Accelerate 2023 Catalog
Get Ready to Learn
Check out the all-new Voice of the Customer track and learn how Fortinet customers (like University of Buffalo, USI and Wellington Catholic District) have tackled some of the most difficult security challenges with ease.
The Technical track takes you deep into the technology that makes Fortinet products and solutions best-in-class. And don't miss the Fast Track Workshops. Peruse the catalog and get ready to deepen your skills, knowledge, and expertise.
Conference Workshops offer you some of the best hands-on training around. Need to troubleshoot SD-WAN? There's a workshop for that. Want to acquire the necessary tools to sell and support a Fortinet Universal ZTNA solution? Don't miss the Technical Enablement Series on Universal ZTNA. There's over 15 workshops to choose from, taught be professional instructors to help you gain unique insights and instructions.
Session registration will open in early March so you can create your perfect agenda.
Name | Description | Track | More Info | ||
---|---|---|---|---|---|
Conference Workshops | |||||
Solving the Financial Services Cybersecurity Challenge | The financial services sector is a high-value target for cyberattacks. Financial services are the world’s most-attacked industry and face constant intrusion attempts. Protecting this sensitive data for business and compliance reasons is an important consideration. Also, achieving this goal is complicated by a continually expanding attack surface with new technologies being continuously launched through digital innovation initiatives. To maintain competitiveness, financial Cybersecurity teams need visibility to achieve cost savings, operational efficiency, and compliance reporting. But better security should not come at the expense of network performance, as consumers and businesses increasingly demand real-time access to every offering, from online and mobile banking to high-frequency trading. At the same time, institutions must control costs and optimize operational efficiency to remain competitive in an industry with many players. Fortinet cybersecurity solutions for financial services cover several use cases with comprehensive protection. The performance of FortiGate high-end firewalls meets the specialized needs of electronic trading infrastructures, and the Fortinet Security Fabric covers the entire organization with a multilayered defense, with centralized policy controls, all visible on a single pane of glass. Additionally, Fortinet supports connectivity at branch locations with secure networking solutions that are scalable and fast. Attend this hands-on technical training workshop to learn how Fortinet solutions can protect financial institutions against advanced threats and help to solve the financial cybersecurity challenge. | Conference Workshops | |||
Advanced Threat Protection for the Healthcare Industry | The healthcare industry is in a unique and particularly vulnerable position when it comes to cybersecurity. Providers face substantial regulation around privacy and data security, while hackers have much to gain from patient data. Recent statistics put the black market value of healthcare records at ten times that of credit card information. Attackers aren’t just motivated by potential financial rewards either. Several large data breaches have been attributed to state actors collecting data for suspected espionage purposes. Protected health information (PHI) can be used to build rich personal profiles in the wrong hands. Healthcare encompasses a wide range of organizations and IT environments, from Hospitals and Insurance providers to Pharmaceutical and Medical Device manufacturers. Fortinet’s Advanced Threat Protection is flexible and provides comprehensive defenses in heterogeneous deployments. While ATP may look different for an insurance company than for a remote clinic, the idea is the same: block known threats immediately, detect unknown threats with sandboxing, and share intelligence on new threats. Fortinet’s solutions deliver advanced, real-time threat protection for endpoints both pre- and post-infection. It proactively reduces the attack surface, prevents malware infection, detects and defuses potential threats in real-time, and can automate response and remediation procedures. This workshop will cover Fortinet’s ZTNA, NGFW, and SD-WAN solutions that are relevant to HealthCare and Life Sciences. Participants who attend this workshop will learn how to: | Conference Workshops | |||
The Future of the NSE Certification Program | During this presentation, you will see a preview of the upcoming changes to the NSE certification program. The most important changes include adding more role-based training, simplifying the program structure and rules, and expanding to include multiple certifications per level. You will learn how these changes will affect your current NSE certifications and the requirements for Fortinet partners to maintain and upgrade their current Fortinet Engage status. This session is particularly interesting to Fortinet partners and individuals wanting to achieve or renew NSE certifications. | Conference Workshops | |||
Digital Security for Digital-age Education | The digital transformation of the education environment has empowered schools & universities with new methods and tools to learn, teach and conduct research. However, that same technology increases the attack surface and introduces security risks, which makes campus networks vulnerable to cyber threats and security breaches. The challenge is finding the right security posture that protects resources and users and provides a collaborative learning environment. Fortinet is well-positioned to accompany schools, universities, and colleges on their digital journey with security transformation provided by the Fortinet Security Fabric. The Fortinet Security Fabric consists of a wide set of technologies that work together and are supported by a single source of threat intelligence (FortiGuard Labs) to eliminate security gaps in the network and respond to any attack vector. Attend this hands-on technical training workshop to learn how Fortinet can help you find the right balance between an open and secure academic environment, by providing intelligent network security for a safe learning environment. | Conference Workshops | |||
Reduce the Complexity of Operations with the Fabric Management Center | The rapid embrace of digital innovation has made networks and network security much more complex—and vulnerable. While malicious cyberattacks remain a serious problem, 48% of all breaches last year came from benign sources that could have been prevented. Moreover, 75% of network outages and performance issues result from misconfiguration errors. In this regard, a network security strategy that prioritizes network automation can help reduce one of the leading causes of cyber risk and downtime—human error and misconfigurations. As a key part of the Security Fabric, the Fortinet Fabric Management Center (made up of FortiManager and FortiAnalyzer) simplifies operations by addressing this core challenge of network infrastructure teams across small, medium, or large enterprises. In this Fast Track Workshop, attendees will gain hands-on experience and see how the solution provides centralized management, network automation, and orchestration, and Security Fabric analytics. | Conference Workshops | |||
Protecting Retailers Against Cyber Attacks and Threats | In this workshop, participants learn how to deploy and manage the Fortinet retail cybersecurity solution. Retailers present cyber criminals with an attractive target. Customer payment data is transmitted across the network and stored on-premises and in public and private clouds. At the same time, the arrival of omnichannel customer experiences creates challenges in-branch retail locations where customers demand high performance and secure connections. Faced with acute cybersecurity staffing shortages, retailers struggle to cover all their security gaps—something that is exacerbated by the proliferation of point security products and the advanced threat landscape. Fortinet offers retailers a broad set of network and security technologies that are seamlessly integrated and automated with the Fortinet Security Fabric. High-performance solutions with both best-in-class network and security capabilities address a wide range of retail use cases. Fortinet provides retailers with transparent visibility and real-time security workflows, and threat-intelligence sharing. This level of integration also unlocks automation that enables lean network and security teams to work more efficiently and faster while also allowing them to reduce risk—all at a low total cost of ownership (TCO). Participants who attend this workshop will learn how to: | Conference Workshops | |||
Hands On Training (HOT) Workshop: FortiPortal | FortiPortal provides a comprehensive set of security management and analytics within a multi-tenant, multi-tier management framework. This enables MSSPs to give their customers controlled access to configuration and analytics. Enterprises and Education can use FortiPortal to delegate a limited set of management and analytic capabilities to business units, departments, colleges, and so on. This workshop shows key FortiPortal concepts to implement a self-service portal for customer ADOMs. It is recommended that you have an understanding of the topics covered in the following courses or have equivalent experience: NSE 4 FortiGate Security | Conference Workshops | |||
Hands On Training (HOT) Workshop: FortiOS Dynamic Routing | This workshop presents the dynamic routing modules from NSE 7 Enterprise Firewall, with in-depth examples of FortiOS configurations for BGP and OSPF. It is recommended that you have an understanding of the topics covered in the following courses or have equivalent experience: NSE 4 FortiGate Security | Conference Workshops | |||
Hands On Training (HOT) Workshop: FortiManager IPsec Templates | This workshop shows how FortiManager IPsec templates can be used to standardize an IPsec VPN topology configuration for consistency and scalability, the use of IPsec templates is contrasted with VPN Manager pane for a similar deployment. Automation and orchestration are increasingly implemented for NGFW and SD-WAN, FortiManager templates provide a no-code alternative to scripting and third-party orchestration technologies, which is fully integrated into the product. It is recommended that you have an understanding of the topics covered in the following courses or have equivalent experience: NSE 4 FortiGate Security | Conference Workshops | |||
Educational Challenge: Threat Hunting Using Mitre ATT&CK™ to Identify Adversarial Behaviors | No alerts have been detected but are there adversaries on AcmeCorp's network? In this educational challenge, you will take on the role of a security analyst and be asked to identify any threats undetected on AcmeCorp's network. To do this, you will make use of Mitre ATT&CK™, which is a knowledge base of adversary behavior based on real-world observations. ATT&CK™ allows analysts to hunt for behavior patterns rather than artifacts such as hashes, IPs, or Domains. Why is this important? Well, according to 'The Pyramid of Pain' by David Bianco, while it is very easy for attackers to change these artifacts, it is much harder for them to change their Tactics, Techniques, and Procedures (TTPs). Therefore, TTPs are a more reliable way of identifying adversary behavior. The challenge is set up with several exercises set around the technical goals the adversary is trying to achieve (ATT&CK™ Tactics), for example, Initial Access, Persistence, Privilege Escalation, Command, and Control. You will be asked to detect any techniques being used by an adversary to achieve these goals. The workshop will use FortiAnalzyer and FortiSIEM for analytics and reporting, and for data sources, it will use FortiGate, FortiWeb, FortiDeceptor, FortiMail, and FortiSandbox. | Conference Workshops | |||
Technical Enablement Series: Universal ZTNA | Zero Trust Network Access (ZTNA) is a capability within Zero Trust Access (ZTA) that controls access to applications. It extends the principles of ZTA to verify users and devices before every application session. ZTNA confirms that they meet the organization’s policy to access that application. Fortinet’s unique approach, delivering Universal ZTNA as part of the FortiGate Next-Generation Firewall (NGFW), makes it uniquely flexible, covering users when they are remote or in the office. Universal ZTNA capabilities are automatically enabled on any device or service running FortiOS 7.0 and higher, including hardware appliances, virtual machines in clouds, and the FortiSASE service. During the group discussion, participants will acquire the tools necessary to sell and support a Fortinet Universal ZTNA solution, including how to: • Identify Universal ZTNA sales opportunities. In the hands-on lab, students will use Fortinet products to: • Integrate FortiClient Endpoint Management Server (EMS) into Security Fabric. | Conference Workshops | |||
Cybersecurity for Safe, Reliable, Secure Industrial Control Systems (ICS) | Connections between IT and operational technology (OT) systems are no longer air-gapped, introducing the potential for hackers to penetrate industrial control systems, risking the safety and availability of critical infrastructure. Security for OT requires visibility, control, and analytics to meet safety and availability requirements. Convergence is blurring the lines between IT and OT, creating an opportunity to improve critical systems' visibility, control, and situational awareness. Failure to take the wide range of security issues into account when converging these two very different networks and networking philosophies can result in catastrophic network failures that risk critical systems and the life and well-being of workers and communities. In this workshop, participants learn about the Fortinet Security Fabric, the first-ever architectural security approach designed to adapt dynamically to the unique needs of legacy OT environments while enabling the move toward modernizing these critical systems. Leveraging the Purdue Model for the security layers needed in OT, the multi-layered approach provided by the Security Fabric provides broad, integrated, and automated protection against sophisticated threats. Participants who attend this workshop will learn how to: | Conference Workshops | |||
Learn the Best Practices to Becoming a Fast Track Instructor (SD-WAN Lab) | Conference Workshops | ||||
Hands On Training (HOT) Workshop: OT Security | The convergence of OT and IT impacts the security of industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems. These systems are exposed to an expanding threat landscape as the air gap is removed. This workshop looks at how FortiGate and FortiNAC are deployed to provide visibility, control, and analytics within OT environments. It is recommended that you have an understanding of the topics covered in the following courses, or have equivalent experience: NSE 4 FortiGate Security | Conference Workshops | |||
Hands On Training (HOT) Workshop: SD-WAN Troubleshooting | This workshop presents the troubleshooting exercises from NSE 7 SD-WAN training. Participants will troubleshoot SD-WAN routing and rule matching issues on an advanced IPsec and routing configuration. It is recommended that you have an understanding of the topics covered in the following courses or have equivalent experience: NSE 4 FortiGate Security | Conference Workshops | |||
Proactive Advanced Endpoint Protection, Visibility, and Control for Critical Assets | Fortinet strengthens endpoint security through integrated visibility, control, and proactive defense. With the ability to discover, monitor, and assess endpoint risks, organizations can ensure endpoint compliance, mitigate risks, and reduce exposure. Endpoints are frequently the target of initial compromise or attacks. One recent study found that 30% of breaches involved malware being installed on endpoints. Fortinet endpoint solutions strengthen endpoint security through integrated visibility, control, and proactive defense. FortiEDR delivers advanced, real-time threat protection for endpoints both pre- and post-infection. It proactively reduces the attack surface, prevents malware infection, detects and defuses potential threats in real-time, and can automate response and remediation procedures with customizable playbooks. Participants who attend this workshop will learn how to: | Conference Workshops | |||
The Evolution of Access to Applications with Fortinet ZTNA | Zero Trust Network Access (ZTNA) is an access control method that uses client device identification, authentication, and Zero Trust tags to provide role-based application access. It allows administrators to manage network access for On-net local users and Off-net remote users. Access to applications is granted only after device verification, authenticating the user’s identity, authorizing the user, and then performing context-based posture checks using Zero Trust tags. In this workshop, participants learn about how Fortinet offers a firewall-based approach to ZTNA that results in a flexible and comprehensive solution that delivers universal ZTNA. Wherever the user is and wherever the application is, Fortinet can effectively and efficiently grant (or block) application access based on a variety of factors. Participants who attend this workshop will learn how to: • Integrate FortiClient Endpoint Management Server (EMS) into Security Fabric. | Conference Workshops | |||
Constructing a Secure SD-WAN Architecture | Corporate networks are stretched thin by cloud services, SaaS applications, and mobility. Plus, organizations require better connections to branch offices to deliver higher-quality network services. Organizations' network topologies are significantly impacted as they transition to a digital business model. The adoption of cloud services, the virtualization of the traditional network, and an increasingly mobile workforce accessing applications in the cloud are accelerating advancements in wide-area networking technologies. The traditional WAN is struggling to keep up because it relies on a static infrastructure of devices that simply can’t accommodate shifting, and often temporary resource allocation and workloads. In this workshop, participants learn how Secure SD-WAN solves these problems. Participants who attend this workshop will learn how to: • Apply software-defined networking (SDN) to software control of wide-area networks in an enterprise environment | Conference Workshops | |||
Fortifying the Enterprise Network (NGFW) | As security architects consider how to provide comprehensive threat protection for their enterprises, including intrusion prevention, web filtering, anti-malware, and application control, they face a major complexity hurdle managing these point products with no integration and lack of visibility. In this workshop, participants learn how Fortinet network security leverages a single operating system that works across different network security use cases. FortiGate reduces complexity by integrating various point products using Next Generation Firewall (NGFW) features. FortiGate also provides automated visibility into cloud applications and IoT devices. The Fortinet Security Fabric automatically discovers the end-to-end topology view of the enterprise network and protects it from known and unknown attacks via automated action. FortiGate NGFW utilizes purpose-built security processors (SPUs) and threat intelligence security services from FortiGuard Labs to deliver top-rated protection and high performance, including encrypted cloud access. Participants who attend this workshop will learn how to: • Reduce complexity with industry-leading security effectiveness | Conference Workshops | |||
Partner Track | |||||
Sell Through: The Best Use Cases for Adding FortiGuard Security Services to NGFW and SD-WAN | Fortinet enables MSSP partners to create new revenue streams, improve margins, and deliver differentiated security services. Fortinet continues to drive market evolution with FortiGuard AI-powered Security Service on top of the FortiGate NGFW and SW-WAN solutions. The security-driven networking solutions that deliver security effectiveness and automation, cost, and performance for use cases spanning enterprises on-premises, multi-cloud environments, branch, and remote deployments. During this session, the most common use cases and services are explained with valuable FortiGuard insights that will blow your customers away. | Partner Track | |||
Your Managed SOC Offerings Need a Little Boost ? Augment Your Teams with Ours | With the continued skillset shortage, digital transformation initiatives, and overwhelmed security staff, enterprises continue to seek outside expert assistance to help augment their security operations. If you want a fast time-to-market for security services that you want to offer but haven't had the time to build, Fortinet can help. With both managed services for network and endpoint, and expert advisory services to help enterprises stay ahead of security challenges and respond in crises, Fortinet global experts have years of deep and broad security experience you can offer. Augment your team with ours. | Partner Track | |||
Global Engage Update | Fortinet's Engage Partner Program provides you with a valuable, flexible platform to build a profitable and highly-differentiated security practice that leverages the industry's best security solutions to drive customer success. In this session global leadership will announce the exciting updates coming to the Engage Partner Program, the impact they’ll have on the industry, how these programs and opportunities will enable you to grow your business with Fortinet, and more. | Partner Track | |||
Mobile Network Security for 4G and 5G Networks | Fortinet provides a common set of security solutions and tools that provide end-to-end security visibility and control for 4G and 5G mobile infrastructure while enabling industry use cases’ security and monetization. This approach facilitates integration and onboarding while keeping operations and management efforts to a minimum, as the same platform is constantly used throughout the 5G ecosystem. | Partner Track | |||
Build and Deliver Profitable MDR with Fortinet's Automated SOC Platform Solution Stack | MDR services delivery doesn't have to be a compromise between the functional limitations presented by pure-play MDR providers and the multi-vendor integration challenges of leveraging true enterprise-class SIEM, SOAR, and EDR. In this session, we will discuss the advantages of a single-vendor MDR stack which harnesses the power and flexibility of each full-featured product combined with the out-of-the-box integrations and automations that would only be possible from a shared development organization. Add in the experience and world-class support of a global organization that really understands the business and technical needs of our managed services partners, and we will be presenting a very high bar that is uniquely Fortinet. | Partner Track | |||
Pre-Conference Workshops | |||||
Breakfast | Pre-Conference Workshops | ||||
Breakfast | Pre-Conference Workshops | ||||
NSE 4 Immersion v7.2 | This course is an expanded version (from 1 day to 2 days) of the NSE 4 Immersion v.7.2 course. You will be assigned a series of do-it-yourself (DIY) configuration tasks in a virtual lab environment. The configuration tasks cover some of the topics in the NSE 4 certification exam and include the use of the most common FortiGate features, such as firewall policies, the Fortinet Security Fabric, user authentication, SSL and IPsec VPNs, equal-cost multi-path (ECMP) routing, SD-WAN, high availability (HA), and content inspection. This course is not a replacement for the FortiGate Security and FortiGate Infrastructure courses, and it is meant to complement what you had learned from those courses or from your hands-on working experience with ForiGate devices. For more information, download the course description here. | Pre-Conference Workshops | |||
NSE 5 FortiManager v7.2 | In this course, you will learn the fundamentals of using FortiManager for the centralized network administration of many FortiGate devices. In interactive labs, you will explore deployment strategies, which include single or multiple ADOMs, device registration, policy packages, shared objects, installing configuration changes, provisioning FortiManager as a local FortiGuard distribution server, and troubleshooting the features that are critical to day-to-day use after you deploy FortiManager. For more information, download the course description here. | Pre-Conference Workshops | |||
NSE 6 FortiAnalyzer Administrator v7.2 (Day 1) | In this course, you will learn how to deploy, configure, and secure FortiAnalyzer. You will also learn how to register and manage devices with FortiAnalyzer. Finally, you will explore the fundamentals of the logging and reporting management capabilities included in FortiAnalyzer. These skills will provide you with a solid foundation for becoming a professional FortiAnalyzer administrator. To learn more, click here | Pre-Conference Workshops | |||
NSE 5 FortiEDR v5.0 | In this interactive course, you will learn how to use FortiEDR to protect your endpoints against advanced attacks with real-time orchestrated incident response functionality. You will also explore FortiEDR features and how they protect your endpoints automatically in real time. (ISC)² CPE Training Hours: 6 (ISC)² CPE Lab Hours: 6 (ISC)² CISSP Domains: Communication and Network Security To learn more, click here | Pre-Conference Workshops | |||
NSE 7 Zero Trust Access (ZTA) | In this course, you will learn how to define, design, deploy, and manage Zero Trust Access (ZTA) using different Fortinet solutions. You will also learn how to configure FortiGate, FortiClient EMS, FortiAuthenticator, FortiNAC, and FortiAnalyzer to secure network and application access, monitor ZTA enforcement, and automate incident response. To learn more, click here | Pre-Conference Workshops | |||
NSE 7 OT Security v7.2 | This course will teach you how to secure your OT infrastructure using Fortinet solutions. You will learn how to design, deploy, administrate, and monitor FortiGate, FortiNAC, FortiAnalyzer, and FortiSIEM devices to secure OT infrastructures. These skills will provide you with a solid understanding of designing, implementing, and operating an OT security solution based on Fortinet products. For more information, download the course description here. | Pre-Conference Workshops | |||
NSE 4 Immersion v7.2 | This course is an expanded version (from 1 day to 2 days) of the NSE 4 Immersion v.7.2 course. You will be assigned a series of do-it-yourself (DIY) configuration tasks in a virtual lab environment. The configuration tasks cover some of the topics in the NSE 4 certification exam and include the use of the most common FortiGate features, such as firewall policies, the Fortinet Security Fabric, user authentication, SSL and IPsec VPNs, equal-cost multi-path (ECMP) routing, SD-WAN, high availability (HA), and content inspection. This course is not a replacement for the FortiGate Security and FortiGate Infrastructure courses, and it is meant to complement what you had learned from those courses or from your hands-on working experience with ForiGate devices. For more information, download the course description here. | Pre-Conference Workshops | |||
NSE 4 Immersion v7.2 | This course is an expanded version (from 1 day to 2 days) of the NSE 4 Immersion v.7.2 course. You will be assigned a series of do-it-yourself (DIY) configuration tasks in a virtual lab environment. The configuration tasks cover some of the topics in the NSE 4 certification exam and include the use of the most common FortiGate features, such as firewall policies, the Fortinet Security Fabric, user authentication, SSL and IPsec VPNs, equal-cost multi-path (ECMP) routing, SD-WAN, high availability (HA), and content inspection. This course is not a replacement for the FortiGate Security and FortiGate Infrastructure courses, and it is meant to complement what you had learned from those courses or from your hands-on working experience with ForiGate devices. For more information, download the course description here. | Pre-Conference Workshops | |||
NSE 5 FortiSIEM v6.3 | In this course, you will learn about FortiSIEM initial configurations, architecture, and the discovery of devices on the network. You will also learn how to collect performance information and aggregate it with syslog data to enrich the overall view of the health of your environment, how to use the configuration database to greatly facilitate compliance audits, and how to integrate FortiSIEM into your network awareness infrastructure. To learn more, click here | Pre-Conference Workshops | |||
NSE 4 Immersion v7.2 | This course is an expanded version (from 1 day to 2 days) of the NSE 4 Immersion v.7.2 course. You will be assigned a series of do-it-yourself (DIY) configuration tasks in a virtual lab environment. The configuration tasks cover some of the topics in the NSE 4 certification exam and include the use of the most common FortiGate features, such as firewall policies, the Fortinet Security Fabric, user authentication, SSL and IPsec VPNs, equal-cost multi-path (ECMP) routing, SD-WAN, high availability (HA), and content inspection. This course is not a replacement for the FortiGate Security and FortiGate Infrastructure courses, and it is meant to complement what you had learned from those courses or from your hands-on working experience with ForiGate devices. For more information, download the course description here. | Pre-Conference Workshops | |||
NSE 5 FortiSIEM v6.3 | In this course, you will learn about FortiSIEM initial configurations, architecture, and the discovery of devices on the network. You will also learn how to collect performance information and aggregate it with syslog data to enrich the overall view of the health of your environment, how to use the configuration database to greatly facilitate compliance audits, and how to integrate FortiSIEM into your network awareness infrastructure. To learn more, click here | Pre-Conference Workshops | |||
Networking Security Troubleshooting v7.2 | This course is a preview of the upcoming and new NSE 7 Network Security Troubleshooting v.7.2 course. You will learn how to diagnose and troubleshoot the most common networking and security problems in a FortiGate network security solution. In interactive break-and-fix labs you will use tools, diagnostic, and debug commands to detect, isolate, and resolve problems related with the most commonly used FortiGate features, such as IPsec, routing, web filtering, HA, IPS, and more. These skills and knowledge will give you an advanced understanding of how to support a network security solution based on FortiGate devices. To learn more, view the course description here. | Pre-Conference Workshops | |||
Networking Security Troubleshooting v7.2 | This course is a preview of the upcoming and new NSE 7 Network Security Troubleshooting v.7.2 course. You will learn how to diagnose and troubleshoot the most common networking and security problems in a FortiGate network security solution. In interactive break-and-fix labs you will use tools, diagnostic, and debug commands to detect, isolate, and resolve problems related with the most commonly used FortiGate features, such as IPsec, routing, web filtering, HA, IPS, and more. These skills and knowledge will give you an advanced understanding of how to support a network security solution based on FortiGate devices. To learn more, view the course description here. | Pre-Conference Workshops | |||
NSE 7 Advanced Analytics v6.6 | During this two-day training, you will learn the most important topics and concepts that are covered in the NSE 7 Advanced Analytics v6.6 course. You will learn how to use FortiSIEM in a multi-tenant environment. You will learn about rules and their architecture, how incidents are generated, how baseline calculations are performed, the different remediation methods available, and how the MITRE ATT&CK framework integrates with FortiSIEM. You will also learn how to integrate FortiSOAR with FortiSIEM. To learn more, click here | Pre-Conference Workshops | |||
NSE 8 Immersion v7.2 | The NSE 8 Immersion is an all-hands-on lab that students preparing for the NSE 8 practical exam can do to get an exam-like experience. Based on the previous NSE 8 practical exam, students will be tasked with completing the lab in a challenging learning environment. Fortinet products in the lab include FortiGate, FortiManager, FortiAnalyzer, FortiWeb, FortiMail, FortiADC, FortiAuthenticator, and FortiSandbox. During the sessions, an NSE8-certified instructor is available for questions and to help gain knowledge to prepare for becoming NSE 8 certified. For more information, download the course description here. | Pre-Conference Workshops | |||
NSE 8 Immersion v7.2 | The NSE 8 Immersion is an all-hands-on lab that students preparing for the NSE 8 practical exam can do to get an exam-like experience. Based on the previous NSE 8 practical exam, students will be tasked with completing the lab in a challenging learning environment. Fortinet products in the lab include FortiGate, FortiManager, FortiAnalyzer, FortiWeb, FortiMail, FortiADC, FortiAuthenticator, and FortiSandbox. During the sessions, an NSE8-certified instructor is available for questions and to help gain knowledge to prepare for becoming NSE 8 certified. For more information, download the course description here. | Pre-Conference Workshops | |||
Cybersecurity (powered by FortiGuard Labs) - Offensive OT Security | Industrial Control Systems (ICS) and Operational Technology (OT) are part of critical infrastructure environments for many commercial and government organizations. Attacks against assets in these environments have been increasing at an exponential pace. Damage to these environments can cause significant damage to the operations of a business, agency, government entity, and even nations. Attackers understand these are valuable targets and focus on them because of historically successful attacks. This class will focus on cyber offensive attacks in the OT space. We will focus on how attackers exploit systems and IoT/OT devices to compromise critical infrastructure. Learn to think like an attacker and understand how to defend your critical infrastructure. For more information, download the course description here. | Pre-Conference Workshops | |||
Cybersecurity (Powered by FortiGuard Labs) - Web Application Security (Day 2) | This cybersecurity module will explore web application threats and countermeasures focused on Fortinet solutions. Comprised of theory lessons and hands-on labs, this course will get the students from the very motivations of attacks to web applications through understanding and executing attack techniques, recognizing such attacks, and configuring Fortinet solutions to mitigate them. Learn more about this Pre-Conference Workshop here. | Pre-Conference Workshops | |||
Deep Dive into Authentication Troubleshooting | The training deep dive in authentication troubleshooting will focus on configuring and troubleshooting different authentication protocols (LDAP, RADIUS, PKI, SAML, Kerberos) across various Fortinet products (FortiGate, FortiADC, FortiWeb, FortiAuthenticator). It also includes a lesson with tips and best practices using Wireshark, where you'll learn how to customize your Wireshark to get the most out of it. For more information, download the course description here. | Pre-Conference Workshops | |||
NSE 5 FortiManager v7.2 | In this course, you will learn the fundamentals of using FortiManager for the centralized network administration of many FortiGate devices. In interactive labs, you will explore deployment strategies, which include single or multiple ADOMs, device registration, policy packages, shared objects, installing configuration changes, provisioning FortiManager as a local FortiGuard distribution server, and troubleshooting the features that are critical to day-to-day use after you deploy FortiManager. For more information, download the course description here. | Pre-Conference Workshops | |||
NSE 7 OT Security v7.2 | This course will teach you how to secure your OT infrastructure using Fortinet solutions. You will learn how to design, deploy, administrate, and monitor FortiGate, FortiNAC, FortiAnalyzer, and FortiSIEM devices to secure OT infrastructures. These skills will provide you with a solid understanding of designing, implementing, and operating an OT security solution based on Fortinet products. For more information, download the course description here. | Pre-Conference Workshops | |||
Infrastructure as Code with Fortinet Products (Day 1) | An introduction course to Infrastructure as Code (IaC) using Terraform to create a web service protected with Fortinet products. Going through the basic concepts of IaC necessary for creating a full service with docker images, virtual machines, and networking, protected by FortiGate and FortiWeb, everything deployed using Terraform. Learn more about this Pre-Conference Workshop here. | Pre-Conference Workshops | |||
NSE 7 Zero Trust Access (ZTA) | In this course, you will learn how to define, design, deploy, and manage Zero Trust Access (ZTA) using different Fortinet solutions. You will also learn how to configure FortiGate, FortiClient EMS, FortiAuthenticator, FortiNAC, and FortiAnalyzer to secure network and application access, monitor ZTA enforcement, and automate incident response. To learn more, click here | Pre-Conference Workshops | |||
Automation, API & Scripting | The training Automation, API & Scripting will focus on different aspects of Automation. On day one, the automation features that are ready-to-use inside FortiOS & FortiManager/FortiAnalyzer (7.2.x) will be explored along with how to set up an environment for demo/testing Automation features. Day two will take automation one step further by exploring and interacting with the API capabilities of FortiOS (7.2.x), FortiManager/FortiAnalyzer, and FortiAuthenticator using various tools. Day two also includes an introduction into python scripting, where you'll learn how to interact with Fortinet devices using SSH and the API to explore the capabilities of automation using python scripts. For more information, download the course description here. | Pre-Conference Workshops | |||
NSE 7 SD-WAN v7.2 | This course is a preview of the upcoming and new NSE 7 SD-WAN v.7.2 course. You will learn about common SD-WAN deployment scenarios using the Fortinet Secure SD-WAN solution. You will explore different situations, from a single enterprise site to multiple data center environments, that will help you to enhance and troubleshoot SD-WAN deployments. To learn more, click here | Pre-Conference Workshops | |||
NSE 7 SD-WAN v7.2 | This course is a preview of the upcoming and new NSE 7 SD-WAN v.7.2 course. You will learn about common SD-WAN deployment scenarios using the Fortinet Secure SD-WAN solution. You will explore different situations, from a single enterprise site to multiple data center environments, that will help you to enhance and troubleshoot SD-WAN deployments. To learn more, click here | Pre-Conference Workshops | |||
Cybersecurity (powered by FortiGuard Labs) - Offensive OT Security | Industrial Control Systems (ICS) and Operational Technology (OT) are part of critical infrastructure environments for many commercial and government organizations. Attacks against assets in these environments have been increasing at an exponential pace. Damage to these environments can cause significant damage to the operations of a business, agency, government entity, and even nations. Attackers understand these are valuable targets and focus on them because of historically successful attacks. This class will focus on cyber offensive attacks in the OT space. We will focus on how attackers exploit systems and IoT/OT devices to compromise critical infrastructure. Learn to think like an attacker and understand how to defend your critical infrastructure. For more information, download the course description here. | Pre-Conference Workshops | |||
Deep Dive into Authentication Troubleshooting | The training deep dive in authentication troubleshooting will focus on configuring and troubleshooting different authentication protocols (LDAP, RADIUS, PKI, SAML, Kerberos) across various Fortinet products (FortiGate, FortiADC, FortiWeb, FortiAuthenticator). It also includes a lesson with tips and best practices using Wireshark, where you'll learn how to customize your Wireshark to get the most out of it. For more information, download the course description here. | Pre-Conference Workshops | |||
NSE 5 FortiAnalyzer Analyst v7.2 (Day 2) | In this course, you will learn the fundamentals of using FortiAnalyzer for centralized logging. You will also learn how to identify current and potential threats through log analysis. Finally, you will examine the management of events, incidents, reports, and task automation with playbooks. These skills will provide you with a solid foundation for becoming a SOC analyst in an environment using Fortinet products. To learn more, click here | Pre-Conference Workshops | |||
NSE 7 Public Cloud Security v7.2 | In this course, you will learn how to deploy FortiGate VMs in the public cloud using various methods. You will learn how to use third-party automation tools to deploy FortiGate VMs and secure your network. You will take a deep dive into AWS SD-WAN Connect deployments and learn how to utilize AWS Transit Gateway to secure east-west and north-south traffic. You will also learn how to effectively troubleshoot FortiGate deployments in Azure and how to use FortiCNP to simplify risk management for your AWS workloads. To learn more, click here | Pre-Conference Workshops | |||
NSE 5 FortiEDR v5.0 | In this interactive course, you will learn how to use FortiEDR to protect your endpoints against advanced attacks with real-time orchestrated incident response functionality. You will also explore FortiEDR features and how they protect your endpoints automatically in real time. (ISC)² CPE Training Hours: 6 (ISC)² CPE Lab Hours: 6 (ISC)² CISSP Domains: Communication and Network Security To learn more, click here | Pre-Conference Workshops | |||
NSE 7 Enterprise Firewall v7.2 | This course is a preview of the upcoming NSE 7 Enterprise Firewall v7.2 course. You will learn how to implement, troubleshoot, and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices. To learn more, click here | Pre-Conference Workshops | |||
NSE 7 Enterprise Firewall v7.2 | This course is a preview of the upcoming NSE 7 Enterprise Firewall v7.2 course. You will learn how to implement, troubleshoot, and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices. To learn more, click here | Pre-Conference Workshops | |||
NSE 7 Advanced Analytics v6.6 | During this two-day training, you will learn the most important topics and concepts that are covered in the NSE 7 Advanced Analytics v6.6 course. You will learn how to use FortiSIEM in a multi-tenant environment. You will learn about rules and their architecture, how incidents are generated, how baseline calculations are performed, the different remediation methods available, and how the MITRE ATT&CK framework integrates with FortiSIEM. You will also learn how to integrate FortiSOAR with FortiSIEM. To learn more, click here | Pre-Conference Workshops | |||
NSE 6 FortiSwitch v7.2 | During this two-day training, you will learn the most important topics and concepts that are covered in the NSE 6 FortiSwitch v7.2 course. You will learn how to deploy, provision, and manage a FortiSwitch with FortiGate using FortiLink. This course also covers the deployment and troubleshooting of Layer 2 and Layer 3 features, as well as the most common FortiSwitch stack topologies, including those that leverage multichassis link aggregation group (MCLAG) for redundancy and higher performance. You will also learn about FortiSwitch in standalone mode, its unique features, and how to manage a standalone switch directly, or from FortiSwitch Cloud. To learn more, click here | Pre-Conference Workshops | |||
Automation, API & Scripting | The training Automation, API & Scripting will focus on different aspects of Automation. On day one, the automation features that are ready-to-use inside FortiOS & FortiManager/FortiAnalyzer (7.2.x) will be explored along with how to set up an environment for demo/testing Automation features. Day two will take automation one step further by exploring and interacting with the API capabilities of FortiOS (7.2.x), FortiManager/FortiAnalyzer, and FortiAuthenticator using various tools. Day two also includes an introduction into python scripting, where you'll learn how to interact with Fortinet devices using SSH and the API to explore the capabilities of automation using python scripts. For more information, download the course description here. | Pre-Conference Workshops | |||
NSE 6 FortiSwitch v7.2 | During this two-day training, you will learn the most important topics and concepts that are covered in the NSE 6 FortiSwitch v7.2 course. You will learn how to deploy, provision, and manage a FortiSwitch with FortiGate using FortiLink. This course also covers the deployment and troubleshooting of Layer 2 and Layer 3 features, as well as the most common FortiSwitch stack topologies, including those that leverage multichassis link aggregation group (MCLAG) for redundancy and higher performance. You will also learn about FortiSwitch in standalone mode, its unique features, and how to manage a standalone switch directly, or from FortiSwitch Cloud. To learn more, click here | Pre-Conference Workshops | |||
NSE 6 FortiNAC v7.2 | During this two-day training, you will learn the most important topics and concepts that are covered in the NSE 6 FortiNAC v.7.2 course. You will learn how to leverage the powerful and diverse capabilities of FortiNAC, using best practices for achieving visibility, control, and response. These fundamentals will provide you with a solid understanding of how to implement network visibility and security automation. To learn more, click here | Pre-Conference Workshops | |||
NSE 6 FortiNAC v7.2 | During this two-day training, you will learn the most important topics and concepts that are covered in the NSE 6 FortiNAC v.7.2 course. You will learn how to leverage the powerful and diverse capabilities of FortiNAC, using best practices for achieving visibility, control, and response. These fundamentals will provide you with a solid understanding of how to implement network visibility and security automation. To learn more, click here | Pre-Conference Workshops | |||
NSE 7 Public Cloud Security v7.2 | In this course, you will learn how to deploy FortiGate VMs in the public cloud using various methods. You will learn how to use third-party automation tools to deploy FortiGate VMs and secure your network. You will take a deep dive into AWS SD-WAN Connect deployments and learn how to utilize AWS Transit Gateway to secure east-west and north-south traffic. You will also learn how to effectively troubleshoot FortiGate deployments in Azure and how to use FortiCNP to simplify risk management for your AWS workloads. To learn more, click here | Pre-Conference Workshops | |||
Pre-Conference Registration and Check-In | Pre-Conference Workshops | ||||
Lunch | Pre-Conference Workshops | ||||
Lunch | Pre-Conference Workshops | ||||
NSE 5 FortiSIEM v6.3 | In this course, you will learn about FortiSIEM initial configurations, architecture, and the discovery of devices on the network. You will also learn how to collect performance information and aggregate it with syslog data to enrich the overall view of the health of your environment, how to use the configuration database to greatly facilitate compliance audits, and how to integrate FortiSIEM into your network awareness infrastructure. To learn more, click here | Pre-Conference Workshops | |||
NSE 5 FortiAnalyzer Analyst v7.2 (Day 2) | This course teaches you the fundamentals of using FortiAnalyzer for centralized logging and reporting. You will learn how to configure and deploy FortiAnalyzer, and identify threats and attack patterns through logging, analysis, and reporting. Finally, you will examine the management of events, incidents, playbooks, and some helpful troubleshooting techniques. | Pre-Conference Workshops | |||
NSE 7 Zero Trust Access (ZTA) | In this course, you will learn how to define, design, deploy, and manage Zero Trust Access (ZTA) using different Fortinet solutions. You will also learn how to configure FortiGate, FortiClient EMS, FortiAuthenticator, FortiNAC, and FortiAnalyzer to secure network and application access, monitor ZTA enforcement, and automate incident response. To learn more, click here | Pre-Conference Workshops | |||
NSE 7 Zero Trust Access (ZTA) | In this course, you will learn how to define, design, deploy, and manage Zero Trust Access (ZTA) using different Fortinet solutions. You will also learn how to configure FortiGate, FortiClient EMS, FortiAuthenticator, FortiNAC, and FortiAnalyzer to secure network and application access, monitor ZTA enforcement, and automate incident response. To learn more, click here | Pre-Conference Workshops | |||
NSE 7 SD-WAN v7.2 | This course is a preview of the upcoming and new NSE 7 SD-WAN v.7.2 course. You will learn about common SD-WAN deployment scenarios using the Fortinet Secure SD-WAN solution. You will explore different situations, from a single enterprise site to multiple data center environments, that will help you to enhance and troubleshoot SD-WAN deployments. To learn more, click here | Pre-Conference Workshops | |||
NSE 7 Public Cloud Security v7.2 | In this course, you will learn how to deploy FortiGate VMs in the public cloud using various methods. You will learn how to use third-party automation tools to deploy FortiGate VMs and secure your network. You will take a deep dive into AWS SD-WAN Connect deployments and learn how to utilize AWS Transit Gateway to secure east-west and north-south traffic. You will also learn how to effectively troubleshoot FortiGate deployments in Azure and how to use FortiCNP to simplify risk management for your AWS workloads. To learn more, click here | Pre-Conference Workshops | |||
NSE 7 Enterprise Firewall v7.2 | This course is a preview of the upcoming NSE 7 Enterprise Firewall v7.2 course. You will learn how to implement, troubleshoot, and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices. To learn more, click here | Pre-Conference Workshops | |||
NSE 7 Advanced Analytics v6.6 | During this two-day training, you will learn the most important topics and concepts that are covered in the NSE 7 Advanced Analytics v6.6 course. You will learn how to use FortiSIEM in a multi-tenant environment. You will learn about rules and their architecture, how incidents are generated, how baseline calculations are performed, the different remediation methods available, and how the MITRE ATT&CK framework integrates with FortiSIEM. You will also learn how to integrate FortiSOAR with FortiSIEM. To learn more, click here | Pre-Conference Workshops | |||
NSE 6 FortiSwitch v7.2 | During this two-day training, you will learn the most important topics and concepts that are covered in the NSE 6 FortiSwitch v7.2 course. You will learn how to deploy, provision, and manage a FortiSwitch with FortiGate using FortiLink. This course also covers the deployment and troubleshooting of Layer 2 and Layer 3 features, as well as the most common FortiSwitch stack topologies, including those that leverage multichassis link aggregation group (MCLAG) for redundancy and higher performance. You will also learn about FortiSwitch in standalone mode, its unique features, and how to manage a standalone switch directly, or from FortiSwitch Cloud. To learn more, click here | Pre-Conference Workshops | |||
NSE 6 FortiSwitch v7.2 | During this two-day training, you will learn the most important topics and concepts that are covered in the NSE 6 FortiSwitch v7.2 course. You will learn how to deploy, provision, and manage a FortiSwitch with FortiGate using FortiLink. This course also covers the deployment and troubleshooting of Layer 2 and Layer 3 features, as well as the most common FortiSwitch stack topologies, including those that leverage multichassis link aggregation group (MCLAG) for redundancy and higher performance. You will also learn about FortiSwitch in standalone mode, its unique features, and how to manage a standalone switch directly, or from FortiSwitch Cloud. To learn more, click here | Pre-Conference Workshops | |||
NSE 6 FortiNAC v7.2 | During this two-day training, you will learn the most important topics and concepts that are covered in the NSE 6 FortiNAC v.7.2 course. You will learn how to leverage the powerful and diverse capabilities of FortiNAC, using best practices for achieving visibility, control, and response. These fundamentals will provide you with a solid understanding of how to implement network visibility and security automation. To learn more, click here | Pre-Conference Workshops | |||
NSE 5 FortiSIEM v6.3 | In this course, you will learn about FortiSIEM initial configurations, architecture, and the discovery of devices on the network. You will also learn how to collect performance information and aggregate it with syslog data to enrich the overall view of the health of your environment, how to use the configuration database to greatly facilitate compliance audits, and how to integrate FortiSIEM into your network awareness infrastructure. To learn more, click here | Pre-Conference Workshops | |||
NSE 5 FortiManager v7.2 | In this course, you will learn the fundamentals of using FortiManager for the centralized network administration of many FortiGate devices. In interactive labs, you will explore deployment strategies, which include single or multiple ADOMs, device registration, policy packages, shared objects, installing configuration changes, provisioning FortiManager as a local FortiGuard distribution server, and troubleshooting the features that are critical to day-to-day use after you deploy FortiManager. For more information, download the course description here. | Pre-Conference Workshops | |||
NSE 5 FortiEDR v5.0 | In this interactive course, you will learn how to use FortiEDR to protect your endpoints against advanced attacks with real-time orchestrated incident response functionality. You will also explore FortiEDR features and how they protect your endpoints automatically in real time. (ISC)² CPE Training Hours: 6 (ISC)² CPE Lab Hours: 6 (ISC)² CISSP Domains: Communication and Network Security To learn more, click here | Pre-Conference Workshops | |||
NSE 5 FortiEDR v5.0 | In this interactive course, you will learn how to use FortiEDR to protect your endpoints against advanced attacks with real-time orchestrated incident response functionality. You will also explore FortiEDR features and how they protect your endpoints automatically in real time. (ISC)² CPE Training Hours: 6 (ISC)² CPE Lab Hours: 6 (ISC)² CISSP Domains: Communication and Network Security To learn more, click here | Pre-Conference Workshops | |||
NSE 4 Immersion v7.2 | This course is an expanded version (from 1 day to 2 days) of the NSE 4 Immersion v.7.2 course. You will be assigned a series of do-it-yourself (DIY) configuration tasks in a virtual lab environment. The configuration tasks cover some of the topics in the NSE 4 certification exam and include the use of the most common FortiGate features, such as firewall policies, the Fortinet Security Fabric, user authentication, SSL and IPsec VPNs, equal-cost multi-path (ECMP) routing, SD-WAN, high availability (HA), and content inspection. This course is not a replacement for the FortiGate Security and FortiGate Infrastructure courses, and it is meant to complement what you had learned from those courses or from your hands-on working experience with ForiGate devices. For more information, download the course description here. | Pre-Conference Workshops | |||
NSE 4 Immersion v7.2 | This course is an expanded version (from 1 day to 2 days) of the NSE 4 Immersion v.7.2 course. You will be assigned a series of do-it-yourself (DIY) configuration tasks in a virtual lab environment. The configuration tasks cover some of the topics in the NSE 4 certification exam and include the use of the most common FortiGate features, such as firewall policies, the Fortinet Security Fabric, user authentication, SSL and IPsec VPNs, equal-cost multi-path (ECMP) routing, SD-WAN, high availability (HA), and content inspection. This course is not a replacement for the FortiGate Security and FortiGate Infrastructure courses, and it is meant to complement what you had learned from those courses or from your hands-on working experience with ForiGate devices. For more information, download the course description here. | Pre-Conference Workshops | |||
NSE 4 Immersion v7.2 | This course is an expanded version (from 1 day to 2 days) of the NSE 4 Immersion v.7.2 course. You will be assigned a series of do-it-yourself (DIY) configuration tasks in a virtual lab environment. The configuration tasks cover some of the topics in the NSE 4 certification exam and include the use of the most common FortiGate features, such as firewall policies, the Fortinet Security Fabric, user authentication, SSL and IPsec VPNs, equal-cost multi-path (ECMP) routing, SD-WAN, high availability (HA), and content inspection. This course is not a replacement for the FortiGate Security and FortiGate Infrastructure courses, and it is meant to complement what you had learned from those courses or from your hands-on working experience with ForiGate devices. For more information, download the course description here. | Pre-Conference Workshops | |||
NSE 4 Immersion v7.2 | This course is an expanded version (from 1 day to 2 days) of the NSE 4 Immersion v.7.2 course. You will be assigned a series of do-it-yourself (DIY) configuration tasks in a virtual lab environment. The configuration tasks cover some of the topics in the NSE 4 certification exam and include the use of the most common FortiGate features, such as firewall policies, the Fortinet Security Fabric, user authentication, SSL and IPsec VPNs, equal-cost multi-path (ECMP) routing, SD-WAN, high availability (HA), and content inspection. This course is not a replacement for the FortiGate Security and FortiGate Infrastructure courses, and it is meant to complement what you had learned from those courses or from your hands-on working experience with ForiGate devices. For more information, download the course description here. | Pre-Conference Workshops | |||
Networking Security Troubleshooting v7.2 | This course is a preview of the upcoming and new NSE 7 Network Security Troubleshooting v.7.2 course. You will learn how to diagnose and troubleshoot the most common networking and security problems in a FortiGate network security solution. In interactive break-and-fix labs you will use tools, diagnostic, and debug commands to detect, isolate, and resolve problems related with the most commonly used FortiGate features, such as IPsec, routing, web filtering, HA, IPS, and more. These skills and knowledge will give you an advanced understanding of how to support a network security solution based on FortiGate devices. To learn more, view the course description here. | Pre-Conference Workshops | |||
NSE 8 Immersion v7.2 | The NSE 8 Immersion is an all-hands-on lab that students preparing for the NSE 8 practical exam can do to get an exam-like experience. Based on the previous NSE 8 practical exam, students will be tasked with completing the lab in a challenging learning environment. Fortinet products in the lab include FortiGate, FortiManager, FortiAnalyzer, FortiWeb, FortiMail, FortiADC, FortiAuthenticator, and FortiSandbox. During the sessions, an NSE8-certified instructor is available for questions and to help gain knowledge to prepare for becoming NSE 8 certified. For more information, download the course description here. | Pre-Conference Workshops | |||
NSE 7 OT Security v7.2 | This course will teach you how to secure your OT infrastructure using Fortinet solutions. You will learn how to design, deploy, administrate, and monitor FortiGate, FortiNAC, FortiAnalyzer, and FortiSIEM devices to secure OT infrastructures. These skills will provide you with a solid understanding of designing, implementing, and operating an OT security solution based on Fortinet products. For more information, download the course description here. | Pre-Conference Workshops | |||
NSE 7 Public Cloud Security v7.2 | In this course, you will learn how to deploy FortiGate VMs in the public cloud using various methods. You will learn how to use third-party automation tools to deploy FortiGate VMs and secure your network. You will take a deep dive into AWS SD-WAN Connect deployments and learn how to utilize AWS Transit Gateway to secure east-west and north-south traffic. You will also learn how to effectively troubleshoot FortiGate deployments in Azure and how to use FortiCNP to simplify risk management for your AWS workloads. To learn more, click here | Pre-Conference Workshops | |||
Infrastructure as Code with Fortinet Products (Day 1) | An introduction course to Infrastructure as Code (IaC) using Terraform to create a web service protected with Fortinet products. Going through the basic concepts of IaC necessary for creating a full service with docker images, virtual machines, and networking, protected by FortiGate and FortiWeb, everything deployed using Terraform. Learn more about this Pre-Conference Workshop here. | Pre-Conference Workshops | |||
Automation, API & Scripting | The NSE 8 Immersion is an all-hands-on lab that students preparing for the NSE 8 practical exam can do to get an exam-like experience. Based on the previous NSE 8 practical exam, students will be tasked with completing the lab in a challenging learning environment. Fortinet products in the lab include FortiGate, FortiManager, FortiAnalyzer, FortiWeb, FortiMail, FortiADC, FortiAuthenticator, and FortiSandbox. During the sessions, an NSE8-certified instructor is available for questions and to help gain knowledge to prepare for becoming NSE 8 certified.
The training Automation, API & Scripting will focus on different aspects of Automation. On day one, the automation features that are ready-to-use inside FortiOS & FortiManager/FortiAnalyzer (7.2.x) will be explored along with how to set up an environment for demo/testing Automation features.
Day two will take automation one step further by exploring and interacting with the API capabilities of FortiOS (7.2.x), FortiManager/FortiAnalyzer, and FortiAuthenticator using various tools. Day two also includes an introduction into python scripting, where you'll learn how to interact with Fortinet devices using SSH and the API to explore the capabilities of automation using python scripts. For more information, download the course description here. | Pre-Conference Workshops | |||
Cybersecurity (powered by FortiGuard Labs) - Offensive OT Security | Industrial Control Systems (ICS) and Operational Technology (OT) are part of critical infrastructure environments for many commercial and government organizations. Attacks against assets in these environments have been increasing at an exponential pace. Damage to these environments can cause significant damage to the operations of a business, agency, government entity, and even nations. Attackers understand these are valuable targets and focus on them because of historically successful attacks. This class will focus on cyber offensive attacks in the OT space. We will focus on how attackers exploit systems and IoT/OT devices to compromise critical infrastructure. Learn to think like an attacker and understand how to defend your critical infrastructure. For more information, download the course description here. | Pre-Conference Workshops | |||
Cybersecurity (powered by FortiGuard Labs) - Offensive OT Security | Industrial Control Systems (ICS) and Operational Technology (OT) are part of critical infrastructure environments for many commercial and government organizations. Attacks against assets in these environments have been increasing at an exponential pace. Damage to these environments can cause significant damage to the operations of a business, agency, government entity, and even nations. Attackers understand these are valuable targets and focus on them because of historically successful attacks. This class will focus on cyber offensive attacks in the OT space. We will focus on how attackers exploit systems and IoT/OT devices to compromise critical infrastructure. Learn to think like an attacker and understand how to defend your critical infrastructure. For more information, download the course description here. | Pre-Conference Workshops | |||
Deep Dive into Authentication Troubleshooting | The training deep dive in authentication troubleshooting will focus on configuring and troubleshooting different authentication protocols (LDAP, RADIUS, PKI, SAML, Kerberos) across various Fortinet products (FortiGate, FortiADC, FortiWeb, FortiAuthenticator). It also includes a lesson with tips and best practices using Wireshark, where you'll learn how to customize your Wireshark to get the most out of it. For more information, download the course description here. | Pre-Conference Workshops | |||
Deep Dive into Authentication Troubleshooting | The training deep dive in authentication troubleshooting will focus on configuring and troubleshooting different authentication protocols (LDAP, RADIUS, PKI, SAML, Kerberos) across various Fortinet products (FortiGate, FortiADC, FortiWeb, FortiAuthenticator). It also includes a lesson with tips and best practices using Wireshark, where you'll learn how to customize your Wireshark to get the most out of it. For more information, download the course description here. | Pre-Conference Workshops | |||
NSE 7 OT Security v7.2 | This course will teach you how to secure your OT infrastructure using Fortinet solutions. You will learn how to design, deploy, administrate, and monitor FortiGate, FortiNAC, FortiAnalyzer, and FortiSIEM devices to secure OT infrastructures. These skills will provide you with a solid understanding of designing, implementing, and operating an OT security solution based on Fortinet products. For more information, download the course description here. | Pre-Conference Workshops | |||
Automation, API & Scripting | The training Automation, API & Scripting will focus on different aspects of Automation. On day one, the automation features that are ready-to-use inside FortiOS & FortiManager/FortiAnalyzer (7.2.x) will be explored along with how to set up an environment for demo/testing Automation features. Day two will take automation one step further by exploring and interacting with the API capabilities of FortiOS (7.2.x), FortiManager/FortiAnalyzer, and FortiAuthenticator using various tools. Day two also includes an introduction into python scripting, where you'll learn how to interact with Fortinet devices using SSH and the API to explore the capabilities of automation using python scripts. For more information, download the course description here. | Pre-Conference Workshops | |||
NSE 7 SD-WAN v7.2 | This course is a preview of the upcoming and new NSE 7 SD-WAN v.7.2 course. You will learn about common SD-WAN deployment scenarios using the Fortinet Secure SD-WAN solution. You will explore different situations, from a single enterprise site to multiple data center environments, that will help you to enhance and troubleshoot SD-WAN deployments. To learn more, click here | Pre-Conference Workshops | |||
NSE 7 Enterprise Firewall v7.2 | This course is a preview of the upcoming NSE 7 Enterprise Firewall v7.2 course. You will learn how to implement, troubleshoot, and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices. To learn more, click here | Pre-Conference Workshops | |||
NSE 5 FortiAnalyzer Administrator v7.2 (Day 1) | This course teaches you the fundamentals of using FortiAnalyzer for centralized logging and reporting. You will learn how to configure and deploy FortiAnalyzer, and identify threats and attack patterns through logging, analysis, and reporting. Finally, you will examine the management of events, incidents, playbooks, and some helpful troubleshooting techniques. | Pre-Conference Workshops | |||
NSE 8 Immersion v7.2 | The NSE 8 Immersion is an all-hands-on lab that students preparing for the NSE 8 practical exam can do to get an exam-like experience. Based on the previous NSE 8 practical exam, students will be tasked with completing the lab in a challenging learning environment. Fortinet products in the lab include FortiGate, FortiManager, FortiAnalyzer, FortiWeb, FortiMail, FortiADC, FortiAuthenticator, and FortiSandbox. During the sessions, an NSE8-certified instructor is available for questions and to help gain knowledge to prepare for becoming NSE 8 certified. For more information, download the course description here. | Pre-Conference Workshops | |||
NSE 6 FortiNAC v7.2 | During this two-day training, you will learn the most important topics and concepts that are covered in the NSE 6 FortiNAC v.7.2 course. You will learn how to leverage the powerful and diverse capabilities of FortiNAC, using best practices for achieving visibility, control, and response. These fundamentals will provide you with a solid understanding of how to implement network visibility and security automation. To learn more, click here | Pre-Conference Workshops | |||
NSE 7 Advanced Analytics v6.6 | During this two-day training, you will learn the most important topics and concepts that are covered in the NSE 7 Advanced Analytics v6.6 course. You will learn how to use FortiSIEM in a multi-tenant environment. You will learn about rules and their architecture, how incidents are generated, how baseline calculations are performed, the different remediation methods available, and how the MITRE ATT&CK framework integrates with FortiSIEM. You will also learn how to integrate FortiSOAR with FortiSIEM. To learn more, click here | Pre-Conference Workshops | |||
Networking Security Troubleshooting v7.2 | This course is a preview of the upcoming and new NSE 7 Network Security Troubleshooting v.7.2 course. You will learn how to diagnose and troubleshoot the most common networking and security problems in a FortiGate network security solution. In interactive break-and-fix labs you will use tools, diagnostic, and debug commands to detect, isolate, and resolve problems related with the most commonly used FortiGate features, such as IPsec, routing, web filtering, HA, IPS, and more. These skills and knowledge will give you an advanced understanding of how to support a network security solution based on FortiGate devices. To learn more, view the course description here. | Pre-Conference Workshops | |||
Cybersecurity (Powered by FortiGuard Labs) - Web Application Security (Day 2) | This cybersecurity module will explore web application threats and countermeasures focused on Fortinet solutions. Comprised of theory lessons and hands-on labs, this course will get the students from the very motivations of attacks to web applications through understanding and executing attack techniques, recognizing such attacks, and configuring Fortinet solutions to mitigate them. Learn more about this Pre-Conference Workshop here. | Pre-Conference Workshops | |||
NSE 5 FortiManager v7.2 | In this course, you will learn the fundamentals of using FortiManager for the centralized network administration of many FortiGate devices. In interactive labs, you will explore deployment strategies, which include single or multiple ADOMs, device registration, policy packages, shared objects, installing configuration changes, provisioning FortiManager as a local FortiGuard distribution server, and troubleshooting the features that are critical to day-to-day use after you deploy FortiManager. For more information, download the course description here. | Pre-Conference Workshops | |||
Pre-Conference Welcome Reception | Pre-Conference Workshops | ||||
Technical Track | |||||
Agile Wireless WAN Solution for Your SD Branch | FortiExtender is a fully fabric integrated Wireless LTE/5G WAN access for your SD-WAN and SD-BRANCH deployments. You can define SD-WAN rules, policies on wireless interfaces providing an extended choice of connectivity, and redundancy while optimizing overall operational cost. FortiExtender can also be independently deployed and managed by cloud service. In addition, With some of the purpose-built models and solutions, it serves FortiSASE, mobile and OT use cases. | Technical Track | |||
App-to-App Zero Trust Protection in Security Fabric | Prevent unauthorized and unexpected connections between apps! Join this session to see how FortiPolicy can discover apps, multi-tier apps and automatically generate policies to achieve this. You will get visibility into apps, connections, and separation required to protect your apps and data. | Technical Track | |||
Agile Consumption with Fortinet On-demand Points Solutions | Organizations' appetite for on-demand and pay-as-you-go style consumption methods continuously grow. In this session, learn how to gain agility and flexibility with Fortinet's points based system for on-demand products and services. | Technical Track | |||
Accelerating the Cloud Journey with ZTNA and SASE | Join us to see how FortiSASE can accelerate your cloud journey with unified Secure Internet Access (SIA) & Secure Private Access (SPA), secured by Fortinet NGFW, ZTNA, and CASB technologies. | Technical Track | |||
Cross-Fabric eXtended, Automated Detection and Response | Recent research reports indicate that security operations today are more difficult than they were two years ago. Top reasons being the changing threat landscape and attack surface and increased use of cloud services. Other notable challenges were the expansion of data collected, too many unscalable manual actions, gaps in security monitoring, and the inability to automate complex tasks. The concept of XDR, built on the foundation of EDR, comes to solving these problems. While EDR specifically covers endpoints with additional integrations, the “X” in XDR indicates that the solution can normalize and correlate data from other security products to detect attacks and automate a response. Join this session to get an overview of FortiXDR and how its built-in integrations and AI-based capabilities allow leveraging the security ecosystem to get more accurate, automatic, contextual detections as well as automatic cross-systems incident-response. | Technical Track | |||
Evolution of SD-WAN Performance & Orchestration | The industry-leading Secure SD-WAN solution continues to evolve with some of the most significant updates to date. With major enhancements from top to bottom, Fortinet continues to set the standard for application performance and security. Join us as we dive into some of the newest features introduced since 7.2, including enhancements across provisioning, operations and application performance. We’ll review how users of all backgrounds could deploy and manage SD-WAN networks using the orchestration and provisioning capabilities introduced in 7.2.0. | Technical Track | |||
Simplified and Secure Application Access for Hybrid Workforce with Zero Trust | Organizations are moving towards remote and hybrid work environments. These trends are exposing organizations to higher security risks beyond corporate perimeters with bigger attack surfaces and reduced visibility & control. Remote Endpoints are the new perimeter edge that needs to be monitored and secured. Join this session to get an overview of how you can adopt Fortinet’s Zero Trust Network Access solution to enhance endpoint security and provide secure access to both on-premise and SaaS Applications from anywhere and everywhere using our integrated FortiClient Agent. | Technical Track | |||
Secure Your Network and Expand Your Coverage with Fastest Sandbox | A typical IT security response: Sandboxing, checked! Inline-Blocking, maybe? MacOS, Linux, Android VMs, likely not. Learn how to use the latest updates on Sandboxing technologies to expand your coverage. | Technical Track | |||
FortiNDR: New Era of Threat Detection with Advanced ML | Network Detection Response - a new way to detect threats based on customers' traffic meta data, using advanced analytics and machine learning techniques. Find out the latest development for NDR space and how it will help organizations to detect threats early. | Technical Track | |||
FortiPAM: Secure, Control and Monitor Access to Your Critical Systems and Data | Often, the difference between Identity Access Management (IAM) and Privileged Access Management (PAM) is not understood since they are both used to protect access to resources. You might think that if you control access to a resource via a user’s identity, you control the accounts that users can use. But that is not the case. IAM and PAM are accessed via different network methods and have different objectives in controlling and protecting an attack surface. IAM is focused on general end-users and controlling access that users have within an application. PAM is focused on IT administration and Sys Admin as end-users using and controlling access to privileged account credentials and monitoring privileged account activity. The key difference is the interface PAM and IAM use to allow access to an application because of the much higher risk associated with access to a privileged account. | Technical Track | |||
FortiTrust Identity: Facilitating the Journey to the Cloud | FortiTrust Identity is a full-featured IAM service hosted by Fortinet. It is designed to integrate seamlessly with Fortinet’s SASE and ZTNA products for Zero Trust deployments. FortiTrust Identity’s unique and powerful IAM features provide the highest security for the business and the lowest friction end-user experience. A compelling example of FortiTrust Identity’s value is how it can be deployed with FortiSASE or FortiZTNA in a legacy Active Directory environment to enable secure SSO to cloud and SaaS applications without having to move accounts from AD. | Technical Track | |||
Fabric Integrated and Multi-Vendor Options for Dynamic Access Control | With the continued huge growth of devices and users coming on the networks, it remains critical to discover, identify and control everything that’s coming on board. FortiNAC provides you with several industry-leading options. You can deploy it fully integrated with Security Fabric utilizing the powerful capabilities of core Fabric components. FortiNAC also has extensive multi-vendor support as well as its highly scalable enabling the ability to protect thousands of endpoints per deployment. | Technical Track | |||
Automate NetOps at Scale with Single Pane Management | Networks are constantly evolving, and the attack surface now extends beyond the perimeter to cloud services, IoT devices, employees’ homes, customers, and suppliers. Network teams struggle to manage multiple networks while delivering secure, consistent access, policies, and services. In this session, we’ll explore how you can use FortiManager and FortiPortal to automate the management for on-prem data centers, cloud, and large branch locations to improve operational efficiency. | Technical Track | |||
Managing at Scale and Adapting Wi-Fi 6E and 7! | Turn on self-tuning and self-checking networks with FortiAIOps. Learn how this integrated AIOps tool can lower your time-to-remediation across your LAN Edge and SD-WAN estate. In this session, you will discover the latest FortiAP hardware and software features and what the future holds for Wi-Fi. | Technical Track | |||
Unlocking the Power of FortiCloud for Deployment & Management: User, Inventory, ZTP and Entitlement Management | Unlock the power of FortiCloud by running deployment, entitlement, and management all from a single login. Learn about the Organisational Units, Licensing, and ZTP in this FortiCLoud overview. | Technical Track | |||
Expanding the Visibility: DEM, SD WAN Integration and 3rd Party Network Monitoring | Expand the visibility of the security fabric, and discover how total visibility is achievable for your entire network with Fortinet and 3rd Party equipment from traditional networking to cloud workloads and all in between. | Technical Track | |||
SOCaaS: A New Approach to Fast Track Your Security | Staff shortage? Budget constraints? An overwhelming number of threats and alerts? Join this session to learn how small to mid-sized companies can benefit from FortiGuard SOCaaS and have a 24x7 SOC that never sleeps. You will learn how AI, machine learning, and automation are leveraged for highly efficient and effective threat detection, alert triage, and incident response. | Technical Track | |||
Supercharge Your SOC with FortiAnalyzer, SIEM and SOAR | As today’s threat landscape continues to expand, SOC teams struggle with the disparate tools that they rely on to drive threat detection and incident response, the disconnect between products and services, and a lack of usability. In this session, we’ll explore how you can:
| Technical Track | |||
Uncovering Hidden Threats: FortiSIEM Security Analytics | Using the latest FortiSIEM developments in event correlations, machine learning, automation, and incident investigations, FortiSIEM enables organizations to maximize their security investments to stay ahead of increasingly sophisticated cyber threats. | Technical Track | |||
Email Breach Prevention | Explore how Fortinet can enable a more secure and productive workforce by defending your Microsoft 365 and Google inboxes from the top threats, including phishing, ransomware, and business email compromise | Technical Track | |||
SaaS Security: Securing User Access with Network and API SaaS Security | As organizations continue to use SaaS applications for an increasing variety of use cases, the need for visibility and control over data and usage patterns grows. Additionally, users work from a variety of locations using a variety of devices. Securing the SaaS journey grows in complexity, and organizations must consider a combination of cloud and inline CASB solutions. This session will cover the Fortinet Security Fabric CASB solution and showcase its ability to uniquely address the modern organization's expansive SaaS security requirements. | Technical Track | |||
Managing Cloud Risk with Fortinet Cloud Security | As organizations build and migrate applications to cloud infrastructure and platform service providers such as AWS, Azure, and GCP, the need to maintain visibility and manage risk across the entire cloud estate grows. In this session, we will present a priority-based risk management approach to address these challenges. The session will showcase FortiCNP and its ability to prioritize cloud risk as well as its integration with cloud provider native security tools and FortiGate VM instances that protect cloud workloads. | Technical Track | |||
Top 5 Use Cases for Securing Your Cloud Network | Maintaining consistent, secure networking across the everchanging infrastructure in dynamic and hybrid world-spanning cloud and on-prem infrastructures is more critical than ever. Network connectivity, security, and operations all play a critical role in the organization. In this session, we will review five secure networking use cases offered by Fortinet for cloud customers. From high-performance / low footprint FortiGate VM network virtual appliances, Multi-Cloud SD-WAN consistently running on different clouds and on-prem, to cloud-native integrations between Azure vWAN as well as GCP NCC with FortiOS, to the latest introduction of Fortinet's Cloud Native Firewall as a Service, FortiGate CNF. | Technical Track | |||
Next-Generation Datacenter | FortiGate Next-Generation Firewalls (NGFWs) protect hybrid data centers with dynamic segmentation and coordinated, automated AI/ML-powered FortiGuard services to enable speed and manage all security risks. Attend this session to learn about the latest Datacenter FortiGates and new 7.4 features that will help you reduce cost and complexity by eliminating point products and consolidating industry-leading security capabilities. | Technical Track | |||
SOC5 : The Newest Secure SD-WAN ASIC | The Fortinet Secure SD-WAN (software-defined wide-area network) solution enables enterprises to transform and secure all WAN edges. Learn how the latest SOC5 Secure SD-WAN ASIC and FortiGates can help you realize a superior user experience and enhanced security posture effectiveness with converged networking and security. | Technical Track | |||
Protect Your Data by Stopping Attacks at LAN Edge | With FortiLink technology, security is extended to the network perimeter. Fortinet’s Security Fabric has integrated, dynamic, and adaptive network access control providing powerful tools to secure the data at the LAN Edge. With a wide range of FortiSwitch & FortiAP models, such solutions can be built for small to large deployments, serving retail and branch offices to large enterprises, including OT deployments. In this session, you will get the latest information on Wi-Fi 6E and & 7 FortiAP models. | Technical Track | |||
Application Security: From Development to Production | With the rapid expansion of the customer's digital footprint, the attack surface continues to grow. Developments in how applications are developed and delivered create a major headache for security teams to keep as these changes allow applications to be updated sometimes on a daily basis. In this session, we will go over the challenges of securing applications throughout their lifecycle and discuss solutions to protect applications from development to production | Technical Track | |||
On-Demand Experts and Advisory Services | Despite continued investments in the latest and greatest cybersecurity technology, successful breaches continue to plague organizations. Fortinet’s 2022 Cybersecurity skills gap report indicates it’s a Cybersecurity Skill Shortage problem. The report survey highlights that Worldwide, 80% of organizations suffered one or more breaches that they could attribute to the lack of cybersecurity skills and/or awareness. In this session, you will learn about FortiGuard’s Global Security Consulting service offerings, including Incident Response and SOC Incident Readiness services, and how these consulting services are helping customers solve the lack of expert resource availability. | Technical Track | |||
Stay Ahead of Threats with FortiRecon | Learn how FortiRecon Digital Risk Protection (DRP) service can help you avoid threats before they become cyberattacks. It combines three powerful modules – External Attack Surface Management, Brand Protection, and Adversary Centric Intelligence, to provide unified threat intelligence about the attackers targetting your network, the techniques they use, and how to stop them. | Technical Track | |||
Deceive by Design: How to Use Deception Technology to Protect Medical IoT, OT, and IT Networks | Advanced deception technologies put the power back into the hands of its defenders, with the ability to deceive attackers into engaging with fake assets, data, and applications and, ultimately -- revealing themselves. This results in high-fidelity alerts powered by valuable intelligence, accelerated response, and actionable insights into your environment’s defense weak spots. Join us in this session us to learn why deception technology is the “solution of choice” for many Fortinet customers. Find out how manufacturing, healthcare, utilities, and government organizations use Fortinet’s deception technology to secure their environment while ensuring business continuity effectively. | Technical Track | |||
Voice of Customer | |||||
Let's Demystify SASE: Enabling Consistent Security and User Experience Anywhere | Today’s networks are nothing like the ones most security solutions were designed to defend, nor are they confined to four office walls. They are expansive and constantly evolving to support an organization’s digital acceleration efforts and work-from-anywhere (WFA) strategies. In response to these rapid changes, many organizations are challenged by an expanding attack surface, inconsistent security posture, and poor user experience. In this session, you will learn how Fortinet delivers a comprehensive SASE solution that extends the convergence of networking and security from on-prem to remote users. FortiSASE seamlessly converges cloud-delivered security (comprised of a secure web gateway, universal zero trust network access, cloud access security broker, and Firewall-as-a-Service) with SD-WAN. A single operating system (FortiOS), single agent (FortiClient), and AI-powered security to drive consistent security posture and operational efficiency. Featured Customers:
| Voice of Customer | |||
State of Industrial Security and Future Trends | Recent geopolitical events and industrial incidents validate the exceptional risk associated with Industrial cyber events. Beyond these global events, numerous day-to-day challenges exist in mitigating operational risk in industrial environments. As the stakes rise, OT network and security are relatively immature and at times, unique. In this session, we'll catch up on recent Industrial events, discuss operational security pain points and examine OT security trends in relation to maturity. | Voice of Customer | |||
The Future of Hybrid Network with Disruptions in Security, Productivity and ROI | Join us to learn more about innovative and disruptive technologies that will shape the future of the hybrid network and empower the CIO team with consolidation and simplified operations. With Fortinet’s convergence approach to bring network security and enterprise networking technologies in one unified offering, you can now take advantage of consistent security, 300%+ ROI, and better user experience across all locations. Topics that will be covered during this session include security transformation and network modernization using NGFW, SD-WAN, LAN Edge, 5G, SASE, Automation, and Digital Experience Measurement. Featured Customer: | Voice of Customer | |||
Cybersecurity Vendor Consolidation, Done Right | According to Gartner, 75% of organizations are currently pursuing cybersecurity vendor consolidation to promote cybersecurity efficacy and team effectiveness, up dramatically compared to 25% in 2020. Join us for a CISO discussion covering the following:
Featured Customer: | Voice of Customer | |||
How Services Helped Meet Organizational Support Strategy or Enable Transformation | Transformation is always difficult, and we’ve heard stories about long delays, missed opportunities, and semi-finished projects. In order for the transformation project to be successful, organizations must have an end-to-end strategy, resources, and expertise to meet their objectives. In this session, a customer will share how they met their transformation objectives and reduced the time-to-value by leveraging Fortinet’s FortiCare Services. | Voice of Customer | |||
What Does It Really Mean to "Automate My SOC"? | Automation, orchestration, machine learning, artificial intelligence -- many of the claims made in today's security marketplace make it seem like the cyber skills shortage is irrelevant because the machines are ready to solve all of our security operations challenges. While clearly not the case (yet), there are some truly impactful ways to leverage the latest technologies that can allow a smaller team to move faster and do more. In this session, we will focus on the places where too many security operations teams are wasting time on automatable processes and we'll dig into some of the extraordinary security ops enhanced capabilities that machine learning and automation have made accessible to those without extraordinary security ops budgets. Featured Customers:
| Voice of Customer | |||
Discover a LAN Solution Focused on Features Not Licensing, with Security by Design, Not Add-on | As we have asked more of our wired and wireless networks, they have become more complex to maintain and secure. In this session, you will hear from our customers on how the Fortinet LAN Edge Solution simplifies and secures the LAN with intelligence. Featured Customers:
| Voice of Customer | |||
Increasing Productivity of Security and Network Teams with Secure SD-WAN | With its centralized, single pane of glass, network and security teams can see everything about any device and any traffic that’s going through. This session will explore how a Fortinet customer was able to identify more quickly and remediate network issues improving time to issue resolution and enabling to reassign security and network team resources to higher-value activities. Featured Customer: | Voice of Customer | |||
How Would You Know if Attackers are Inside Your Network? There’s a “Decoy” for That! | There’s always a chance the security controls you have in place are not 100% configured the way they should be -- up-to-date and patched. Maybe a third-party software was tampered with, and you weren’t aware of it. Or maybe, via a recent Merger and Acquisition (M&A), you exposed your network to hidden security risks. Attackers will always find their way in. Discussion topics will include:
| Voice of Customer | |||
Stopping Future Spray-and-Pray Nation-State Ransomware Attacks at the Endpoint | Within five months of Russia’s invasion of Ukraine, the Financial Crimes Enforcement Network (FinCEN) reported that 75% of all ransomware attacks on American government agencies were from Russia. It is believed that heavily sanctioned nations have or will turn to cyber-attacks to fund various agencies. The data available to us shows that Russia is turning into a spray-and-pray IT security attack factory which puts all public and private organizations into its crosshairs. This session will go into the details from the frontlines in Ukraine on how nation-states create attack pools based on vulnerabilities, how they initiate attacks, and what you can do about it. With 46% of people working from home in a hybrid work environment, we will discuss how endpoint security is your first, and last line of defense against these advanced attacks. We will dive into what types of tools might be right for you and how you can integrate them into your larger security ecosystem. Featured Customer: | Voice of Customer | |||
101 Ways to Detect Intrusion Before Compromise: Break the Cyber Kill Chain | Many of today's most successful cyber campaigns are a composition of components provided by a robust cyber-criminal industry and delivered in multiple stages, often allowing them to bypass traditional security controls to gain entry and then remain below the radar as they progress to their ultimate objective. While these campaigns may be more difficult to detect, they do offer well-prepared cybersecurity teams multiple opportunities to thwart them. Join this session as we map services and products to cyber kill chain stages and see the many ways your organization can gain early warning about intrusion before they have costly impacts. Featured Customer: | Voice of Customer | |||
Industrial Security: Maturing Solutions in Digital Transformation | Not long ago, Industrial security for OT was new or deemed unneeded since the factory was air-gapped. Today, that factory is connected to the internet and vulnerable to the added risk of personnel and production safety. With connectivity came the need for security. The first security steps included "visibility" of OT devices. Next, flat networks needed segmentation. Most companies are in this phase or still contemplating how to start. In this session, we will focus on phase 2. We will discuss common pain points, take solutions beyond phase 1 and provide strategic considerations beyond phase 2. Featured Customer: | Voice of Customer | |||
Why FortiCare Services are Critical for Your Organization | Many organizations struggle to secure their organizations and meet their organizational support objectives due to competing projects, staffing, and expertise, not to mention extended delays. In this session, a Fortinet customer will share how they leveraged FortiCare Services to meet and exceed their support KPIs, reduce time-to-value timelines, and meet organizational objectives. Featured Customer: | Voice of Customer | |||
How FortiCare Services Helped Transform an Organization from Reactive to Proactive | In this session, a Fortinet customer will share how they leveraged Advanced Support to transform their organization from reactive firefighting to proactive incident prevention. This transformation enabled them to allocate their limited internal experts to other mission-critical projects strategically. | Voice of Customer | |||
Reduce Complexity and Increase Efficiency of Hybrid Cloud Network Security Operations | According to a Cloud Security Report in May 2022, 39% of organizations surveyed will run their workloads in hybrid cloud environments with integration between private cloud and public cloud environments while 33% will use multi-cloud and only 27% will operate on a single cloud. For 95% of these organizations, security was a key concern and 78% are looking for a single cloud security platform. Join us to learn how Fortinet delivers consistent and effective network security policy and enforcement with a single FortiOS platform to secure hybrid cloud deployments through deep integrations with SDN solutions and public cloud services. Featured Customer: | Voice of Customer | |||
How to Leverage FortiCare Services | As the demand for cybersecurity skills increases in this tight labor market, many organizations need help to meet their organizational support objectives and secure their network from cyber threats. In this session, a Fortinet customer will share how they leveraged FortiCare Services to meet and exceed their support KPIs and organizational objectives. | Voice of Customer | |||
Comprehensive Zero Trust Delivered for Work From Anywhere Security | Work from Anywhere is the new normal, yet organizations are still struggling to get all the Zero Trust pieces to work together for complete security. Fortinet's unique solution that encompasses identity, endpoint security, application access, and remote security covers all the requirements for a comprehensive solution that both allows for consistently high levels of security in any location as well as policies that follow employees. Fortinet has converged the key technologies into an integrated solution that provides MFA, EPP, ZTNA, SASE, and EDR to create a platform with pre-validated integrations. During this session, you will learn how Fortinet makes it easy (and secure) to support Work From Anywhere with a Zero Trust approach. | Voice of Customer | |||
Making the Distributed Edge Mobile: How 5G/LTE Wireless WAN is Changing IT | Many enterprises are leveraging broadband in a distributed edge model to expand cloud access and cut costs. Yet, wired broadband is limited and the internet poses cyber risks. As a result, enterprises today are leveraging mobile 5G and LTE networks as their primary branch connection. Attend this session to learn how Fortinet provides secure 5G/LTE wireless WAN for enterprises across many industries, transforming their distributed edge with secure, low-cost mobility. Featured Customers:
| Voice of Customer | |||
Strategies for Securing Organizations Against Today’s Phishing, Impersonation, Zero Day and Email-based Ransomware Threats | In this session, we’ll briefly cover the latest trends in the threat landscape, including the use of AI by threat actors and then discuss best practices for email security, including securing cloud-based email services, the role of AI-powered sandboxing solutions and services to protect against zero-day malware, the use of DMARC and capabilities like DANE and MTA-STS, and combining email security with security awareness training and phishing simulation. We’ll also talk about how email security will evolve in the future to become part of organizations’ broader cybersecurity mesh adoption and resulting security outcomes. You'll also hear from a customer using Fortinet’s email security-as-a-service solution, FortiMail, with Microsoft Exchange 365, and hear the benefits they get from this approach. | Voice of Customer | |||
Accelerating Cloud Deployments with Fortinet Cloud Consulting Services | To stay ahead of the rapidly evolving threat landscape, organizations must adopt a cloud security architecture and operations that include a comprehensive and measured approach to cybersecurity. Fortinet experts use a vendor-agnostic approach to discover existing posture elements, align findings to business goals, guide current projects, and plan a future roadmap toward deep, native cloud security integration. Join us to learn how Fortinet Cloud Consulting Services has helped customers achieve a holistic security architecture across private and public cloud environments, resilient enough to withstand the continuous changes in the threat landscape. | Voice of Customer | |||
Applications Living in the Data Center: An Evolution Towards a Hybrid Network Environment | The data center is not dead. Sure, the speed of business is creating market dynamics that have increased the need for a hybrid network architecture, but the data center is a big part of the solution. Join Armando Diana, Director of Product Marketing, to explore the data center’s evolution into a more dynamic hybrid model of physical, virtual, and cloud infrastructures to handle applications living in the data center. You'll learn how one of Fortinet's top customers re-engineered their network to deploy a secure data center across a hybrid architecture and how they overcame the many challenges to ensure all network components are safe but effective. They will also explore the enabling technologies for this reimagined future that will deliver a more reliable, energy-efficient, and secure network. Featured Customer: | Voice of Customer | |||
Securing the Web Application and API Attack Surface | Securing the attack surface for your organization's web applications and their APIs has never been more important. These applications increasingly deliver some of your organization’s critical line-of-business capabilities: e-commerce, payroll, supply chain management, business intelligence, and more, and to deliver those capabilities to the applications and APIs that access some of your organization’s most critical data. Threat actors targeting those data assets constantly probe those applications’ attack surfaces, looking for a way in. Join us to learn how Fortinet can help accelerate your digital transformation by helping you deploy business-critical web applications and APIs without compromising security. | Voice of Customer | |||
Building Security into the CI/CD Application Lifecycle | The adoption of cloud-native strategies has enabled organizations to develop and deliver innovative solutions at a faster pace and helped to modernize and transform business operations. With over 90% of organizations leveraging open-source software to build their applications, this is also an entry point for software vulnerabilities to be introduced into an application, which if exploited, can cause put organizations and customers at risk. And as applications become more complex, it is critical that security be integrated into the application build cycles early in the process to ensure software vulnerabilities are detected swiftly and remediated. Come learn how Fortinet helps to simplify and automate application security (appsec) testing with broad visibility enabling organizations to manage and protect against software vulnerabilities for your applications. | Voice of Customer | |||
Reducing Friction Across Clouds with Cloud-native Security | Digital transformation and cloud adoption continue to accelerate, with many organizations adopting a cloud-native first strategy to increase agility and efficiency while recognizing cost benefits. However, cybercriminals are getting smarter about the ways they are able to gain access to your network. While native cloud security services help address the most common use cases for their clients, many organizations are still struggling with data overload and security teams are not able to separate through the noise to get to the core concerns that matter most. Cloud-native protection platforms that natively integrate with Cloud Service Providers’ security services can provide a comprehensive, full-stack cloud security solution for securing cloud workloads. Join us to learn how Fortinet helps to simplify cloud risk and enables organizations to make more impactful security decisions to proactively manage cloud using context-rich, actionable insights while maximizing your security investments to drive greater transformation and benefits. | Voice of Customer | |||
Know Your External Threats Before They Turn into Internal Risks | Malicious actors are constantly launching cyberattacks, leveraging vulnerable internet-facing assets, fake websites, phishing campaigns, rogue mobile apps, fake social media accounts, and more. The earlier you can view what adversaries are seeing, doing, and planning, the faster you can adjust your security posture and respond. Join us for an info-packed discussion, where you’ll see, firsthand, how to counter attacks at the reconnaissance phase – the initial stage of a cyberattack. Find out how to significantly reduce the risk, time, and costs of later-stage threat mitigation. Areas covered will include:
| Voice of Customer | |||
Securing Application Journeys from Data Center to Cloud | As organizations continue to pursue digital acceleration initiatives to better compete in today’s business landscape, successfully executing upon their application journey plans is a critical success factor. Those who have made application journeys thus far have come to realize that the journey is much more fluid than even just twelve months ago. Applications now can live anywhere from the data center to hybrid and multi-clouds to edge compute instances that are regionally and locally closest to users and devices. Given this, those making application journeys into the cloud face even more security and operational challenges than before. Join us to learn how to wade through the murky waters of securing application journeys of today and tomorrow, and critical things to consider to help guide the development of a strategic roadmap. | Voice of Customer | |||
Optimize Your Security Operations with FortiGuard's Managed Security Services Solution | Today most organizations need the (severely scarce) cybersecurity skills and staff to build, maintain, and operate a 24*7 security operations function or center (SOC). Security and threats are dynamic, and businesses must remain adept at change. As the security stack grows, determining what actions are required, on all alerts generated, on a continuous basis, can quickly become full-time jobs that further burden the business. FortiGuard's Managed SecOps solution provides the SecOps fast time-to-market and required expertise your team may need. Join us with one of our customers to discuss why and how they use FortiGuard's Managed Security Services to augment their security operations to an optimum outcome and to get a peak into the new solution offering. | Voice of Customer | |||
Start Your Zero Trust Journey by Discovering What's in the Jungle First | Just like vitamins to human bodies, NAC has been an essential part of the business network, keeping it operating securely, effectively, and orderly. In modern networks, with IoT proliferation, 59% of organizations could only see less than 75% of their networked assets, NAC gets its new use cases. More and more customers with IT/OT convergence are looking at NAC as a starting point for their device zero-trust efforts. In this session, we will share how customers like you got an immediate boost of confidence on asset visibility with FortiNAC and Fortinet security fabric as they discover connected devices, control access, and even automatically respond to security incidents with ease and confidence. | Voice of Customer | |||
So You’ve Mapped the MITRE ATT&CK CHAIN: Now What? | So you’ve done your due diligence in having an action plan for each stage of the MITRE ATT&CK Framework. Now all you have to do is ensure all of that technology you’ve steadfastly put in place is actually keeping you secure. How do you do that? Join our Practice leader and other experts as we talk about the important ‘cyber hygiene’ practices that all security teams must understand. And, get a sneak peek at the new services we’re introducing to help Sec Ops teams. | Voice of Customer | |||
Universal ZTNA is the Solution for Securing Work From Anywhere that Accelerates Your Team's Productivity (and Saves You Money!) | Are you tired of remote access solutions that hold your team back and drain your budget? Fortinet's Universal Zero Trust Network Access (ZTNA) is the answer you've been looking for. In this session, you'll learn how this cutting-edge technology can provide secure and reliable access to all resources for your team, no matter where they are, while also saving you up to 5x compared to competing solutions. Whether your team is working from home, the office, a coffee shop, or anywhere else, Universal ZTNA enables them to work at the speed of light without breaking the bank. You'll also hear from our experts and a real-world customer experience about the numerous benefits of Universal ZTNA, including improved security, productivity, and flexibility. Don't miss this opportunity to discover how Universal ZTNA can accelerate your team's productivity and save you money! | Voice of Customer | |||
Leveraging Threat Intelligence and AI/ML-Powered Security at the Enterprise Edge | Security becomes paramount as organizations move away from traditional hub-and-spoke architectures and embrace cloud and internet access at distributed branch and campus locations. 95% of internet edge traffic is encrypted, which hides advanced threats that can paralyze unprotected enterprises. Join this session to learn how customers leverage FortiGate NGFW to deliver advanced threat intelligence, AI/ML-powered security, and decryption at scale to protect against known and unknown threats, while automating operations end-to-end to relieve constrained IT teams. | Voice of Customer | |||
A BRIEF HISTORY OF Current Attacks, Extraordinary Mitigation, and TIME | Like all proper things in life, this session will be composed of three sections:
| Voice of Customer | |||
Unleash the Power and Protection of Next Generation Firewall Services | Ever make a buying decision for an NGFW based on the security services and threat intelligence powering the NGFW? Sure, there's throughput, but what about the throughput when the services are turned on? Is the NGFW engineered to support services? Is there a lab or threat intelligence considered in the performance? Also, how is threat intelligence updated? These questions and many more considerations will be explored to ensure customers are fully evaluating services and threat intelligence as part of the full value equation. Featured Customer: | Voice of Customer | |||
Drive Business Growth with Operational Efficiency | Join us to learn why a leading global bank selected Fortinet Security Fabric to secure its network edges. Umar will share the scope and requirements of the Deutsche Bank initiative and the vendor selection process. Showcasing the benefits his team gets from AI/ML to secure their network edges and the advantage of centralized management for control and visibility of their network and security operations teams to be operationally efficient to drive business accelerated growth. Featured Customer: | Voice of Customer |