPsec and routing configuration.

It is recommended that you have an understanding of the topics covered in the following courses or have equivalent experience:

NSE 4 FortiGate Security
NSE 4 FortiGate Infrastructure

Conference Workshops
Proactive Advanced Endpoint Protection, Visibility, and Control for Critical Assets

Fortinet strengthens endpoint security through integrated visibility, control, and proactive defense. With the ability to discover, monitor, and assess endpoint risks, organizations can ensure endpoint compliance, mitigate risks, and reduce exposure. Endpoints are frequently the target of initial compromise or attacks. One recent study found that 30% of breaches involved malware being installed on endpoints.  Fortinet endpoint solutions strengthen endpoint security through integrated visibility, control, and proactive defense. 
FortiClient can discover, monitor, and assess endpoint risks, so you can ensure endpoint compliance, mitigate risks, and reduce exposure. Its tight integration with the Fortinet Security Fabric enables policy-based automation to contain threats and control outbreaks.  FortiClient also provides secure remote access with ZTNA, built-in VPN, single-sign-on, and two-factor authentication for added security.

FortiEDR delivers advanced, real-time threat protection for endpoints both pre- and post-infection. It proactively reduces the attack surface, prevents malware infection, detects and defuses potential threats in real-time, and can automate response and remediation procedures with customizable playbooks.

Participants who attend this workshop will learn how to:
•    Integrate FortiClient EMS into the Security Fabric
•    Deploy custom FortiClient Installer
•    Configure FortiClient EMS to apply ZTNA tags to endpoints that FortiGate can use to dynamically control access to subnets and corporate assets
•    Deploy FortiEDR collector
•    Apply FortiEDR virtual patching to workstation 
•    Configuring FortiEDR pre- and post-execution scanning policies
•    Filter, sort, and view events in FortiEDR
•    Perform forensic analysis in FortiEDR

Conference Workshops
The Evolution of Access to Applications with Fortinet ZTNA

Zero Trust Network Access (ZTNA) is an access control method that uses client device identification, authentication, and Zero Trust tags to provide role-based application access. It allows administrators to manage network access for On-net local users and Off-net remote users. Access to applications is granted only after device verification, authenticating the user’s identity, authorizing the user, and then performing context-based posture checks using Zero Trust tags.

In this workshop, participants learn about how Fortinet offers a firewall-based approach to ZTNA that results in a flexible and comprehensive solution that delivers universal ZTNA. Wherever the user is and wherever the application is, Fortinet can effectively and efficiently grant (or block) application access based on a variety of factors. 

Participants who attend this workshop will learn how to:

•    Integrate FortiClient Endpoint Management Server (EMS) into Security Fabric.
•    Configure EMS Zero Trust policies and rules to protect corporate and remote users.
•    Configure ZTNA HTTPS Access Proxy for secure remote access to applications.
•    Configure ZTNA IP/MAC Based Access Control for On-net dynamic access.
•    Demonstrate successful operation of these critical functions

Conference Workshops
Constructing a Secure SD-WAN Architecture

Corporate networks are stretched thin by cloud services, SaaS applications, and mobility. Plus, organizations require better connections to branch offices to deliver higher-quality network services.

Organizations' network topologies are significantly impacted as they transition to a digital business model. The adoption of cloud services, the virtualization of the traditional network, and an increasingly mobile workforce accessing applications in the cloud are accelerating advancements in wide-area networking technologies.

The traditional WAN is struggling to keep up because it relies on a static infrastructure of devices that simply can’t accommodate shifting, and often temporary resource allocation and workloads. In this workshop, participants learn how Secure SD-WAN solves these problems. 

Participants who attend this workshop will learn how to:

•    Apply software-defined networking (SDN) to software control of wide-area networks in an enterprise environment
•    Implement application control and traffic shaping over SD-WAN
•    Use FortiManager to enable unified policy across multiple enterprise branches
•    Configure virtualized products supporting WAN aggregation while gaining hands-on experience
•    Use SD-WAN Overlay Templates to facilitate SD-WAN deployments

Conference Workshops
Fortifying the Enterprise Network (NGFW)

As security architects consider how to provide comprehensive threat protection for their enterprises, including intrusion prevention, web filtering, anti-malware, and application control, they face a major complexity hurdle managing these point products with no integration and lack of visibility.

In this workshop, participants learn how Fortinet network security leverages a single operating system that works across different network security use cases. FortiGate reduces complexity by integrating various point products using Next Generation Firewall (NGFW) features. FortiGate also provides automated visibility into cloud applications and IoT devices. The Fortinet Security Fabric automatically discovers the end-to-end topology view of the enterprise network and protects it from known and unknown attacks via automated action. FortiGate NGFW utilizes purpose-built security processors (SPUs) and threat intelligence security services from FortiGuard Labs to deliver top-rated protection and high performance, including encrypted cloud access. 

Participants who attend this workshop will learn how to:

•    Reduce complexity with industry-leading security effectiveness
•    Enhance visibility with automated action
•    Simplify SSL performance and complexity issues for encrypted cloud access
•    Reduce resource usage across the enterprise WAN with ADVPN

Conference Workshops
Partner Track
Sell Through: The Best Use Cases for Adding FortiGuard Security Services to NGFW and SD-WAN

Fortinet enables MSSP partners to create new revenue streams, improve margins, and deliver differentiated security services. 

Fortinet continues to drive market evolution with FortiGuard AI-powered Security Service on top of the FortiGate NGFW and SW-WAN solutions. The security-driven networking solutions that deliver security effectiveness and automation, cost, and performance for use cases spanning enterprises on-premises, multi-cloud environments, branch, and remote deployments.

During this session, the most common use cases and services are explained with valuable FortiGuard insights that will blow your customers away.

Partner Track
Your Managed SOC Offerings Need a Little Boost ? Augment Your Teams with Ours 

With the continued skillset shortage, digital transformation initiatives, and overwhelmed security staff, enterprises continue to seek outside expert assistance to help augment their security operations. If you want a fast time-to-market for security services that you want to offer but haven't had the time to build, Fortinet can help. With both managed services for network and endpoint, and expert advisory services to help enterprises stay ahead of security challenges and respond in crises, Fortinet global experts have years of deep and broad security experience you can offer. Augment your team with ours.

Partner Track
Global Engage Update

Fortinet's Engage Partner Program provides you with a valuable, flexible platform to build a profitable and highly-differentiated security practice that leverages the industry's best security solutions to drive customer success.

In this session global leadership will announce the exciting updates coming to the Engage Partner Program, the impact they’ll have on the industry, how these programs and opportunities will enable you to grow your business with Fortinet, and more.

Partner Track
Mobile Network Security for 4G and 5G Networks

Fortinet provides a common set of security solutions and tools that provide end-to-end security visibility and control for 4G and 5G mobile infrastructure while enabling industry use cases’ security and monetization. This approach facilitates integration and onboarding while keeping operations and management efforts to a minimum, as the same platform is constantly used throughout the 5G ecosystem.

Partner Track
Build and Deliver Profitable MDR with Fortinet's Automated SOC Platform Solution Stack

MDR services delivery doesn't have to be a compromise between the functional limitations presented by pure-play MDR providers and the multi-vendor integration challenges of leveraging true enterprise-class SIEM, SOAR, and EDR.

In this session, we will discuss the advantages of a single-vendor MDR stack which harnesses the power and flexibility of each full-featured product combined with the out-of-the-box integrations and automations that would only be possible from a shared development organization. Add in the experience and world-class support of a global organization that really understands the business and technical needs of our managed services partners, and we will be presenting a very high bar that is uniquely Fortinet.

Partner Track
Pre-Conference Workshops
Breakfast Pre-Conference Workshops
Breakfast Pre-Conference Workshops
NSE 4 Immersion v7.2

This course is an expanded version (from 1 day to 2 days) of the NSE 4 Immersion v.7.2 course. You will be assigned a series of do-it-yourself (DIY) configuration tasks in a virtual lab environment. The configuration tasks cover some of the topics in the NSE 4 certification exam and include the use of the most common FortiGate features, such as firewall policies, the Fortinet Security Fabric, user authentication, SSL and IPsec VPNs, equal-cost multi-path (ECMP) routing, SD-WAN, high availability (HA), and content inspection.

This course is not a replacement for the FortiGate Security and FortiGate Infrastructure courses, and it is meant to complement what you had learned from those courses or from your hands-on working experience with ForiGate devices.

For more information, download the course description here.

Pre-Conference Workshops
NSE 5 FortiManager v7.2

In this course, you will learn the fundamentals of using FortiManager for the centralized network administration of many FortiGate devices.

In interactive labs, you will explore deployment strategies, which include single or multiple ADOMs, device registration, policy packages, shared objects, installing configuration changes, provisioning FortiManager as a local FortiGuard distribution server, and troubleshooting the features that are critical to day-to-day use after you deploy FortiManager.

For more information, download the course description here.

Pre-Conference Workshops
NSE 6 FortiAnalyzer Administrator v7.2 (Day 1)

In this course, you will learn how to deploy, configure, and secure FortiAnalyzer. You will also learn how to register and manage devices with FortiAnalyzer. Finally, you will explore the fundamentals of the logging and reporting management capabilities included in FortiAnalyzer. These skills will provide you with a solid foundation for becoming a professional FortiAnalyzer administrator.

To learn more, click here

Pre-Conference Workshops
NSE 5 FortiEDR v5.0

In this interactive course, you will learn how to use FortiEDR to protect your endpoints against advanced attacks with real-time orchestrated incident response functionality. You will also explore FortiEDR features and how they protect your endpoints automatically in real time.

(ISC)² CPE Training Hours: 6

(ISC)² CPE Lab Hours: 6

(ISC)² CISSP Domains: Communication and Network Security

To learn more, click here

Pre-Conference Workshops
NSE 7 Zero Trust Access (ZTA)

In this course, you will learn how to define, design, deploy, and manage Zero Trust Access (ZTA) using different Fortinet solutions. You will also learn how to configure FortiGate, FortiClient EMS, FortiAuthenticator, FortiNAC, and FortiAnalyzer to secure network and application access, monitor ZTA enforcement, and automate incident response.

To learn more, click here

Pre-Conference Workshops
NSE 7 OT Security v7.2

This course will teach you how to secure your OT infrastructure using Fortinet solutions.

You will learn how to design, deploy, administrate, and monitor FortiGate, FortiNAC, FortiAnalyzer, and FortiSIEM devices to secure OT infrastructures. These skills will provide you with a solid understanding of designing, implementing, and operating an OT security solution based on Fortinet products.

For more information, download the course description here.

Pre-Conference Workshops
NSE 4 Immersion v7.2

This course is an expanded version (from 1 day to 2 days) of the NSE 4 Immersion v.7.2 course. You will be assigned a series of do-it-yourself (DIY) configuration tasks in a virtual lab environment. The configuration tasks cover some of the topics in the NSE 4 certification exam and include the use of the most common FortiGate features, such as firewall policies, the Fortinet Security Fabric, user authentication, SSL and IPsec VPNs, equal-cost multi-path (ECMP) routing, SD-WAN, high availability (HA), and content inspection.

This course is not a replacement for the FortiGate Security and FortiGate Infrastructure courses, and it is meant to complement what you had learned from those courses or from your hands-on working experience with ForiGate devices.

For more information, download the course description here.

Pre-Conference Workshops
NSE 4 Immersion v7.2

This course is an expanded version (from 1 day to 2 days) of the NSE 4 Immersion v.7.2 course. You will be assigned a series of do-it-yourself (DIY) configuration tasks in a virtual lab environment. The configuration tasks cover some of the topics in the NSE 4 certification exam and include the use of the most common FortiGate features, such as firewall policies, the Fortinet Security Fabric, user authentication, SSL and IPsec VPNs, equal-cost multi-path (ECMP) routing, SD-WAN, high availability (HA), and content inspection.

This course is not a replacement for the FortiGate Security and FortiGate Infrastructure courses, and it is meant to complement what you had learned from those courses or from your hands-on working experience with ForiGate devices.

For more information, download the course description here.

Pre-Conference Workshops
NSE 5 FortiSIEM v6.3

In this course, you will learn about FortiSIEM initial configurations, architecture, and the discovery of devices on the network. You will also learn how to collect performance information and aggregate it with syslog data to enrich the overall view of the health of your environment, how to use the configuration database to greatly facilitate compliance audits, and how to integrate FortiSIEM into your network awareness infrastructure.

To learn more, click here

Pre-Conference Workshops
NSE 4 Immersion v7.2

This course is an expanded version (from 1 day to 2 days) of the NSE 4 Immersion v.7.2 course. You will be assigned a series of do-it-yourself (DIY) configuration tasks in a virtual lab environment. The configuration tasks cover some of the topics in the NSE 4 certification exam and include the use of the most common FortiGate features, such as firewall policies, the Fortinet Security Fabric, user authentication, SSL and IPsec VPNs, equal-cost multi-path (ECMP) routing, SD-WAN, high availability (HA), and content inspection.

This course is not a replacement for the FortiGate Security and FortiGate Infrastructure courses, and it is meant to complement what you had learned from those courses or from your hands-on working experience with ForiGate devices.

For more information, download the course description here.

Pre-Conference Workshops
NSE 5 FortiSIEM v6.3

In this course, you will learn about FortiSIEM initial configurations, architecture, and the discovery of devices on the network. You will also learn how to collect performance information and aggregate it with syslog data to enrich the overall view of the health of your environment, how to use the configuration database to greatly facilitate compliance audits, and how to integrate FortiSIEM into your network awareness infrastructure.

To learn more, click here

Pre-Conference Workshops
Networking Security Troubleshooting v7.2

This course is a preview of the upcoming and new NSE 7 Network Security Troubleshooting v.7.2 course. You will learn how to diagnose and troubleshoot the most common networking and security problems in a FortiGate network security solution. In interactive break-and-fix labs you will use tools, diagnostic, and debug commands to detect, isolate, and resolve problems related with the most commonly used FortiGate features, such as IPsec, routing, web filtering, HA, IPS, and more. These skills and knowledge will give you an advanced understanding of how to support a network security solution based on FortiGate devices.

To learn more, view the course description here.

Pre-Conference Workshops
Networking Security Troubleshooting v7.2

This course is a preview of the upcoming and new NSE 7 Network Security Troubleshooting v.7.2 course. You will learn how to diagnose and troubleshoot the most common networking and security problems in a FortiGate network security solution. In interactive break-and-fix labs you will use tools, diagnostic, and debug commands to detect, isolate, and resolve problems related with the most commonly used FortiGate features, such as IPsec, routing, web filtering, HA, IPS, and more. These skills and knowledge will give you an advanced understanding of how to support a network security solution based on FortiGate devices.

To learn more, view the course description here.

Pre-Conference Workshops
NSE 7 Advanced Analytics v6.6

During this two-day training, you will learn the most important topics and concepts that are covered in the NSE 7 Advanced Analytics v6.6 course. You will learn how to use FortiSIEM in a multi-tenant environment. You will learn about rules and their architecture, how incidents are generated, how baseline calculations are performed, the different remediation methods available, and how the MITRE ATT&CK framework integrates with FortiSIEM. You will also learn how to integrate FortiSOAR with FortiSIEM.

To learn more, click here

Pre-Conference Workshops
NSE 8 Immersion v7.2

The NSE 8 Immersion is an all-hands-on lab that students preparing for the NSE 8 practical exam can do to get an exam-like experience. Based on the previous NSE 8 practical exam, students will be tasked with completing the lab in a challenging learning environment. Fortinet products in the lab include FortiGate, FortiManager, FortiAnalyzer, FortiWeb, FortiMail, FortiADC, FortiAuthenticator, and FortiSandbox. During the sessions, an NSE8-certified instructor is available for questions and to help gain knowledge to prepare for becoming NSE 8 certified.

For more information, download the course description here.

Pre-Conference Workshops
NSE 8 Immersion v7.2

The NSE 8 Immersion is an all-hands-on lab that students preparing for the NSE 8 practical exam can do to get an exam-like experience. Based on the previous NSE 8 practical exam, students will be tasked with completing the lab in a challenging learning environment. Fortinet products in the lab include FortiGate, FortiManager, FortiAnalyzer, FortiWeb, FortiMail, FortiADC, FortiAuthenticator, and FortiSandbox. During the sessions, an NSE8-certified instructor is available for questions and to help gain knowledge to prepare for becoming NSE 8 certified.

For more information, download the course description here.

Pre-Conference Workshops
Cybersecurity (powered by FortiGuard Labs) - Offensive OT Security

Industrial Control Systems (ICS) and Operational Technology (OT) are part of critical infrastructure environments for many commercial and government organizations. Attacks against assets in these environments have been increasing at an exponential pace. Damage to these environments can cause significant damage to the operations of a business, agency, government entity, and even nations. Attackers understand these are valuable targets and focus on them because of historically successful attacks. This class will focus on cyber offensive attacks in the OT space. We will focus on how attackers exploit systems and IoT/OT devices to compromise critical infrastructure. Learn to think like an attacker and understand how to defend your critical infrastructure.

For more information, download the course description here.

Pre-Conference Workshops
Cybersecurity (Powered by FortiGuard Labs) - Web Application Security (Day 2)

This cybersecurity module will explore web application threats and countermeasures focused on Fortinet solutions. Comprised of theory lessons and hands-on labs, this course will get the students from the very motivations of attacks to web applications through understanding and executing attack techniques, recognizing such attacks, and configuring Fortinet solutions to mitigate them.

Learn more about this Pre-Conference Workshop here.

Pre-Conference Workshops
Deep Dive into Authentication Troubleshooting

The training deep dive in authentication troubleshooting will focus on configuring and troubleshooting different authentication protocols (LDAP, RADIUS, PKI, SAML, Kerberos) across various Fortinet products (FortiGate, FortiADC, FortiWeb, FortiAuthenticator).

It also includes a lesson with tips and best practices using Wireshark, where you'll learn how to customize your Wireshark to get the most out of it.

For more information, download the course description here.

Pre-Conference Workshops
NSE 5 FortiManager v7.2

In this course, you will learn the fundamentals of using FortiManager for the centralized network administration of many FortiGate devices.

In interactive labs, you will explore deployment strategies, which include single or multiple ADOMs, device registration, policy packages, shared objects, installing configuration changes, provisioning FortiManager as a local FortiGuard distribution server, and troubleshooting the features that are critical to day-to-day use after you deploy FortiManager.

For more information, download the course description here.

Pre-Conference Workshops
NSE 7 OT Security v7.2

This course will teach you how to secure your OT infrastructure using Fortinet solutions.

You will learn how to design, deploy, administrate, and monitor FortiGate, FortiNAC, FortiAnalyzer, and FortiSIEM devices to secure OT infrastructures. These skills will provide you with a solid understanding of designing, implementing, and operating an OT security solution based on Fortinet products.

For more information, download the course description here.

Pre-Conference Workshops
Infrastructure as Code with Fortinet Products (Day 1)

An introduction course to Infrastructure as Code (IaC) using Terraform to create a web service protected with Fortinet products. Going through the basic concepts of IaC necessary for creating a full service with docker images, virtual machines, and networking, protected by FortiGate and FortiWeb, everything deployed using Terraform.

Learn more about this Pre-Conference Workshop here.

Pre-Conference Workshops
NSE 7 Zero Trust Access (ZTA)

In this course, you will learn how to define, design, deploy, and manage Zero Trust Access (ZTA) using different Fortinet solutions. You will also learn how to configure FortiGate, FortiClient EMS, FortiAuthenticator, FortiNAC, and FortiAnalyzer to secure network and application access, monitor ZTA enforcement, and automate incident response.

To learn more, click here

Pre-Conference Workshops
Automation, API & Scripting

The training Automation, API & Scripting will focus on different aspects of Automation. On day one, the automation features that are ready-to-use inside FortiOS & FortiManager/FortiAnalyzer (7.2.x) will be explored along with how to set up an environment for demo/testing Automation features.

Day two will take automation one step further by exploring and interacting with the API capabilities of FortiOS (7.2.x), FortiManager/FortiAnalyzer, and FortiAuthenticator using various tools.

Day two also includes an introduction into python scripting, where you'll learn how to interact with Fortinet devices using SSH and the API to explore the capabilities of automation using python scripts.

For more information, download the course description here.

Pre-Conference Workshops
NSE 7 SD-WAN v7.2

This course is a preview of the upcoming and new NSE 7 SD-WAN v.7.2 course. You will learn about common SD-WAN deployment scenarios using the Fortinet Secure SD-WAN solution. You will explore different situations, from a single enterprise site to multiple data center environments, that will help you to enhance and troubleshoot SD-WAN deployments.

To learn more, click here

Pre-Conference Workshops
NSE 7 SD-WAN v7.2

This course is a preview of the upcoming and new NSE 7 SD-WAN v.7.2 course. You will learn about common SD-WAN deployment scenarios using the Fortinet Secure SD-WAN solution. You will explore different situations, from a single enterprise site to multiple data center environments, that will help you to enhance and troubleshoot SD-WAN deployments.

To learn more, click here

Pre-Conference Workshops
Cybersecurity (powered by FortiGuard Labs) - Offensive OT Security

Industrial Control Systems (ICS) and Operational Technology (OT) are part of critical infrastructure environments for many commercial and government organizations. Attacks against assets in these environments have been increasing at an exponential pace. Damage to these environments can cause significant damage to the operations of a business, agency, government entity, and even nations. Attackers understand these are valuable targets and focus on them because of historically successful attacks. This class will focus on cyber offensive attacks in the OT space. We will focus on how attackers exploit systems and IoT/OT devices to compromise critical infrastructure. Learn to think like an attacker and understand how to defend your critical infrastructure.

For more information, download the course description here.

Pre-Conference Workshops
Deep Dive into Authentication Troubleshooting

The training deep dive in authentication troubleshooting will focus on configuring and troubleshooting different authentication protocols (LDAP, RADIUS, PKI, SAML, Kerberos) across various Fortinet products (FortiGate, FortiADC, FortiWeb, FortiAuthenticator).

It also includes a lesson with tips and best practices using Wireshark, where you'll learn how to customize your Wireshark to get the most out of it.

For more information, download the course description here.

Pre-Conference Workshops
NSE 5 FortiAnalyzer Analyst v7.2 (Day 2)

In this course, you will learn the fundamentals of using FortiAnalyzer for centralized logging. You will also learn how to identify current and potential threats through log analysis. Finally, you will examine the management of events, incidents, reports, and task automation with playbooks. These skills will provide you with a solid foundation for becoming a SOC analyst in an environment using Fortinet products.

To learn more, click here

Pre-Conference Workshops
NSE 7 Public Cloud Security v7.2

In this course, you will learn how to deploy FortiGate VMs in the public cloud using various methods. You will learn how to use third-party automation tools to deploy FortiGate VMs and secure your network. You will take a deep dive into AWS SD-WAN Connect deployments and learn how to utilize AWS Transit Gateway to secure east-west and north-south traffic. You will also learn how to effectively troubleshoot FortiGate deployments in Azure and how to use FortiCNP to simplify risk management for your AWS workloads.

To learn more, click here

Pre-Conference Workshops
NSE 5 FortiEDR v5.0

In this interactive course, you will learn how to use FortiEDR to protect your endpoints against advanced attacks with real-time orchestrated incident response functionality. You will also explore FortiEDR features and how they protect your endpoints automatically in real time.

(ISC)² CPE Training Hours: 6

(ISC)² CPE Lab Hours: 6

(ISC)² CISSP Domains: Communication and Network Security

To learn more, click here

Pre-Conference Workshops
NSE 7 Enterprise Firewall v7.2

This course is a preview of the upcoming NSE 7 Enterprise Firewall v7.2 course. You will learn how to implement, troubleshoot, and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices.

To learn more, click here

Pre-Conference Workshops
NSE 7 Enterprise Firewall v7.2

This course is a preview of the upcoming NSE 7 Enterprise Firewall v7.2 course. You will learn how to implement, troubleshoot, and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices.

To learn more, click here

Pre-Conference Workshops
NSE 7 Advanced Analytics v6.6

During this two-day training, you will learn the most important topics and concepts that are covered in the NSE 7 Advanced Analytics v6.6 course. You will learn how to use FortiSIEM in a multi-tenant environment. You will learn about rules and their architecture, how incidents are generated, how baseline calculations are performed, the different remediation methods available, and how the MITRE ATT&CK framework integrates with FortiSIEM. You will also learn how to integrate FortiSOAR with FortiSIEM.

To learn more, click here

Pre-Conference Workshops
NSE 6 FortiSwitch v7.2

During this two-day training, you will learn the most important topics and concepts that are covered in the NSE 6 FortiSwitch v7.2 course. You will learn how to deploy, provision, and manage a FortiSwitch with FortiGate using FortiLink. This course also covers the deployment and troubleshooting of Layer 2 and Layer 3 features, as well as the most common FortiSwitch stack topologies, including those that leverage multichassis link aggregation group (MCLAG) for redundancy and higher performance. You will also learn about FortiSwitch in standalone mode, its unique features, and how to manage a standalone switch directly, or from FortiSwitch Cloud.

To learn more, click here

Pre-Conference Workshops
Automation, API & Scripting

The training Automation, API & Scripting will focus on different aspects of Automation. On day one, the automation features that are ready-to-use inside FortiOS & FortiManager/FortiAnalyzer (7.2.x) will be explored along with how to set up an environment for demo/testing Automation features.

Day two will take automation one step further by exploring and interacting with the API capabilities of FortiOS (7.2.x), FortiManager/FortiAnalyzer, and FortiAuthenticator using various tools.

Day two also includes an introduction into python scripting, where you'll learn how to interact with Fortinet devices using SSH and the API to explore the capabilities of automation using python scripts.

For more information, download the course description here.

Pre-Conference Workshops
NSE 6 FortiSwitch v7.2

During this two-day training, you will learn the most important topics and concepts that are covered in the NSE 6 FortiSwitch v7.2 course. You will learn how to deploy, provision, and manage a FortiSwitch with FortiGate using FortiLink. This course also covers the deployment and troubleshooting of Layer 2 and Layer 3 features, as well as the most common FortiSwitch stack topologies, including those that leverage multichassis link aggregation group (MCLAG) for redundancy and higher performance. You will also learn about FortiSwitch in standalone mode, its unique features, and how to manage a standalone switch directly, or from FortiSwitch Cloud.

To learn more, click here

Pre-Conference Workshops
NSE 6 FortiNAC v7.2

During this two-day training, you will learn the most important topics and concepts that are covered in the NSE 6 FortiNAC v.7.2 course. You will learn how to leverage the powerful and diverse capabilities of FortiNAC, using best practices for achieving visibility, control, and response. These fundamentals will provide you with a solid understanding of how to implement network visibility and security automation.

To learn more, click here

Pre-Conference Workshops
NSE 6 FortiNAC v7.2

During this two-day training, you will learn the most important topics and concepts that are covered in the NSE 6 FortiNAC v.7.2 course. You will learn how to leverage the powerful and diverse capabilities of FortiNAC, using best practices for achieving visibility, control, and response. These fundamentals will provide you with a solid understanding of how to implement network visibility and security automation.

To learn more, click here

Pre-Conference Workshops
NSE 7 Public Cloud Security v7.2

In this course, you will learn how to deploy FortiGate VMs in the public cloud using various methods. You will learn how to use third-party automation tools to deploy FortiGate VMs and secure your network. You will take a deep dive into AWS SD-WAN Connect deployments and learn how to utilize AWS Transit Gateway to secure east-west and north-south traffic. You will also learn how to effectively troubleshoot FortiGate deployments in Azure and how to use FortiCNP to simplify risk management for your AWS workloads.

To learn more, click here

Pre-Conference Workshops
Pre-Conference Registration and Check-In Pre-Conference Workshops
Lunch Pre-Conference Workshops
Lunch Pre-Conference Workshops
NSE 5 FortiSIEM v6.3

In this course, you will learn about FortiSIEM initial configurations, architecture, and the discovery of devices on the network. You will also learn how to collect performance information and aggregate it with syslog data to enrich the overall view of the health of your environment, how to use the configuration database to greatly facilitate compliance audits, and how to integrate FortiSIEM into your network awareness infrastructure.

To learn more, click here

Pre-Conference Workshops
NSE 5 FortiAnalyzer Analyst v7.2 (Day 2)

This course teaches you the fundamentals of using FortiAnalyzer for centralized logging and reporting. You will learn how to configure and deploy FortiAnalyzer, and identify threats and attack patterns through logging, analysis, and reporting. Finally, you will examine the management of events, incidents, playbooks, and some helpful troubleshooting techniques.

Pre-Conference Workshops
NSE 7 Zero Trust Access (ZTA)

In this course, you will learn how to define, design, deploy, and manage Zero Trust Access (ZTA) using different Fortinet solutions. You will also learn how to configure FortiGate, FortiClient EMS, FortiAuthenticator, FortiNAC, and FortiAnalyzer to secure network and application access, monitor ZTA enforcement, and automate incident response.

To learn more, click here

Pre-Conference Workshops
NSE 7 Zero Trust Access (ZTA)

In this course, you will learn how to define, design, deploy, and manage Zero Trust Access (ZTA) using different Fortinet solutions. You will also learn how to configure FortiGate, FortiClient EMS, FortiAuthenticator, FortiNAC, and FortiAnalyzer to secure network and application access, monitor ZTA enforcement, and automate incident response.

To learn more, click here

Pre-Conference Workshops
NSE 7 SD-WAN v7.2

This course is a preview of the upcoming and new NSE 7 SD-WAN v.7.2 course. You will learn about common SD-WAN deployment scenarios using the Fortinet Secure SD-WAN solution. You will explore different situations, from a single enterprise site to multiple data center environments, that will help you to enhance and troubleshoot SD-WAN deployments.

To learn more, click here

Pre-Conference Workshops
NSE 7 Public Cloud Security v7.2

In this course, you will learn how to deploy FortiGate VMs in the public cloud using various methods. You will learn how to use third-party automation tools to deploy FortiGate VMs and secure your network. You will take a deep dive into AWS SD-WAN Connect deployments and learn how to utilize AWS Transit Gateway to secure east-west and north-south traffic. You will also learn how to effectively troubleshoot FortiGate deployments in Azure and how to use FortiCNP to simplify risk management for your AWS workloads.

To learn more, click here

Pre-Conference Workshops
NSE 7 Enterprise Firewall v7.2

This course is a preview of the upcoming NSE 7 Enterprise Firewall v7.2 course. You will learn how to implement, troubleshoot, and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices.

To learn more, click here

Pre-Conference Workshops
NSE 7 Advanced Analytics v6.6

During this two-day training, you will learn the most important topics and concepts that are covered in the NSE 7 Advanced Analytics v6.6 course. You will learn how to use FortiSIEM in a multi-tenant environment. You will learn about rules and their architecture, how incidents are generated, how baseline calculations are performed, the different remediation methods available, and how the MITRE ATT&CK framework integrates with FortiSIEM. You will also learn how to integrate FortiSOAR with FortiSIEM.

To learn more, click here

Pre-Conference Workshops
NSE 6 FortiSwitch v7.2

During this two-day training, you will learn the most important topics and concepts that are covered in the NSE 6 FortiSwitch v7.2 course. You will learn how to deploy, provision, and manage a FortiSwitch with FortiGate using FortiLink. This course also covers the deployment and troubleshooting of Layer 2 and Layer 3 features, as well as the most common FortiSwitch stack topologies, including those that leverage multichassis link aggregation group (MCLAG) for redundancy and higher performance. You will also learn about FortiSwitch in standalone mode, its unique features, and how to manage a standalone switch directly, or from FortiSwitch Cloud.

To learn more, click here

Pre-Conference Workshops
NSE 6 FortiSwitch v7.2

During this two-day training, you will learn the most important topics and concepts that are covered in the NSE 6 FortiSwitch v7.2 course. You will learn how to deploy, provision, and manage a FortiSwitch with FortiGate using FortiLink. This course also covers the deployment and troubleshooting of Layer 2 and Layer 3 features, as well as the most common FortiSwitch stack topologies, including those that leverage multichassis link aggregation group (MCLAG) for redundancy and higher performance. You will also learn about FortiSwitch in standalone mode, its unique features, and how to manage a standalone switch directly, or from FortiSwitch Cloud.

To learn more, click here

Pre-Conference Workshops
NSE 6 FortiNAC v7.2

During this two-day training, you will learn the most important topics and concepts that are covered in the NSE 6 FortiNAC v.7.2 course. You will learn how to leverage the powerful and diverse capabilities of FortiNAC, using best practices for achieving visibility, control, and response. These fundamentals will provide you with a solid understanding of how to implement network visibility and security automation.

To learn more, click here

Pre-Conference Workshops
NSE 5 FortiSIEM v6.3

In this course, you will learn about FortiSIEM initial configurations, architecture, and the discovery of devices on the network. You will also learn how to collect performance information and aggregate it with syslog data to enrich the overall view of the health of your environment, how to use the configuration database to greatly facilitate compliance audits, and how to integrate FortiSIEM into your network awareness infrastructure.

To learn more, click here

Pre-Conference Workshops
NSE 5 FortiManager v7.2

In this course, you will learn the fundamentals of using FortiManager for the centralized network administration of many FortiGate devices.

In interactive labs, you will explore deployment strategies, which include single or multiple ADOMs, device registration, policy packages, shared objects, installing configuration changes, provisioning FortiManager as a local FortiGuard distribution server, and troubleshooting the features that are critical to day-to-day use after you deploy FortiManager.

For more information, download the course description here.

Pre-Conference Workshops
NSE 5 FortiEDR v5.0

In this interactive course, you will learn how to use FortiEDR to protect your endpoints against advanced attacks with real-time orchestrated incident response functionality. You will also explore FortiEDR features and how they protect your endpoints automatically in real time.

(ISC)² CPE Training Hours: 6

(ISC)² CPE Lab Hours: 6

(ISC)² CISSP Domains: Communication and Network Security

To learn more, click here

Pre-Conference Workshops
NSE 5 FortiEDR v5.0

In this interactive course, you will learn how to use FortiEDR to protect your endpoints against advanced attacks with real-time orchestrated incident response functionality. You will also explore FortiEDR features and how they protect your endpoints automatically in real time.

(ISC)² CPE Training Hours: 6

(ISC)² CPE Lab Hours: 6

(ISC)² CISSP Domains: Communication and Network Security

To learn more, click here

Pre-Conference Workshops
NSE 4 Immersion v7.2

This course is an expanded version (from 1 day to 2 days) of the NSE 4 Immersion v.7.2 course. You will be assigned a series of do-it-yourself (DIY) configuration tasks in a virtual lab environment. The configuration tasks cover some of the topics in the NSE 4 certification exam and include the use of the most common FortiGate features, such as firewall policies, the Fortinet Security Fabric, user authentication, SSL and IPsec VPNs, equal-cost multi-path (ECMP) routing, SD-WAN, high availability (HA), and content inspection.

This course is not a replacement for the FortiGate Security and FortiGate Infrastructure courses, and it is meant to complement what you had learned from those courses or from your hands-on working experience with ForiGate devices.

For more information, download the course description here.

Pre-Conference Workshops
NSE 4 Immersion v7.2

This course is an expanded version (from 1 day to 2 days) of the NSE 4 Immersion v.7.2 course. You will be assigned a series of do-it-yourself (DIY) configuration tasks in a virtual lab environment. The configuration tasks cover some of the topics in the NSE 4 certification exam and include the use of the most common FortiGate features, such as firewall policies, the Fortinet Security Fabric, user authentication, SSL and IPsec VPNs, equal-cost multi-path (ECMP) routing, SD-WAN, high availability (HA), and content inspection.

This course is not a replacement for the FortiGate Security and FortiGate Infrastructure courses, and it is meant to complement what you had learned from those courses or from your hands-on working experience with ForiGate devices.

For more information, download the course description here.

Pre-Conference Workshops
NSE 4 Immersion v7.2

This course is an expanded version (from 1 day to 2 days) of the NSE 4 Immersion v.7.2 course. You will be assigned a series of do-it-yourself (DIY) configuration tasks in a virtual lab environment. The configuration tasks cover some of the topics in the NSE 4 certification exam and include the use of the most common FortiGate features, such as firewall policies, the Fortinet Security Fabric, user authentication, SSL and IPsec VPNs, equal-cost multi-path (ECMP) routing, SD-WAN, high availability (HA), and content inspection.

This course is not a replacement for the FortiGate Security and FortiGate Infrastructure courses, and it is meant to complement what you had learned from those courses or from your hands-on working experience with ForiGate devices.

For more information, download the course description here.

Pre-Conference Workshops
NSE 4 Immersion v7.2

This course is an expanded version (from 1 day to 2 days) of the NSE 4 Immersion v.7.2 course. You will be assigned a series of do-it-yourself (DIY) configuration tasks in a virtual lab environment. The configuration tasks cover some of the topics in the NSE 4 certification exam and include the use of the most common FortiGate features, such as firewall policies, the Fortinet Security Fabric, user authentication, SSL and IPsec VPNs, equal-cost multi-path (ECMP) routing, SD-WAN, high availability (HA), and content inspection.

This course is not a replacement for the FortiGate Security and FortiGate Infrastructure courses, and it is meant to complement what you had learned from those courses or from your hands-on working experience with ForiGate devices.

For more information, download the course description here.

Pre-Conference Workshops
Networking Security Troubleshooting v7.2

This course is a preview of the upcoming and new NSE 7 Network Security Troubleshooting v.7.2 course. You will learn how to diagnose and troubleshoot the most common networking and security problems in a FortiGate network security solution. In interactive break-and-fix labs you will use tools, diagnostic, and debug commands to detect, isolate, and resolve problems related with the most commonly used FortiGate features, such as IPsec, routing, web filtering, HA, IPS, and more. These skills and knowledge will give you an advanced understanding of how to support a network security solution based on FortiGate devices.

To learn more, view the course description here.

Pre-Conference Workshops
NSE 8 Immersion v7.2

The NSE 8 Immersion is an all-hands-on lab that students preparing for the NSE 8 practical exam can do to get an exam-like experience. Based on the previous NSE 8 practical exam, students will be tasked with completing the lab in a challenging learning environment. Fortinet products in the lab include FortiGate, FortiManager, FortiAnalyzer, FortiWeb, FortiMail, FortiADC, FortiAuthenticator, and FortiSandbox. During the sessions, an NSE8-certified instructor is available for questions and to help gain knowledge to prepare for becoming NSE 8 certified.

For more information, download the course description here.

Pre-Conference Workshops
NSE 7 OT Security v7.2

This course will teach you how to secure your OT infrastructure using Fortinet solutions.

You will learn how to design, deploy, administrate, and monitor FortiGate, FortiNAC, FortiAnalyzer, and FortiSIEM devices to secure OT infrastructures. These skills will provide you with a solid understanding of designing, implementing, and operating an OT security solution based on Fortinet products.

For more information, download the course description here.

Pre-Conference Workshops
NSE 7 Public Cloud Security v7.2

In this course, you will learn how to deploy FortiGate VMs in the public cloud using various methods. You will learn how to use third-party automation tools to deploy FortiGate VMs and secure your network. You will take a deep dive into AWS SD-WAN Connect deployments and learn how to utilize AWS Transit Gateway to secure east-west and north-south traffic. You will also learn how to effectively troubleshoot FortiGate deployments in Azure and how to use FortiCNP to simplify risk management for your AWS workloads.

To learn more, click here

Pre-Conference Workshops
Infrastructure as Code with Fortinet Products (Day 1)

An introduction course to Infrastructure as Code (IaC) using Terraform to create a web service protected with Fortinet products. Going through the basic concepts of IaC necessary for creating a full service with docker images, virtual machines, and networking, protected by FortiGate and FortiWeb, everything deployed using Terraform.

Learn more about this Pre-Conference Workshop here.

Pre-Conference Workshops
Automation, API & Scripting

The NSE 8 Immersion is an all-hands-on lab that students preparing for the NSE 8 practical exam can do to get an exam-like experience. Based on the previous NSE 8 practical exam, students will be tasked with completing the lab in a challenging learning environment. Fortinet products in the lab include FortiGate, FortiManager, FortiAnalyzer, FortiWeb, FortiMail, FortiADC, FortiAuthenticator, and FortiSandbox. During the sessions, an NSE8-certified instructor is available for questions and to help gain knowledge to prepare for becoming NSE 8 certified.

 

The training Automation, API & Scripting will focus on different aspects of Automation. On day one, the automation features that are ready-to-use inside FortiOS & FortiManager/FortiAnalyzer (7.2.x) will be explored along with how to set up an environment for demo/testing Automation features.

 

Day two will take automation one step further by exploring and interacting with the API capabilities of FortiOS (7.2.x), FortiManager/FortiAnalyzer, and FortiAuthenticator using various tools.

Day two also includes an introduction into python scripting, where you'll learn how to interact with Fortinet devices using SSH and the API to explore the capabilities of automation using python scripts.

For more information, download the course description here.

Pre-Conference Workshops
Cybersecurity (powered by FortiGuard Labs) - Offensive OT Security

Industrial Control Systems (ICS) and Operational Technology (OT) are part of critical infrastructure environments for many commercial and government organizations. Attacks against assets in these environments have been increasing at an exponential pace. Damage to these environments can cause significant damage to the operations of a business, agency, government entity, and even nations. Attackers understand these are valuable targets and focus on them because of historically successful attacks. This class will focus on cyber offensive attacks in the OT space. We will focus on how attackers exploit systems and IoT/OT devices to compromise critical infrastructure. Learn to think like an attacker and understand how to defend your critical infrastructure.

For more information, download the course description here.

Pre-Conference Workshops
Cybersecurity (powered by FortiGuard Labs) - Offensive OT Security

Industrial Control Systems (ICS) and Operational Technology (OT) are part of critical infrastructure environments for many commercial and government organizations. Attacks against assets in these environments have been increasing at an exponential pace. Damage to these environments can cause significant damage to the operations of a business, agency, government entity, and even nations. Attackers understand these are valuable targets and focus on them because of historically successful attacks. This class will focus on cyber offensive attacks in the OT space. We will focus on how attackers exploit systems and IoT/OT devices to compromise critical infrastructure. Learn to think like an attacker and understand how to defend your critical infrastructure.

For more information, download the course description here.

Pre-Conference Workshops
Deep Dive into Authentication Troubleshooting

The training deep dive in authentication troubleshooting will focus on configuring and troubleshooting different authentication protocols (LDAP, RADIUS, PKI, SAML, Kerberos) across various Fortinet products (FortiGate, FortiADC, FortiWeb, FortiAuthenticator).

It also includes a lesson with tips and best practices using Wireshark, where you'll learn how to customize your Wireshark to get the most out of it.

For more information, download the course description here.

Pre-Conference Workshops
Deep Dive into Authentication Troubleshooting

The training deep dive in authentication troubleshooting will focus on configuring and troubleshooting different authentication protocols (LDAP, RADIUS, PKI, SAML, Kerberos) across various Fortinet products (FortiGate, FortiADC, FortiWeb, FortiAuthenticator).

It also includes a lesson with tips and best practices using Wireshark, where you'll learn how to customize your Wireshark to get the most out of it.

For more information, download the course description here.

Pre-Conference Workshops
NSE 7 OT Security v7.2

This course will teach you how to secure your OT infrastructure using Fortinet solutions.

You will learn how to design, deploy, administrate, and monitor FortiGate, FortiNAC, FortiAnalyzer, and FortiSIEM devices to secure OT infrastructures. These skills will provide you with a solid understanding of designing, implementing, and operating an OT security solution based on Fortinet products.

For more information, download the course description here.

Pre-Conference Workshops
Automation, API & Scripting

The training Automation, API & Scripting will focus on different aspects of Automation. On day one, the automation features that are ready-to-use inside FortiOS & FortiManager/FortiAnalyzer (7.2.x) will be explored along with how to set up an environment for demo/testing Automation features.

Day two will take automation one step further by exploring and interacting with the API capabilities of FortiOS (7.2.x), FortiManager/FortiAnalyzer, and FortiAuthenticator using various tools.

Day two also includes an introduction into python scripting, where you'll learn how to interact with Fortinet devices using SSH and the API to explore the capabilities of automation using python scripts.

For more information, download the course description here.

Pre-Conference Workshops
NSE 7 SD-WAN v7.2

This course is a preview of the upcoming and new NSE 7 SD-WAN v.7.2 course. You will learn about common SD-WAN deployment scenarios using the Fortinet Secure SD-WAN solution. You will explore different situations, from a single enterprise site to multiple data center environments, that will help you to enhance and troubleshoot SD-WAN deployments.

To learn more, click here

Pre-Conference Workshops
NSE 7 Enterprise Firewall v7.2

This course is a preview of the upcoming NSE 7 Enterprise Firewall v7.2 course. You will learn how to implement, troubleshoot, and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices.

To learn more, click here

Pre-Conference Workshops
NSE 5 FortiAnalyzer Administrator v7.2 (Day 1)

This course teaches you the fundamentals of using FortiAnalyzer for centralized logging and reporting. You will learn how to configure and deploy FortiAnalyzer, and identify threats and attack patterns through logging, analysis, and reporting. Finally, you will examine the management of events, incidents, playbooks, and some helpful troubleshooting techniques.

Pre-Conference Workshops
NSE 8 Immersion v7.2

The NSE 8 Immersion is an all-hands-on lab that students preparing for the NSE 8 practical exam can do to get an exam-like experience. Based on the previous NSE 8 practical exam, students will be tasked with completing the lab in a challenging learning environment. Fortinet products in the lab include FortiGate, FortiManager, FortiAnalyzer, FortiWeb, FortiMail, FortiADC, FortiAuthenticator, and FortiSandbox. During the sessions, an NSE8-certified instructor is available for questions and to help gain knowledge to prepare for becoming NSE 8 certified.

For more information, download the course description here.

Pre-Conference Workshops
NSE 6 FortiNAC v7.2

During this two-day training, you will learn the most important topics and concepts that are covered in the NSE 6 FortiNAC v.7.2 course. You will learn how to leverage the powerful and diverse capabilities of FortiNAC, using best practices for achieving visibility, control, and response. These fundamentals will provide you with a solid understanding of how to implement network visibility and security automation.

To learn more, click here

Pre-Conference Workshops
NSE 7 Advanced Analytics v6.6

During this two-day training, you will learn the most important topics and concepts that are covered in the NSE 7 Advanced Analytics v6.6 course. You will learn how to use FortiSIEM in a multi-tenant environment. You will learn about rules and their architecture, how incidents are generated, how baseline calculations are performed, the different remediation methods available, and how the MITRE ATT&CK framework integrates with FortiSIEM. You will also learn how to integrate FortiSOAR with FortiSIEM.

To learn more, click here

Pre-Conference Workshops
Networking Security Troubleshooting v7.2

This course is a preview of the upcoming and new NSE 7 Network Security Troubleshooting v.7.2 course. You will learn how to diagnose and troubleshoot the most common networking and security problems in a FortiGate network security solution. In interactive break-and-fix labs you will use tools, diagnostic, and debug commands to detect, isolate, and resolve problems related with the most commonly used FortiGate features, such as IPsec, routing, web filtering, HA, IPS, and more. These skills and knowledge will give you an advanced understanding of how to support a network security solution based on FortiGate devices.

To learn more, view the course description here.

Pre-Conference Workshops
Cybersecurity (Powered by FortiGuard Labs) - Web Application Security (Day 2)

This cybersecurity module will explore web application threats and countermeasures focused on Fortinet solutions. Comprised of theory lessons and hands-on labs, this course will get the students from the very motivations of attacks to web applications through understanding and executing attack techniques, recognizing such attacks, and configuring Fortinet solutions to mitigate them.

Learn more about this Pre-Conference Workshop here.

Pre-Conference Workshops
NSE 5 FortiManager v7.2

In this course, you will learn the fundamentals of using FortiManager for the centralized network administration of many FortiGate devices.

In interactive labs, you will explore deployment strategies, which include single or multiple ADOMs, device registration, policy packages, shared objects, installing configuration changes, provisioning FortiManager as a local FortiGuard distribution server, and troubleshooting the features that are critical to day-to-day use after you deploy FortiManager.

For more information, download the course description here.

Pre-Conference Workshops
Pre-Conference Welcome Reception Pre-Conference Workshops
Technical Track
Agile Wireless WAN Solution for Your SD Branch

FortiExtender is a fully fabric integrated Wireless LTE/5G WAN access for your SD-WAN and SD-BRANCH deployments. You can define SD-WAN rules, policies on wireless interfaces providing an extended choice of connectivity, and redundancy while optimizing overall operational cost. FortiExtender can also be independently deployed and managed by cloud service. In addition, With some of the purpose-built models and solutions, it serves FortiSASE, mobile and OT use cases.

Technical Track
App-to-App Zero Trust Protection in Security Fabric

Prevent unauthorized and unexpected connections between apps!

Join this session to see how FortiPolicy can discover apps, multi-tier apps and automatically generate policies to achieve this. You will get visibility into apps, connections, and separation required to protect your apps and data.

Technical Track
Agile Consumption with Fortinet On-demand Points Solutions

Organizations' appetite for on-demand and pay-as-you-go style consumption methods continuously grow. In this session, learn how to gain agility and flexibility with Fortinet's points based system for on-demand products and services.

Technical Track
Accelerating the Cloud Journey with ZTNA and SASE

Join us to see how FortiSASE can accelerate your cloud journey with unified Secure Internet Access (SIA) & Secure Private Access (SPA), secured by Fortinet NGFW, ZTNA, and CASB technologies. 

Technical Track
Cross-Fabric eXtended, Automated Detection and Response

Recent research reports indicate that security operations today are more difficult than they were two years ago. Top reasons being the changing threat landscape and attack surface and increased use of cloud services. Other notable challenges were the expansion of data collected, too many unscalable manual actions, gaps in security monitoring, and the inability to automate complex tasks.

The concept of XDR, built on the foundation of EDR, comes to solving these problems. While EDR specifically covers endpoints with additional integrations, the “X” in XDR indicates that the solution can normalize and correlate data from other security products to detect attacks and automate a response.

Join this session to get an overview of FortiXDR and how its built-in integrations and AI-based capabilities allow leveraging the security ecosystem to get more accurate, automatic, contextual detections as well as automatic cross-systems incident-response.

Technical Track
Evolution of SD-WAN Performance & Orchestration

The industry-leading Secure SD-WAN solution continues to evolve with some of the most significant updates to date. With major enhancements from top to bottom, Fortinet continues to set the standard for application performance and security.

Join us as we dive into some of the newest features introduced since 7.2, including enhancements across provisioning, operations and application performance. We’ll review how users of all backgrounds could deploy and manage SD-WAN networks using the orchestration and provisioning capabilities introduced in 7.2.0.

Technical Track
Simplified and Secure Application Access for Hybrid Workforce with Zero Trust

Organizations are moving towards remote and hybrid work environments. These trends are exposing organizations to higher security risks beyond corporate perimeters with bigger attack surfaces and reduced visibility & control. Remote Endpoints are the new perimeter edge that needs to be monitored and secured.

Join this session to get an overview of how you can adopt Fortinet’s Zero Trust Network Access solution to enhance endpoint security and provide secure access to both on-premise and SaaS Applications from anywhere and everywhere using our integrated FortiClient Agent. 

Technical Track
Secure Your Network and Expand Your Coverage with Fastest Sandbox

A typical IT security response: Sandboxing, checked! Inline-Blocking, maybe? MacOS, Linux, Android VMs, likely not. Learn how to use the latest updates on Sandboxing technologies to expand your coverage.

Technical Track
FortiNDR: New Era of Threat Detection with Advanced ML

Network Detection Response - a new way to detect threats based on customers' traffic meta data, using advanced analytics and machine learning techniques.

Find out the latest development for NDR space and how it will help organizations to detect threats early. 

Technical Track
FortiPAM: Secure, Control and Monitor Access to Your Critical Systems and Data

Often, the difference between Identity Access Management (IAM) and Privileged Access Management (PAM) is not understood since they are both used to protect access to resources. You might think that if you control access to a resource via a user’s identity, you control the accounts that users can use. But that is not the case. IAM and PAM are accessed via different network methods and have different objectives in controlling and protecting an attack surface. IAM is focused on general end-users and controlling access that users have within an application. PAM is focused on IT administration and Sys Admin as end-users using and controlling access to privileged account credentials and monitoring privileged account activity. The key difference is the interface PAM and IAM use to allow access to an application because of the much higher risk associated with access to a privileged account. 

Technical Track
FortiTrust Identity: Facilitating the Journey to the Cloud

FortiTrust Identity is a full-featured IAM service hosted by Fortinet. It is designed to integrate seamlessly with Fortinet’s SASE and ZTNA products for Zero Trust deployments. FortiTrust Identity’s unique and powerful IAM features provide the highest security for the business and the lowest friction end-user experience. A compelling example of FortiTrust Identity’s value is how it can be deployed with FortiSASE or FortiZTNA in a legacy Active Directory environment to enable secure SSO to cloud and SaaS applications without having to move accounts from AD.

Technical Track
Fabric Integrated and Multi-Vendor Options for Dynamic Access Control

With the continued huge growth of devices and users coming on the networks, it remains critical to discover, identify and control everything that’s coming on board. FortiNAC provides you with several industry-leading options. You can deploy it fully integrated with Security Fabric utilizing the powerful capabilities of core Fabric components.

FortiNAC also has extensive multi-vendor support as well as its highly scalable enabling the ability to protect thousands of endpoints per deployment. 

Technical Track
Automate NetOps at Scale with Single Pane Management

Networks are constantly evolving, and the attack surface now extends beyond the perimeter to cloud services, IoT devices, employees’ homes, customers, and suppliers. Network teams struggle to manage multiple networks while delivering secure, consistent access, policies, and services.

In this session, we’ll explore how you can use FortiManager and FortiPortal to automate the management for on-prem data centers, cloud, and large branch locations to improve operational efficiency.

Technical Track
Managing at Scale and Adapting Wi-Fi 6E and 7!

Turn on self-tuning and self-checking networks with FortiAIOps. Learn how this integrated AIOps tool can lower your time-to-remediation across your LAN Edge and SD-WAN estate.

In this session, you will discover the latest FortiAP hardware and software features and what the future holds for Wi-Fi.

Technical Track
Unlocking the Power of FortiCloud for Deployment & Management: User, Inventory, ZTP and Entitlement Management

Unlock the power of FortiCloud by running deployment, entitlement, and management all from a single login. Learn about the Organisational Units, Licensing, and ZTP in this FortiCLoud overview.

Technical Track
Expanding the Visibility: DEM, SD WAN Integration and 3rd Party Network Monitoring

Expand the visibility of the security fabric, and discover how total visibility is achievable for your entire network with Fortinet and 3rd Party equipment from traditional networking to cloud workloads and all in between.

Technical Track
SOCaaS: A New Approach to Fast Track Your Security

Staff shortage? Budget constraints? An overwhelming number of threats and alerts?

Join this session to learn how small to mid-sized companies can benefit from FortiGuard SOCaaS and have a 24x7 SOC that never sleeps.

You will learn how AI, machine learning, and automation are leveraged for highly efficient and effective threat detection, alert triage, and incident response.

Technical Track
Supercharge Your SOC with FortiAnalyzer, SIEM and SOAR

As today’s threat landscape continues to expand, SOC teams struggle with the disparate tools that they rely on to drive threat detection and incident response, the disconnect between products and services, and a lack of usability.

In this session, we’ll explore how you can:

  • Get faster search, insights, streamlined processes, and more to eliminate security blind spots with FortiAnalyzer and FortiSIEM
  • Automate and orchestrate security operations by leveraging FortiSOAR Threat Intel management, with out-of-the-box content packages, and playbooks
Technical Track
Uncovering Hidden Threats: FortiSIEM Security Analytics

Using the latest FortiSIEM developments in event correlations, machine learning, automation, and incident investigations, FortiSIEM enables organizations to maximize their security investments to stay ahead of increasingly sophisticated cyber threats.

Technical Track
Email Breach Prevention

Explore how Fortinet can enable a more secure and productive workforce by defending your Microsoft 365 and Google inboxes from the top threats, including phishing, ransomware, and business email compromise

Technical Track
SaaS Security: Securing User Access with Network and API SaaS Security

As organizations continue to use SaaS applications for an increasing variety of use cases, the need for visibility and control over data and usage patterns grows. Additionally, users work from a variety of locations using a variety of devices. Securing the SaaS journey grows in complexity, and organizations must consider a combination of cloud and inline CASB solutions.

This session will cover the Fortinet Security Fabric CASB solution and showcase its ability to uniquely address the modern organization's expansive SaaS security requirements. 

Technical Track
Managing Cloud Risk with Fortinet Cloud Security

As organizations build and migrate applications to cloud infrastructure and platform service providers such as AWS, Azure, and GCP, the need to maintain visibility and manage risk across the entire cloud estate grows.

In this session, we will present a priority-based risk management approach to address these challenges. The session will showcase FortiCNP and its ability to prioritize cloud risk as well as its integration with cloud provider native security tools and FortiGate VM instances that protect cloud workloads.

Technical Track
Top 5 Use Cases for Securing Your Cloud Network

Maintaining consistent, secure networking across the everchanging infrastructure in dynamic and hybrid world-spanning cloud and on-prem infrastructures is more critical than ever. Network connectivity, security, and operations all play a critical role in the organization.

In this session, we will review five secure networking use cases offered by Fortinet for cloud customers. From high-performance / low footprint FortiGate VM network virtual appliances, Multi-Cloud SD-WAN consistently running on different clouds and on-prem, to cloud-native integrations between Azure vWAN as well as GCP NCC with FortiOS, to the latest introduction of Fortinet's Cloud Native Firewall as a Service, FortiGate CNF.

Technical Track
Next-Generation Datacenter

FortiGate Next-Generation Firewalls (NGFWs) protect hybrid data centers with dynamic segmentation and coordinated, automated AI/ML-powered FortiGuard services to enable speed and manage all security risks.

Attend this session to learn about the latest Datacenter FortiGates and new 7.4 features that will help you reduce cost and complexity by eliminating point products and consolidating industry-leading security capabilities.

Technical Track
SOC5 : The Newest Secure SD-WAN ASIC

The Fortinet Secure SD-WAN (software-defined wide-area network) solution enables enterprises to transform and secure all WAN edges.

Learn how the latest SOC5 Secure SD-WAN ASIC and FortiGates can help you realize a superior user experience and enhanced security posture effectiveness with converged networking and security.

Technical Track
Protect Your Data by Stopping Attacks at LAN Edge

With FortiLink technology, security is extended to the network perimeter. Fortinet’s Security Fabric has integrated, dynamic, and adaptive network access control providing powerful tools to secure the data at the LAN Edge. With a wide range of FortiSwitch & FortiAP models, such solutions can be built for small to large deployments, serving retail and branch offices to large enterprises, including OT deployments.

In this session, you will get the latest information on Wi-Fi 6E and & 7 FortiAP models.

Technical Track
Application Security: From Development to Production

With the rapid expansion of the customer's digital footprint, the attack surface continues to grow. Developments in how applications are developed and delivered create a major headache for security teams to keep as these changes allow applications to be updated sometimes on a daily basis.

In this session, we will go over the challenges of securing applications throughout their lifecycle and discuss solutions to protect applications from development to production

Technical Track
On-Demand Experts and Advisory Services

Despite continued investments in the latest and greatest cybersecurity technology, successful breaches continue to plague organizations. Fortinet’s 2022 Cybersecurity skills gap report indicates it’s a Cybersecurity Skill Shortage problem. The report survey highlights that Worldwide, 80% of organizations suffered one or more breaches that they could attribute to the lack of cybersecurity skills and/or awareness.

In this session, you will learn about FortiGuard’s Global Security Consulting service offerings, including Incident Response and SOC Incident Readiness services, and how these consulting services are helping customers solve the lack of expert resource availability.

Technical Track
Stay Ahead of Threats with FortiRecon

Learn how FortiRecon Digital Risk Protection (DRP) service can help you avoid threats before they become cyberattacks. It combines three powerful modules – External Attack Surface Management, Brand Protection, and Adversary Centric Intelligence, to provide unified threat intelligence about the attackers targetting your network, the techniques they use, and how to stop them.

Technical Track
Deceive by Design: How to Use Deception Technology to Protect Medical IoT, OT, and IT Networks

Advanced deception technologies put the power back into the hands of its defenders, with the ability to deceive attackers into engaging with fake assets, data, and applications and, ultimately -- revealing themselves. This results in high-fidelity alerts powered by valuable intelligence, accelerated response, and actionable insights into your environment’s defense weak spots.

Join us in this session us to learn why deception technology is the “solution of choice” for many Fortinet customers. Find out how manufacturing, healthcare, utilities, and government organizations use Fortinet’s deception technology to secure their environment while ensuring business continuity effectively.

Technical Track
Voice of Customer
Let's Demystify SASE: Enabling Consistent Security and User Experience Anywhere

Today’s networks are nothing like the ones most security solutions were designed to defend, nor are they confined to four office walls. They are expansive and constantly evolving to support an organization’s digital acceleration efforts and work-from-anywhere (WFA) strategies. In response to these rapid changes, many organizations are challenged by an expanding attack surface, inconsistent security posture, and poor user experience.

In this session, you will learn how Fortinet delivers a comprehensive SASE solution that extends the convergence of networking and security from on-prem to remote users. FortiSASE seamlessly converges cloud-delivered security (comprised of a secure web gateway, universal zero trust network access, cloud access security broker, and Firewall-as-a-Service) with SD-WAN. A single operating system (FortiOS), single agent (FortiClient), and AI-powered security to drive consistent security posture and operational efficiency.

Featured Customers:

Upper Grande School District Wellington Catholic School District
Voice of Customer
State of Industrial Security and Future Trends

Recent geopolitical events and industrial incidents validate the exceptional risk associated with Industrial cyber events. Beyond these global events, numerous day-to-day challenges exist in mitigating operational risk in industrial environments.  As the stakes rise, OT network and security are relatively immature and at times, unique.

In this session, we'll catch up on recent Industrial events, discuss operational security pain points and examine OT security trends in relation to maturity.

Voice of Customer
The Future of Hybrid Network with Disruptions in Security, Productivity and ROI

Join us to learn more about innovative and disruptive technologies that will shape the future of the hybrid network and empower the CIO team with consolidation and simplified operations. With Fortinet’s convergence approach to bring network security and enterprise networking technologies in one unified offering, you can now take advantage of consistent security, 300%+ ROI, and better user experience across all locations.

Topics that will be covered during this session include security transformation and network modernization using NGFW, SD-WAN, LAN Edge, 5G, SASE, Automation, and Digital Experience Measurement.

Featured Customer:
S&P Global

Voice of Customer
Cybersecurity Vendor Consolidation, Done Right

According to Gartner, 75% of organizations are currently pursuing cybersecurity vendor consolidation to promote cybersecurity efficacy and team effectiveness, up dramatically compared to 25% in 2020.  Join us for a CISO discussion covering the following:

  1. What are the pros and cons of cyber security platforms vs. point products?
  2. Why are so many enterprises moving away from product-to-platform strategies?
  3. How does one decide when a platform component or a point product is right for a project?  
  4. It is a journey, not a rip and replace; how to account for consolidation in your 3-5 year plan?
  5. The 3 most important questions to ask when you invest in new technologies

Featured Customer:
National Healthcare (NHC)

Voice of Customer
How Services Helped Meet Organizational Support Strategy or Enable Transformation

Transformation is always difficult, and we’ve heard stories about long delays, missed opportunities, and semi-finished projects. In order for the transformation project to be successful, organizations must have an end-to-end strategy, resources, and expertise to meet their objectives.

In this session, a customer will share how they met their transformation objectives and reduced the time-to-value by leveraging Fortinet’s FortiCare Services.

Voice of Customer
What Does It Really Mean to "Automate My SOC"?

Automation, orchestration, machine learning, artificial intelligence -- many of the claims made in today's security marketplace make it seem like the cyber skills shortage is irrelevant because the machines are ready to solve all of our security operations challenges. While clearly not the case (yet), there are some truly impactful ways to leverage the latest technologies that can allow a smaller team to move faster and do more.

In this session, we will focus on the places where too many security operations teams are wasting time on automatable processes and we'll dig into some of the extraordinary security ops enhanced capabilities that machine learning and automation have made accessible to those without extraordinary security ops budgets.

Featured Customers:

Riverside Health USI

 

Voice of Customer
Discover a LAN Solution Focused on Features Not Licensing, with Security by Design, Not Add-on

As we have asked more of our wired and wireless networks, they have become more complex to maintain and secure. In this session, you will hear from our customers on how the Fortinet LAN Edge Solution simplifies and secures the LAN with intelligence.

Featured Customers:

Voice of Customer
Increasing Productivity of Security and Network Teams with Secure SD-WAN

With its centralized, single pane of glass, network and security teams can see everything about any device and any traffic that’s going through.

This session will explore how a Fortinet customer was able to identify more quickly and remediate network issues improving time to issue resolution and enabling to reassign security and network team resources to higher-value activities.

Featured Customer:
Gentiva

Voice of Customer
How Would You Know if Attackers are Inside Your Network? There’s a “Decoy” for That!

There’s always a chance the security controls you have in place are not 100% configured the way they should be -- up-to-date and patched. Maybe a third-party software was tampered with, and you weren’t aware of it. Or maybe, via a recent Merger and Acquisition (M&A), you exposed your network to hidden security risks. Attackers will always find their way in.
 
For every scenario, there’s a decoy to stop it – that’s where deception comes into play. Join us to learn how deception can be a force multiplier to current security defenses and enable early detection and response to in-network (human and automated) threats.

Discussion topics will include:

  • How to use deception to detect and protect against IT/OT threats
  • Valuable tips on how to architect a deception environment and measure its effectiveness
  • How deception, integrated into your security ecosystem, is used to enhance threat intelligence and to automate incident response
Voice of Customer
Stopping Future Spray-and-Pray Nation-State Ransomware Attacks at the Endpoint

Within five months of Russia’s invasion of Ukraine, the Financial Crimes Enforcement Network (FinCEN) reported that 75% of all ransomware attacks on American government agencies were from Russia. It is believed that heavily sanctioned nations have or will turn to cyber-attacks to fund various agencies. The data available to us shows that Russia is turning into a spray-and-pray IT security attack factory which puts all public and private organizations into its crosshairs.

This session will go into the details from the frontlines in Ukraine on how nation-states create attack pools based on vulnerabilities, how they initiate attacks, and what you can do about it. With 46% of people working from home in a hybrid work environment, we will discuss how endpoint security is your first, and last line of defense against these advanced attacks. We will dive into what types of tools might be right for you and how you can integrate them into your larger security ecosystem.

Featured Customer:
McComb Enterprises

Voice of Customer
101 Ways to Detect Intrusion Before Compromise: Break the Cyber Kill Chain

Many of today's most successful cyber campaigns are a composition of components provided by a robust cyber-criminal industry and delivered in multiple stages, often allowing them to bypass traditional security controls to gain entry and then remain below the radar as they progress to their ultimate objective. While these campaigns may be more difficult to detect, they do offer well-prepared cybersecurity teams multiple opportunities to thwart them.

Join this session as we map services and products to cyber kill chain stages and see the many ways your organization can gain early warning about intrusion before they have costly impacts.

Featured Customer:
Nuvance Health

Voice of Customer
Industrial Security: Maturing Solutions in Digital Transformation

Not long ago, Industrial security for OT was new or deemed unneeded since the factory was air-gapped. Today, that factory is connected to the internet and vulnerable to the added risk of personnel and production safety. With connectivity came the need for security. The first security steps included "visibility" of OT devices. Next, flat networks needed segmentation. Most companies are in this phase or still contemplating how to start.

In this session, we will focus on phase 2. We will discuss common pain points, take solutions beyond phase 1 and provide strategic considerations beyond phase 2.

Featured Customer:
Falu Energi & Vatten, Sweden

Voice of Customer
Why FortiCare Services are Critical for Your Organization

Many organizations struggle to secure their organizations and meet their organizational support objectives due to competing projects, staffing, and expertise, not to mention extended delays.

In this session, a Fortinet customer will share how they leveraged FortiCare Services to meet and exceed their support KPIs, reduce time-to-value timelines, and meet organizational objectives. 

Featured Customer:
PRGX

Voice of Customer
How FortiCare Services Helped Transform an Organization from Reactive to Proactive

In this session, a Fortinet customer will share how they leveraged Advanced Support to transform their organization from reactive firefighting to proactive incident prevention. This transformation enabled them to allocate their limited internal experts to other mission-critical projects strategically.

Voice of Customer
Reduce Complexity and Increase Efficiency of Hybrid Cloud Network Security Operations

According to a Cloud Security Report in May 2022, 39% of organizations surveyed will run their workloads in hybrid cloud environments with integration between private cloud and public cloud environments while 33% will use multi-cloud and only 27% will operate on a single cloud. For 95% of these organizations, security was a key concern and 78% are looking for a single cloud security platform.

Join us to learn how Fortinet delivers consistent and effective network security policy and enforcement with a single FortiOS platform to secure hybrid cloud deployments through deep integrations with SDN solutions and public cloud services.

Featured Customer:
Tegria

Voice of Customer
How to Leverage FortiCare Services

As the demand for cybersecurity skills increases in this tight labor market, many organizations need help to meet their organizational support objectives and secure their network from cyber threats.

In this session, a Fortinet customer will share how they leveraged FortiCare Services to meet and exceed their support KPIs and organizational objectives.

Voice of Customer
Comprehensive Zero Trust Delivered for Work From Anywhere Security

Work from Anywhere is the new normal, yet organizations are still struggling to get all the Zero Trust pieces to work together for complete security.  Fortinet's unique solution that encompasses identity, endpoint security, application access, and remote security covers all the requirements for a comprehensive solution that both allows for consistently high levels of security in any location as well as policies that follow employees.

Fortinet has converged the key technologies into an integrated solution that provides MFA, EPP, ZTNA, SASE, and EDR to create a platform with pre-validated integrations.  

During this session, you will learn how Fortinet makes it easy (and secure) to support Work From Anywhere with a Zero Trust approach. 

Voice of Customer
Making the Distributed Edge Mobile: How 5G/LTE Wireless WAN is Changing IT

Many enterprises are leveraging broadband in a distributed edge model to expand cloud access and cut costs. Yet, wired broadband is limited and the internet poses cyber risks. As a result, enterprises today are leveraging mobile 5G and LTE networks as their primary branch connection.

Attend this session to learn how Fortinet provides secure 5G/LTE wireless WAN for enterprises across many industries, transforming their distributed edge with secure, low-cost mobility.

Featured Customers:

Alaska Airlines University of Buffalo

 

Voice of Customer
Strategies for Securing Organizations Against Today’s Phishing, Impersonation, Zero Day and Email-based Ransomware Threats

In this session, we’ll briefly cover the latest trends in the threat landscape, including the use of AI by threat actors and then discuss best practices for email security, including securing cloud-based email services, the role of AI-powered sandboxing solutions and services to protect against zero-day malware, the use of DMARC and capabilities like DANE and MTA-STS, and combining email security with security awareness training and phishing simulation. We’ll also talk about how email security will evolve in the future to become part of organizations’ broader cybersecurity mesh adoption and resulting security outcomes.

You'll also hear from a customer using Fortinet’s email security-as-a-service solution, FortiMail, with Microsoft Exchange 365, and hear the benefits they get from this approach.

Voice of Customer
Accelerating Cloud Deployments with Fortinet Cloud Consulting Services

To stay ahead of the rapidly evolving threat landscape, organizations must adopt a cloud security architecture and operations that include a comprehensive and measured approach to cybersecurity. Fortinet experts use a vendor-agnostic approach to discover existing posture elements, align findings to business goals, guide current projects, and plan a future roadmap toward deep, native cloud security integration.

Join us to learn how Fortinet Cloud Consulting Services has helped customers achieve a holistic security architecture across private and public cloud environments, resilient enough to withstand the continuous changes in the threat landscape.

Voice of Customer
Applications Living in the Data Center: An Evolution Towards a Hybrid Network Environment

The data center is not dead. Sure, the speed of business is creating market dynamics that have increased the need for a hybrid network architecture, but the data center is a big part of the solution. Join Armando Diana, Director of Product Marketing, to explore the data center’s evolution into a more dynamic hybrid model of physical, virtual, and cloud infrastructures to handle applications living in the data center. You'll learn how one of Fortinet's top customers re-engineered their network to deploy a secure data center across a hybrid architecture and how they overcame the many challenges to ensure all network components are safe but effective.

They will also explore the enabling technologies for this reimagined future that will deliver a more reliable, energy-efficient, and secure network.

Featured Customer:
Nuvance Health

Voice of Customer
Securing the Web Application and API Attack Surface

Securing the attack surface for your organization's web applications and their APIs has never been more important. These applications increasingly deliver some of your organization’s critical line-of-business capabilities: e-commerce, payroll, supply chain management, business intelligence, and more, and to deliver those capabilities to the applications and APIs that access some of your organization’s most critical data. Threat actors targeting those data assets constantly probe those applications’ attack surfaces, looking for a way in. 

Join us to learn how Fortinet can help accelerate your digital transformation by helping you deploy business-critical web applications and APIs without compromising security.

Voice of Customer
Building Security into the CI/CD Application Lifecycle

The adoption of cloud-native strategies has enabled organizations to develop and deliver innovative solutions at a faster pace and helped to modernize and transform business operations.

With over 90% of organizations leveraging open-source software to build their applications, this is also an entry point for software vulnerabilities to be introduced into an application, which if exploited, can cause put organizations and customers at risk. And as applications become more complex, it is critical that security be integrated into the application build cycles early in the process to ensure software vulnerabilities are detected swiftly and remediated.

Come learn how Fortinet helps to simplify and automate application security (appsec) testing with broad visibility enabling organizations to manage and protect against software vulnerabilities for your applications.

Voice of Customer
Reducing Friction Across Clouds with Cloud-native Security

Digital transformation and cloud adoption continue to accelerate, with many organizations adopting a cloud-native first strategy to increase agility and efficiency while recognizing cost benefits. However, cybercriminals are getting smarter about the ways they are able to gain access to your network.

While native cloud security services help address the most common use cases for their clients, many organizations are still struggling with data overload and security teams are not able to separate through the noise to get to the core concerns that matter most.

Cloud-native protection platforms that natively integrate with Cloud Service Providers’ security services can provide a comprehensive, full-stack cloud security solution for securing cloud workloads.

Join us to learn how Fortinet helps to simplify cloud risk and enables organizations to make more impactful security decisions to proactively manage cloud using context-rich, actionable insights while maximizing your security investments to drive greater transformation and benefits.

Voice of Customer
Know Your External Threats Before They Turn into Internal Risks

Malicious actors are constantly launching cyberattacks, leveraging vulnerable internet-facing assets, fake websites, phishing campaigns, rogue mobile apps, fake social media accounts, and more. The earlier you can view what adversaries are seeing, doing, and planning, the faster you can adjust your security posture and respond.

Join us for an info-packed discussion, where you’ll see, firsthand, how to counter attacks at the reconnaissance phase – the initial stage of a cyberattack. Find out how to significantly reduce the risk, time, and costs of later-stage threat mitigation.

Areas covered will include:

  • Various ways of detecting immediate security threats relevant to your organization
  • Monitoring your organization’s digital footprint for effective brand protection and customer trust
  • Merging external attack surface visibility, dark web monitoring, and actionable threat intelligence for fast detection and response
Voice of Customer
Securing Application Journeys from Data Center to Cloud

As organizations continue to pursue digital acceleration initiatives to better compete in today’s business landscape, successfully executing upon their application journey plans is a critical success factor. Those who have made application journeys thus far have come to realize that the journey is much more fluid than even just twelve months ago. Applications now can live anywhere from the data center to hybrid and multi-clouds to edge compute instances that are regionally and locally closest to users and devices. Given this, those making application journeys into the cloud face even more security and operational challenges than before.

Join us to learn how to wade through the murky waters of securing application journeys of today and tomorrow, and critical things to consider to help guide the development of a strategic roadmap.

Voice of Customer
Optimize Your Security Operations with FortiGuard's Managed Security Services Solution

Today most organizations need the (severely scarce) cybersecurity skills and staff to build, maintain, and operate a 24*7 security operations function or center (SOC). Security and threats are dynamic, and businesses must remain adept at change. As the security stack grows, determining what actions are required, on all alerts generated, on a continuous basis, can quickly become full-time jobs that further burden the business.

FortiGuard's Managed SecOps solution provides the SecOps fast time-to-market and required expertise your team may need.

Join us with one of our customers to discuss why and how they use FortiGuard's Managed Security Services to augment their security operations to an optimum outcome and to get a peak into the new solution offering.

Voice of Customer
Start Your Zero Trust Journey by Discovering What's in the Jungle First

Just like vitamins to human bodies, NAC has been an essential part of the business network, keeping it operating securely, effectively, and orderly. In modern networks, with IoT proliferation, 59% of organizations could only see less than 75% of their networked assets, NAC gets its new use cases. More and more customers with IT/OT convergence are looking at NAC as a starting point for their device zero-trust efforts.

In this session, we will share how customers like you got an immediate boost of confidence on asset visibility with FortiNAC and Fortinet security fabric as they discover connected devices, control access, and even automatically respond to security incidents with ease and confidence. 

Voice of Customer
So You’ve Mapped the MITRE ATT&CK CHAIN: Now What?

So you’ve done your due diligence in having an action plan for each stage of the MITRE ATT&CK Framework. Now all you have to do is ensure all of that technology you’ve steadfastly put in place is actually keeping you secure. How do you do that? Join our Practice leader and other experts as we talk about the important ‘cyber hygiene’ practices that all security teams must understand. And, get a sneak peek at the new services we’re introducing to help Sec Ops teams.

Voice of Customer
Universal ZTNA is the Solution for Securing Work From Anywhere that Accelerates Your Team's Productivity (and Saves You Money!)

Are you tired of remote access solutions that hold your team back and drain your budget? Fortinet's Universal Zero Trust Network Access (ZTNA) is the answer you've been looking for. In this session, you'll learn how this cutting-edge technology can provide secure and reliable access to all resources for your team, no matter where they are, while also saving you up to 5x compared to competing solutions. Whether your team is working from home, the office, a coffee shop, or anywhere else, Universal ZTNA enables them to work at the speed of light without breaking the bank. You'll also hear from our experts and a real-world customer experience about the numerous benefits of Universal ZTNA, including improved security, productivity, and flexibility. Don't miss this opportunity to discover how Universal ZTNA can accelerate your team's productivity and save you money!

Voice of Customer
Leveraging Threat Intelligence and AI/ML-Powered Security at the Enterprise Edge

Security becomes paramount as organizations move away from traditional hub-and-spoke architectures and embrace cloud and internet access at distributed branch and campus locations. 95% of internet edge traffic is encrypted, which hides advanced threats that can paralyze unprotected enterprises.

Join this session to learn how customers leverage FortiGate NGFW to deliver advanced threat intelligence, AI/ML-powered security, and decryption at scale to protect against known and unknown threats, while automating operations end-to-end to relieve constrained IT teams.

Voice of Customer
A BRIEF HISTORY OF Current Attacks, Extraordinary Mitigation, and TIME

Like all proper things in life, this session will be composed of three sections:

  1. Short review of innovation seen in current attack tactics in the wild based on our FortiGuard Lab research and global Threat Intelligent shared within our network of partners
  2. Recap of tools and tactics for prevention, detection, and remediation of these new(er) attack tactics
  3. Deep conversation about the REAL element and dimension we are all bound by and fighting with or against - TIME. And how we can shorten our time to protection through innovation in machine learning and automation. This section will cover the role of machine learning for both local and cloud-delivered analysis and how it all ties to automation that can drive self-defending security posture. (hence, winning in the dimension of TIME)
Voice of Customer
Unleash the Power and Protection of Next Generation Firewall Services

Ever make a buying decision for an NGFW based on the security services and threat intelligence powering the NGFW? Sure, there's throughput, but what about the throughput when the services are turned on? Is the NGFW engineered to support services? Is there a lab or threat intelligence considered in the performance? Also, how is threat intelligence updated?  

These questions and many more considerations will be explored to ensure customers are fully evaluating services and threat intelligence as part of the full value equation.

Featured Customer:
Fordham University

Voice of Customer
Drive Business Growth with Operational Efficiency

Join us to learn why a leading global bank selected Fortinet Security Fabric to secure its network edges. Umar will share the scope and requirements of the Deutsche Bank initiative and the vendor selection process. Showcasing the benefits his team gets from AI/ML to secure their network edges and the advantage of centralized management for control and visibility of their network and security operations teams to be operationally efficient to drive business accelerated growth.

Featured Customer:
Glencore

Voice of Customer