The Accelerate content catalog offers a broad range of sessions designed to expand your cybersecurity knowledge and skills. Learn directly from your peers in the Voice of the Customer track, where Fortinet customers share real-world experiences, challenges, and success stories.
Looking to go deeper? Explore the Technical track for in-depth sessions led by Fortinet experts, packed with practical guidance and technical insights. If your focus is on outcomes and implementation, the Solutions track highlights proven approaches to solving today’s most pressing security challenges.
With something for every role and experience level, the content catalog puts you in control of your Accelerate journey.
Session registration is open to all attendees. Login in to create your personalized schedule today.
Join Zaxby Restaurants Senior Security Analyst, Adam Price to discover how Zaxby’s lean security operations center team leverages the power of the Fortinet SOC solutions, FortiSIEM and FortiSOAR, to manage the security of over 1000 restaurants. Learn about the company’s security adoption journey over time, vendor assessments, operational insights, and the best practices that allow a small enterprise to operate a Fortune-500-class SOC.
Discover how Fortinet uses AI to enhance visibility, detect threats, and protect OT environments without adding operational complexity. This session explores how AI-driven insights help identify assets, spot abnormal behaviour, and reduce risk across OT environments.
Please note this session is offered multiple times.
Discover how Fortinet uses AI to enhance visibility, detect threats, and protect OT environments without adding operational complexity. This session explores how AI-driven insights help identify assets, spot abnormal behaviour, and reduce risk across OT environments.
Please note this session is offered multiple times.
This hands-on workshop explores how to integrate, automate, and orchestrate Fortinet’s Security Fabric for unified visibility and intelligent response. Participants will learn how to connect multiple Fortinet solutions, synchronize configuration and objects across the Fabric, and automate operations using FortiAnalyzer event handlers, playbooks, and FortiGate automation stitches. Attendees will build and test automation workflows that enhance security efficiency and operational consistency across complex environments.
- Laptop (required, second screen strongly suggested to view lab instructions)
- Hands-on experience with FortiGate and FortiAnalyzer
As enterprises evolve, new technologies emerge, and cybercriminals introduce more sophisticated attacks, security leaders and their teams face a variety of challenges in securing the organization’s networks. Security operations center (SOC) teams often struggle with the overwhelming task of investigating alerts and responding to threats, frequently needing to consolidate data from multiple tools to analyze and resolve incidents. This excessive workload impedes their ability to swiftly detect and address critical attacks. This course emphasizes the growing need for advanced security solutions, such as Fortinet’s SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) to tackle these challenges.
The course will focus on real-time threat monitoring with FortiSIEM and the automation of security workflows using FortiSOAR. These solutions are designed to reduce manual effort, lower operational costs, and strengthen overall security posture. By the end of the course, participants will be equipped with the knowledge to leverage Fortinet’s advanced security technologies to enhance visibility, mitigate cyber risks, and optimize their organization’s security operations.
Participants who attend this workshop will learn how to:
- Gain insights into the Configuration Management Database (CMDB) by exploring devices, applications, servers, configuration differences, and CMDB reports.
- Leverage out-of-the-box content including Reports, Rules, and Threat Intelligence (such as 3rd Party Malware IP Import), and utilize Custom SIGMA Rule Import to easily incorporate new security rules.
- Understand, view, and manage incidents using tools like Incident Risk View, Incident List View and Investigate Incident.
- Utilize analytics tools to execute both simple and complex queries with aggregation techniques.
- To explore various dashboard types, such as Widget, Summary, and Identity & Location dashboards, to effectively visualize and analyze data for enhanced decision-making and insights.
- To implement automated case management for SOC analyst groups and users, develop case management policies, and create automation policies to enhance workflow efficiency.
- Address the staff and skills shortage by automating routine tasks to preserve scarce expertise for critical incidents
- Combat complexity with connectors that easily integrate with deployed security controls to ingest information and provide a single, centralized point of visibility and control
- Avoid alert fatigue by aggregating security alerts in one place, enriching them with added context to speed investigation, and including playbooks to guide the triage process
Please note this session is offered multiple times.
As enterprises evolve, new technologies emerge, and cybercriminals introduce more sophisticated attacks, security leaders and their teams face a variety of challenges in securing the organization’s networks. Security operations center (SOC) teams often struggle with the overwhelming task of investigating alerts and responding to threats, frequently needing to consolidate data from multiple tools to analyze and resolve incidents. This excessive workload impedes their ability to swiftly detect and address critical attacks. This course emphasizes the growing need for advanced security solutions, such as Fortinet’s SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) to tackle these challenges.
The course will focus on real-time threat monitoring with FortiSIEM and the automation of security workflows using FortiSOAR. These solutions are designed to reduce manual effort, lower operational costs, and strengthen overall security posture. By the end of the course, participants will be equipped with the knowledge to leverage Fortinet’s advanced security technologies to enhance visibility, mitigate cyber risks, and optimize their organization’s security operations.
Participants who attend this workshop will learn how to:
- Gain insights into the Configuration Management Database (CMDB) by exploring devices, applications, servers, configuration differences, and CMDB reports.
- Leverage out-of-the-box content including Reports, Rules, and Threat Intelligence (such as 3rd Party Malware IP Import), and utilize Custom SIGMA Rule Import to easily incorporate new security rules.
- Understand, view, and manage incidents using tools like Incident Risk View, Incident List View and Investigate Incident.
- Utilize analytics tools to execute both simple and complex queries with aggregation techniques.
- To explore various dashboard types, such as Widget, Summary, and Identity & Location dashboards, to effectively visualize and analyze data for enhanced decision-making and insights.
- To implement automated case management for SOC analyst groups and users, develop case management policies, and create automation policies to enhance workflow efficiency.
- Address the staff and skills shortage by automating routine tasks to preserve scarce expertise for critical incidents
- Combat complexity with connectors that easily integrate with deployed security controls to ingest information and provide a single, centralized point of visibility and control
- Avoid alert fatigue by aggregating security alerts in one place, enriching them with added context to speed investigation, and including playbooks to guide the triage process
Please note this session is offered multiple times.
As enterprises evolve, new technologies emerge, and cybercriminals introduce more sophisticated attacks, security leaders and their teams face a variety of challenges in securing the organization’s networks. Security operations center (SOC) teams often struggle with the overwhelming task of investigating alerts and responding to threats, frequently needing to consolidate data from multiple tools to analyze and resolve incidents. This excessive workload impedes their ability to swiftly detect and address critical attacks. This course emphasizes the growing need for advanced security solutions, such as Fortinet’s SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) to tackle these challenges.
The course will focus on real-time threat monitoring with FortiSIEM and the automation of security workflows using FortiSOAR. These solutions are designed to reduce manual effort, lower operational costs, and strengthen overall security posture. By the end of the course, participants will be equipped with the knowledge to leverage Fortinet’s advanced security technologies to enhance visibility, mitigate cyber risks, and optimize their organization’s security operations.
Participants who attend this workshop will learn how to:
- Gain insights into the Configuration Management Database (CMDB) by exploring devices, applications, servers, configuration differences, and CMDB reports.
- Leverage out-of-the-box content including Reports, Rules, and Threat Intelligence (such as 3rd Party Malware IP Import), and utilize Custom SIGMA Rule Import to easily incorporate new security rules.
- Understand, view, and manage incidents using tools like Incident Risk View, Incident List View and Investigate Incident.
- Utilize analytics tools to execute both simple and complex queries with aggregation techniques.
- To explore various dashboard types, such as Widget, Summary, and Identity & Location dashboards, to effectively visualize and analyze data for enhanced decision-making and insights.
- To implement automated case management for SOC analyst groups and users, develop case management policies, and create automation policies to enhance workflow efficiency.
- Address the staff and skills shortage by automating routine tasks to preserve scarce expertise for critical incidents
- Combat complexity with connectors that easily integrate with deployed security controls to ingest information and provide a single, centralized point of visibility and control
- Avoid alert fatigue by aggregating security alerts in one place, enriching them with added context to speed investigation, and including playbooks to guide the triage process
Please note this session is offered multiple times.
As enterprises evolve, new technologies emerge, and cybercriminals introduce more sophisticated attacks, security leaders and their teams face a variety of challenges in securing the organization’s networks. Security operations center (SOC) teams often struggle with the overwhelming task of investigating alerts and responding to threats, frequently needing to consolidate data from multiple tools to analyze and resolve incidents. This excessive workload impedes their ability to swiftly detect and address critical attacks. This course emphasizes the growing need for advanced security solutions, such as Fortinet’s SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) to tackle these challenges.
The course will focus on real-time threat monitoring with FortiSIEM and the automation of security workflows using FortiSOAR. These solutions are designed to reduce manual effort, lower operational costs, and strengthen overall security posture. By the end of the course, participants will be equipped with the knowledge to leverage Fortinet’s advanced security technologies to enhance visibility, mitigate cyber risks, and optimize their organization’s security operations.
Participants who attend this workshop will learn how to:
- Gain insights into the Configuration Management Database (CMDB) by exploring devices, applications, servers, configuration differences, and CMDB reports.
- Leverage out-of-the-box content including Reports, Rules, and Threat Intelligence (such as 3rd Party Malware IP Import), and utilize Custom SIGMA Rule Import to easily incorporate new security rules.
- Understand, view, and manage incidents using tools like Incident Risk View, Incident List View and Investigate Incident.
- Utilize analytics tools to execute both simple and complex queries with aggregation techniques.
- To explore various dashboard types, such as Widget, Summary, and Identity & Location dashboards, to effectively visualize and analyze data for enhanced decision-making and insights.
- To implement automated case management for SOC analyst groups and users, develop case management policies, and create automation policies to enhance workflow efficiency.
- Address the staff and skills shortage by automating routine tasks to preserve scarce expertise for critical incidents
- Combat complexity with connectors that easily integrate with deployed security controls to ingest information and provide a single, centralized point of visibility and control
- Avoid alert fatigue by aggregating security alerts in one place, enriching them with added context to speed investigation, and including playbooks to guide the triage process
Please note this session is offered multiple times.
As enterprises evolve, new technologies emerge, and cybercriminals introduce more sophisticated attacks, security leaders and their teams face a variety of challenges in securing the organization’s networks. Security operations center (SOC) teams often struggle with the overwhelming task of investigating alerts and responding to threats, frequently needing to consolidate data from multiple tools to analyze and resolve incidents. This excessive workload impedes their ability to swiftly detect and address critical attacks. This course emphasizes the growing need for advanced security solutions, such as Fortinet’s SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) to tackle these challenges.
The course will focus on real-time threat monitoring with FortiSIEM and the automation of security workflows using FortiSOAR. These solutions are designed to reduce manual effort, lower operational costs, and strengthen overall security posture. By the end of the course, participants will be equipped with the knowledge to leverage Fortinet’s advanced security technologies to enhance visibility, mitigate cyber risks, and optimize their organization’s security operations.
Participants who attend this workshop will learn how to:
- Gain insights into the Configuration Management Database (CMDB) by exploring devices, applications, servers, configuration differences, and CMDB reports.
- Leverage out-of-the-box content including Reports, Rules, and Threat Intelligence (such as 3rd Party Malware IP Import), and utilize Custom SIGMA Rule Import to easily incorporate new security rules.
- Understand, view, and manage incidents using tools like Incident Risk View, Incident List View and Investigate Incident.
- Utilize analytics tools to execute both simple and complex queries with aggregation techniques.
- To explore various dashboard types, such as Widget, Summary, and Identity & Location dashboards, to effectively visualize and analyze data for enhanced decision-making and insights.
- To implement automated case management for SOC analyst groups and users, develop case management policies, and create automation policies to enhance workflow efficiency.
- Address the staff and skills shortage by automating routine tasks to preserve scarce expertise for critical incidents
- Combat complexity with connectors that easily integrate with deployed security controls to ingest information and provide a single, centralized point of visibility and control
- Avoid alert fatigue by aggregating security alerts in one place, enriching them with added context to speed investigation, and including playbooks to guide the triage process
Please note this session is offered multiple times.
The day-to-day life of a cloud security analyst isn’t easy. Even the most experienced technically savvy pros have to keep up with increasingly sophisticated threats such as zero-day exploits, sophisticated bots, API threats, and remote scripting. Coupled with that is a never-ending barrage of alerts from countless monitoring tools, increasing the likelihood of missing true threats. With perennial understaffing, it’s a recipe for loss of control and an increased risk. Join us to understand how Fortinet simplifies application security through its unified platform approach and newly introduced enhancements like FortiAI-Assist and client-side protection. Find out how to meet compliance requriements and secure your web applications now and in the future.
As organizations accelerate their adoption of SaaS and cloud applications, the stability of their underlying network becomes mission-critical. Performance issues, brownouts, and latency threaten business continuity, a risk heightened by architectures dependent on centralized controllers. In this session, we’ll explore how Fortinet’s Secure SD-WAN architecture was purpose-built around a completely decentralized model—one where every device can independently self-heal and automatically self-correct during outages or degradation.
Please note this session is offered multiple times.
As organizations accelerate their adoption of SaaS and cloud applications, the stability of their underlying network becomes mission-critical. Performance issues, brownouts, and latency threaten business continuity, a risk heightened by architectures dependent on centralized controllers. In this session, we’ll explore how Fortinet’s Secure SD-WAN architecture was purpose-built around a completely decentralized model—one where every device can independently self-heal and automatically self-correct during outages or degradation.
Please note this session is offered multiple times.
As organizations accelerate their adoption of SaaS and cloud applications, the stability of their underlying network becomes mission-critical. Performance issues, brownouts, and latency threaten business continuity, a risk heightened by architectures dependent on centralized controllers. In this session, we’ll explore how Fortinet’s Secure SD-WAN architecture was purpose-built around a completely decentralized model—one where every device can independently self-heal and automatically self-correct during outages or degradation.
Please note this session is offered multiple times.
Join James Erwin, Senior Director of Engineering Services for Lowe's Home Improvement, to hear how Lowe's IT team secured the business from the core to the edge with FortiGate network firewalls. James will discuss the business drivers that made FortiGate the right choice to protect Lowe's physical data centers, regional hubs, and store networks. Learn how a Fortune 50 company is leveraging FortiGate NGFWs for peak performance and cost reduction.
Join us for an inspiring conversation with a select group of sales and channel leaders to discuss Fortinet's commitment to our partners' success in 2026 and beyond. We'll take a closer look at the biggest growth drivers and discuss the importance of customer success. We'll wrap the session with a celebration of the winners of our partner of the year awards.
Connections between IT and operational technology (OT) systems are no longer air gapped, introducing the potential for hackers to penetrate industrial control systems, risking the safety and availability of critical infrastructure. Security for OT requires visibility, control, and analytics to meet safety and availability requirements.
Convergence is blurring the lines between IT and OT, creating an opportunity to improve the visibility, control, and situational awareness necessary for critical systems. Failure to take the wide range of security issues into account when converging these two very different networks and networking philosophies can result in catastrophic network failures that risk critical systems and the life and well-being of workers and communities.
In this workshop, participants learn about the Fortinet Security Fabric, the first ever architectural security approach designed to dynamically adapt to unique needs of legacy OT environments while enabling the move toward modernizing these critical systems. Leveraging the Purdue Model for the security layers needed in OT, the multi-layered approach provided by the Security Fabric provides broad, integrated, and automated protection against sophisticated threats.
Participants who attend this workshop will learn how to:
- Configure internal segmentation
- Explore the FortiGate asset list, network topology, and FortiNAC visibility
- Implement FortiGate access control
- Configure virtual patching through IPS
- Configure industrial protocol visibility and security
- Implement deception using FortiDeceptor
Please note this session is offered multiple times.
Connections between IT and operational technology (OT) systems are no longer air gapped, introducing the potential for hackers to penetrate industrial control systems, risking the safety and availability of critical infrastructure. Security for OT requires visibility, control, and analytics to meet safety and availability requirements.
Convergence is blurring the lines between IT and OT, creating an opportunity to improve the visibility, control, and situational awareness necessary for critical systems. Failure to take the wide range of security issues into account when converging these two very different networks and networking philosophies can result in catastrophic network failures that risk critical systems and the life and well-being of workers and communities.
In this workshop, participants learn about the Fortinet Security Fabric, the first ever architectural security approach designed to dynamically adapt to unique needs of legacy OT environments while enabling the move toward modernizing these critical systems. Leveraging the Purdue Model for the security layers needed in OT, the multi-layered approach provided by the Security Fabric provides broad, integrated, and automated protection against sophisticated threats.
Participants who attend this workshop will learn how to:
- Configure internal segmentation
- Explore the FortiGate asset list, network topology, and FortiNAC visibility
- Implement FortiGate access control
- Configure virtual patching through IPS
- Configure industrial protocol visibility and security
- Implement deception using FortiDeceptor
Please note this session is offered multiple times.
Connections between IT and operational technology (OT) systems are no longer air gapped, introducing the potential for hackers to penetrate industrial control systems, risking the safety and availability of critical infrastructure. Security for OT requires visibility, control, and analytics to meet safety and availability requirements.
Convergence is blurring the lines between IT and OT, creating an opportunity to improve the visibility, control, and situational awareness necessary for critical systems. Failure to take the wide range of security issues into account when converging these two very different networks and networking philosophies can result in catastrophic network failures that risk critical systems and the life and well-being of workers and communities.
In this workshop, participants learn about the Fortinet Security Fabric, the first ever architectural security approach designed to dynamically adapt to unique needs of legacy OT environments while enabling the move toward modernizing these critical systems. Leveraging the Purdue Model for the security layers needed in OT, the multi-layered approach provided by the Security Fabric provides broad, integrated, and automated protection against sophisticated threats.
Participants who attend this workshop will learn how to:
- Configure internal segmentation
- Explore the FortiGate asset list, network topology, and FortiNAC visibility
- Implement FortiGate access control
- Configure virtual patching through IPS
- Configure industrial protocol visibility and security
- Implement deception using FortiDeceptor
Please note this session is offered multiple times.
Connections between IT and operational technology (OT) systems are no longer air gapped, introducing the potential for hackers to penetrate industrial control systems, risking the safety and availability of critical infrastructure. Security for OT requires visibility, control, and analytics to meet safety and availability requirements.
Convergence is blurring the lines between IT and OT, creating an opportunity to improve the visibility, control, and situational awareness necessary for critical systems. Failure to take the wide range of security issues into account when converging these two very different networks and networking philosophies can result in catastrophic network failures that risk critical systems and the life and well-being of workers and communities.
In this workshop, participants learn about the Fortinet Security Fabric, the first ever architectural security approach designed to dynamically adapt to unique needs of legacy OT environments while enabling the move toward modernizing these critical systems. Leveraging the Purdue Model for the security layers needed in OT, the multi-layered approach provided by the Security Fabric provides broad, integrated, and automated protection against sophisticated threats.
Participants who attend this workshop will learn how to:
- Configure internal segmentation
- Explore the FortiGate asset list, network topology, and FortiNAC visibility
- Implement FortiGate access control
- Configure virtual patching through IPS
- Configure industrial protocol visibility and security
- Implement deception using FortiDeceptor
Please note this session is offered multiple times.
Connections between IT and operational technology (OT) systems are no longer air gapped, introducing the potential for hackers to penetrate industrial control systems, risking the safety and availability of critical infrastructure. Security for OT requires visibility, control, and analytics to meet safety and availability requirements.
Convergence is blurring the lines between IT and OT, creating an opportunity to improve the visibility, control, and situational awareness necessary for critical systems. Failure to take the wide range of security issues into account when converging these two very different networks and networking philosophies can result in catastrophic network failures that risk critical systems and the life and well-being of workers and communities.
In this workshop, participants learn about the Fortinet Security Fabric, the first ever architectural security approach designed to dynamically adapt to unique needs of legacy OT environments while enabling the move toward modernizing these critical systems. Leveraging the Purdue Model for the security layers needed in OT, the multi-layered approach provided by the Security Fabric provides broad, integrated, and automated protection against sophisticated threats.
Participants who attend this workshop will learn how to:
- Configure internal segmentation
- Explore the FortiGate asset list, network topology, and FortiNAC visibility
- Implement FortiGate access control
- Configure virtual patching through IPS
- Configure industrial protocol visibility and security
- Implement deception using FortiDeceptor
Please note this session is offered multiple times.
Securing sensitive data against theft or exposure—due to malicious insiders or untrained employees—is a complex, ongoing challenge. Join this session to explore end-to-end data security strategies across the network, endpoint, and cloud, protecting data in motion, in use, and at rest. We’ll examine effective approaches to preventing data loss and managing insider risk and share the latest insights into the behaviors and profiles that pose the greatest threats. You’ll learn how to identify what data your organization holds, where it resides, how sensitive it is, and how it’s being used or exposed—so you can secure it with confidence.
As organizations expand across cloud, on-premises, and edge environments, traditional perimeter-centric security models are no longer sufficient. This session explores how FortiOS 8.0.0 introduces a new era of AI-driven threat defence designed to secure today's distributed and dynamic attack surface. Attendees will gain insights into the latest advancements in Fortinet’s security architecture, including enhanced AI-powered detection and the powerful new hardware platforms that extend protection beyond the perimeter.
Please note this session is offered multiple times.
As organizations expand across cloud, on-premises, and edge environments, traditional perimeter-centric security models are no longer sufficient. This session explores how FortiOS 8.0.0 introduces a new era of AI-driven threat defence designed to secure today's distributed and dynamic attack surface. Attendees will gain insights into the latest advancements in Fortinet’s security architecture, including enhanced AI-powered detection and the powerful new hardware platforms that extend protection beyond the perimeter.
Please note this session is offered multiple times.
As organizations expand across cloud, on-premises, and edge environments, traditional perimeter-centric security models are no longer sufficient. This session explores how FortiOS 8.0.0 introduces a new era of AI-driven threat defence designed to secure today's distributed and dynamic attack surface. Attendees will gain insights into the latest advancements in Fortinet’s security architecture, including enhanced AI-powered detection and the powerful new hardware platforms that extend protection beyond the perimeter.
Please note this session is offered multiple times.
Today’s networks are highly complex, with evolving threats and increasing pressure on IT and security teams to protect their organizations. Firewalls have become multifunctional security devices, but managing multiple point products without integration creates visibility and management challenges. Organizations also need fast, scalable security to protect against internet-borne threats, web-based attacks, and growing network demands.
In this workshop, participants will learn how Fortinet’s unified security approach streamlines protection across various use cases. FortiGate integrates NGFW features with specialized processors and FortiGuard Labs intelligence for high-performance security. The Fortinet Security Fabric offers centralized visibility, automated threat response, and seamless protection for cloud applications, IoT, and web traffic.
In this workshop, participants will learn how to:
- Configure basic FortiGate settings for routing, firewall policies, and security profiles
- Set up a Fortinet Security Fabric with centralized logging, visibility, and automation
- Leverage FortiGuard AI-powered security services for real-time threat detection, web filtering, application control, and malware prevention
- Segment and secure the network with ISFW, ZTNA, and ADVPN for optimized remote access and WAN usage
Please note this session is offered multiple times.
Today’s networks are highly complex, with evolving threats and increasing pressure on IT and security teams to protect their organizations. Firewalls have become multifunctional security devices, but managing multiple point products without integration creates visibility and management challenges. Organizations also need fast, scalable security to protect against internet-borne threats, web-based attacks, and growing network demands.
In this workshop, participants will learn how Fortinet’s unified security approach streamlines protection across various use cases. FortiGate integrates NGFW features with specialized processors and FortiGuard Labs intelligence for high-performance security. The Fortinet Security Fabric offers centralized visibility, automated threat response, and seamless protection for cloud applications, IoT, and web traffic.
In this workshop, participants will learn how to:
- Configure basic FortiGate settings for routing, firewall policies, and security profiles
- Set up a Fortinet Security Fabric with centralized logging, visibility, and automation
- Leverage FortiGuard AI-powered security services for real-time threat detection, web filtering, application control, and malware prevention
- Segment and secure the network with ISFW, ZTNA, and ADVPN for optimized remote access and WAN usage
Please note this session is offered multiple times.
Today’s networks are highly complex, with evolving threats and increasing pressure on IT and security teams to protect their organizations. Firewalls have become multifunctional security devices, but managing multiple point products without integration creates visibility and management challenges. Organizations also need fast, scalable security to protect against internet-borne threats, web-based attacks, and growing network demands.
In this workshop, participants will learn how Fortinet’s unified security approach streamlines protection across various use cases. FortiGate integrates NGFW features with specialized processors and FortiGuard Labs intelligence for high-performance security. The Fortinet Security Fabric offers centralized visibility, automated threat response, and seamless protection for cloud applications, IoT, and web traffic.
In this workshop, participants will learn how to:
- Configure basic FortiGate settings for routing, firewall policies, and security profiles
- Set up a Fortinet Security Fabric with centralized logging, visibility, and automation
- Leverage FortiGuard AI-powered security services for real-time threat detection, web filtering, application control, and malware prevention
- Segment and secure the network with ISFW, ZTNA, and ADVPN for optimized remote access and WAN usage
Please note this session is offered multiple times.
Today’s networks are highly complex, with evolving threats and increasing pressure on IT and security teams to protect their organizations. Firewalls have become multifunctional security devices, but managing multiple point products without integration creates visibility and management challenges. Organizations also need fast, scalable security to protect against internet-borne threats, web-based attacks, and growing network demands.
In this workshop, participants will learn how Fortinet’s unified security approach streamlines protection across various use cases. FortiGate integrates NGFW features with specialized processors and FortiGuard Labs intelligence for high-performance security. The Fortinet Security Fabric offers centralized visibility, automated threat response, and seamless protection for cloud applications, IoT, and web traffic.
In this workshop, participants will learn how to:
- Configure basic FortiGate settings for routing, firewall policies, and security profiles
- Set up a Fortinet Security Fabric with centralized logging, visibility, and automation
- Leverage FortiGuard AI-powered security services for real-time threat detection, web filtering, application control, and malware prevention
- Segment and secure the network with ISFW, ZTNA, and ADVPN for optimized remote access and WAN usage
Please note this session is offered multiple times.
Today’s networks are highly complex, with evolving threats and increasing pressure on IT and security teams to protect their organizations. Firewalls have become multifunctional security devices, but managing multiple point products without integration creates visibility and management challenges. Organizations also need fast, scalable security to protect against internet-borne threats, web-based attacks, and growing network demands.
In this workshop, participants will learn how Fortinet’s unified security approach streamlines protection across various use cases. FortiGate integrates NGFW features with specialized processors and FortiGuard Labs intelligence for high-performance security. The Fortinet Security Fabric offers centralized visibility, automated threat response, and seamless protection for cloud applications, IoT, and web traffic.
In this workshop, participants will learn how to:
- Configure basic FortiGate settings for routing, firewall policies, and security profiles
- Set up a Fortinet Security Fabric with centralized logging, visibility, and automation
- Leverage FortiGuard AI-powered security services for real-time threat detection, web filtering, application control, and malware prevention
- Segment and secure the network with ISFW, ZTNA, and ADVPN for optimized remote access and WAN usage
Please note this session is offered multiple times.
OT and cyber-physical systems (CPS) security are emerging as strategic growth areas driven by regulation, industrial digitalization, and physical risk. This session examines market demand, regulatory drivers, and how OT threat models differ from IT environments. Learn how Fortinet's OT-aware Security Fabric and industrial-grade technologies help partners build differentiated practices, scale managed OT security services, and deliver measurable outcomes for asset owners.
In this workshop, participants will learn the core principles of SAML based authentication. How to implement and use it in multiple of FortiOS features (like IPsec VPN for remote access, administrative access etc.). And how to integrate FortiAuthenticator, or other external Identity Providers.
Attendees will practice learned principles in hands-on-lab, through configurations of FortiOS as a SAML Service Provider (SP), integrations with Identity Providers (IdPs , like FortiAuthenticator).
This workshop also includes practical troubleshooting hints and techniques to analyze SAML assertions and to identify and resolve common SAML and authentication related issues.
By the end, participants will understand how to design and maintain secure and reliable SAML-based authentication setups throughout their Fortinet environment.
Workshop will break for lunch from 12:00 - 1:00 PM.
Please note this session is offered multiple times.
- Working knowledge of FortiOS and FortiAuthenticator
In this workshop, participants will learn the core principles of SAML based authentication. How to implement and use it in multiple of FortiOS features (like IPsec VPN for remote access, administrative access etc.). And how to integrate FortiAuthenticator, or other external Identity Providers.
Attendees will practice learned principles in hands-on-lab, through configurations of FortiOS as a SAML Service Provider (SP), integrations with Identity Providers (IdPs , like FortiAuthenticator).
This workshop also includes practical troubleshooting hints and techniques to analyze SAML assertions and to identify and resolve common SAML and authentication related issues.
By the end, participants will understand how to design and maintain secure and reliable SAML-based authentication setups throughout their Fortinet environment.
Workshop will break for lunch from 12:00 - 1:00 PM.
Please note this session is offered multiple times.
- Working knowledge of FortiOS and FortiAuthenticator
Security teams are under pressure to move faster, respond smarter, and do more with fewer resources. This session reveals how organizations are modernizing their security operations with the Fortinet SOC Platform, leveraging a unified strategy that combines next-generation SIEM, SOAR, and AI into a single operational foundation that evolves with their needs, enabling a SOC that adapts. Hear directly from peers who have transformed investigations, reduced response times, and unlocked measurable improvements in efficiency, resilience, and security outcomes.
Build Unified-LAN integrated with Fortinet’s Security Fabric providing single point of management, extending Security to edge of the wired and wireless network. We will discuss latest on Switches and Access-points, FortiLink technology, Fabric integrated access control. Last but not the least, learn how recent additions on FortiAIOps continue to provide meaningful and actionable AI-driven insights into entire network.
Please note this session is offered multiple times.
Build Unified-LAN integrated with Fortinet’s Security Fabric providing single point of management, extending Security to edge of the wired and wireless network. We will discuss latest on Switches and Access-points, FortiLink technology, Fabric integrated access control. Last but not the least, learn how recent additions on FortiAIOps continue to provide meaningful and actionable AI-driven insights into entire network.
Please note this session is offered multiple times.
Turn Fortinet install base into net-new and recurring revenue—fast. In this interactive session, Ingram Micro and Fortinet will unpack proven, ready-to-run GTM plays (EOS/EOL trade up and SASE + SD WAN land/expand) and show how Ingram Micro’s capabilities such as Customer Success program, Services, Eyesight (Cyber Posture) assessments, and Training plug in to accelerate execution. Walk out with a 90-day action plan, partner ready outreach sequences, and “request my Install Base” CTAs to get install base reports, Eyesight assessments, and a playbook to start pipeline this week.
AI and quantum computing are changing everything, and cybersecurity is no different. To stay ahead of threats and trends, we continally update FortiOS and our custom-built silicon chips to ensure that the FortiGate network firewall offers the latest innovations built for the future of security. Find out how our ASICs ensure the highest performance, and AI-powered security services protect from even the newest, most sophisticated threats. Learn why FortiOS is future-ready with post-quantum cryptography, and how SASE capabilities are tied to the firewall to support the next generation of security architectures. Join this session to hear all the details about how Fortinet is changing the network firewall landscape.
Please note this session is offered multiple times.
AI and quantum computing are changing everything, and cybersecurity is no different. To stay ahead of threats and trends, we continally update FortiOS and our custom-built silicon chips to ensure that the FortiGate network firewall offers the latest innovations built for the future of security. Find out how our ASICs ensure the highest performance, and AI-powered security services protect from even the newest, most sophisticated threats. Learn why FortiOS is future-ready with post-quantum cryptography, and how SASE capabilities are tied to the firewall to support the next generation of security architectures. Join this session to hear all the details about how Fortinet is changing the network firewall landscape.
Please note this session is offered multiple times.
Join our global channel leaders to get the latest updates on the evolution of the Fortinet Engage Partner Program, including what's on tap for 2026 and beyond, as well as key NSE program updates. We'll spotlight the rapidly expanding SASE and Security Operations market and how Fortinet's AI-driven platform approach enables partners to monetize services, grow recurring revenue, and drive sustained growth across the customer security lifecycle.
Discover how FortiGuard Labs identifies, analyzes, and neutralizes global threats at machine speed. Through the combined power of FortiRecon threat actor insights, Threat Landscape Reports, and Outbreak intelligence, this session reveals how actionable threat context enables organizations to stay ahead of fast-moving campaigns and strengthen their cyber resilience.
Join us for an inspiring conversation with a select group of sales and channel leaders to discuss Fortinet's commitment to our partners' success in 2026 and beyond. We'll take a closer look at the biggest growth drivers and discuss the importance of customer success. We'll wrap the session with a celebration of the winners of our partner of the year awards.
Join us for an inspiring conversation with a select group of sales and channel leaders to discuss Fortinet's commitment to our partners' success in 2026 and beyond. We'll take a closer look at the biggest growth drivers and discuss the importance of customer success. We'll wrap the session with a celebration of the winners of our partner of the year awards.
Start your final day at Accelerate with purpose—and power. Join us for a special networking breakfast recognizing International Women’s Day, where women and men come together to connect and hear what Lead Fearlessly. Keynote speaker Hayley Van Loon, CEO of Crime Stoppers International, will share actionable ways you can make a meaningful impact through your leadership. This is a can’t-miss opportunity to close out Accelerate inspired, energized, and ready to lead. Seating is limited.
Discover how to secure the whole suite of colaboration tools - mail and beyond - being used within your organization. Collaborative working has many benefits, but tools can sometimes be seen as invisible and uncontrollable. Whether its Cloud, SEG, Hybrid or more, we show how our Secure Mail & Workspace platform solves challenges.
Please note this session is offered multiple times.
Discover how to secure the whole suite of colaboration tools - mail and beyond - being used within your organization. Collaborative working has many benefits, but tools can sometimes be seen as invisible and uncontrollable. Whether its Cloud, SEG, Hybrid or more, we show how our Secure Mail & Workspace platform solves challenges.
Please note this session is offered multiple times.
The rapid adoption of digital innovation has greatly increased the complexity and vulnerability of networks. As organizations speed up their digital transformation, they often build fragmented infrastructures across multiple locations that are harder to secure. Meanwhile, cybercriminals are launching more advanced, targeted, and quickly evolving attacks. The demand for always-on connectivity further puts pressure on security teams, making it challenging to maintain consistent protection without creating gaps. This growth of the attack surface, along with rising operational costs and dependence on manual processes, results in inefficiencies, more mistakes, and slower responses, ultimately impairing an organization’s ability to defend itself effectively and address emerging threats.
In this workshop, participants will learn how to integrate multiple Fortinet devices to provide unified security across the network, regardless of the location of network assets and users. Device integration and automation are essential as organizations undergo digital transformation to reduce complexity and enhance defenses against evolving threats.
At the heart of this solution is FortiManager, which revolutionizes network management and security operations by automating routine tasks and leveraging intelligent insights. Participants will also discover how to integrate FortiGate, FortiAnalyzer, FortiSandbox, and FortiMail as part of a Security Fabric to provide comprehensive real-time cybersecurity protection from users to applications. By deploying this solution, organizations can grow and adapt to new threats, making their network more proactive and adaptable.
Participants who attend this workshop will learn how to:
- Configure central management
- Deploy the Security Fabric
- Improve visibility and coordination across devices
- Use low-touch provisioning (LTP) to deploy remote devices
- Provide zero-day protection using sandboxing
- Integrate email protection across the network
- Use REST API and the FortiAI Security Assistant
Please note this session is offered multiple times.
The rapid adoption of digital innovation has greatly increased the complexity and vulnerability of networks. As organizations speed up their digital transformation, they often build fragmented infrastructures across multiple locations that are harder to secure. Meanwhile, cybercriminals are launching more advanced, targeted, and quickly evolving attacks. The demand for always-on connectivity further puts pressure on security teams, making it challenging to maintain consistent protection without creating gaps. This growth of the attack surface, along with rising operational costs and dependence on manual processes, results in inefficiencies, more mistakes, and slower responses, ultimately impairing an organization’s ability to defend itself effectively and address emerging threats.
In this workshop, participants will learn how to integrate multiple Fortinet devices to provide unified security across the network, regardless of the location of network assets and users. Device integration and automation are essential as organizations undergo digital transformation to reduce complexity and enhance defenses against evolving threats.
At the heart of this solution is FortiManager, which revolutionizes network management and security operations by automating routine tasks and leveraging intelligent insights. Participants will also discover how to integrate FortiGate, FortiAnalyzer, FortiSandbox, and FortiMail as part of a Security Fabric to provide comprehensive real-time cybersecurity protection from users to applications. By deploying this solution, organizations can grow and adapt to new threats, making their network more proactive and adaptable.
Participants who attend this workshop will learn how to:
- Configure central management
- Deploy the Security Fabric
- Improve visibility and coordination across devices
- Use low-touch provisioning (LTP) to deploy remote devices
- Provide zero-day protection using sandboxing
- Integrate email protection across the network
- Use REST API and the FortiAI Security Assistant
Please note this session is offered multiple times.
The rapid adoption of digital innovation has greatly increased the complexity and vulnerability of networks. As organizations speed up their digital transformation, they often build fragmented infrastructures across multiple locations that are harder to secure. Meanwhile, cybercriminals are launching more advanced, targeted, and quickly evolving attacks. The demand for always-on connectivity further puts pressure on security teams, making it challenging to maintain consistent protection without creating gaps. This growth of the attack surface, along with rising operational costs and dependence on manual processes, results in inefficiencies, more mistakes, and slower responses, ultimately impairing an organization’s ability to defend itself effectively and address emerging threats.
In this workshop, participants will learn how to integrate multiple Fortinet devices to provide unified security across the network, regardless of the location of network assets and users. Device integration and automation are essential as organizations undergo digital transformation to reduce complexity and enhance defenses against evolving threats.
At the heart of this solution is FortiManager, which revolutionizes network management and security operations by automating routine tasks and leveraging intelligent insights. Participants will also discover how to integrate FortiGate, FortiAnalyzer, FortiSandbox, and FortiMail as part of a Security Fabric to provide comprehensive real-time cybersecurity protection from users to applications. By deploying this solution, organizations can grow and adapt to new threats, making their network more proactive and adaptable.
Participants who attend this workshop will learn how to:
- Configure central management
- Deploy the Security Fabric
- Improve visibility and coordination across devices
- Use low-touch provisioning (LTP) to deploy remote devices
- Provide zero-day protection using sandboxing
- Integrate email protection across the network
- Use REST API and the FortiAI Security Assistant
Please note this session is offered multiple times.
The rapid adoption of digital innovation has greatly increased the complexity and vulnerability of networks. As organizations speed up their digital transformation, they often build fragmented infrastructures across multiple locations that are harder to secure. Meanwhile, cybercriminals are launching more advanced, targeted, and quickly evolving attacks. The demand for always-on connectivity further puts pressure on security teams, making it challenging to maintain consistent protection without creating gaps. This growth of the attack surface, along with rising operational costs and dependence on manual processes, results in inefficiencies, more mistakes, and slower responses, ultimately impairing an organization’s ability to defend itself effectively and address emerging threats.
In this workshop, participants will learn how to integrate multiple Fortinet devices to provide unified security across the network, regardless of the location of network assets and users. Device integration and automation are essential as organizations undergo digital transformation to reduce complexity and enhance defenses against evolving threats.
At the heart of this solution is FortiManager, which revolutionizes network management and security operations by automating routine tasks and leveraging intelligent insights. Participants will also discover how to integrate FortiGate, FortiAnalyzer, FortiSandbox, and FortiMail as part of a Security Fabric to provide comprehensive real-time cybersecurity protection from users to applications. By deploying this solution, organizations can grow and adapt to new threats, making their network more proactive and adaptable.
Participants who attend this workshop will learn how to:
- Configure central management
- Deploy the Security Fabric
- Improve visibility and coordination across devices
- Use low-touch provisioning (LTP) to deploy remote devices
- Provide zero-day protection using sandboxing
- Integrate email protection across the network
- Use REST API and the FortiAI Security Assistant
Please note this session is offered multiple times.
The rapid adoption of digital innovation has greatly increased the complexity and vulnerability of networks. As organizations speed up their digital transformation, they often build fragmented infrastructures across multiple locations that are harder to secure. Meanwhile, cybercriminals are launching more advanced, targeted, and quickly evolving attacks. The demand for always-on connectivity further puts pressure on security teams, making it challenging to maintain consistent protection without creating gaps. This growth of the attack surface, along with rising operational costs and dependence on manual processes, results in inefficiencies, more mistakes, and slower responses, ultimately impairing an organization’s ability to defend itself effectively and address emerging threats.
In this workshop, participants will learn how to integrate multiple Fortinet devices to provide unified security across the network, regardless of the location of network assets and users. Device integration and automation are essential as organizations undergo digital transformation to reduce complexity and enhance defenses against evolving threats.
At the heart of this solution is FortiManager, which revolutionizes network management and security operations by automating routine tasks and leveraging intelligent insights. Participants will also discover how to integrate FortiGate, FortiAnalyzer, FortiSandbox, and FortiMail as part of a Security Fabric to provide comprehensive real-time cybersecurity protection from users to applications. By deploying this solution, organizations can grow and adapt to new threats, making their network more proactive and adaptable.
Participants who attend this workshop will learn how to:
- Configure central management
- Deploy the Security Fabric
- Improve visibility and coordination across devices
- Use low-touch provisioning (LTP) to deploy remote devices
- Provide zero-day protection using sandboxing
- Integrate email protection across the network
- Use REST API and the FortiAI Security Assistant
Please note this session is offered multiple times.
Managing a large deployment of networking and security technology often means multiple interfaces and manual operations. Not with Fortinet. FortiManager is more than a configuration tool; it's a central network management hub for the Fortinet Security Fabric. Attend this session to learn how FortiManager leverages AI to streamline the management experience and automate everyday tasks to save you time, improve network security, and maintain network uptime.
In this course, you will learn how to use the most common FortiGate features. In interactive labs, you will explore firewall policies, user authentication, and logging and monitoring, and how to protect your network using security profiles. This session is two days long and includes a subset of the content that is part of the 4-day NSE4 FortiOS Administrator course.
In this course, you will learn how to use the most common FortiGate features. In interactive labs, you will explore firewall policies, user authentication, and logging and monitoring, and how to protect your network using security profiles. This session is two days long and includes a subset of the content that is part of the 4-day NSE4 FortiOS Administrator course.
In this course, you will learn how to use the most common FortiGate features. In interactive labs, you will explore firewall policies, user authentication, and logging and monitoring, and how to protect your network using security profiles. This session is two days long and includes a subset of the content that is part of the 4-day NSE4 FortiOS Administrator course.
In this course, you will learn how to use the most common FortiGate features. In interactive labs, you will explore firewall policies, user authentication, and logging and monitoring, and how to protect your network using security profiles. This session is two days long and includes a subset of the content that is part of the 4-day NSE4 FortiOS Administrator course.
In this course, you will gain the practical skills of a SOC analyst using FortiAnalyzer for centralized logging and analytics. You will learn how to examine and manage events, and automate threat response using event handlers and playbooks. You will also learn how to identify current and potential threats through incident analysis and outbreak reports. Finally, you will learn how to incorporate FortiAI in your workflow and generate security reports.
In this course, you will gain the practical skills of a SOC analyst using FortiAnalyzer for centralized logging and analytics. You will learn how to examine and manage events, and automate threat response using event handlers and playbooks. You will also learn how to identify current and potential threats through incident analysis and outbreak reports. Finally, you will learn how to incorporate FortiAI in your workflow and generate security reports.
In this course, you will gain the practical skills of a SOC analyst using FortiAnalyzer for centralized logging and analytics. You will learn how to examine and manage events, and automate threat response using event handlers and playbooks. You will also learn how to identify current and potential threats through incident analysis and outbreak reports. Finally, you will learn how to incorporate FortiAI in your workflow and generate security reports.
In this course, you will gain the practical skills of a SOC analyst using FortiAnalyzer for centralized logging and analytics. You will learn how to examine and manage events, and automate threat response using event handlers and playbooks. You will also learn how to identify current and potential threats through incident analysis and outbreak reports. Finally, you will learn how to incorporate FortiAI in your workflow and generate security reports.
In this course, you will learn the fundamentals of using FortiManager for the centralized network administration of many FortiGate devices. In interactive labs, you will explore deployment strategies, which include single or multiple ADOMs, device registration, policy packages, shared objects, installing configuration changes, provisioning FortiManager as a local FortiGuard distribution server, and troubleshooting the features that are critical to day-to-day use after you deploy FortiManager.
In this course, you will learn the fundamentals of using FortiManager for the centralized network administration of many FortiGate devices. In interactive labs, you will explore deployment strategies, which include single or multiple ADOMs, device registration, policy packages, shared objects, installing configuration changes, provisioning FortiManager as a local FortiGuard distribution server, and troubleshooting the features that are critical to day-to-day use after you deploy FortiManager.
In this course, you will learn the fundamentals of using FortiManager for the centralized network administration of many FortiGate devices. In interactive labs, you will explore deployment strategies, which include single or multiple ADOMs, device registration, policy packages, shared objects, installing configuration changes, provisioning FortiManager as a local FortiGuard distribution server, and troubleshooting the features that are critical to day-to-day use after you deploy FortiManager.
In this course, you will learn the fundamentals of using FortiManager for the centralized network administration of many FortiGate devices. In interactive labs, you will explore deployment strategies, which include single or multiple ADOMs, device registration, policy packages, shared objects, installing configuration changes, provisioning FortiManager as a local FortiGuard distribution server, and troubleshooting the features that are critical to day-to-day use after you deploy FortiManager.
In this course, you will learn how to use FortiCNAPP features, including cloud posture management, vulnerability scanning, and compliance reporting. You will also explore FortiCNAPP integrations, policies, and automation workflows, as well as how to monitor your cloud environment, remediate misconfigurations, and protect workloads and applications using capabilities, such as attack path analysis, Infrastructure-as-Code (IaC) scanning, and runtime security.
In this course, you will learn how to use FortiCNAPP features, including cloud posture management, vulnerability scanning, and compliance reporting. You will also explore FortiCNAPP integrations, policies, and automation workflows, as well as how to monitor your cloud environment, remediate misconfigurations, and protect workloads and applications using capabilities, such as attack path analysis, Infrastructure-as-Code (IaC) scanning, and runtime security.
In this course, your will learn how to use FortiDLP as a next-generation, AI-enhanced, cloud-native endpoint data loss prevention solution to anticipate and prevent data leaks and detect behvaviour-related insider risks.
In this course, your will learn how to use FortiDLP as a next-generation, AI-enhanced, cloud-native endpoint data loss prevention solution to anticipate and prevent data leaks and detect behvaviour-related insider risks.
In this course, you will learn how to protect users across the modern workspace using AI-powered SaaS security for email, web browsers, and collaboration tools.
In this course, you will learn how to protect users across the modern workspace using AI-powered SaaS security for email, web browsers, and collaboration tools.
In this course, you will learn how to protect users across the modern workspace using AI-powered SaaS security for email, web browsers, and collaboration tools.
In this course, you will learn how to protect users across the modern workspace using AI-powered SaaS security for email, web browsers, and collaboration tools.
In this course you will learn how FortiNDR Cloud leverages artificial intelligence (AI) and machine learning (ML), behavioral, and human analysis to inspect network traffic to detect malicious behavior early while reducing false positives. You will also learn how to automatically provides risk scores, and shares relevant threat intelligence to assist security teams in prioritizing response efforts.
In this course you will learn how FortiNDR Cloud leverages artificial intelligence (AI) and machine learning (ML), behavioral, and human analysis to inspect network traffic to detect malicious behavior early while reducing false positives. You will also learn how to automatically provides risk scores, and shares relevant threat intelligence to assist security teams in prioritizing response efforts.
In this course you will learn how FortiNDR Cloud leverages artificial intelligence (AI) and machine learning (ML), behavioral, and human analysis to inspect network traffic to detect malicious behavior early while reducing false positives. You will also learn how to automatically provides risk scores, and shares relevant threat intelligence to assist security teams in prioritizing response efforts.
In this course you will learn how FortiNDR Cloud leverages artificial intelligence (AI) and machine learning (ML), behavioral, and human analysis to inspect network traffic to detect malicious behavior early while reducing false positives. You will also learn how to automatically provides risk scores, and shares relevant threat intelligence to assist security teams in prioritizing response efforts.
In this course, you will learn how to use FortiSIEM to search, enrich, and analyze events from customers in a managed security service provider (MSSP) organization. You will learn how to perform real-time and historical searches, and build advanced queries. You will also learn how to perform analysis and remediation of security incidents.
In this course, you will learn how to use FortiSIEM to search, enrich, and analyze events from customers in a managed security service provider (MSSP) organization. You will learn how to perform real-time and historical searches, and build advanced queries. You will also learn how to perform analysis and remediation of security incidents.
In this course, you will learn how to use FortiSIEM to search, enrich, and analyze events from customers in a managed security service provider (MSSP) organization. You will learn how to perform real-time and historical searches, and build advanced queries. You will also learn how to perform analysis and remediation of security incidents.
In this course, you will learn how to use FortiSIEM to search, enrich, and analyze events from customers in a managed security service provider (MSSP) organization. You will learn how to perform real-time and historical searches, and build advanced queries. You will also learn how to perform analysis and remediation of security incidents.
In this interactive course, you will learn how to use FortiSOAR to design simple to complex playbooks, examine the role of FortiSOAR in mitigating malicious indicators, and learn how to create interactive dashboards to display relevant information about alerts and incidents.
In this interactive course, you will learn how to use FortiSOAR to design simple to complex playbooks, examine the role of FortiSOAR in mitigating malicious indicators, and learn how to create interactive dashboards to display relevant information about alerts and incidents.
In this interactive course, you will learn how to use FortiSOAR to design simple to complex playbooks, examine the role of FortiSOAR in mitigating malicious indicators, and learn how to create interactive dashboards to display relevant information about alerts and incidents.
In this interactive course, you will learn how to use FortiSOAR to design simple to complex playbooks, examine the role of FortiSOAR in mitigating malicious indicators, and learn how to create interactive dashboards to display relevant information about alerts and incidents.
In this course, you will learn how to diagnose and troubleshoot the most common networking and security problems in a Fortinet protected network security solution. In interactive break-and-fix labs, you will use tools, diagnostics, and debug commands to detect, isolate, and resolve problems related to the most commonly used FortiGate features. This session is two days long and includes a subset of the content that is part of the 3-day NSE 6 Network Security Support Engineer course.
You must have an understanding of the topics covered in the FCP - FortiGate Administrator course, or have equivalent experience. It is also recommended that you have an understanding of the topics covered in the FCSS - Enterprise Firewall Administrator course.
In this course, you will learn how to diagnose and troubleshoot the most common networking and security problems in a Fortinet protected network security solution. In interactive break-and-fix labs, you will use tools, diagnostics, and debug commands to detect, isolate, and resolve problems related to the most commonly used FortiGate features. This session is two days long and includes a subset of the content that is part of the 3-day NSE 6 Network Security Support Engineer course.
You must have an understanding of the topics covered in the FCP - FortiGate Administrator course, or have equivalent experience. It is also recommended that you have an understanding of the topics covered in the FCSS - Enterprise Firewall Administrator course.
In this course, you will learn how to diagnose and troubleshoot the most common networking and security problems in a Fortinet protected network security solution. In interactive break-and-fix labs, you will use tools, diagnostics, and debug commands to detect, isolate, and resolve problems related to the most commonly used FortiGate features. This session is two days long and includes a subset of the content that is part of the 3-day NSE 6 Network Security Support Engineer course.
You must have an understanding of the topics covered in the FCP - FortiGate Administrator course, or have equivalent experience. It is also recommended that you have an understanding of the topics covered in the FCSS - Enterprise Firewall Administrator course.
In this course, you will learn how to diagnose and troubleshoot the most common networking and security problems in a Fortinet protected network security solution. In interactive break-and-fix labs, you will use tools, diagnostics, and debug commands to detect, isolate, and resolve problems related to the most commonly used FortiGate features. This session is two days long and includes a subset of the content that is part of the 3-day NSE 6 Network Security Support Engineer course.
You must have an understanding of the topics covered in the FCP - FortiGate Administrator course, or have equivalent experience. It is also recommended that you have an understanding of the topics covered in the FCSS - Enterprise Firewall Administrator course.
In this course, you will learn how to design, deploy, and manage advanced Fortinet Secure SD-WAN environments across branches and regions. You will also learn how to enhance and troubleshoot SD-WAN deployments, deploy complex topologies using overlay templates, and implement zero-touch provisioning for scalable deployments. These advanced topics will help you optimize SD-WAN performance and reliability in distributed enterprise networks.
Advanced knowledge of networking, and extensive hands-on experience working with FortiGate and FortiManager.
It is recommended that you have an understanding of the topics covered in the following courses, or have equivalent experience:
- FCP - FortiGate Administrator
- FCP - FortiManager Administrator
In this course, you will learn how to design, deploy, and manage advanced Fortinet Secure SD-WAN environments across branches and regions. You will also learn how to enhance and troubleshoot SD-WAN deployments, deploy complex topologies using overlay templates, and implement zero-touch provisioning for scalable deployments. These advanced topics will help you optimize SD-WAN performance and reliability in distributed enterprise networks.
Advanced knowledge of networking, and extensive hands-on experience working with FortiGate and FortiManager.
It is recommended that you have an understanding of the topics covered in the following courses, or have equivalent experience:
- FCP - FortiGate Administrator
- FCP - FortiManager Administrator
In this course, you will learn how to design, deploy, and manage advanced Fortinet Secure SD-WAN environments across branches and regions. You will also learn how to enhance and troubleshoot SD-WAN deployments, deploy complex topologies using overlay templates, and implement zero-touch provisioning for scalable deployments. These advanced topics will help you optimize SD-WAN performance and reliability in distributed enterprise networks.
Advanced knowledge of networking, and extensive hands-on experience working with FortiGate and FortiManager.
It is recommended that you have an understanding of the topics covered in the following courses, or have equivalent experience:
- FCP - FortiGate Administrator
- FCP - FortiManager Administrator
In this course, you will learn how to design, deploy, and manage advanced Fortinet Secure SD-WAN environments across branches and regions. You will also learn how to enhance and troubleshoot SD-WAN deployments, deploy complex topologies using overlay templates, and implement zero-touch provisioning for scalable deployments. These advanced topics will help you optimize SD-WAN performance and reliability in distributed enterprise networks.
Advanced knowledge of networking, and extensive hands-on experience working with FortiGate and FortiManager.
It is recommended that you have an understanding of the topics covered in the following courses, or have equivalent experience:
- FCP - FortiGate Administrator
- FCP - FortiManager Administrator
In this course, you will learn how to implement and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices. This session is two days long and includes a subset of the content that is part of the 3-day NSE 7 Enterprise Firewall Administrator course.
You must have an understanding of the topics covered in FCP - FortiGate Administrator (or have equivalent experience).
It is also recommended that you have an understanding of the topics covered in the following courses, or have equivalent experience:
- FCP - FortiManager Administrator
- FCP - FortiAnalyzer Administrator
In this course, you will learn how to implement and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices. This session is two days long and includes a subset of the content that is part of the 3-day NSE 7 Enterprise Firewall Administrator course.
You must have an understanding of the topics covered in FCP - FortiGate Administrator (or have equivalent experience).
It is also recommended that you have an understanding of the topics covered in the following courses, or have equivalent experience:
- FCP - FortiManager Administrator
- FCP - FortiAnalyzer Administrator
In this course, you will learn how to implement and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices. This session is two days long and includes a subset of the content that is part of the 3-day NSE 7 Enterprise Firewall Administrator course.
You must have an understanding of the topics covered in FCP - FortiGate Administrator (or have equivalent experience).
It is also recommended that you have an understanding of the topics covered in the following courses, or have equivalent experience:
- FCP - FortiManager Administrator
- FCP - FortiAnalyzer Administrator
In this course, you will learn how to implement and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices. This session is two days long and includes a subset of the content that is part of the 3-day NSE 7 Enterprise Firewall Administrator course.
You must have an understanding of the topics covered in FCP - FortiGate Administrator (or have equivalent experience).
It is also recommended that you have an understanding of the topics covered in the following courses, or have equivalent experience:
- FCP - FortiManager Administrator
- FCP - FortiAnalyzer Administrator
In this course, you will learn how to design, deploy, and manage advanced Fortinet Secure SD-WAN environments across branches and regions. You will also learn how to enhance and troubleshoot SD-WAN deployments, deploy complex topologies using overlay templates, and implement zero-touch provisioning for scalable deployments. These advanced topics will help you optimize SD-WAN performance and reliability in distributed enterprise networks.
You must have an understanding of the topics covered in the following courses, or have equivalent experience:
- FCP - FortiGate Administrator
- FCP - FortiClient EMS Administrator
In this course, you will learn how to design, deploy, and manage advanced Fortinet Secure SD-WAN environments across branches and regions. You will also learn how to enhance and troubleshoot SD-WAN deployments, deploy complex topologies using overlay templates, and implement zero-touch provisioning for scalable deployments. These advanced topics will help you optimize SD-WAN performance and reliability in distributed enterprise networks.
You must have an understanding of the topics covered in the following courses, or have equivalent experience:
- FCP - FortiGate Administrator
- FCP - FortiClient EMS Administrator
In this course, you will learn how to design, deploy, and manage advanced Fortinet Secure SD-WAN environments across branches and regions. You will also learn how to enhance and troubleshoot SD-WAN deployments, deploy complex topologies using overlay templates, and implement zero-touch provisioning for scalable deployments. These advanced topics will help you optimize SD-WAN performance and reliability in distributed enterprise networks.
You must have an understanding of the topics covered in the following courses, or have equivalent experience:
- FCP - FortiGate Administrator
- FCP - FortiClient EMS Administrator
In this course, you will learn how to design, deploy, and manage advanced Fortinet Secure SD-WAN environments across branches and regions. You will also learn how to enhance and troubleshoot SD-WAN deployments, deploy complex topologies using overlay templates, and implement zero-touch provisioning for scalable deployments. These advanced topics will help you optimize SD-WAN performance and reliability in distributed enterprise networks.
You must have an understanding of the topics covered in the following courses, or have equivalent experience:
- FCP - FortiGate Administrator
- FCP - FortiClient EMS Administrator
In this course, you will learn how to design, deploy, and manage a Fortinet SOC solution using FortiSIEM and FortiSOAR. You will learn how to analyze and respond to security incidents according to industry best practices for incident handling. You will also learn about SOC playbook development, threat hunting, and how to incorporate FortiAI in your workflow.
You must have an understanding of the topics covered in the FCP FortiSIEM Analyst and FCP FortiSOAR Administrator courses, or have equivalent experience.
In this course, you will learn how to design, deploy, and manage a Fortinet SOC solution using FortiSIEM and FortiSOAR. You will learn how to analyze and respond to security incidents according to industry best practices for incident handling. You will also learn about SOC playbook development, threat hunting, and how to incorporate FortiAI in your workflow.
You must have an understanding of the topics covered in the FCP FortiSIEM Analyst and FCP FortiSOAR Administrator courses, or have equivalent experience.
In this course, you will learn how to design, deploy, and manage a Fortinet SOC solution using FortiSIEM and FortiSOAR. You will learn how to analyze and respond to security incidents according to industry best practices for incident handling. You will also learn about SOC playbook development, threat hunting, and how to incorporate FortiAI in your workflow.
You must have an understanding of the topics covered in the FCP FortiSIEM Analyst and FCP FortiSOAR Administrator courses, or have equivalent experience.
In this course, you will learn how to design, deploy, and manage a Fortinet SOC solution using FortiSIEM and FortiSOAR. You will learn how to analyze and respond to security incidents according to industry best practices for incident handling. You will also learn about SOC playbook development, threat hunting, and how to incorporate FortiAI in your workflow.
You must have an understanding of the topics covered in the FCP FortiSIEM Analyst and FCP FortiSOAR Administrator courses, or have equivalent experience.
Join us for an inspiring conversation with a select group of sales and channel leaders to discuss Fortinet's commitment to our partners' success in 2026 and beyond. We'll take a closer look at the biggest growth drivers and discuss the importance of customer success. We'll wrap the session with a celebration of the winners of our partner of the year awards.
Join us for an inspiring conversation with a select group of sales and channel leaders to discuss Fortinet's commitment to our partners' success in 2026 and beyond. We'll take a closer look at the biggest growth drivers and discuss the importance of customer success. We'll wrap the session with a celebration of the winners of our partner of the year awards.
Visibility is important. But what you do with it is more critical and actually determines your security posture. Data and vulnerability information can be rendered useless if it is stuck in a workflow or waiting to be prioritized for mitigation. Join us as we discuss OT device risk and mitigation strategies, including automated actions. More importantly, we'll demonstrate how to take rich visibility "detection" information and make it "actionable" to quickly, efficiently, and thoroughly mitigate OT device risk.
Kick off the conference with a powerful opening keynote led by Fortinet Founder, Chairman of the Board, and Chief Executive Officer Ken Xie, joined by Fortinet’s global executive leadership team and distinguished external voices shaping the future of cybersecurity.
In this high-impact general session, Ken Xie will share his perspective on the evolving threat landscape, the forces reshaping cybersecurity and networking, and Fortinet’s long-term vision for securing the digital world. From the acceleration of AI-driven attacks to the convergence of networking and security, this keynote sets the strategic tone for the days ahead.
You’ll also hear insights from Fortinet executives across finance, technology, sales, marketing, and security operations, offering a holistic view of how organizations can stay resilient in an increasingly complex global environment. The session will feature perspectives from international security leaders and partners—including representatives from INTERPOL, the World Economic Forum, and national cybersecurity authorities—highlighting the importance of collaboration across industries, governments, and borders.
Together, these leaders will explore how innovation, intelligence, and trust are redefining what’s possible in cybersecurity—delivering clarity, confidence, and a shared roadmap for navigating what’s next.
In this training, you will explore a practical approach to leverage Outbreak Alerts published by FortiGuard Labs. You will learn how Outbreak Alerts are structured and which type of content they provide. Hands-on labs focused on a specific outbreak alert will allow you to learn how to bring outbreak alert threat mitigation assets into action using Fortinet solutions.
- Laptop (required, second screen strongly suggested to view lab instructions)
- Working Fortinet Training Institute account (for lab access)
- Basic hands-on experience with Kali Linux (GUI and CLI)
- Basic administration experience with various Fortinet solutions such as FortiGate, FortiWeb, FortiADC, FortiDeceptor, FortiAnalyzer, FortiSIEM, and FortiSOAR
In this training, you will explore a practical approach to leverage Outbreak Alerts published by FortiGuard Labs. You will learn how Outbreak Alerts are structured and which type of content they provide. Hands-on labs focused on a specific outbreak alert will allow you to learn how to bring outbreak alert threat mitigation assets into action using Fortinet solutions.
- Laptop (required, second screen strongly suggested to view lab instructions)
- Working Fortinet Training Institute account (for lab access)
- Basic hands-on experience with Kali Linux (GUI and CLI)
- Basic administration experience with various Fortinet solutions such as FortiGate, FortiWeb, FortiADC, FortiDeceptor, FortiAnalyzer, FortiSIEM, and FortiSOAR
In an era where hybrid work, diverse device ecosystems, and sophisticated cyber-threats place unprecedented strain on IT and security teams, a unified approach to endpoint protection and management has become essential. This session provides an overview of a modern Unified Endpoint Solution that combines secure zero trust access, next-generation endpoint protection, advanced Endpoint Detection & Response (EDR), and Data Loss Prevention (DLP). Attendees will learn how unified policies, centralized management, and integrated threat intelligence can streamline endpoint security, strengthen protection across diverse devices, and simplify IT operations and attack-surface management.
Please note this session is offered multiple times.
In an era where hybrid work, diverse device ecosystems, and sophisticated cyber-threats place unprecedented strain on IT and security teams, a unified approach to endpoint protection and management has become essential. This session provides an overview of a modern Unified Endpoint Solution that combines secure zero trust access, next-generation endpoint protection, advanced Endpoint Detection & Response (EDR), and Data Loss Prevention (DLP). Attendees will learn how unified policies, centralized management, and integrated threat intelligence can streamline endpoint security, strengthen protection across diverse devices, and simplify IT operations and attack-surface management.
Please note this session is offered multiple times.
During this hands-on focused workshop, students will explore how FortiSOAR can automate processes and responses, how it can orchestrate actions with other Fortinet products using the Security Fabric, and how to do more with less.
- Laptop (required, second screen strongly suggested to view lab instructions)
- Hands-on experience with FortiGate, FortiManager, FortiAnalyzer, and FortiSOAR
During this hands-on focused workshop, students will explore how FortiSOAR can automate processes and responses, how it can orchestrate actions with other Fortinet products using the Security Fabric, and how to do more with less.
- Laptop (required, second screen strongly suggested to view lab instructions)
- Hands-on experience with FortiGate, FortiManager, FortiAnalyzer, and FortiSOAR
Maintaining security operations is resource and operationally intensive. This session highlights how organizations achieve always-on protection through FortiGuard SOC-as-a-Service offering threat monitoring, incident handling, and response to defend critical environments continuously. Attend this session to hear from your peers how Fortinet is making 24/7 security operations accessible to organizations of any size, enabling teams to shift from operational overload to proactive protection, gaining speed, clarity, and predictable outcomes without increasing internal complexity.
Join us on a journey through the enchanting realm of Zero Touch Provisioning (ZTP). Learn how to automate network device deployment and configuration, making network setup a breeze with this spellbinding approach.
- Laptop (required, second screen strongly suggested to view lab instructions)
- Hands-on experience with FortiGate and FortiManager
- Recommended NSE7/FCSS
Join us on a journey through the enchanting realm of Zero Touch Provisioning (ZTP). Learn how to automate network device deployment and configuration, making network setup a breeze with this spellbinding approach.
- Laptop (required, second screen strongly suggested to view lab instructions)
- Hands-on experience with FortiGate and FortiManager
- Recommended NSE7/FCSS
The wired and wireless network is often the largest attack surface in any business. Fortinet Secure LAN converges foundational networking technology with security and services, delivering simplified operations and better business outcomes. Find out how our customers are using Fortinet switches and access points and why they chose Fortinet in a very crowded market.
Please note this session is offered multiple times.
The wired and wireless network is often the largest attack surface in any business. Fortinet Secure LAN converges foundational networking technology with security and services, delivering simplified operations and better business outcomes. Find out how our customers are using Fortinet switches and access points and why they chose Fortinet in a very crowded market.
Please note this session is offered multiple times.
What will SD-WAN's role be in the next evolution of networking and security? As organizations adopt multi-cloud strategies and hybrid work models, network complexity is increasing. SD-WAN has revolutionized modern networking, and emerging technologies like SASE, GenAI, and zero trust are expanding its possibilities for the future. In this session, we’ll break down why SD-WAN is still essential and how it fits into today’s rapidly shifting IT landscape. Get actionable insights on how SD-WAN is the cornerstone of SASE and how to enhance your network’s performance and resiliency.
Please note this session is offered multiple times.
What will SD-WAN's role be in the next evolution of networking and security? As organizations adopt multi-cloud strategies and hybrid work models, network complexity is increasing. SD-WAN has revolutionized modern networking, and emerging technologies like SASE, GenAI, and zero trust are expanding its possibilities for the future. In this session, we’ll break down why SD-WAN is still essential and how it fits into today’s rapidly shifting IT landscape. Get actionable insights on how SD-WAN is the cornerstone of SASE and how to enhance your network’s performance and resiliency.
Please note this session is offered multiple times.
AI and AI-based workloads are the new transformational effort, and securing these modern web applications in the cloud requires more than just security gates. In this session, Adobe and Fortinet share experience and strategies for protecting AI-enabled applications, web APIs, and data. Join Ammar Alim, Head of DevSecOps at Adobe to learn about Adobe’s cloud security experience, explore practical examples, and receive actionable guidance to strengthen your cloud security posture. The session combines co-presented insights with audience Q&A for an engaging, interactive experience.
The Cloud and application landscape continues to evolve, adapting to the AI-era. Organizations use of AI agents and applications quickly expand the attack surface exposing customer to various new threats. In this session we’ll explore how Fortinet cloud and application security solutions secure cloud infrastructure and (Web and API) Applications in the new AI era.
Securing modern applications is not a one-time event but a continuous journey that begins at the first line of code. From development through deployment across hybrid and multi-cloud environments, every stage introduces new risks. The challenge has intensified with AI-assisted coding, which accelerates development but also increases exposure of sensitive data in the cloud. Organizations need new strategies to gain visibility, reduce risk, and proactively protect everything from DevOps pipelines to SecOps. In this session, we will explore and demonstrate how to secure cloud-native applications and workloads in an AI-driven future.
Modern gaming platforms operate at massive scale—dozens of studios, multiple game development teams, multiple cloud environments and a mix of legacy and cloud‑native workloads. For Microsoft Gaming, rapid growth through acquisitions created a familiar challenge: fragmented controls, inconsistent compliance, rising costs, and limited visibility across complex multi‑cloud environments.
In this session, Microsoft Gaming shares how it uses FortiCNAPP to secure cloud workloads across its diverse AWS footprint. FortiCNAPP's unified visibility, agentless scanning, anomaly detection, and baseline‑driven policies helped Microsoft Gaming consolidate signals, strengthen posture, and improve operational efficiency across independent studios.
Learn how Microsoft Gaming scales security without slowing development, aligns controls to studio‑specific requirements, and operationalizes compliance across teams. This is a practical, customer-led walkthrough of how cloud‑native security tooling supports innovation, resilience, and growth at gaming scale.
Over the past decade, technological modernization has driven global growth and challenges in enterprise IT, extending into OT networks. Today, such transformation is touching industrial sectors across the world, including oil and gas. Join Blake Gilson, Industrial Cybersecurity Manager at ExxonMobil, for an intimate look at how his team plans, executes, and operates changes on a massive scale. Blake will not only explore his Fortinet setup, but the entire technology ecosystem and future innovations.
Hear from Octerrius Ware of Genuine Parts, which has over 6,000 stores worldwide, about challenges to ensure security, segmentation, performance, SLA, and reliable WAN connectivity for stores when transitioning to a Google Edge server for Kubernetes. In this session, you'll learn why Genuine Parts selected Fortinet and how Fortinet Secure SD-WAN enabled the company to easily make that transition and achieve quantifiable business benefits.
Please note this session is offered multiple times.
With hybrid work on the rise and applications moving to the cloud and SaaS, organizations face the challenge of securing employees accessing networks and applications remotely. This has widened the attack surface, complicating network, application, and resource security.
Secure Access Service Edge (SASE) architecture converges networking and security to provide secure access and connectivity to users anywhere. However, many cloud-delivered security solutions lack enterprise-grade protection for hybrid workforces and struggle to integrate with various network and security tools for consistent security and user experience everywhere.
FortiSASE delivers both a consistent security posture and an optimal user experience for users working from anywhere. Secure your hybrid workforce by closing security gaps, plus simplify operations. AI-powered secure web gateway (SWG), zero-trust network access (ZTNA), cloud access security broker (CASB), Firewall-as-a-Service (FWaaS), and secure SD-WAN all run on one OS and can all be managed with a single console.
Participants who attend this workshop will learn how to:
- Achieve Secure Internet Access (SIA) and Secure SaaS Access (SSA) for any user using FortiSASE.
- Setup Secure Private Access (SPA) to internal resources using FortiSASE.
- Use FortiSASE Universal ZTNA.
- View FortiSASE Logs and Reports.
Please note this session is offered multiple times.
With hybrid work on the rise and applications moving to the cloud and SaaS, organizations face the challenge of securing employees accessing networks and applications remotely. This has widened the attack surface, complicating network, application, and resource security.
Secure Access Service Edge (SASE) architecture converges networking and security to provide secure access and connectivity to users anywhere. However, many cloud-delivered security solutions lack enterprise-grade protection for hybrid workforces and struggle to integrate with various network and security tools for consistent security and user experience everywhere.
FortiSASE delivers both a consistent security posture and an optimal user experience for users working from anywhere. Secure your hybrid workforce by closing security gaps, plus simplify operations. AI-powered secure web gateway (SWG), zero-trust network access (ZTNA), cloud access security broker (CASB), Firewall-as-a-Service (FWaaS), and secure SD-WAN all run on one OS and can all be managed with a single console.
Participants who attend this workshop will learn how to:
- Achieve Secure Internet Access (SIA) and Secure SaaS Access (SSA) for any user using FortiSASE.
- Setup Secure Private Access (SPA) to internal resources using FortiSASE.
- Use FortiSASE Universal ZTNA.
- View FortiSASE Logs and Reports.
Please note this session is offered multiple times.
With hybrid work on the rise and applications moving to the cloud and SaaS, organizations face the challenge of securing employees accessing networks and applications remotely. This has widened the attack surface, complicating network, application, and resource security.
Secure Access Service Edge (SASE) architecture converges networking and security to provide secure access and connectivity to users anywhere. However, many cloud-delivered security solutions lack enterprise-grade protection for hybrid workforces and struggle to integrate with various network and security tools for consistent security and user experience everywhere.
FortiSASE delivers both a consistent security posture and an optimal user experience for users working from anywhere. Secure your hybrid workforce by closing security gaps, plus simplify operations. AI-powered secure web gateway (SWG), zero-trust network access (ZTNA), cloud access security broker (CASB), Firewall-as-a-Service (FWaaS), and secure SD-WAN all run on one OS and can all be managed with a single console.
Participants who attend this workshop will learn how to:
- Achieve Secure Internet Access (SIA) and Secure SaaS Access (SSA) for any user using FortiSASE.
- Setup Secure Private Access (SPA) to internal resources using FortiSASE.
- Use FortiSASE Universal ZTNA.
- View FortiSASE Logs and Reports.
Please note this session is offered multiple times.
With hybrid work on the rise and applications moving to the cloud and SaaS, organizations face the challenge of securing employees accessing networks and applications remotely. This has widened the attack surface, complicating network, application, and resource security.
Secure Access Service Edge (SASE) architecture converges networking and security to provide secure access and connectivity to users anywhere. However, many cloud-delivered security solutions lack enterprise-grade protection for hybrid workforces and struggle to integrate with various network and security tools for consistent security and user experience everywhere.
FortiSASE delivers both a consistent security posture and an optimal user experience for users working from anywhere. Secure your hybrid workforce by closing security gaps, plus simplify operations. AI-powered secure web gateway (SWG), zero-trust network access (ZTNA), cloud access security broker (CASB), Firewall-as-a-Service (FWaaS), and secure SD-WAN all run on one OS and can all be managed with a single console.
Participants who attend this workshop will learn how to:
- Achieve Secure Internet Access (SIA) and Secure SaaS Access (SSA) for any user using FortiSASE.
- Setup Secure Private Access (SPA) to internal resources using FortiSASE.
- Use FortiSASE Universal ZTNA.
- View FortiSASE Logs and Reports.
Please note this session is offered multiple times.
With hybrid work on the rise and applications moving to the cloud and SaaS, organizations face the challenge of securing employees accessing networks and applications remotely. This has widened the attack surface, complicating network, application, and resource security.
Secure Access Service Edge (SASE) architecture converges networking and security to provide secure access and connectivity to users anywhere. However, many cloud-delivered security solutions lack enterprise-grade protection for hybrid workforces and struggle to integrate with various network and security tools for consistent security and user experience everywhere.
FortiSASE delivers both a consistent security posture and an optimal user experience for users working from anywhere. Secure your hybrid workforce by closing security gaps, plus simplify operations. AI-powered secure web gateway (SWG), zero-trust network access (ZTNA), cloud access security broker (CASB), Firewall-as-a-Service (FWaaS), and secure SD-WAN all run on one OS and can all be managed with a single console.
Participants who attend this workshop will learn how to:
- Achieve Secure Internet Access (SIA) and Secure SaaS Access (SSA) for any user using FortiSASE.
- Setup Secure Private Access (SPA) to internal resources using FortiSASE.
- Use FortiSASE Universal ZTNA.
- View FortiSASE Logs and Reports.
Please note this session is offered multiple times.
Fortinet Secure LAN converges foundational networking technology with security and services, delivering simplified operations and better outcomes. In this discussion, Benjamin Durieux, CIO of the International Red Cross will cover how the organization uses Fortinet Secure LAN to support its mission to protect and assist victims of armed conflict and promote respect for international humanitarian law around the world.
With organizations increasingly adopting generative and agentic AI tools, they are exposed to growing risks such as prompt injection, data loss, and compliance challenges. The fast-evolving, interconnected nature of AI models, applications, and APIs expands the overall attack surface, producing new regulatory hurdles and operational visibility gaps. This session will explore the Fortinet solutions that help secure the modern AI Data Center with enterprise grade performance, application security and delivery.
Please note this session is offered multiple times.
With organizations increasingly adopting generative and agentic AI tools, they are exposed to growing risks such as prompt injection, data loss, and compliance challenges. The fast-evolving, interconnected nature of AI models, applications, and APIs expands the overall attack surface, producing new regulatory hurdles and operational visibility gaps. This session will explore the Fortinet solutions that help secure the modern AI Data Center with enterprise grade performance, application security and delivery.
Please note this session is offered multiple times.
When users, devices, and applications are constantly moving, traditional network-based security needs to adapt. In this session, hear how Arnold Clark Automobiles, leading car retailer in the UK, rethought web filtering, access control, and incident response by shifting from location- and device-based policies to a user-centric integrated SASE approach. Join Dr. Zibby Kwecka, Arnold Clark’s CISO, to hear examples of how Unified SASE delivered visibility down to the endpoint process level, reduced incident analysis from hours to minutes, integrated seamlessly with Secure SD-WAN for operational productivity, and eliminated the need for full VPN access—without disrupting critical business operations. Walk away with practical lessons on securing a mobile workforce while improving user experience, visibility, and reducing operational overhead.
As a global leader in aftermarket parts for the mining and heavy industries, H-E Parts International protects valuable intellectual property, including CAD designs and sensitive business and customer data, from insider risk across global operations. In this session, Global VP of IT Jill Renfroe—formerly an IT executive at Colonial Pipeline—shares H-E Parts' journey which began with visibility into data, data flows, and employee interactions to then build effective controls to prevent theft and accidental loss. Attendees will leave with practical, proven insights for a visibility-first approach to data security.
As demand for managed security services accelerates, Fortinet service provider partners are positioned to capture the next phase of growth. This session explores the business drivers behind managed security adoption and how Fortinet's broad portfolio and integrated Security Fabric enable providers to scale services, simplify operations, and deliver consistent security outcomes across global environments. Attendees will gain insight into the key success factors for building profitable, repeatable managed security offerings with Fortinet.
Securing a global healthcare environment requires more than just protecting cloud access: It demands consistency, flexibility, and operational simplicity. Join Bruno Gomes of Convatec to learn how he addressed rising SSE costs, infrastructure team relocation, and the challenge of enforcing uniform security policies across on-premises and remote users with a lean IT team. Find out about initial challenges and why Convatec selected Fortinet Unified SASE, how seamless integration with existing SD-WAN and global PoP coverage accelerated deployment, and what mattered most during the POC. The session will highlight practical lessons learned, real cost savings, and how Convatec simplified security operations while strengthening protection across all its sites across the globe.
Join us for an inspiring conversation with a select group of sales and channel leaders to discuss Fortinet's commitment to our partners' success in 2026 and beyond. We'll take a closer look at the biggest growth drivers and discuss the importance of customer success. We'll wrap the session with a celebration of the winners of our partner of the year awards.
Join us for an inspiring conversation with a select group of sales and channel leaders to discuss Fortinet's commitment to our partners' success in 2026 and beyond. We'll take a closer look at the biggest growth drivers and discuss the importance of customer success. We'll wrap the session with a celebration of the winners of our partner of the year awards.
Dive into the latest advancements in Threat Detection & Incident Response (TDIR), from deep network-based detection using NDR and deception, to cutting-edge AI-powered malware analysis with FortiSandbox. This session highlights emerging capabilities, integration workflows, and practical tips to combat advanced threats and elevate your security operations.
Learn how the County of Nassau in New York uses FortiRecon to proactively identify and prioritize its exposure from an external adversary POV. Douglas Rodriquez will share key insights based on using of FortiRecon for exposure management over the last several years. Find out what benefits the team saw after gaining full visibility to exposure, prioritizing exposures to address, getting brand protection, and achieving time savings for security operations staff. He will also discuss how organizations can get started on their own journey with threat exposure management.
See first-hand how your Enterprise IT team can deploy FortiSASE and ZTNA like a pro! Witness the power of FortiSASE as we seamlessly secure a hybrid workforce while providing lightning-fast connectivity to business-critical applications. Plus, you’ll see how FortiAI-assisted Digital Experience Monitoring can be used to diagnose and solve SaaS application performance issues.
Please note this session is offered multiple times.
See first-hand how your Enterprise IT team can deploy FortiSASE and ZTNA like a pro! Witness the power of FortiSASE as we seamlessly secure a hybrid workforce while providing lightning-fast connectivity to business-critical applications. Plus, you’ll see how FortiAI-assisted Digital Experience Monitoring can be used to diagnose and solve SaaS application performance issues.
Please note this session is offered multiple times.
See first-hand how your Enterprise IT team can deploy FortiSASE and ZTNA like a pro! Witness the power of FortiSASE as we seamlessly secure a hybrid workforce while providing lightning-fast connectivity to business-critical applications. Plus, you’ll see how FortiAI-assisted Digital Experience Monitoring can be used to diagnose and solve SaaS application performance issues.
Please note this session is offered multiple times.
Security leaders face mounting challenges in managing risk and responding to threats like ransomware. Legacy vulnerability management programs generate overwhelming alert volumes, miss critical blind spots in the attack surface, and deliver poor ROI. Compounding these is the problem of tool sprawl that paralyzes security teams and slows down incident response. Join this session to explore how FortiRecon can help SOC teams reduce real-world risk and alert fatigue by prioritizing exposures using offensive validation based on an adversarial view of your organization.
The Ultimate Fabric Challenge finale is here! You'll compete for serious money, and in front of thousands of Fortinet customers and partners.
Arrive: 4:30 PM
Competition commences: 5:00 PM
Comptention ends: 8:00 PM
Good luck!
Learn how the FortiSOC platform unifies Agentic AI, Analyzer, SIEM, SOAR and TIP with SOCaaS best practices into a single platform to reshape the future of SOC, where AI agents work across workflows to accelerate decisions and move SOCs toward a more autonomous, intelligent, and resilient operation.
Please note this session is offered multiple times.
Learn how the FortiSOC platform unifies Agentic AI, Analyzer, SIEM, SOAR and TIP with SOCaaS best practices into a single platform to reshape the future of SOC, where AI agents work across workflows to accelerate decisions and move SOCs toward a more autonomous, intelligent, and resilient operation.
Please note this session is offered multiple times.
Learn how the FortiSOC platform unifies Agentic AI, Analyzer, SIEM, SOAR and TIP with SOCaaS best practices into a single platform to reshape the future of SOC, where AI agents work across workflows to accelerate decisions and move SOCs toward a more autonomous, intelligent, and resilient operation.
Please note this session is offered multiple times.
This session covers unified data protection for sensitive information in use, in motion, and at rest. Attendees will learn how AI-based detection and policy-driven DLP prevent data leaks—including through AI tools—while providing end-to-end visibility across endpoints, networks, and cloud environments.
Please note this session is offered multiple times.
This session covers unified data protection for sensitive information in use, in motion, and at rest. Attendees will learn how AI-based detection and policy-driven DLP prevent data leaks—including through AI tools—while providing end-to-end visibility across endpoints, networks, and cloud environments.
Please note this session is offered multiple times.
With the majority of attacks originating at the endpoint, organizations need protection that unifies prevention, access, and reponse to detect, contain, and respond to threats faster—while simplifying management and reducing agent sprawl. FortiEndpoint, a unified endpoint platform, brings together prevention (EPP), detection and response (EDR), virtual private network (VPN), and zero-trust network access (ZTNA) into a single, integrated platform. In this session, find out how FortiEndpoint simplifies endpoint management, enhances visibility, and strengthens protection across users and devices. Plus, see how customers gain faster time-to-protection, lower operational overhead, and consistent security everywhere—all through one agent, one console, and one unified approach to endpoint security.
Learn how FortiManager platform brings together single-pane management across on-prem, cloud, LAN, WAN, Edge, SD-WAN, SASE, and ZTNA, combined with AIOps and Agentic AI to automate routine operations, improve uptime, scale performance and move NOCs from reactive towards predictive and more autonomous operations.
Please note this session is offered multiple times.
Learn how FortiManager platform brings together single-pane management across on-prem, cloud, LAN, WAN, Edge, SD-WAN, SASE, and ZTNA, combined with AIOps and Agentic AI to automate routine operations, improve uptime, scale performance and move NOCs from reactive towards predictive and more autonomous operations.
Please note this session is offered multiple times.
In a world where users, devices, and applications are everywhere, organizations need a unified, adaptive, and intelligent security strategy. That's where Fortinet Unified SASE comes in. Join us to learn how Fortinet uniquely converges networking and security into a single platform. AI-driven operations with FortiAI-Assist, 170+ global PoPs, data sovereignty, universal ZTNA, and comprehensive SaaS and data protection are all delivered through one OS with one agent and one management console. We’ll share real-world examples of how customers reduce costs, accelerate time-to-value, and improve user experience. Plus, get insights into why Fortinet leads with the most integrated, flexible, and intelligent unified SASE platform.
Please note this session is offered multiple times.
In a world where users, devices, and applications are everywhere, organizations need a unified, adaptive, and intelligent security strategy. That's where Fortinet Unified SASE comes in. Join us to learn how Fortinet uniquely converges networking and security into a single platform. AI-driven operations with FortiAI-Assist, 170+ global PoPs, data sovereignty, universal ZTNA, and comprehensive SaaS and data protection are all delivered through one OS with one agent and one management console. We’ll share real-world examples of how customers reduce costs, accelerate time-to-value, and improve user experience. Plus, get insights into why Fortinet leads with the most integrated, flexible, and intelligent unified SASE platform.
Please note this session is offered multiple times.
Join us for an inspiring conversation with a select group of sales and channel leaders to discuss Fortinet's commitment to our partners' success in 2026 and beyond. We'll take a closer look at the biggest growth drivers and discuss the importance of customer success. We'll wrap the session with a celebration of the winners of our partner of the year awards.
Learn how Fortinet works with partners to align managed security service offerings to their business models and go-to-market strategies. This session highlights Fortinet's proven approach to helping partners build scalable, differentiated services designed to capture market share. See how Fortinet's partner programs, including offer development, support a clear path to portfolio maturity. Real-world case studies illustrate how this collaboration enables efficient service delivery, recurring revenue growth, and long-term customer value.
Attack surface is not static. It is ever growing in terms of scale and complexity. We continue to see new devices -xOTs, applications coming on the network in all verticals. Join to us to learn Fortinet solutions and FortiGuard services for device discovery, vulnerability detection, granular network access control enabling zero-trust paradigm and deep visibility into devices and users coming on board your network. Provide best user experience to users – internal and external as well as xOT devices while keeping your network secure.
Please note this session is offered multiple times.
Attack surface is not static. It is ever growing in terms of scale and complexity. We continue to see new devices -xOTs, applications coming on the network in all verticals. Join to us to learn Fortinet solutions and FortiGuard services for device discovery, vulnerability detection, granular network access control enabling zero-trust paradigm and deep visibility into devices and users coming on board your network. Provide best user experience to users – internal and external as well as xOT devices while keeping your network secure.
Please note this session is offered multiple times.
This hands-on workshop explores how to integrate, automate, and orchestrate Fortinet’s Security Fabric for unified visibility and intelligent response. Participants will learn how to connect multiple Fortinet solutions, synchronize configuration and objects across the Fabric, and automate operations using FortiAnalyzer event handlers, playbooks, and FortiGate automation stitches. Attendees will build and test automation workflows that enhance security efficiency and operational consistency across complex environments.
- Laptop (required, second screen strongly suggested to view lab instructions)
- Hands-on experience with FortiGate and FortiAnalyzer
In this course, you will learn how to use the most common FortiGate features. In interactive labs, you will explore firewall policies, user authentication, and logging and monitoring, and how to protect your network using security profiles. This session is two days long and includes a subset of the content that is part of the 4-day NSE4 FortiOS Administrator course.
In this course, you will gain the practical skills of a SOC analyst using FortiAnalyzer for centralized logging and analytics. You will learn how to examine and manage events, and automate threat response using event handlers and playbooks. You will also learn how to identify current and potential threats through incident analysis and outbreak reports. Finally, you will learn how to incorporate FortiAI in your workflow and generate security reports.
In this course, you will learn the fundamentals of using FortiManager for the centralized network administration of many FortiGate devices. In interactive labs, you will explore deployment strategies, which include single or multiple ADOMs, device registration, policy packages, shared objects, installing configuration changes, provisioning FortiManager as a local FortiGuard distribution server, and troubleshooting the features that are critical to day-to-day use after you deploy FortiManager.
In this course, your will learn how to use FortiDLP as a next-generation, AI-enhanced, cloud-native endpoint data loss prevention solution to anticipate and prevent data leaks and detect behvaviour-related insider risks.
In this course, you will learn how to protect users across the modern workspace using AI-powered SaaS security for email, web browsers, and collaboration tools.
In this course you will learn how FortiNDR Cloud leverages artificial intelligence (AI) and machine learning (ML), behavioral, and human analysis to inspect network traffic to detect malicious behavior early while reducing false positives. You will also learn how to automatically provides risk scores, and shares relevant threat intelligence to assist security teams in prioritizing response efforts.
In this course, you will learn how to use FortiSIEM to search, enrich, and analyze events from customers in a managed security service provider (MSSP) organization. You will learn how to perform real-time and historical searches, and build advanced queries. You will also learn how to perform analysis and remediation of security incidents.
In this interactive course, you will learn how to use FortiSOAR to design simple to complex playbooks, examine the role of FortiSOAR in mitigating malicious indicators, and learn how to create interactive dashboards to display relevant information about alerts and incidents.
In this course, you will learn how to diagnose and troubleshoot the most common networking and security problems in a Fortinet protected network security solution. In interactive break-and-fix labs, you will use tools, diagnostics, and debug commands to detect, isolate, and resolve problems related to the most commonly used FortiGate features. This session is two days long and includes a subset of the content that is part of the 3-day NSE 6 Network Security Support Engineer course.
You must have an understanding of the topics covered in the FCP - FortiGate Administrator course, or have equivalent experience. It is also recommended that you have an understanding of the topics covered in the FCSS - Enterprise Firewall Administrator course.
In this course, you will learn how to design, deploy, and manage advanced Fortinet Secure SD-WAN environments across branches and regions. You will also learn how to enhance and troubleshoot SD-WAN deployments, deploy complex topologies using overlay templates, and implement zero-touch provisioning for scalable deployments. These advanced topics will help you optimize SD-WAN performance and reliability in distributed enterprise networks.
Advanced knowledge of networking, and extensive hands-on experience working with FortiGate and FortiManager.
It is recommended that you have an understanding of the topics covered in the following courses, or have equivalent experience:
- FCP - FortiGate Administrator
- FCP - FortiManager Administrator
In this course, you will learn how to implement and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices. This session is two days long and includes a subset of the content that is part of the 3-day NSE 7 Enterprise Firewall Administrator course.
You must have an understanding of the topics covered in FCP - FortiGate Administrator (or have equivalent experience).
It is also recommended that you have an understanding of the topics covered in the following courses, or have equivalent experience:
- FCP - FortiManager Administrator
- FCP - FortiAnalyzer Administrator
In this course, you will learn how to design, deploy, and manage advanced Fortinet Secure SD-WAN environments across branches and regions. You will also learn how to enhance and troubleshoot SD-WAN deployments, deploy complex topologies using overlay templates, and implement zero-touch provisioning for scalable deployments. These advanced topics will help you optimize SD-WAN performance and reliability in distributed enterprise networks.
You must have an understanding of the topics covered in the following courses, or have equivalent experience:
- FCP - FortiGate Administrator
- FCP - FortiClient EMS Administrator
In this course, you will learn how to design, deploy, and manage a Fortinet SOC solution using FortiSIEM and FortiSOAR. You will learn how to analyze and respond to security incidents according to industry best practices for incident handling. You will also learn about SOC playbook development, threat hunting, and how to incorporate FortiAI in your workflow.
You must have an understanding of the topics covered in the FCP FortiSIEM Analyst and FCP FortiSOAR Administrator courses, or have equivalent experience.
During this hands-on focused workshop, students will explore how FortiSOAR can automate processes and responses, how it can orchestrate actions with other Fortinet products using the Security Fabric, and how to do more with less.
- Laptop (required, second screen strongly suggested to view lab instructions)
- Hands-on experience with FortiGate, FortiManager, FortiAnalyzer, and FortiSOAR
In this course, you will learn how to use the most common FortiGate features. In interactive labs, you will explore firewall policies, user authentication, and logging and monitoring, and how to protect your network using security profiles. This session is two days long and includes a subset of the content that is part of the 4-day NSE4 FortiOS Administrator course.
In this course, you will gain the practical skills of a SOC analyst using FortiAnalyzer for centralized logging and analytics. You will learn how to examine and manage events, and automate threat response using event handlers and playbooks. You will also learn how to identify current and potential threats through incident analysis and outbreak reports. Finally, you will learn how to incorporate FortiAI in your workflow and generate security reports.
In this course, you will learn the fundamentals of using FortiManager for the centralized network administration of many FortiGate devices. In interactive labs, you will explore deployment strategies, which include single or multiple ADOMs, device registration, policy packages, shared objects, installing configuration changes, provisioning FortiManager as a local FortiGuard distribution server, and troubleshooting the features that are critical to day-to-day use after you deploy FortiManager.
In this course, your will learn how to use FortiDLP as a next-generation, AI-enhanced, cloud-native endpoint data loss prevention solution to anticipate and prevent data leaks and detect behvaviour-related insider risks.
In this course, you will learn how to protect users across the modern workspace using AI-powered SaaS security for email, web browsers, and collaboration tools.
In this course you will learn how FortiNDR Cloud leverages artificial intelligence (AI) and machine learning (ML), behavioral, and human analysis to inspect network traffic to detect malicious behavior early while reducing false positives. You will also learn how to automatically provides risk scores, and shares relevant threat intelligence to assist security teams in prioritizing response efforts.
In this course, you will learn how to use FortiSIEM to search, enrich, and analyze events from customers in a managed security service provider (MSSP) organization. You will learn how to perform real-time and historical searches, and build advanced queries. You will also learn how to perform analysis and remediation of security incidents.
In this interactive course, you will learn how to use FortiSOAR to design simple to complex playbooks, examine the role of FortiSOAR in mitigating malicious indicators, and learn how to create interactive dashboards to display relevant information about alerts and incidents.
In this course, you will learn how to diagnose and troubleshoot the most common networking and security problems in a Fortinet protected network security solution. In interactive break-and-fix labs, you will use tools, diagnostics, and debug commands to detect, isolate, and resolve problems related to the most commonly used FortiGate features. This session is two days long and includes a subset of the content that is part of the 3-day NSE 6 Network Security Support Engineer course.
You must have an understanding of the topics covered in the FCP - FortiGate Administrator course, or have equivalent experience. It is also recommended that you have an understanding of the topics covered in the FCSS - Enterprise Firewall Administrator course.
In this course, you will learn how to design, deploy, and manage advanced Fortinet Secure SD-WAN environments across branches and regions. You will also learn how to enhance and troubleshoot SD-WAN deployments, deploy complex topologies using overlay templates, and implement zero-touch provisioning for scalable deployments. These advanced topics will help you optimize SD-WAN performance and reliability in distributed enterprise networks.
Advanced knowledge of networking, and extensive hands-on experience working with FortiGate and FortiManager.
It is recommended that you have an understanding of the topics covered in the following courses, or have equivalent experience:
- FCP - FortiGate Administrator
- FCP - FortiManager Administrator
In this course, you will learn how to implement and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices. This session is two days long and includes a subset of the content that is part of the 3-day NSE 7 Enterprise Firewall Administrator course.
You must have an understanding of the topics covered in FCP - FortiGate Administrator (or have equivalent experience).
It is also recommended that you have an understanding of the topics covered in the following courses, or have equivalent experience:
- FCP - FortiManager Administrator
- FCP - FortiAnalyzer Administrator
In this course, you will learn how to design, deploy, and manage advanced Fortinet Secure SD-WAN environments across branches and regions. You will also learn how to enhance and troubleshoot SD-WAN deployments, deploy complex topologies using overlay templates, and implement zero-touch provisioning for scalable deployments. These advanced topics will help you optimize SD-WAN performance and reliability in distributed enterprise networks.
You must have an understanding of the topics covered in the following courses, or have equivalent experience:
- FCP - FortiGate Administrator
- FCP - FortiClient EMS Administrator
In this course, you will learn how to design, deploy, and manage a Fortinet SOC solution using FortiSIEM and FortiSOAR. You will learn how to analyze and respond to security incidents according to industry best practices for incident handling. You will also learn about SOC playbook development, threat hunting, and how to incorporate FortiAI in your workflow.
You must have an understanding of the topics covered in the FCP FortiSIEM Analyst and FCP FortiSOAR Administrator courses, or have equivalent experience.
In this training, you will explore a practical approach to leverage Outbreak Alerts published by FortiGuard Labs. You will learn how Outbreak Alerts are structured and which type of content they provide. Hands-on labs focused on a specific outbreak alert will allow you to learn how to bring outbreak alert threat mitigation assets into action using Fortinet solutions.
- Laptop (required, second screen strongly suggested to view lab instructions)
- Working Fortinet Training Institute account (for lab access)
- Basic hands-on experience with Kali Linux (GUI and CLI)
- Basic administration experience with various Fortinet solutions such as FortiGate, FortiWeb, FortiADC, FortiDeceptor, FortiAnalyzer, FortiSIEM, and FortiSOAR
Join us on a journey through the enchanting realm of Zero Touch Provisioning (ZTP). Learn how to automate network device deployment and configuration, making network setup a breeze with this spellbinding approach.
- Laptop (required, second screen strongly suggested to view lab instructions)
- Hands-on experience with FortiGate and FortiManager
- Recommended NSE7/FCSS
In this course, you will learn how to use the most common FortiGate features. In interactive labs, you will explore firewall policies, user authentication, and logging and monitoring, and how to protect your network using security profiles. This session is two days long and includes a subset of the content that is part of the 4-day NSE4 FortiOS Administrator course.
In this course, you will gain the practical skills of a SOC analyst using FortiAnalyzer for centralized logging and analytics. You will learn how to examine and manage events, and automate threat response using event handlers and playbooks. You will also learn how to identify current and potential threats through incident analysis and outbreak reports. Finally, you will learn how to incorporate FortiAI in your workflow and generate security reports.
In this course, you will learn the fundamentals of using FortiManager for the centralized network administration of many FortiGate devices. In interactive labs, you will explore deployment strategies, which include single or multiple ADOMs, device registration, policy packages, shared objects, installing configuration changes, provisioning FortiManager as a local FortiGuard distribution server, and troubleshooting the features that are critical to day-to-day use after you deploy FortiManager.
In this course, you will learn how to use FortiCNAPP features, including cloud posture management, vulnerability scanning, and compliance reporting. You will also explore FortiCNAPP integrations, policies, and automation workflows, as well as how to monitor your cloud environment, remediate misconfigurations, and protect workloads and applications using capabilities, such as attack path analysis, Infrastructure-as-Code (IaC) scanning, and runtime security.
In this course, you will learn how to protect users across the modern workspace using AI-powered SaaS security for email, web browsers, and collaboration tools.
In this course you will learn how FortiNDR Cloud leverages artificial intelligence (AI) and machine learning (ML), behavioral, and human analysis to inspect network traffic to detect malicious behavior early while reducing false positives. You will also learn how to automatically provides risk scores, and shares relevant threat intelligence to assist security teams in prioritizing response efforts.
In this course, you will learn how to use FortiSIEM to search, enrich, and analyze events from customers in a managed security service provider (MSSP) organization. You will learn how to perform real-time and historical searches, and build advanced queries. You will also learn how to perform analysis and remediation of security incidents.
In this interactive course, you will learn how to use FortiSOAR to design simple to complex playbooks, examine the role of FortiSOAR in mitigating malicious indicators, and learn how to create interactive dashboards to display relevant information about alerts and incidents.
In this course, you will learn how to diagnose and troubleshoot the most common networking and security problems in a Fortinet protected network security solution. In interactive break-and-fix labs, you will use tools, diagnostics, and debug commands to detect, isolate, and resolve problems related to the most commonly used FortiGate features. This session is two days long and includes a subset of the content that is part of the 3-day NSE 6 Network Security Support Engineer course.
You must have an understanding of the topics covered in the FCP - FortiGate Administrator course, or have equivalent experience. It is also recommended that you have an understanding of the topics covered in the FCSS - Enterprise Firewall Administrator course.
In this course, you will learn how to design, deploy, and manage advanced Fortinet Secure SD-WAN environments across branches and regions. You will also learn how to enhance and troubleshoot SD-WAN deployments, deploy complex topologies using overlay templates, and implement zero-touch provisioning for scalable deployments. These advanced topics will help you optimize SD-WAN performance and reliability in distributed enterprise networks.
Advanced knowledge of networking, and extensive hands-on experience working with FortiGate and FortiManager.
It is recommended that you have an understanding of the topics covered in the following courses, or have equivalent experience:
- FCP - FortiGate Administrator
- FCP - FortiManager Administrator
In this course, you will learn how to implement and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices. This session is two days long and includes a subset of the content that is part of the 3-day NSE 7 Enterprise Firewall Administrator course.
You must have an understanding of the topics covered in FCP - FortiGate Administrator (or have equivalent experience).
It is also recommended that you have an understanding of the topics covered in the following courses, or have equivalent experience:
- FCP - FortiManager Administrator
- FCP - FortiAnalyzer Administrator
In this course, you will learn how to design, deploy, and manage advanced Fortinet Secure SD-WAN environments across branches and regions. You will also learn how to enhance and troubleshoot SD-WAN deployments, deploy complex topologies using overlay templates, and implement zero-touch provisioning for scalable deployments. These advanced topics will help you optimize SD-WAN performance and reliability in distributed enterprise networks.
You must have an understanding of the topics covered in the following courses, or have equivalent experience:
- FCP - FortiGate Administrator
- FCP - FortiClient EMS Administrator
In this course, you will learn how to design, deploy, and manage a Fortinet SOC solution using FortiSIEM and FortiSOAR. You will learn how to analyze and respond to security incidents according to industry best practices for incident handling. You will also learn about SOC playbook development, threat hunting, and how to incorporate FortiAI in your workflow.
You must have an understanding of the topics covered in the FCP FortiSIEM Analyst and FCP FortiSOAR Administrator courses, or have equivalent experience.
During this hands-on focused workshop, students will explore how FortiSOAR can automate processes and responses, how it can orchestrate actions with other Fortinet products using the Security Fabric, and how to do more with less.
- Laptop (required, second screen strongly suggested to view lab instructions)
- Hands-on experience with FortiGate, FortiManager, FortiAnalyzer, and FortiSOAR
In this course, you will learn how to use the most common FortiGate features. In interactive labs, you will explore firewall policies, user authentication, and logging and monitoring, and how to protect your network using security profiles. This session is two days long and includes a subset of the content that is part of the 4-day NSE4 FortiOS Administrator course.
In this course, you will gain the practical skills of a SOC analyst using FortiAnalyzer for centralized logging and analytics. You will learn how to examine and manage events, and automate threat response using event handlers and playbooks. You will also learn how to identify current and potential threats through incident analysis and outbreak reports. Finally, you will learn how to incorporate FortiAI in your workflow and generate security reports.
In this course, you will learn the fundamentals of using FortiManager for the centralized network administration of many FortiGate devices. In interactive labs, you will explore deployment strategies, which include single or multiple ADOMs, device registration, policy packages, shared objects, installing configuration changes, provisioning FortiManager as a local FortiGuard distribution server, and troubleshooting the features that are critical to day-to-day use after you deploy FortiManager.
In this course, you will learn how to use FortiCNAPP features, including cloud posture management, vulnerability scanning, and compliance reporting. You will also explore FortiCNAPP integrations, policies, and automation workflows, as well as how to monitor your cloud environment, remediate misconfigurations, and protect workloads and applications using capabilities, such as attack path analysis, Infrastructure-as-Code (IaC) scanning, and runtime security.
In this course, you will learn how to protect users across the modern workspace using AI-powered SaaS security for email, web browsers, and collaboration tools.
In this course you will learn how FortiNDR Cloud leverages artificial intelligence (AI) and machine learning (ML), behavioral, and human analysis to inspect network traffic to detect malicious behavior early while reducing false positives. You will also learn how to automatically provides risk scores, and shares relevant threat intelligence to assist security teams in prioritizing response efforts.
In this course, you will learn how to use FortiSIEM to search, enrich, and analyze events from customers in a managed security service provider (MSSP) organization. You will learn how to perform real-time and historical searches, and build advanced queries. You will also learn how to perform analysis and remediation of security incidents.
In this interactive course, you will learn how to use FortiSOAR to design simple to complex playbooks, examine the role of FortiSOAR in mitigating malicious indicators, and learn how to create interactive dashboards to display relevant information about alerts and incidents.
In this course, you will learn how to diagnose and troubleshoot the most common networking and security problems in a Fortinet protected network security solution. In interactive break-and-fix labs, you will use tools, diagnostics, and debug commands to detect, isolate, and resolve problems related to the most commonly used FortiGate features. This session is two days long and includes a subset of the content that is part of the 3-day NSE 6 Network Security Support Engineer course.
You must have an understanding of the topics covered in the FCP - FortiGate Administrator course, or have equivalent experience. It is also recommended that you have an understanding of the topics covered in the FCSS - Enterprise Firewall Administrator course.
In this course, you will learn how to design, deploy, and manage advanced Fortinet Secure SD-WAN environments across branches and regions. You will also learn how to enhance and troubleshoot SD-WAN deployments, deploy complex topologies using overlay templates, and implement zero-touch provisioning for scalable deployments. These advanced topics will help you optimize SD-WAN performance and reliability in distributed enterprise networks.
Advanced knowledge of networking, and extensive hands-on experience working with FortiGate and FortiManager.
It is recommended that you have an understanding of the topics covered in the following courses, or have equivalent experience:
- FCP - FortiGate Administrator
- FCP - FortiManager Administrator
In this course, you will learn how to implement and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices. This session is two days long and includes a subset of the content that is part of the 3-day NSE 7 Enterprise Firewall Administrator course.
You must have an understanding of the topics covered in FCP - FortiGate Administrator (or have equivalent experience).
It is also recommended that you have an understanding of the topics covered in the following courses, or have equivalent experience:
- FCP - FortiManager Administrator
- FCP - FortiAnalyzer Administrator
In this course, you will learn how to design, deploy, and manage advanced Fortinet Secure SD-WAN environments across branches and regions. You will also learn how to enhance and troubleshoot SD-WAN deployments, deploy complex topologies using overlay templates, and implement zero-touch provisioning for scalable deployments. These advanced topics will help you optimize SD-WAN performance and reliability in distributed enterprise networks.
You must have an understanding of the topics covered in the following courses, or have equivalent experience:
- FCP - FortiGate Administrator
- FCP - FortiClient EMS Administrator
In this course, you will learn how to design, deploy, and manage a Fortinet SOC solution using FortiSIEM and FortiSOAR. You will learn how to analyze and respond to security incidents according to industry best practices for incident handling. You will also learn about SOC playbook development, threat hunting, and how to incorporate FortiAI in your workflow.
You must have an understanding of the topics covered in the FCP FortiSIEM Analyst and FCP FortiSOAR Administrator courses, or have equivalent experience.
In this training, you will explore a practical approach to leverage Outbreak Alerts published by FortiGuard Labs. You will learn how Outbreak Alerts are structured and which type of content they provide. Hands-on labs focused on a specific outbreak alert will allow you to learn how to bring outbreak alert threat mitigation assets into action using Fortinet solutions.
- Laptop (required, second screen strongly suggested to view lab instructions)
- Working Fortinet Training Institute account (for lab access)
- Basic hands-on experience with Kali Linux (GUI and CLI)
- Basic administration experience with various Fortinet solutions such as FortiGate, FortiWeb, FortiADC, FortiDeceptor, FortiAnalyzer, FortiSIEM, and FortiSOAR
Join us on a journey through the enchanting realm of Zero Touch Provisioning (ZTP). Learn how to automate network device deployment and configuration, making network setup a breeze with this spellbinding approach.
- Laptop (required, second screen strongly suggested to view lab instructions)
- Hands-on experience with FortiGate and FortiManager
- Recommended NSE7/FCSS
The Ultimate Fabric Challenge finale is here! You'll compete for serious money, and in front of thousands of Fortinet customers and partners.
Arrive: 4:30 PM
Competition commences: 5:00 PM
Comptention ends: 8:00 PM
Good luck!
Join us for the official kickoff to Accelerate at the Welcome Reception in the Tech Expo—where innovation, expertise, and connection come together. Meet with our valued sponsors and engage one-on-one with more than 50 Fortinet experts ready to answer questions, share insights, and explore solutions tailored to your environment.
Throughout the evening, Tech Expo theaters will feature short, high-impact presentations from Fortinet specialists and partners, delivering practical takeaways you can use right away. Enjoy great food, refreshing drinks, and an energetic atmosphere designed for networking and discovery.
This is the best way to start Accelerate 2026! Come connect, learn, and get inspired from the moment you arrive.
Start Day 1 with a full breakfast buffet designed to fuel a productive day ahead. Enjoy a scrumptious selection of hot and cold breakfast favorites, plenty of fresh coffee, and time to connect with fellow attendees before the program begins.
Join us, get energized, and get set for a full day at Accelerate.
Kick off the conference with a powerful opening keynote led by Fortinet Founder, Chairman of the Board, and Chief Executive Officer Ken Xie, joined by Fortinet’s global executive leadership team and distinguished external voices shaping the future of cybersecurity.
In this high-impact general session, Ken Xie will share his perspective on the evolving threat landscape, the forces reshaping cybersecurity and networking, and Fortinet’s long-term vision for securing the digital world. From the acceleration of AI-driven attacks to the convergence of networking and security, this keynote sets the strategic tone for the days ahead.
You’ll also hear insights from Fortinet executives across finance, technology, sales, marketing, and security operations, offering a holistic view of how organizations can stay resilient in an increasingly complex global environment. The session will feature perspectives from international security leaders and partners—including representatives from INTERPOL, the World Economic Forum, and national cybersecurity authorities—highlighting the importance of collaboration across industries, governments, and borders.
Together, these leaders will explore how innovation, intelligence, and trust are redefining what’s possible in cybersecurity—delivering clarity, confidence, and a shared roadmap for navigating what’s next.
Ease into the afternoon by enjoying lunch and the Tech Expo at the same time. This attendee-favorite format lets you grab a relaxed, unhurried meal and explore the Tech Expo at your own pace. With sessions and workshops beginning afterward, you’ll have plenty of time to connect with sponsors, meet Fortinet experts, and dive into the technologies that matter most—without feeling rushed. It’s a comfortable, convenient way to satisfy your appetite for both great food and great innovation.
Ease into the afternoon by enjoying lunch and the Tech Expo at the same time. This attendee-favorite format lets you grab a relaxed, unhurried meal and explore the Tech Expo at your own pace. With sessions and workshops beginning afterward, you’ll have plenty of time to connect with sponsors, meet Fortinet experts, and dive into the technologies that matter most—without feeling rushed. It’s a comfortable, convenient way to satisfy your appetite for both great food and great innovation.
Free on-site certification testing at Accelerate delivers tremendous value to attendees, removing both the financial and logistical barriers that often prevent busy professionals from advancing their credentials. By offering instant, no-cost access to Fortinet NSE certification exams, you can validate your expertise, strengthen your professional standing, and accelerate your career growth, all while attending Accelerate.
The free on-site testing is open to Fortinet customers and partners. No exam registration is necessary. Limit one (1) exam. Open-seating on a first-come first-served basis.
As enterprises evolve, new technologies emerge, and cybercriminals introduce more sophisticated attacks, security leaders and their teams face a variety of challenges in securing the organization’s networks. Security operations center (SOC) teams often struggle with the overwhelming task of investigating alerts and responding to threats, frequently needing to consolidate data from multiple tools to analyze and resolve incidents. This excessive workload impedes their ability to swiftly detect and address critical attacks. This course emphasizes the growing need for advanced security solutions, such as Fortinet’s SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) to tackle these challenges.
The course will focus on real-time threat monitoring with FortiSIEM and the automation of security workflows using FortiSOAR. These solutions are designed to reduce manual effort, lower operational costs, and strengthen overall security posture. By the end of the course, participants will be equipped with the knowledge to leverage Fortinet’s advanced security technologies to enhance visibility, mitigate cyber risks, and optimize their organization’s security operations.
Participants who attend this workshop will learn how to:
- Gain insights into the Configuration Management Database (CMDB) by exploring devices, applications, servers, configuration differences, and CMDB reports.
- Leverage out-of-the-box content including Reports, Rules, and Threat Intelligence (such as 3rd Party Malware IP Import), and utilize Custom SIGMA Rule Import to easily incorporate new security rules.
- Understand, view, and manage incidents using tools like Incident Risk View, Incident List View and Investigate Incident.
- Utilize analytics tools to execute both simple and complex queries with aggregation techniques.
- To explore various dashboard types, such as Widget, Summary, and Identity & Location dashboards, to effectively visualize and analyze data for enhanced decision-making and insights.
- To implement automated case management for SOC analyst groups and users, develop case management policies, and create automation policies to enhance workflow efficiency.
- Address the staff and skills shortage by automating routine tasks to preserve scarce expertise for critical incidents
- Combat complexity with connectors that easily integrate with deployed security controls to ingest information and provide a single, centralized point of visibility and control
- Avoid alert fatigue by aggregating security alerts in one place, enriching them with added context to speed investigation, and including playbooks to guide the triage process
Please note this session is offered multiple times.
Connections between IT and operational technology (OT) systems are no longer air gapped, introducing the potential for hackers to penetrate industrial control systems, risking the safety and availability of critical infrastructure. Security for OT requires visibility, control, and analytics to meet safety and availability requirements.
Convergence is blurring the lines between IT and OT, creating an opportunity to improve the visibility, control, and situational awareness necessary for critical systems. Failure to take the wide range of security issues into account when converging these two very different networks and networking philosophies can result in catastrophic network failures that risk critical systems and the life and well-being of workers and communities.
In this workshop, participants learn about the Fortinet Security Fabric, the first ever architectural security approach designed to dynamically adapt to unique needs of legacy OT environments while enabling the move toward modernizing these critical systems. Leveraging the Purdue Model for the security layers needed in OT, the multi-layered approach provided by the Security Fabric provides broad, integrated, and automated protection against sophisticated threats.
Participants who attend this workshop will learn how to:
- Configure internal segmentation
- Explore the FortiGate asset list, network topology, and FortiNAC visibility
- Implement FortiGate access control
- Configure virtual patching through IPS
- Configure industrial protocol visibility and security
- Implement deception using FortiDeceptor
Please note this session is offered multiple times.
Today’s networks are highly complex, with evolving threats and increasing pressure on IT and security teams to protect their organizations. Firewalls have become multifunctional security devices, but managing multiple point products without integration creates visibility and management challenges. Organizations also need fast, scalable security to protect against internet-borne threats, web-based attacks, and growing network demands.
In this workshop, participants will learn how Fortinet’s unified security approach streamlines protection across various use cases. FortiGate integrates NGFW features with specialized processors and FortiGuard Labs intelligence for high-performance security. The Fortinet Security Fabric offers centralized visibility, automated threat response, and seamless protection for cloud applications, IoT, and web traffic.
In this workshop, participants will learn how to:
- Configure basic FortiGate settings for routing, firewall policies, and security profiles
- Set up a Fortinet Security Fabric with centralized logging, visibility, and automation
- Leverage FortiGuard AI-powered security services for real-time threat detection, web filtering, application control, and malware prevention
- Segment and secure the network with ISFW, ZTNA, and ADVPN for optimized remote access and WAN usage
Please note this session is offered multiple times.
The rapid adoption of digital innovation has greatly increased the complexity and vulnerability of networks. As organizations speed up their digital transformation, they often build fragmented infrastructures across multiple locations that are harder to secure. Meanwhile, cybercriminals are launching more advanced, targeted, and quickly evolving attacks. The demand for always-on connectivity further puts pressure on security teams, making it challenging to maintain consistent protection without creating gaps. This growth of the attack surface, along with rising operational costs and dependence on manual processes, results in inefficiencies, more mistakes, and slower responses, ultimately impairing an organization’s ability to defend itself effectively and address emerging threats.
In this workshop, participants will learn how to integrate multiple Fortinet devices to provide unified security across the network, regardless of the location of network assets and users. Device integration and automation are essential as organizations undergo digital transformation to reduce complexity and enhance defenses against evolving threats.
At the heart of this solution is FortiManager, which revolutionizes network management and security operations by automating routine tasks and leveraging intelligent insights. Participants will also discover how to integrate FortiGate, FortiAnalyzer, FortiSandbox, and FortiMail as part of a Security Fabric to provide comprehensive real-time cybersecurity protection from users to applications. By deploying this solution, organizations can grow and adapt to new threats, making their network more proactive and adaptable.
Participants who attend this workshop will learn how to:
- Configure central management
- Deploy the Security Fabric
- Improve visibility and coordination across devices
- Use low-touch provisioning (LTP) to deploy remote devices
- Provide zero-day protection using sandboxing
- Integrate email protection across the network
- Use REST API and the FortiAI Security Assistant
Please note this session is offered multiple times.
With hybrid work on the rise and applications moving to the cloud and SaaS, organizations face the challenge of securing employees accessing networks and applications remotely. This has widened the attack surface, complicating network, application, and resource security.
Secure Access Service Edge (SASE) architecture converges networking and security to provide secure access and connectivity to users anywhere. However, many cloud-delivered security solutions lack enterprise-grade protection for hybrid workforces and struggle to integrate with various network and security tools for consistent security and user experience everywhere.
FortiSASE delivers both a consistent security posture and an optimal user experience for users working from anywhere. Secure your hybrid workforce by closing security gaps, plus simplify operations. AI-powered secure web gateway (SWG), zero-trust network access (ZTNA), cloud access security broker (CASB), Firewall-as-a-Service (FWaaS), and secure SD-WAN all run on one OS and can all be managed with a single console.
Participants who attend this workshop will learn how to:
- Achieve Secure Internet Access (SIA) and Secure SaaS Access (SSA) for any user using FortiSASE.
- Setup Secure Private Access (SPA) to internal resources using FortiSASE.
- Use FortiSASE Universal ZTNA.
- View FortiSASE Logs and Reports.
Please note this session is offered multiple times.
As organizations accelerate their adoption of SaaS and cloud applications, the stability of their underlying network becomes mission-critical. Performance issues, brownouts, and latency threaten business continuity, a risk heightened by architectures dependent on centralized controllers. In this session, we’ll explore how Fortinet’s Secure SD-WAN architecture was purpose-built around a completely decentralized model—one where every device can independently self-heal and automatically self-correct during outages or degradation.
Please note this session is offered multiple times.
In an era where hybrid work, diverse device ecosystems, and sophisticated cyber-threats place unprecedented strain on IT and security teams, a unified approach to endpoint protection and management has become essential. This session provides an overview of a modern Unified Endpoint Solution that combines secure zero trust access, next-generation endpoint protection, advanced Endpoint Detection & Response (EDR), and Data Loss Prevention (DLP). Attendees will learn how unified policies, centralized management, and integrated threat intelligence can streamline endpoint security, strengthen protection across diverse devices, and simplify IT operations and attack-surface management.
Please note this session is offered multiple times.
AI and AI-based workloads are the new transformational effort, and securing these modern web applications in the cloud requires more than just security gates. In this session, Adobe and Fortinet share experience and strategies for protecting AI-enabled applications, web APIs, and data. Join Ammar Alim, Head of DevSecOps at Adobe to learn about Adobe’s cloud security experience, explore practical examples, and receive actionable guidance to strengthen your cloud security posture. The session combines co-presented insights with audience Q&A for an engaging, interactive experience.
The Cloud and application landscape continues to evolve, adapting to the AI-era. Organizations use of AI agents and applications quickly expand the attack surface exposing customer to various new threats. In this session we’ll explore how Fortinet cloud and application security solutions secure cloud infrastructure and (Web and API) Applications in the new AI era.
When users, devices, and applications are constantly moving, traditional network-based security needs to adapt. In this session, hear how Arnold Clark Automobiles, leading car retailer in the UK, rethought web filtering, access control, and incident response by shifting from location- and device-based policies to a user-centric integrated SASE approach. Join Dr. Zibby Kwecka, Arnold Clark’s CISO, to hear examples of how Unified SASE delivered visibility down to the endpoint process level, reduced incident analysis from hours to minutes, integrated seamlessly with Secure SD-WAN for operational productivity, and eliminated the need for full VPN access—without disrupting critical business operations. Walk away with practical lessons on securing a mobile workforce while improving user experience, visibility, and reducing operational overhead.
As organizations expand across cloud, on-premises, and edge environments, traditional perimeter-centric security models are no longer sufficient. This session explores how FortiOS 8.0.0 introduces a new era of AI-driven threat defence designed to secure today's distributed and dynamic attack surface. Attendees will gain insights into the latest advancements in Fortinet’s security architecture, including enhanced AI-powered detection and the powerful new hardware platforms that extend protection beyond the perimeter.
Please note this session is offered multiple times.
Security teams are under pressure to move faster, respond smarter, and do more with fewer resources. This session reveals how organizations are modernizing their security operations with the Fortinet SOC Platform, leveraging a unified strategy that combines next-generation SIEM, SOAR, and AI into a single operational foundation that evolves with their needs, enabling a SOC that adapts. Hear directly from peers who have transformed investigations, reduced response times, and unlocked measurable improvements in efficiency, resilience, and security outcomes.
The wired and wireless network is often the largest attack surface in any business. Fortinet Secure LAN converges foundational networking technology with security and services, delivering simplified operations and better business outcomes. Find out how our customers are using Fortinet switches and access points and why they chose Fortinet in a very crowded market.
Please note this session is offered multiple times.
Dive into the latest advancements in Threat Detection & Incident Response (TDIR), from deep network-based detection using NDR and deception, to cutting-edge AI-powered malware analysis with FortiSandbox. This session highlights emerging capabilities, integration workflows, and practical tips to combat advanced threats and elevate your security operations.
See first-hand how your Enterprise IT team can deploy FortiSASE and ZTNA like a pro! Witness the power of FortiSASE as we seamlessly secure a hybrid workforce while providing lightning-fast connectivity to business-critical applications. Plus, you’ll see how FortiAI-assisted Digital Experience Monitoring can be used to diagnose and solve SaaS application performance issues.
Please note this session is offered multiple times.
With the majority of attacks originating at the endpoint, organizations need protection that unifies prevention, access, and reponse to detect, contain, and respond to threats faster—while simplifying management and reducing agent sprawl. FortiEndpoint, a unified endpoint platform, brings together prevention (EPP), detection and response (EDR), virtual private network (VPN), and zero-trust network access (ZTNA) into a single, integrated platform. In this session, find out how FortiEndpoint simplifies endpoint management, enhances visibility, and strengthens protection across users and devices. Plus, see how customers gain faster time-to-protection, lower operational overhead, and consistent security everywhere—all through one agent, one console, and one unified approach to endpoint security.
AI and quantum computing are changing everything, and cybersecurity is no different. To stay ahead of threats and trends, we continally update FortiOS and our custom-built silicon chips to ensure that the FortiGate network firewall offers the latest innovations built for the future of security. Find out how our ASICs ensure the highest performance, and AI-powered security services protect from even the newest, most sophisticated threats. Learn why FortiOS is future-ready with post-quantum cryptography, and how SASE capabilities are tied to the firewall to support the next generation of security architectures. Join this session to hear all the details about how Fortinet is changing the network firewall landscape.
Please note this session is offered multiple times.
Discover how FortiGuard Labs identifies, analyzes, and neutralizes global threats at machine speed. Through the combined power of FortiRecon threat actor insights, Threat Landscape Reports, and Outbreak intelligence, this session reveals how actionable threat context enables organizations to stay ahead of fast-moving campaigns and strengthen their cyber resilience.
Learn how the County of Nassau in New York uses FortiRecon to proactively identify and prioritize its exposure from an external adversary POV. Douglas Rodriquez will share key insights based on using of FortiRecon for exposure management over the last several years. Find out what benefits the team saw after gaining full visibility to exposure, prioritizing exposures to address, getting brand protection, and achieving time savings for security operations staff. He will also discuss how organizations can get started on their own journey with threat exposure management.
Learn how the FortiSOC platform unifies Agentic AI, Analyzer, SIEM, SOAR and TIP with SOCaaS best practices into a single platform to reshape the future of SOC, where AI agents work across workflows to accelerate decisions and move SOCs toward a more autonomous, intelligent, and resilient operation.
Please note this session is offered multiple times.
Attack surface is not static. It is ever growing in terms of scale and complexity. We continue to see new devices -xOTs, applications coming on the network in all verticals. Join to us to learn Fortinet solutions and FortiGuard services for device discovery, vulnerability detection, granular network access control enabling zero-trust paradigm and deep visibility into devices and users coming on board your network. Provide best user experience to users – internal and external as well as xOT devices while keeping your network secure.
Please note this session is offered multiple times.
Unwind after a full day of learning at Happy Hour in the Tech Expo. Grab a drink, enjoy great food, and dive into lively tech conversations with Fortinet experts and sponsors in a relaxed, social setting. Explore the latest innovations, ask follow-up questions, and make meaningful connections—whether you’re deepening a technical discussion or discovering something new.
It’s the perfect blend of insight and interaction to close out Day 1.
Recharge for another big day at Accelerate with a full breakfast buffet to start your morning right. Enjoy a delicious spread of breakfast favorites, fresh coffee, and a relaxed atmosphere to connect, plan your day, and prepare for what’s ahead.
Fuel up and get ready to make the most of Day 2.
As enterprises evolve, new technologies emerge, and cybercriminals introduce more sophisticated attacks, security leaders and their teams face a variety of challenges in securing the organization’s networks. Security operations center (SOC) teams often struggle with the overwhelming task of investigating alerts and responding to threats, frequently needing to consolidate data from multiple tools to analyze and resolve incidents. This excessive workload impedes their ability to swiftly detect and address critical attacks. This course emphasizes the growing need for advanced security solutions, such as Fortinet’s SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) to tackle these challenges.
The course will focus on real-time threat monitoring with FortiSIEM and the automation of security workflows using FortiSOAR. These solutions are designed to reduce manual effort, lower operational costs, and strengthen overall security posture. By the end of the course, participants will be equipped with the knowledge to leverage Fortinet’s advanced security technologies to enhance visibility, mitigate cyber risks, and optimize their organization’s security operations.
Participants who attend this workshop will learn how to:
- Gain insights into the Configuration Management Database (CMDB) by exploring devices, applications, servers, configuration differences, and CMDB reports.
- Leverage out-of-the-box content including Reports, Rules, and Threat Intelligence (such as 3rd Party Malware IP Import), and utilize Custom SIGMA Rule Import to easily incorporate new security rules.
- Understand, view, and manage incidents using tools like Incident Risk View, Incident List View and Investigate Incident.
- Utilize analytics tools to execute both simple and complex queries with aggregation techniques.
- To explore various dashboard types, such as Widget, Summary, and Identity & Location dashboards, to effectively visualize and analyze data for enhanced decision-making and insights.
- To implement automated case management for SOC analyst groups and users, develop case management policies, and create automation policies to enhance workflow efficiency.
- Address the staff and skills shortage by automating routine tasks to preserve scarce expertise for critical incidents
- Combat complexity with connectors that easily integrate with deployed security controls to ingest information and provide a single, centralized point of visibility and control
- Avoid alert fatigue by aggregating security alerts in one place, enriching them with added context to speed investigation, and including playbooks to guide the triage process
Please note this session is offered multiple times.
Connections between IT and operational technology (OT) systems are no longer air gapped, introducing the potential for hackers to penetrate industrial control systems, risking the safety and availability of critical infrastructure. Security for OT requires visibility, control, and analytics to meet safety and availability requirements.
Convergence is blurring the lines between IT and OT, creating an opportunity to improve the visibility, control, and situational awareness necessary for critical systems. Failure to take the wide range of security issues into account when converging these two very different networks and networking philosophies can result in catastrophic network failures that risk critical systems and the life and well-being of workers and communities.
In this workshop, participants learn about the Fortinet Security Fabric, the first ever architectural security approach designed to dynamically adapt to unique needs of legacy OT environments while enabling the move toward modernizing these critical systems. Leveraging the Purdue Model for the security layers needed in OT, the multi-layered approach provided by the Security Fabric provides broad, integrated, and automated protection against sophisticated threats.
Participants who attend this workshop will learn how to:
- Configure internal segmentation
- Explore the FortiGate asset list, network topology, and FortiNAC visibility
- Implement FortiGate access control
- Configure virtual patching through IPS
- Configure industrial protocol visibility and security
- Implement deception using FortiDeceptor
Please note this session is offered multiple times.
Today’s networks are highly complex, with evolving threats and increasing pressure on IT and security teams to protect their organizations. Firewalls have become multifunctional security devices, but managing multiple point products without integration creates visibility and management challenges. Organizations also need fast, scalable security to protect against internet-borne threats, web-based attacks, and growing network demands.
In this workshop, participants will learn how Fortinet’s unified security approach streamlines protection across various use cases. FortiGate integrates NGFW features with specialized processors and FortiGuard Labs intelligence for high-performance security. The Fortinet Security Fabric offers centralized visibility, automated threat response, and seamless protection for cloud applications, IoT, and web traffic.
In this workshop, participants will learn how to:
- Configure basic FortiGate settings for routing, firewall policies, and security profiles
- Set up a Fortinet Security Fabric with centralized logging, visibility, and automation
- Leverage FortiGuard AI-powered security services for real-time threat detection, web filtering, application control, and malware prevention
- Segment and secure the network with ISFW, ZTNA, and ADVPN for optimized remote access and WAN usage
Please note this session is offered multiple times.
The rapid adoption of digital innovation has greatly increased the complexity and vulnerability of networks. As organizations speed up their digital transformation, they often build fragmented infrastructures across multiple locations that are harder to secure. Meanwhile, cybercriminals are launching more advanced, targeted, and quickly evolving attacks. The demand for always-on connectivity further puts pressure on security teams, making it challenging to maintain consistent protection without creating gaps. This growth of the attack surface, along with rising operational costs and dependence on manual processes, results in inefficiencies, more mistakes, and slower responses, ultimately impairing an organization’s ability to defend itself effectively and address emerging threats.
In this workshop, participants will learn how to integrate multiple Fortinet devices to provide unified security across the network, regardless of the location of network assets and users. Device integration and automation are essential as organizations undergo digital transformation to reduce complexity and enhance defenses against evolving threats.
At the heart of this solution is FortiManager, which revolutionizes network management and security operations by automating routine tasks and leveraging intelligent insights. Participants will also discover how to integrate FortiGate, FortiAnalyzer, FortiSandbox, and FortiMail as part of a Security Fabric to provide comprehensive real-time cybersecurity protection from users to applications. By deploying this solution, organizations can grow and adapt to new threats, making their network more proactive and adaptable.
Participants who attend this workshop will learn how to:
- Configure central management
- Deploy the Security Fabric
- Improve visibility and coordination across devices
- Use low-touch provisioning (LTP) to deploy remote devices
- Provide zero-day protection using sandboxing
- Integrate email protection across the network
- Use REST API and the FortiAI Security Assistant
Please note this session is offered multiple times.
With hybrid work on the rise and applications moving to the cloud and SaaS, organizations face the challenge of securing employees accessing networks and applications remotely. This has widened the attack surface, complicating network, application, and resource security.
Secure Access Service Edge (SASE) architecture converges networking and security to provide secure access and connectivity to users anywhere. However, many cloud-delivered security solutions lack enterprise-grade protection for hybrid workforces and struggle to integrate with various network and security tools for consistent security and user experience everywhere.
FortiSASE delivers both a consistent security posture and an optimal user experience for users working from anywhere. Secure your hybrid workforce by closing security gaps, plus simplify operations. AI-powered secure web gateway (SWG), zero-trust network access (ZTNA), cloud access security broker (CASB), Firewall-as-a-Service (FWaaS), and secure SD-WAN all run on one OS and can all be managed with a single console.
Participants who attend this workshop will learn how to:
- Achieve Secure Internet Access (SIA) and Secure SaaS Access (SSA) for any user using FortiSASE.
- Setup Secure Private Access (SPA) to internal resources using FortiSASE.
- Use FortiSASE Universal ZTNA.
- View FortiSASE Logs and Reports.
Please note this session is offered multiple times.
Join our global channel leaders to get the latest updates on the evolution of the Fortinet Engage Partner Program, including what's on tap for 2026 and beyond, as well as key NSE program updates. We'll spotlight the rapidly expanding SASE and Security Operations market and how Fortinet's AI-driven platform approach enables partners to monetize services, grow recurring revenue, and drive sustained growth across the customer security lifecycle.
Join Zaxby Restaurants Senior Security Analyst, Adam Price to discover how Zaxby’s lean security operations center team leverages the power of the Fortinet SOC solutions, FortiSIEM and FortiSOAR, to manage the security of over 1000 restaurants. Learn about the company’s security adoption journey over time, vendor assessments, operational insights, and the best practices that allow a small enterprise to operate a Fortune-500-class SOC.
As organizations accelerate their adoption of SaaS and cloud applications, the stability of their underlying network becomes mission-critical. Performance issues, brownouts, and latency threaten business continuity, a risk heightened by architectures dependent on centralized controllers. In this session, we’ll explore how Fortinet’s Secure SD-WAN architecture was purpose-built around a completely decentralized model—one where every device can independently self-heal and automatically self-correct during outages or degradation.
Please note this session is offered multiple times.
Securing sensitive data against theft or exposure—due to malicious insiders or untrained employees—is a complex, ongoing challenge. Join this session to explore end-to-end data security strategies across the network, endpoint, and cloud, protecting data in motion, in use, and at rest. We’ll examine effective approaches to preventing data loss and managing insider risk and share the latest insights into the behaviors and profiles that pose the greatest threats. You’ll learn how to identify what data your organization holds, where it resides, how sensitive it is, and how it’s being used or exposed—so you can secure it with confidence.
Join us for an inspiring conversation with a select group of sales and channel leaders to discuss Fortinet's commitment to our partners' success in 2026 and beyond. We'll take a closer look at the biggest growth drivers and discuss the importance of customer success. We'll wrap the session with a celebration of the winners of our partner of the year awards.
Join us for an inspiring conversation with a select group of sales and channel leaders to discuss Fortinet's commitment to our partners' success in 2026 and beyond. We'll take a closer look at the biggest growth drivers and discuss the importance of customer success. We'll wrap the session with a celebration of the winners of our partner of the year awards.
Discover how to secure the whole suite of colaboration tools - mail and beyond - being used within your organization. Collaborative working has many benefits, but tools can sometimes be seen as invisible and uncontrollable. Whether its Cloud, SEG, Hybrid or more, we show how our Secure Mail & Workspace platform solves challenges.
Please note this session is offered multiple times.
Join us for an inspiring conversation with a select group of sales and channel leaders to discuss Fortinet's commitment to our partners' success in 2026 and beyond. We'll take a closer look at the biggest growth drivers and discuss the importance of customer success. We'll wrap the session with a celebration of the winners of our partner of the year awards.
Fortinet Secure LAN converges foundational networking technology with security and services, delivering simplified operations and better outcomes. In this discussion, Benjamin Durieux, CIO of the International Red Cross will cover how the organization uses Fortinet Secure LAN to support its mission to protect and assist victims of armed conflict and promote respect for international humanitarian law around the world.
Join us for an inspiring conversation with a select group of sales and channel leaders to discuss Fortinet's commitment to our partners' success in 2026 and beyond. We'll take a closer look at the biggest growth drivers and discuss the importance of customer success. We'll wrap the session with a celebration of the winners of our partner of the year awards.
In a world where users, devices, and applications are everywhere, organizations need a unified, adaptive, and intelligent security strategy. That's where Fortinet Unified SASE comes in. Join us to learn how Fortinet uniquely converges networking and security into a single platform. AI-driven operations with FortiAI-Assist, 170+ global PoPs, data sovereignty, universal ZTNA, and comprehensive SaaS and data protection are all delivered through one OS with one agent and one management console. We’ll share real-world examples of how customers reduce costs, accelerate time-to-value, and improve user experience. Plus, get insights into why Fortinet leads with the most integrated, flexible, and intelligent unified SASE platform.
Please note this session is offered multiple times.
Join us for an inspiring conversation with a select group of sales and channel leaders to discuss Fortinet's commitment to our partners' success in 2026 and beyond. We'll take a closer look at the biggest growth drivers and discuss the importance of customer success. We'll wrap the session with a celebration of the winners of our partner of the year awards.
In this workshop, participants will learn the core principles of SAML based authentication. How to implement and use it in multiple of FortiOS features (like IPsec VPN for remote access, administrative access etc.). And how to integrate FortiAuthenticator, or other external Identity Providers.
Attendees will practice learned principles in hands-on-lab, through configurations of FortiOS as a SAML Service Provider (SP), integrations with Identity Providers (IdPs , like FortiAuthenticator).
This workshop also includes practical troubleshooting hints and techniques to analyze SAML assertions and to identify and resolve common SAML and authentication related issues.
By the end, participants will understand how to design and maintain secure and reliable SAML-based authentication setups throughout their Fortinet environment.
Workshop will break for lunch from 12:00 - 1:00 PM.
Please note this session is offered multiple times.
- Working knowledge of FortiOS and FortiAuthenticator
Free on-site certification testing at Accelerate delivers tremendous value to attendees, removing both the financial and logistical barriers that often prevent busy professionals from advancing their credentials. By offering instant, no-cost access to Fortinet NSE certification exams, you can validate your expertise, strengthen your professional standing, and accelerate your career growth, all while attending Accelerate.
The free on-site testing is open to Fortinet customers and partners. No exam registration is necessary. Limit one (1) exam. Open-seating on a first-come first-served basis.
Join James Erwin, Senior Director of Engineering Services for Lowe's Home Improvement, to hear how Lowe's IT team secured the business from the core to the edge with FortiGate network firewalls. James will discuss the business drivers that made FortiGate the right choice to protect Lowe's physical data centers, regional hubs, and store networks. Learn how a Fortune 50 company is leveraging FortiGate NGFWs for peak performance and cost reduction.
Managing a large deployment of networking and security technology often means multiple interfaces and manual operations. Not with Fortinet. FortiManager is more than a configuration tool; it's a central network management hub for the Fortinet Security Fabric. Attend this session to learn how FortiManager leverages AI to streamline the management experience and automate everyday tasks to save you time, improve network security, and maintain network uptime.
Hear from Octerrius Ware of Genuine Parts, which has over 6,000 stores worldwide, about challenges to ensure security, segmentation, performance, SLA, and reliable WAN connectivity for stores when transitioning to a Google Edge server for Kubernetes. In this session, you'll learn why Genuine Parts selected Fortinet and how Fortinet Secure SD-WAN enabled the company to easily make that transition and achieve quantifiable business benefits.
Please note this session is offered multiple times.
With organizations increasingly adopting generative and agentic AI tools, they are exposed to growing risks such as prompt injection, data loss, and compliance challenges. The fast-evolving, interconnected nature of AI models, applications, and APIs expands the overall attack surface, producing new regulatory hurdles and operational visibility gaps. This session will explore the Fortinet solutions that help secure the modern AI Data Center with enterprise grade performance, application security and delivery.
Please note this session is offered multiple times.
Security leaders face mounting challenges in managing risk and responding to threats like ransomware. Legacy vulnerability management programs generate overwhelming alert volumes, miss critical blind spots in the attack surface, and deliver poor ROI. Compounding these is the problem of tool sprawl that paralyzes security teams and slows down incident response. Join this session to explore how FortiRecon can help SOC teams reduce real-world risk and alert fatigue by prioritizing exposures using offensive validation based on an adversarial view of your organization.
This session covers unified data protection for sensitive information in use, in motion, and at rest. Attendees will learn how AI-based detection and policy-driven DLP prevent data leaks—including through AI tools—while providing end-to-end visibility across endpoints, networks, and cloud environments.
Please note this session is offered multiple times.
Take a midday break and refuel while continuing the conversations that matter. Lunch and the Tech Expo are open concurrently, giving you the flexibility to enjoy a relaxed meal and spend meaningful time with sponsors and Fortinet experts. Whether you’re following up on questions from Day 1 or discovering new solutions, this open, unhurried format makes it easy to balance learning, networking, and recharging before the afternoon sessions begin.
Take a midday break and refuel while continuing the conversations that matter. Lunch and the Tech Expo are open concurrently, giving you the flexibility to enjoy a relaxed meal and spend meaningful time with sponsors and Fortinet experts. Whether you’re following up on questions from Day 1 or discovering new solutions, this open, unhurried format makes it easy to balance learning, networking, and recharging before the afternoon sessions begin.
As enterprises evolve, new technologies emerge, and cybercriminals introduce more sophisticated attacks, security leaders and their teams face a variety of challenges in securing the organization’s networks. Security operations center (SOC) teams often struggle with the overwhelming task of investigating alerts and responding to threats, frequently needing to consolidate data from multiple tools to analyze and resolve incidents. This excessive workload impedes their ability to swiftly detect and address critical attacks. This course emphasizes the growing need for advanced security solutions, such as Fortinet’s SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) to tackle these challenges.
The course will focus on real-time threat monitoring with FortiSIEM and the automation of security workflows using FortiSOAR. These solutions are designed to reduce manual effort, lower operational costs, and strengthen overall security posture. By the end of the course, participants will be equipped with the knowledge to leverage Fortinet’s advanced security technologies to enhance visibility, mitigate cyber risks, and optimize their organization’s security operations.
Participants who attend this workshop will learn how to:
- Gain insights into the Configuration Management Database (CMDB) by exploring devices, applications, servers, configuration differences, and CMDB reports.
- Leverage out-of-the-box content including Reports, Rules, and Threat Intelligence (such as 3rd Party Malware IP Import), and utilize Custom SIGMA Rule Import to easily incorporate new security rules.
- Understand, view, and manage incidents using tools like Incident Risk View, Incident List View and Investigate Incident.
- Utilize analytics tools to execute both simple and complex queries with aggregation techniques.
- To explore various dashboard types, such as Widget, Summary, and Identity & Location dashboards, to effectively visualize and analyze data for enhanced decision-making and insights.
- To implement automated case management for SOC analyst groups and users, develop case management policies, and create automation policies to enhance workflow efficiency.
- Address the staff and skills shortage by automating routine tasks to preserve scarce expertise for critical incidents
- Combat complexity with connectors that easily integrate with deployed security controls to ingest information and provide a single, centralized point of visibility and control
- Avoid alert fatigue by aggregating security alerts in one place, enriching them with added context to speed investigation, and including playbooks to guide the triage process
Please note this session is offered multiple times.
Connections between IT and operational technology (OT) systems are no longer air gapped, introducing the potential for hackers to penetrate industrial control systems, risking the safety and availability of critical infrastructure. Security for OT requires visibility, control, and analytics to meet safety and availability requirements.
Convergence is blurring the lines between IT and OT, creating an opportunity to improve the visibility, control, and situational awareness necessary for critical systems. Failure to take the wide range of security issues into account when converging these two very different networks and networking philosophies can result in catastrophic network failures that risk critical systems and the life and well-being of workers and communities.
In this workshop, participants learn about the Fortinet Security Fabric, the first ever architectural security approach designed to dynamically adapt to unique needs of legacy OT environments while enabling the move toward modernizing these critical systems. Leveraging the Purdue Model for the security layers needed in OT, the multi-layered approach provided by the Security Fabric provides broad, integrated, and automated protection against sophisticated threats.
Participants who attend this workshop will learn how to:
- Configure internal segmentation
- Explore the FortiGate asset list, network topology, and FortiNAC visibility
- Implement FortiGate access control
- Configure virtual patching through IPS
- Configure industrial protocol visibility and security
- Implement deception using FortiDeceptor
Please note this session is offered multiple times.
Today’s networks are highly complex, with evolving threats and increasing pressure on IT and security teams to protect their organizations. Firewalls have become multifunctional security devices, but managing multiple point products without integration creates visibility and management challenges. Organizations also need fast, scalable security to protect against internet-borne threats, web-based attacks, and growing network demands.
In this workshop, participants will learn how Fortinet’s unified security approach streamlines protection across various use cases. FortiGate integrates NGFW features with specialized processors and FortiGuard Labs intelligence for high-performance security. The Fortinet Security Fabric offers centralized visibility, automated threat response, and seamless protection for cloud applications, IoT, and web traffic.
In this workshop, participants will learn how to:
- Configure basic FortiGate settings for routing, firewall policies, and security profiles
- Set up a Fortinet Security Fabric with centralized logging, visibility, and automation
- Leverage FortiGuard AI-powered security services for real-time threat detection, web filtering, application control, and malware prevention
- Segment and secure the network with ISFW, ZTNA, and ADVPN for optimized remote access and WAN usage
Please note this session is offered multiple times.
The rapid adoption of digital innovation has greatly increased the complexity and vulnerability of networks. As organizations speed up their digital transformation, they often build fragmented infrastructures across multiple locations that are harder to secure. Meanwhile, cybercriminals are launching more advanced, targeted, and quickly evolving attacks. The demand for always-on connectivity further puts pressure on security teams, making it challenging to maintain consistent protection without creating gaps. This growth of the attack surface, along with rising operational costs and dependence on manual processes, results in inefficiencies, more mistakes, and slower responses, ultimately impairing an organization’s ability to defend itself effectively and address emerging threats.
In this workshop, participants will learn how to integrate multiple Fortinet devices to provide unified security across the network, regardless of the location of network assets and users. Device integration and automation are essential as organizations undergo digital transformation to reduce complexity and enhance defenses against evolving threats.
At the heart of this solution is FortiManager, which revolutionizes network management and security operations by automating routine tasks and leveraging intelligent insights. Participants will also discover how to integrate FortiGate, FortiAnalyzer, FortiSandbox, and FortiMail as part of a Security Fabric to provide comprehensive real-time cybersecurity protection from users to applications. By deploying this solution, organizations can grow and adapt to new threats, making their network more proactive and adaptable.
Participants who attend this workshop will learn how to:
- Configure central management
- Deploy the Security Fabric
- Improve visibility and coordination across devices
- Use low-touch provisioning (LTP) to deploy remote devices
- Provide zero-day protection using sandboxing
- Integrate email protection across the network
- Use REST API and the FortiAI Security Assistant
Please note this session is offered multiple times.
With hybrid work on the rise and applications moving to the cloud and SaaS, organizations face the challenge of securing employees accessing networks and applications remotely. This has widened the attack surface, complicating network, application, and resource security.
Secure Access Service Edge (SASE) architecture converges networking and security to provide secure access and connectivity to users anywhere. However, many cloud-delivered security solutions lack enterprise-grade protection for hybrid workforces and struggle to integrate with various network and security tools for consistent security and user experience everywhere.
FortiSASE delivers both a consistent security posture and an optimal user experience for users working from anywhere. Secure your hybrid workforce by closing security gaps, plus simplify operations. AI-powered secure web gateway (SWG), zero-trust network access (ZTNA), cloud access security broker (CASB), Firewall-as-a-Service (FWaaS), and secure SD-WAN all run on one OS and can all be managed with a single console.
Participants who attend this workshop will learn how to:
- Achieve Secure Internet Access (SIA) and Secure SaaS Access (SSA) for any user using FortiSASE.
- Setup Secure Private Access (SPA) to internal resources using FortiSASE.
- Use FortiSASE Universal ZTNA.
- View FortiSASE Logs and Reports.
Please note this session is offered multiple times.
The day-to-day life of a cloud security analyst isn’t easy. Even the most experienced technically savvy pros have to keep up with increasingly sophisticated threats such as zero-day exploits, sophisticated bots, API threats, and remote scripting. Coupled with that is a never-ending barrage of alerts from countless monitoring tools, increasing the likelihood of missing true threats. With perennial understaffing, it’s a recipe for loss of control and an increased risk. Join us to understand how Fortinet simplifies application security through its unified platform approach and newly introduced enhancements like FortiAI-Assist and client-side protection. Find out how to meet compliance requriements and secure your web applications now and in the future.
In an era where hybrid work, diverse device ecosystems, and sophisticated cyber-threats place unprecedented strain on IT and security teams, a unified approach to endpoint protection and management has become essential. This session provides an overview of a modern Unified Endpoint Solution that combines secure zero trust access, next-generation endpoint protection, advanced Endpoint Detection & Response (EDR), and Data Loss Prevention (DLP). Attendees will learn how unified policies, centralized management, and integrated threat intelligence can streamline endpoint security, strengthen protection across diverse devices, and simplify IT operations and attack-surface management.
Please note this session is offered multiple times.
What will SD-WAN's role be in the next evolution of networking and security? As organizations adopt multi-cloud strategies and hybrid work models, network complexity is increasing. SD-WAN has revolutionized modern networking, and emerging technologies like SASE, GenAI, and zero trust are expanding its possibilities for the future. In this session, we’ll break down why SD-WAN is still essential and how it fits into today’s rapidly shifting IT landscape. Get actionable insights on how SD-WAN is the cornerstone of SASE and how to enhance your network’s performance and resiliency.
Please note this session is offered multiple times.
As demand for managed security services accelerates, Fortinet service provider partners are positioned to capture the next phase of growth. This session explores the business drivers behind managed security adoption and how Fortinet's broad portfolio and integrated Security Fabric enable providers to scale services, simplify operations, and deliver consistent security outcomes across global environments. Attendees will gain insight into the key success factors for building profitable, repeatable managed security offerings with Fortinet.
Learn how FortiManager platform brings together single-pane management across on-prem, cloud, LAN, WAN, Edge, SD-WAN, SASE, and ZTNA, combined with AIOps and Agentic AI to automate routine operations, improve uptime, scale performance and move NOCs from reactive towards predictive and more autonomous operations.
Please note this session is offered multiple times.
As a global leader in aftermarket parts for the mining and heavy industries, H-E Parts International protects valuable intellectual property, including CAD designs and sensitive business and customer data, from insider risk across global operations. In this session, Global VP of IT Jill Renfroe—formerly an IT executive at Colonial Pipeline—shares H-E Parts' journey which began with visibility into data, data flows, and employee interactions to then build effective controls to prevent theft and accidental loss. Attendees will leave with practical, proven insights for a visibility-first approach to data security.
As organizations expand across cloud, on-premises, and edge environments, traditional perimeter-centric security models are no longer sufficient. This session explores how FortiOS 8.0.0 introduces a new era of AI-driven threat defence designed to secure today's distributed and dynamic attack surface. Attendees will gain insights into the latest advancements in Fortinet’s security architecture, including enhanced AI-powered detection and the powerful new hardware platforms that extend protection beyond the perimeter.
Please note this session is offered multiple times.
Build Unified-LAN integrated with Fortinet’s Security Fabric providing single point of management, extending Security to edge of the wired and wireless network. We will discuss latest on Switches and Access-points, FortiLink technology, Fabric integrated access control. Last but not the least, learn how recent additions on FortiAIOps continue to provide meaningful and actionable AI-driven insights into entire network.
Please note this session is offered multiple times.
Securing modern applications is not a one-time event but a continuous journey that begins at the first line of code. From development through deployment across hybrid and multi-cloud environments, every stage introduces new risks. The challenge has intensified with AI-assisted coding, which accelerates development but also increases exposure of sensitive data in the cloud. Organizations need new strategies to gain visibility, reduce risk, and proactively protect everything from DevOps pipelines to SecOps. In this session, we will explore and demonstrate how to secure cloud-native applications and workloads in an AI-driven future.
Over the past decade, technological modernization has driven global growth and challenges in enterprise IT, extending into OT networks. Today, such transformation is touching industrial sectors across the world, including oil and gas. Join Blake Gilson, Industrial Cybersecurity Manager at ExxonMobil, for an intimate look at how his team plans, executes, and operates changes on a massive scale. Blake will not only explore his Fortinet setup, but the entire technology ecosystem and future innovations.
Securing a global healthcare environment requires more than just protecting cloud access: It demands consistency, flexibility, and operational simplicity. Join Bruno Gomes of Convatec to learn how he addressed rising SSE costs, infrastructure team relocation, and the challenge of enforcing uniform security policies across on-premises and remote users with a lean IT team. Find out about initial challenges and why Convatec selected Fortinet Unified SASE, how seamless integration with existing SD-WAN and global PoP coverage accelerated deployment, and what mattered most during the POC. The session will highlight practical lessons learned, real cost savings, and how Convatec simplified security operations while strengthening protection across all its sites across the globe.
Maintaining security operations is resource and operationally intensive. This session highlights how organizations achieve always-on protection through FortiGuard SOC-as-a-Service offering threat monitoring, incident handling, and response to defend critical environments continuously. Attend this session to hear from your peers how Fortinet is making 24/7 security operations accessible to organizations of any size, enabling teams to shift from operational overload to proactive protection, gaining speed, clarity, and predictable outcomes without increasing internal complexity.
Learn how Fortinet works with partners to align managed security service offerings to their business models and go-to-market strategies. This session highlights Fortinet's proven approach to helping partners build scalable, differentiated services designed to capture market share. See how Fortinet's partner programs, including offer development, support a clear path to portfolio maturity. Real-world case studies illustrate how this collaboration enables efficient service delivery, recurring revenue growth, and long-term customer value.
Discover how Fortinet uses AI to enhance visibility, detect threats, and protect OT environments without adding operational complexity. This session explores how AI-driven insights help identify assets, spot abnormal behaviour, and reduce risk across OT environments.
Please note this session is offered multiple times.
Join us for an inspiring conversation with a select group of sales and channel leaders to discuss Fortinet's commitment to our partners' success in 2026 and beyond. We'll take a closer look at the biggest growth drivers and discuss the importance of customer success. We'll wrap the session with a celebration of the winners of our partner of the year awards.
Join us for an inspiring conversation with a select group of sales and channel leaders to discuss Fortinet's commitment to our partners' success in 2026 and beyond. We'll take a closer look at the biggest growth drivers and discuss the importance of customer success. We'll wrap the session with a celebration of the winners of our partner of the year awards.
The wired and wireless network is often the largest attack surface in any business. Fortinet Secure LAN converges foundational networking technology with security and services, delivering simplified operations and better business outcomes. Find out how our customers are using Fortinet switches and access points and why they chose Fortinet in a very crowded market.
Please note this session is offered multiple times.
What will SD-WAN's role be in the next evolution of networking and security? As organizations adopt multi-cloud strategies and hybrid work models, network complexity is increasing. SD-WAN has revolutionized modern networking, and emerging technologies like SASE, GenAI, and zero trust are expanding its possibilities for the future. In this session, we’ll break down why SD-WAN is still essential and how it fits into today’s rapidly shifting IT landscape. Get actionable insights on how SD-WAN is the cornerstone of SASE and how to enhance your network’s performance and resiliency.
Please note this session is offered multiple times.
Join us for an inspiring conversation with a select group of sales and channel leaders to discuss Fortinet's commitment to our partners' success in 2026 and beyond. We'll take a closer look at the biggest growth drivers and discuss the importance of customer success. We'll wrap the session with a celebration of the winners of our partner of the year awards.
See first-hand how your Enterprise IT team can deploy FortiSASE and ZTNA like a pro! Witness the power of FortiSASE as we seamlessly secure a hybrid workforce while providing lightning-fast connectivity to business-critical applications. Plus, you’ll see how FortiAI-assisted Digital Experience Monitoring can be used to diagnose and solve SaaS application performance issues.
Please note this session is offered multiple times.
Learn how the FortiSOC platform unifies Agentic AI, Analyzer, SIEM, SOAR and TIP with SOCaaS best practices into a single platform to reshape the future of SOC, where AI agents work across workflows to accelerate decisions and move SOCs toward a more autonomous, intelligent, and resilient operation.
Please note this session is offered multiple times.
Wrap up the day with one more opportunity to connect at Happy Hour in the Tech Expo. Enjoy food, drinks, and high-energy conversations as you spend time with Fortinet experts and sponsors, revisit key solutions, and continue discussions sparked earlier in the conference. With a more casual atmosphere and plenty of time to engage, this is your chance to go deeper, get clarity, and make the most of your Accelerate experience.
A great way to end the evening—and keep the momentum going.
Start your final day at Accelerate with purpose—and power. Join us for a special networking breakfast recognizing International Women’s Day, where women and men come together to connect and hear what Lead Fearlessly. Keynote speaker Hayley Van Loon, CEO of Crime Stoppers International, will share actionable ways you can make a meaningful impact through your leadership. This is a can’t-miss opportunity to close out Accelerate inspired, energized, and ready to lead. Seating is limited.
Power up for the final day of Accelerate with a hearty breakfast buffet and plenty of coffee to get you going. Enjoy a great meal, reflect on key takeaways, and connect with peers before wrapping up an impactful conference experience.
Finish strong and make the most of your final day at Accelerate.
As enterprises evolve, new technologies emerge, and cybercriminals introduce more sophisticated attacks, security leaders and their teams face a variety of challenges in securing the organization’s networks. Security operations center (SOC) teams often struggle with the overwhelming task of investigating alerts and responding to threats, frequently needing to consolidate data from multiple tools to analyze and resolve incidents. This excessive workload impedes their ability to swiftly detect and address critical attacks. This course emphasizes the growing need for advanced security solutions, such as Fortinet’s SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) to tackle these challenges.
The course will focus on real-time threat monitoring with FortiSIEM and the automation of security workflows using FortiSOAR. These solutions are designed to reduce manual effort, lower operational costs, and strengthen overall security posture. By the end of the course, participants will be equipped with the knowledge to leverage Fortinet’s advanced security technologies to enhance visibility, mitigate cyber risks, and optimize their organization’s security operations.
Participants who attend this workshop will learn how to:
- Gain insights into the Configuration Management Database (CMDB) by exploring devices, applications, servers, configuration differences, and CMDB reports.
- Leverage out-of-the-box content including Reports, Rules, and Threat Intelligence (such as 3rd Party Malware IP Import), and utilize Custom SIGMA Rule Import to easily incorporate new security rules.
- Understand, view, and manage incidents using tools like Incident Risk View, Incident List View and Investigate Incident.
- Utilize analytics tools to execute both simple and complex queries with aggregation techniques.
- To explore various dashboard types, such as Widget, Summary, and Identity & Location dashboards, to effectively visualize and analyze data for enhanced decision-making and insights.
- To implement automated case management for SOC analyst groups and users, develop case management policies, and create automation policies to enhance workflow efficiency.
- Address the staff and skills shortage by automating routine tasks to preserve scarce expertise for critical incidents
- Combat complexity with connectors that easily integrate with deployed security controls to ingest information and provide a single, centralized point of visibility and control
- Avoid alert fatigue by aggregating security alerts in one place, enriching them with added context to speed investigation, and including playbooks to guide the triage process
Please note this session is offered multiple times.
Connections between IT and operational technology (OT) systems are no longer air gapped, introducing the potential for hackers to penetrate industrial control systems, risking the safety and availability of critical infrastructure. Security for OT requires visibility, control, and analytics to meet safety and availability requirements.
Convergence is blurring the lines between IT and OT, creating an opportunity to improve the visibility, control, and situational awareness necessary for critical systems. Failure to take the wide range of security issues into account when converging these two very different networks and networking philosophies can result in catastrophic network failures that risk critical systems and the life and well-being of workers and communities.
In this workshop, participants learn about the Fortinet Security Fabric, the first ever architectural security approach designed to dynamically adapt to unique needs of legacy OT environments while enabling the move toward modernizing these critical systems. Leveraging the Purdue Model for the security layers needed in OT, the multi-layered approach provided by the Security Fabric provides broad, integrated, and automated protection against sophisticated threats.
Participants who attend this workshop will learn how to:
- Configure internal segmentation
- Explore the FortiGate asset list, network topology, and FortiNAC visibility
- Implement FortiGate access control
- Configure virtual patching through IPS
- Configure industrial protocol visibility and security
- Implement deception using FortiDeceptor
Please note this session is offered multiple times.
Today’s networks are highly complex, with evolving threats and increasing pressure on IT and security teams to protect their organizations. Firewalls have become multifunctional security devices, but managing multiple point products without integration creates visibility and management challenges. Organizations also need fast, scalable security to protect against internet-borne threats, web-based attacks, and growing network demands.
In this workshop, participants will learn how Fortinet’s unified security approach streamlines protection across various use cases. FortiGate integrates NGFW features with specialized processors and FortiGuard Labs intelligence for high-performance security. The Fortinet Security Fabric offers centralized visibility, automated threat response, and seamless protection for cloud applications, IoT, and web traffic.
In this workshop, participants will learn how to:
- Configure basic FortiGate settings for routing, firewall policies, and security profiles
- Set up a Fortinet Security Fabric with centralized logging, visibility, and automation
- Leverage FortiGuard AI-powered security services for real-time threat detection, web filtering, application control, and malware prevention
- Segment and secure the network with ISFW, ZTNA, and ADVPN for optimized remote access and WAN usage
Please note this session is offered multiple times.
The rapid adoption of digital innovation has greatly increased the complexity and vulnerability of networks. As organizations speed up their digital transformation, they often build fragmented infrastructures across multiple locations that are harder to secure. Meanwhile, cybercriminals are launching more advanced, targeted, and quickly evolving attacks. The demand for always-on connectivity further puts pressure on security teams, making it challenging to maintain consistent protection without creating gaps. This growth of the attack surface, along with rising operational costs and dependence on manual processes, results in inefficiencies, more mistakes, and slower responses, ultimately impairing an organization’s ability to defend itself effectively and address emerging threats.
In this workshop, participants will learn how to integrate multiple Fortinet devices to provide unified security across the network, regardless of the location of network assets and users. Device integration and automation are essential as organizations undergo digital transformation to reduce complexity and enhance defenses against evolving threats.
At the heart of this solution is FortiManager, which revolutionizes network management and security operations by automating routine tasks and leveraging intelligent insights. Participants will also discover how to integrate FortiGate, FortiAnalyzer, FortiSandbox, and FortiMail as part of a Security Fabric to provide comprehensive real-time cybersecurity protection from users to applications. By deploying this solution, organizations can grow and adapt to new threats, making their network more proactive and adaptable.
Participants who attend this workshop will learn how to:
- Configure central management
- Deploy the Security Fabric
- Improve visibility and coordination across devices
- Use low-touch provisioning (LTP) to deploy remote devices
- Provide zero-day protection using sandboxing
- Integrate email protection across the network
- Use REST API and the FortiAI Security Assistant
Please note this session is offered multiple times.
With hybrid work on the rise and applications moving to the cloud and SaaS, organizations face the challenge of securing employees accessing networks and applications remotely. This has widened the attack surface, complicating network, application, and resource security.
Secure Access Service Edge (SASE) architecture converges networking and security to provide secure access and connectivity to users anywhere. However, many cloud-delivered security solutions lack enterprise-grade protection for hybrid workforces and struggle to integrate with various network and security tools for consistent security and user experience everywhere.
FortiSASE delivers both a consistent security posture and an optimal user experience for users working from anywhere. Secure your hybrid workforce by closing security gaps, plus simplify operations. AI-powered secure web gateway (SWG), zero-trust network access (ZTNA), cloud access security broker (CASB), Firewall-as-a-Service (FWaaS), and secure SD-WAN all run on one OS and can all be managed with a single console.
Participants who attend this workshop will learn how to:
- Achieve Secure Internet Access (SIA) and Secure SaaS Access (SSA) for any user using FortiSASE.
- Setup Secure Private Access (SPA) to internal resources using FortiSASE.
- Use FortiSASE Universal ZTNA.
- View FortiSASE Logs and Reports.
Please note this session is offered multiple times.
Turn Fortinet install base into net-new and recurring revenue—fast. In this interactive session, Ingram Micro and Fortinet will unpack proven, ready-to-run GTM plays (EOS/EOL trade up and SASE + SD WAN land/expand) and show how Ingram Micro’s capabilities such as Customer Success program, Services, Eyesight (Cyber Posture) assessments, and Training plug in to accelerate execution. Walk out with a 90-day action plan, partner ready outreach sequences, and “request my Install Base” CTAs to get install base reports, Eyesight assessments, and a playbook to start pipeline this week.
OT and cyber-physical systems (CPS) security are emerging as strategic growth areas driven by regulation, industrial digitalization, and physical risk. This session examines market demand, regulatory drivers, and how OT threat models differ from IT environments. Learn how Fortinet's OT-aware Security Fabric and industrial-grade technologies help partners build differentiated practices, scale managed OT security services, and deliver measurable outcomes for asset owners.
AI and quantum computing are changing everything, and cybersecurity is no different. To stay ahead of threats and trends, we continally update FortiOS and our custom-built silicon chips to ensure that the FortiGate network firewall offers the latest innovations built for the future of security. Find out how our ASICs ensure the highest performance, and AI-powered security services protect from even the newest, most sophisticated threats. Learn why FortiOS is future-ready with post-quantum cryptography, and how SASE capabilities are tied to the firewall to support the next generation of security architectures. Join this session to hear all the details about how Fortinet is changing the network firewall landscape.
Please note this session is offered multiple times.
Visibility is important. But what you do with it is more critical and actually determines your security posture. Data and vulnerability information can be rendered useless if it is stuck in a workflow or waiting to be prioritized for mitigation. Join us as we discuss OT device risk and mitigation strategies, including automated actions. More importantly, we'll demonstrate how to take rich visibility "detection" information and make it "actionable" to quickly, efficiently, and thoroughly mitigate OT device risk.
Modern gaming platforms operate at massive scale—dozens of studios, multiple game development teams, multiple cloud environments and a mix of legacy and cloud‑native workloads. For Microsoft Gaming, rapid growth through acquisitions created a familiar challenge: fragmented controls, inconsistent compliance, rising costs, and limited visibility across complex multi‑cloud environments.
In this session, Microsoft Gaming shares how it uses FortiCNAPP to secure cloud workloads across its diverse AWS footprint. FortiCNAPP's unified visibility, agentless scanning, anomaly detection, and baseline‑driven policies helped Microsoft Gaming consolidate signals, strengthen posture, and improve operational efficiency across independent studios.
Learn how Microsoft Gaming scales security without slowing development, aligns controls to studio‑specific requirements, and operationalizes compliance across teams. This is a practical, customer-led walkthrough of how cloud‑native security tooling supports innovation, resilience, and growth at gaming scale.
This session covers unified data protection for sensitive information in use, in motion, and at rest. Attendees will learn how AI-based detection and policy-driven DLP prevent data leaks—including through AI tools—while providing end-to-end visibility across endpoints, networks, and cloud environments.
Please note this session is offered multiple times.
Attack surface is not static. It is ever growing in terms of scale and complexity. We continue to see new devices -xOTs, applications coming on the network in all verticals. Join to us to learn Fortinet solutions and FortiGuard services for device discovery, vulnerability detection, granular network access control enabling zero-trust paradigm and deep visibility into devices and users coming on board your network. Provide best user experience to users – internal and external as well as xOT devices while keeping your network secure.
Please note this session is offered multiple times.
In this workshop, participants will learn the core principles of SAML based authentication. How to implement and use it in multiple of FortiOS features (like IPsec VPN for remote access, administrative access etc.). And how to integrate FortiAuthenticator, or other external Identity Providers.
Attendees will practice learned principles in hands-on-lab, through configurations of FortiOS as a SAML Service Provider (SP), integrations with Identity Providers (IdPs , like FortiAuthenticator).
This workshop also includes practical troubleshooting hints and techniques to analyze SAML assertions and to identify and resolve common SAML and authentication related issues.
By the end, participants will understand how to design and maintain secure and reliable SAML-based authentication setups throughout their Fortinet environment.
Workshop will break for lunch from 12:00 - 1:00 PM.
Please note this session is offered multiple times.
- Working knowledge of FortiOS and FortiAuthenticator
Free on-site certification testing at Accelerate delivers tremendous value to attendees, removing both the financial and logistical barriers that often prevent busy professionals from advancing their credentials. By offering instant, no-cost access to Fortinet NSE certification exams, you can validate your expertise, strengthen your professional standing, and accelerate your career growth, all while attending Accelerate.
The free on-site testing is open to Fortinet customers and partners. No exam registration is necessary. Limit one (1) exam. Open-seating on a first-come first-served basis.
Make the most of your final opportunity to connect during Tech Expo and Lunch. Enjoy a relaxed meal while getting last-minute answers from Fortinet experts, revisiting solutions you’re considering, or meeting with sponsors before the conference wraps up. With no rush and no competing sessions, this is the perfect time to close the loop on conversations and leave Accelerate with clarity, confidence, and next steps.
Make the most of your final opportunity to connect during Tech Expo and Lunch. Enjoy a relaxed meal while getting last-minute answers from Fortinet experts, revisiting solutions you’re considering, or meeting with sponsors before the conference wraps up. With no rush and no competing sessions, this is the perfect time to close the loop on conversations and leave Accelerate with clarity, confidence, and next steps.
As enterprises evolve, new technologies emerge, and cybercriminals introduce more sophisticated attacks, security leaders and their teams face a variety of challenges in securing the organization’s networks. Security operations center (SOC) teams often struggle with the overwhelming task of investigating alerts and responding to threats, frequently needing to consolidate data from multiple tools to analyze and resolve incidents. This excessive workload impedes their ability to swiftly detect and address critical attacks. This course emphasizes the growing need for advanced security solutions, such as Fortinet’s SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) to tackle these challenges.
The course will focus on real-time threat monitoring with FortiSIEM and the automation of security workflows using FortiSOAR. These solutions are designed to reduce manual effort, lower operational costs, and strengthen overall security posture. By the end of the course, participants will be equipped with the knowledge to leverage Fortinet’s advanced security technologies to enhance visibility, mitigate cyber risks, and optimize their organization’s security operations.
Participants who attend this workshop will learn how to:
- Gain insights into the Configuration Management Database (CMDB) by exploring devices, applications, servers, configuration differences, and CMDB reports.
- Leverage out-of-the-box content including Reports, Rules, and Threat Intelligence (such as 3rd Party Malware IP Import), and utilize Custom SIGMA Rule Import to easily incorporate new security rules.
- Understand, view, and manage incidents using tools like Incident Risk View, Incident List View and Investigate Incident.
- Utilize analytics tools to execute both simple and complex queries with aggregation techniques.
- To explore various dashboard types, such as Widget, Summary, and Identity & Location dashboards, to effectively visualize and analyze data for enhanced decision-making and insights.
- To implement automated case management for SOC analyst groups and users, develop case management policies, and create automation policies to enhance workflow efficiency.
- Address the staff and skills shortage by automating routine tasks to preserve scarce expertise for critical incidents
- Combat complexity with connectors that easily integrate with deployed security controls to ingest information and provide a single, centralized point of visibility and control
- Avoid alert fatigue by aggregating security alerts in one place, enriching them with added context to speed investigation, and including playbooks to guide the triage process
Please note this session is offered multiple times.
Connections between IT and operational technology (OT) systems are no longer air gapped, introducing the potential for hackers to penetrate industrial control systems, risking the safety and availability of critical infrastructure. Security for OT requires visibility, control, and analytics to meet safety and availability requirements.
Convergence is blurring the lines between IT and OT, creating an opportunity to improve the visibility, control, and situational awareness necessary for critical systems. Failure to take the wide range of security issues into account when converging these two very different networks and networking philosophies can result in catastrophic network failures that risk critical systems and the life and well-being of workers and communities.
In this workshop, participants learn about the Fortinet Security Fabric, the first ever architectural security approach designed to dynamically adapt to unique needs of legacy OT environments while enabling the move toward modernizing these critical systems. Leveraging the Purdue Model for the security layers needed in OT, the multi-layered approach provided by the Security Fabric provides broad, integrated, and automated protection against sophisticated threats.
Participants who attend this workshop will learn how to:
- Configure internal segmentation
- Explore the FortiGate asset list, network topology, and FortiNAC visibility
- Implement FortiGate access control
- Configure virtual patching through IPS
- Configure industrial protocol visibility and security
- Implement deception using FortiDeceptor
Please note this session is offered multiple times.
Today’s networks are highly complex, with evolving threats and increasing pressure on IT and security teams to protect their organizations. Firewalls have become multifunctional security devices, but managing multiple point products without integration creates visibility and management challenges. Organizations also need fast, scalable security to protect against internet-borne threats, web-based attacks, and growing network demands.
In this workshop, participants will learn how Fortinet’s unified security approach streamlines protection across various use cases. FortiGate integrates NGFW features with specialized processors and FortiGuard Labs intelligence for high-performance security. The Fortinet Security Fabric offers centralized visibility, automated threat response, and seamless protection for cloud applications, IoT, and web traffic.
In this workshop, participants will learn how to:
- Configure basic FortiGate settings for routing, firewall policies, and security profiles
- Set up a Fortinet Security Fabric with centralized logging, visibility, and automation
- Leverage FortiGuard AI-powered security services for real-time threat detection, web filtering, application control, and malware prevention
- Segment and secure the network with ISFW, ZTNA, and ADVPN for optimized remote access and WAN usage
Please note this session is offered multiple times.
The rapid adoption of digital innovation has greatly increased the complexity and vulnerability of networks. As organizations speed up their digital transformation, they often build fragmented infrastructures across multiple locations that are harder to secure. Meanwhile, cybercriminals are launching more advanced, targeted, and quickly evolving attacks. The demand for always-on connectivity further puts pressure on security teams, making it challenging to maintain consistent protection without creating gaps. This growth of the attack surface, along with rising operational costs and dependence on manual processes, results in inefficiencies, more mistakes, and slower responses, ultimately impairing an organization’s ability to defend itself effectively and address emerging threats.
In this workshop, participants will learn how to integrate multiple Fortinet devices to provide unified security across the network, regardless of the location of network assets and users. Device integration and automation are essential as organizations undergo digital transformation to reduce complexity and enhance defenses against evolving threats.
At the heart of this solution is FortiManager, which revolutionizes network management and security operations by automating routine tasks and leveraging intelligent insights. Participants will also discover how to integrate FortiGate, FortiAnalyzer, FortiSandbox, and FortiMail as part of a Security Fabric to provide comprehensive real-time cybersecurity protection from users to applications. By deploying this solution, organizations can grow and adapt to new threats, making their network more proactive and adaptable.
Participants who attend this workshop will learn how to:
- Configure central management
- Deploy the Security Fabric
- Improve visibility and coordination across devices
- Use low-touch provisioning (LTP) to deploy remote devices
- Provide zero-day protection using sandboxing
- Integrate email protection across the network
- Use REST API and the FortiAI Security Assistant
Please note this session is offered multiple times.
With hybrid work on the rise and applications moving to the cloud and SaaS, organizations face the challenge of securing employees accessing networks and applications remotely. This has widened the attack surface, complicating network, application, and resource security.
Secure Access Service Edge (SASE) architecture converges networking and security to provide secure access and connectivity to users anywhere. However, many cloud-delivered security solutions lack enterprise-grade protection for hybrid workforces and struggle to integrate with various network and security tools for consistent security and user experience everywhere.
FortiSASE delivers both a consistent security posture and an optimal user experience for users working from anywhere. Secure your hybrid workforce by closing security gaps, plus simplify operations. AI-powered secure web gateway (SWG), zero-trust network access (ZTNA), cloud access security broker (CASB), Firewall-as-a-Service (FWaaS), and secure SD-WAN all run on one OS and can all be managed with a single console.
Participants who attend this workshop will learn how to:
- Achieve Secure Internet Access (SIA) and Secure SaaS Access (SSA) for any user using FortiSASE.
- Setup Secure Private Access (SPA) to internal resources using FortiSASE.
- Use FortiSASE Universal ZTNA.
- View FortiSASE Logs and Reports.
Please note this session is offered multiple times.
Build Unified-LAN integrated with Fortinet’s Security Fabric providing single point of management, extending Security to edge of the wired and wireless network. We will discuss latest on Switches and Access-points, FortiLink technology, Fabric integrated access control. Last but not the least, learn how recent additions on FortiAIOps continue to provide meaningful and actionable AI-driven insights into entire network.
Please note this session is offered multiple times.
With organizations increasingly adopting generative and agentic AI tools, they are exposed to growing risks such as prompt injection, data loss, and compliance challenges. The fast-evolving, interconnected nature of AI models, applications, and APIs expands the overall attack surface, producing new regulatory hurdles and operational visibility gaps. This session will explore the Fortinet solutions that help secure the modern AI Data Center with enterprise grade performance, application security and delivery.
Please note this session is offered multiple times.
As organizations expand across cloud, on-premises, and edge environments, traditional perimeter-centric security models are no longer sufficient. This session explores how FortiOS 8.0.0 introduces a new era of AI-driven threat defence designed to secure today's distributed and dynamic attack surface. Attendees will gain insights into the latest advancements in Fortinet’s security architecture, including enhanced AI-powered detection and the powerful new hardware platforms that extend protection beyond the perimeter.
Please note this session is offered multiple times.
As organizations accelerate their adoption of SaaS and cloud applications, the stability of their underlying network becomes mission-critical. Performance issues, brownouts, and latency threaten business continuity, a risk heightened by architectures dependent on centralized controllers. In this session, we’ll explore how Fortinet’s Secure SD-WAN architecture was purpose-built around a completely decentralized model—one where every device can independently self-heal and automatically self-correct during outages or degradation.
Please note this session is offered multiple times.
Discover how to secure the whole suite of colaboration tools - mail and beyond - being used within your organization. Collaborative working has many benefits, but tools can sometimes be seen as invisible and uncontrollable. Whether its Cloud, SEG, Hybrid or more, we show how our Secure Mail & Workspace platform solves challenges.
Please note this session is offered multiple times.
In a world where users, devices, and applications are everywhere, organizations need a unified, adaptive, and intelligent security strategy. That's where Fortinet Unified SASE comes in. Join us to learn how Fortinet uniquely converges networking and security into a single platform. AI-driven operations with FortiAI-Assist, 170+ global PoPs, data sovereignty, universal ZTNA, and comprehensive SaaS and data protection are all delivered through one OS with one agent and one management console. We’ll share real-world examples of how customers reduce costs, accelerate time-to-value, and improve user experience. Plus, get insights into why Fortinet leads with the most integrated, flexible, and intelligent unified SASE platform.
Please note this session is offered multiple times.
Discover how Fortinet uses AI to enhance visibility, detect threats, and protect OT environments without adding operational complexity. This session explores how AI-driven insights help identify assets, spot abnormal behaviour, and reduce risk across OT environments.
Please note this session is offered multiple times.
See first-hand how your Enterprise IT team can deploy FortiSASE and ZTNA like a pro! Witness the power of FortiSASE as we seamlessly secure a hybrid workforce while providing lightning-fast connectivity to business-critical applications. Plus, you’ll see how FortiAI-assisted Digital Experience Monitoring can be used to diagnose and solve SaaS application performance issues.
Please note this session is offered multiple times.
Learn how the FortiSOC platform unifies Agentic AI, Analyzer, SIEM, SOAR and TIP with SOCaaS best practices into a single platform to reshape the future of SOC, where AI agents work across workflows to accelerate decisions and move SOCs toward a more autonomous, intelligent, and resilient operation.
Please note this session is offered multiple times.
Learn how FortiManager platform brings together single-pane management across on-prem, cloud, LAN, WAN, Edge, SD-WAN, SASE, and ZTNA, combined with AIOps and Agentic AI to automate routine operations, improve uptime, scale performance and move NOCs from reactive towards predictive and more autonomous operations.
Please note this session is offered multiple times.