Hi [[ session.user.profile.firstName ]]

Fortinet EMEA

  • Date
  • Rating
  • Views
  • Three Revelations from the new Fortinet Threat Landscape Report
    Three Revelations from the new Fortinet Threat Landscape Report Douglas Jose Pereira dos Santos, Security Strategist, FortiGuard Labs Recorded: Jul 20 2017 38 mins
    Come on a guided tour of the newest Fortinet Threat Landscape Report findings with our expert, Douglas Santos from FortiGuard Labs.

    Take a deep dive into trends such as questionable applications and botnets, exploit activity and when cybercriminals are most active. We'll discuss the correlation between infrastructure and infestation, detail exploit and ransomworm activity, and give recommendations on how to best prepare for the next attack.
  • The FortiGuard Q1 2017 Threat Landscape Report - Critical Findings
    The FortiGuard Q1 2017 Threat Landscape Report - Critical Findings Derek Manky, Global Security Strategist, FortiGuard Recorded: Jun 28 2017 24 mins
    In this webcast, Derek Manky, Global Security Strategist, highlights the main findings from the FortiGuard Threat Landscape Report and discusses their implication for Enterprise Security Leaders.

    This report identifies the threats and trends IT security professionals, from CISO to Security Operations, should be most prepared to address. It draws from the FortiGuard Labs’ vast array of network devices and sensors within production devices, comprising billions of events and incidents observed in live production environments around the world between January 1 and March 31, 2017.
  • The Evolving Threat Landscape versus Advanced Threat Protection
    The Evolving Threat Landscape versus Advanced Threat Protection Patrick Grillo, Senior Director, Security Solutions, Fortinet Recorded: Jun 28 2017 40 mins
    As the most recent outbreak of ransomware has proven once again, a debilitating attack can come from anywhere, with any sort of malware, and have a global impact. While headlines and marketing statements constantly shout “Zero Day”, even old malware can be used effectively to wreak havoc in a network if it’s not properly configured and up to date.

    The threat landscape never stops evolving and neither should an enterprise’s cyber security strategy. New products, new features and efficient source of threat intelligence are just some of the tools that an enterprise should look for from their security vendors.

    This session will look at the evolution of Advanced Threat Protection and how continuous development across the full range of technologies is crucial to maintaining security efficacy.
  • A Connected TV, Fridge and Car Get Together and Order from an Online Bar...
    A Connected TV, Fridge and Car Get Together and Order from an Online Bar... Patrick Grillo, Senior Director, Security Solutions, Fortinet Recorded: Jun 15 2017 41 mins
    Has the world of IoT taken over your world? As yet another technology is being embraced for all of the wonderful things that it can do, the not so nice side of IoT is either being ignored or not understood by consumers and enterprises alike.

    In some ways IoT is nothing new, computers and mobile devices such as phones and tablets have been connecting to enterprise and carrier networks for years. But as whole new categories of devices are being recreated and connected, we see enterprises struggling with how to master and control this modern and high tech Hydra.

    This session will focus on the challenge of securing IoT devices in the enterprise network and will identify three key issues that enterprises need to be aware of in order to securely leverage the potential advantages of IoT.
  • [Video Panel] Protecting the IoT: Threats, Vulnerabilities & Solutions
    [Video Panel] Protecting the IoT: Threats, Vulnerabilities & Solutions Josh Downs, BrightTALK, Patrick Grillo, Fortinet, Danielle Cattedu, CSA & Marc Laliberte, WatchGuard Recorded: Jun 7 2017 48 mins
    - BrightTALK at Infosecurity Europe 2017 -

    IoT networks grow by the day - prompting sleepless nights from security professionals the world over. As more and more devices join the network, how can we ensure that they're not becoming the latest weak link in the network?

    This expert panel will look at vulnerabilities in the IoT, those that are more obvious and those that perhaps aren't. It'll also cover the latest threats targeting IoT networks; the mechanisms and techniques that are being used and how to stop them.

    The IoT will be critical to business and consumer life from hospitals to connected cars to factory floors. Security and privacy remain key concerns and this panel will break down what the explosion of IoT networks will mean for security professionals.
  • [Video Panel] GDPR: The Next 12 Months
    [Video Panel] GDPR: The Next 12 Months Josh Downs, BrightTALK; Patrick Grillo, Fortinet; Roger Francis, Mandiant & Tim Hickman, White & Case Recorded: Jun 6 2017 59 mins
    - BrightTALK at Infosecurity Europe 2017 -

    GDPR and its May 2018 deadline are now fully the minds of the vast majority of security professionals and with massive fines on the horizon for non-compliance, now is a better time than ever to get to grips with the legislation and ensure that your organisation is secure and compliant.

    Join this live interactive panel where our selection of industry experts will be discussing the ins and outs of the regulations; how to prepare, steps to take and what to look out for.

    It’s vital that your business has carried out the relevant preparations for compliance by then to make sure you don’t get whacked with a huge fine of up to £15m or 4% of your organisation’s global annual turnover.

    Not only are there potentially huge financial repercussions, but leaving your business open to attack and your customers at risk can cause serious reputational damage.

    This expert panel will be discussing next steps to make sure that the next 12 months are as pain free as possible.
  • The General Data Protection Regulation or “We Don’t Know What We Don’t Know”
    The General Data Protection Regulation or “We Don’t Know What We Don’t Know” Patrick Grillo, Senior Director, Security Solutions, Fortinet Recorded: May 30 2017 49 mins
    The clock is ticking on the General Data Protection Regulation (GDPR) coming into effect and while there isn’t wide scale panic yet, lots of organizations are either 1) in denial or 2) just coming to grips with its implications.

    The difficulty with GDPR is that the regulation states the “WHAT” but pretty much is silent on the “HOW”. The overwhelming majority of the regulation deals with process, procedure and is it really necessary to collect the data and stresses the rights of the data subject. How to protect the data, in movement and in rest, is left to individual organizations to decide except for the vague mention of “continuous risk assessment” and “state of the art”.

    Another major change from the existing national regulations, which were enacted during the mid to late 1990s, GDPR takes into account the massive change in how technology plays in everyday. To protect the data subject, the punitive aspect of non-compliance is significant with penalties of €20M or 4% of annual turnover, whichever is GREATER.

    So in this confusing and changing environment, where do cyber security technologies come into play?

    This session will focus on the role of the underlying network in any organization’s GDPR compliance efforts and how to take advantage of certain aspects of GDPR to avoid the substantial penalties associated with the regulation.
  • A Deep Dive into the WannaCryThreat
    A Deep Dive into the WannaCryThreat Alex Harvey, Director TME CyberSecurity, Fortinet Recorded: May 22 2017 31 mins
    WannaCry has made a statement, impacting more than 300,000 victims across more than 150 countries.

    Join us to learn how threats like ransomware can become so widespread so quickly, the impact that not being prepared and protected can have on your business, and how to ensure you are well positioned to avoid the IT chaos future threats may pose.
  • Using Authentication and Identity Management to Secure a Financial Network
    Using Authentication and Identity Management to Secure a Financial Network Patrick Grillo, Senior Director, Security Solutions, Fortinet Recorded: May 9 2017 32 mins
    Using Authentication and Identity Management to Secure a Financial Network:
    The Door is Still Open and the Horse is Almost out of the Barn

    Carbanak. JP Morgan/Chase. Dyre Wolf. Bank of America. Bangladesh. Tesco Bank. This roll call should be proof enough of the attractiveness of the FSI to the hacker/cyber criminal community. While not all of them can be associated with Authentication and Identity Management issues, it’s undeniable that they have played a prominent role.

    An increased focus on authentication and identity management is a right step forward but just confirming a user’s identify is only half the task. With the concept of Zero Trust gaining momentum, authentication and identification must be reinforced by the network itself through policy based access and segmentation.

    This session will look back at some of the data breaches that have been attributed to weak authentication methods and how they might have been prevented. At the same time, the concept of internal network segmentation will be presented to show how both halves of the equation need to be brought together to effectively close off this common attack vector.
  • Faster, Wider and Stronger Cyber Security with SIEM
    Faster, Wider and Stronger Cyber Security with SIEM Dan Hanman, Consulting Systems Engineer SIEM Recorded: Mar 29 2017 45 mins
    Locks, barriers and traps will eventually be broken and overcome. The enterprise security infrastructure must continuously evolve in order to continue to protect the enterprise’s assets and provide mitigation in case of a breach.

    Security operations tools can play a critical role in maintaining the enterprise security posture through internal and external evolution.

    During this presentation, we will explore the role of SIEM as an enabler and how FortiSIEM can be a catalyst for a more efficient, effective and complete cybersecurity infrastructure.

Embed in website or blog