Hi [[ session.user.profile.firstName ]]

Fortinet EMEA

  • Date
  • Rating
  • Views
  • A Deep Dive into the WannaCryThreat
    A Deep Dive into the WannaCryThreat Alex Harvey, Director TME CyberSecurity, Fortinet Recorded: May 22 2017 31 mins
    WannaCry has made a statement, impacting more than 300,000 victims across more than 150 countries.

    Join us to learn how threats like ransomware can become so widespread so quickly, the impact that not being prepared and protected can have on your business, and how to ensure you are well positioned to avoid the IT chaos future threats may pose.
  • Using Authentication and Identity Management to Secure a Financial Network
    Using Authentication and Identity Management to Secure a Financial Network Patrick Grillo, Senior Director, Security Solutions, Fortinet Recorded: May 9 2017 32 mins
    Using Authentication and Identity Management to Secure a Financial Network:
    The Door is Still Open and the Horse is Almost out of the Barn

    Carbanak. JP Morgan/Chase. Dyre Wolf. Bank of America. Bangladesh. Tesco Bank. This roll call should be proof enough of the attractiveness of the FSI to the hacker/cyber criminal community. While not all of them can be associated with Authentication and Identity Management issues, it’s undeniable that they have played a prominent role.

    An increased focus on authentication and identity management is a right step forward but just confirming a user’s identify is only half the task. With the concept of Zero Trust gaining momentum, authentication and identification must be reinforced by the network itself through policy based access and segmentation.

    This session will look back at some of the data breaches that have been attributed to weak authentication methods and how they might have been prevented. At the same time, the concept of internal network segmentation will be presented to show how both halves of the equation need to be brought together to effectively close off this common attack vector.
  • Faster, Wider and Stronger Cyber Security with SIEM
    Faster, Wider and Stronger Cyber Security with SIEM Dan Hanman, Consulting Systems Engineer SIEM Recorded: Mar 29 2017 45 mins
    Locks, barriers and traps will eventually be broken and overcome. The enterprise security infrastructure must continuously evolve in order to continue to protect the enterprise’s assets and provide mitigation in case of a breach.

    Security operations tools can play a critical role in maintaining the enterprise security posture through internal and external evolution.

    During this presentation, we will explore the role of SIEM as an enabler and how FortiSIEM can be a catalyst for a more efficient, effective and complete cybersecurity infrastructure.
  • Securing the Migration to Industry 4.0
    Securing the Migration to Industry 4.0 Ronen Shpirer, Security Solutions Architect, Fortinet Recorded: Mar 15 2017 49 mins
    Digital Transformation, alongside European and country specific initiatives, liberalisation and competitive pressures, is transforming utilities, factories and critical infrastructure and their Operational Technology.

    With emphasis on Cyber Physical Systems, design-Customer-Supply chain collaboration, mobility and the cloud as the core enablers of his transformation, OT security must evolve to meet today’s cyber security challenges.

    This session will provide a high level view of these changes, the security challenges they present, and the security solutions which must be put in place to ensure a secured industrial transformation.
  • Securing The Multi-Dimensional Cloud
    Securing The Multi-Dimensional Cloud Ronen Shpirer, Security Solutions Architect, Fortinet Recorded: Feb 22 2017 44 mins
    Software is eating the world – driving digital transformation and changing the way businesses do business. Cloud is a core enabler in every enterprise’s digital transformation voyage - facilitating innovation, agility and cost efficiency.

    But harnessing the power of the cloud creates a multi-dimensional environment where applications, data and information are borderless and yet, regardless of their changing location and existence, must be protected and secured as part of the enterprise overall security strategy and posture.

    This session will provide an overview of the unique security challenges in a multi-dimensional cloud environment, and the solution framework required for empowering and securing digital transformation.
  • It’s My Life but I no Longer Have Control Over it!
    It’s My Life but I no Longer Have Control Over it! Simon Bryden, Consulting Systems Engineer Recorded: Dec 7 2016 45 mins
    We all know that technology plays a role in our everyday life but do you know the extent of that role? Advertising tells us to spend more and more of our life online and embrace technology in our homes, cars and everywhere else a microchip can be placed.

    But nowhere is there a message about the consequences of the misuse of that technology. 2016 has seen a rise in the number of incidents involving ransomware, IoT, and simply well intentioned connectivity gone wrong. That momentum is set to continue into 2017 and beyond.

    Although past performance does not guarantee future results, this session will focus on what we have seen this year and what we expect to see in the near future.
  • One Firewall to Rule them All!
    One Firewall to Rule them All! Patrick Grillo, Senior Director, Security Solutions, Fortinet Recorded: Nov 8 2016 27 mins
    The firewall wars have caused nothing but confusion in the market. Lines have been drawn between UTM and NGFW; are they different or are they the same thing? Unfortunately that confusion has led to introducing complexity and vulnerability in enterprise networks. There is a better way. Rather than fighting through a sea of acronyms, focus on what’s really important - How can I simplify my security infrastructure and improve my ability to fight off advanced attacks, no matter where they occur in the network?

    This session will present a new way of thinking about firewalls, one without the confusion, acronyms and complexity.
  • Stop Taking a Reactive Approach to Network Security
    Stop Taking a Reactive Approach to Network Security Patrick Grillo, Senior Director, Security Solutions, Fortinet Recorded: Oct 11 2016 42 mins
    Preparation and advance planning are key words for a number of activities but when it comes to securing a network, it seems that being reactive is more the norm.

    This session will focus on the consequences of not taking a proactive approach: dealing with the consequences of past decisions while trying to respond to the challenges of today.
  • Scaling & Segmenting the Agile Data Center with Software Defined Security
    Scaling & Segmenting the Agile Data Center with Software Defined Security Ronen Shpirer, Security Solutions, Fortinet Recorded: Sep 21 2016 43 mins
    Data center transformation with server and network virtualization are leading to agile IT environments that accelerate business initiatives and deliver more responsive applications.

    How can security itself be made more elastic and agile in Software-Defined Data Centers?

    A vision for Software-Defined Security is introduced, and a three-part framework will outline how network security is evolving across all layers of the network architecture, from the data plane to the control plane to the management plane.
  • Secure Unified Access Layer – Creating Universal Solutions
    Secure Unified Access Layer – Creating Universal Solutions Ben Wilson, Senior Director, Product Management, Fortinet Recorded: Jun 23 2016 36 mins
    During the past 15 years, access layer solutions have evolved, especially in terms wireless connectivity.

    Today's wireless connectivity has multiple approaches, each better meeting the specific requirements of organisations through a choice of different architectures. Whether its a refresh, redeployment, change of application or a brand new site, there are a lot of options.

    During this webinar we’ll examine different approaches and how to apply them to different verticals or deployment scenarios. As wireless connectivity continues to evolve, we will also look to the future and see how trends in new hardware can provide cutting edge solutions to meet the potential needs of tomorrow's organisations.

    The presentation will end with an overview of Fortinet's Secure Access Architecture and how it can meet today's and tomorrow's wireless requirements.

Embed in website or blog