Hi [[ session.user.profile.firstName ]]

Panel: BYOD: If You Cannot Fight it, How Will You Secure it?

Businesses around the world are observing a constant increase in the amount of employees bringing their own devices to work. The trend has become so significant that the term "BYOD" can no longer be ignored by corporations.

Up until now, businesses debating their BYOD policy have focused on three key aspects: flexibility, convenience and productivity. However, new research goes much further than these simple needs. As we live in a constantly connected world, scientists are discovering distinctive addiction patterns in the brains of device users. There is now evidence that preventing someone from using their device can increase levels of stress and nervousness.

With such strong connections between people and devices, it is impossible to try and resist the BYOD trend. If you can't fight it, how will you secure it?
Recorded Jul 16 2013 56 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Peter Judge, TechWeekEurope (moderator); Andi Scott, Incoming Thought; Robert Berlin, Fortinet
Presentation preview: Panel: BYOD: If You Cannot Fight it, How Will You Secure it?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • A Connected TV, Fridge and Car Get Together and Order from an Online Bar... Jun 15 2017 9:00 am UTC 45 mins
    Patrick Grillo, Senior Director, Security Solutions, Fortinet
    Has the world of IoT taken over your world? As yet another technology is being embraced for all of the wonderful things that it can do, the not so nice side of IoT is either being ignored or not understood by consumers and enterprises alike.

    In some ways IoT is nothing new, computers and mobile devices such as phones and tablets have been connecting to enterprise and carrier networks for years. But as whole new categories of devices are being recreated and connected, we see enterprises struggling with how to master and control this modern and high tech Hydra.

    This session will focus on the challenge of securing IoT devices in the enterprise network and will identify three key issues that enterprises need to be aware of in order to securely leverage the potential advantages of IoT.
  • The General Data Protection Regulation or “We Don’t Know What We Don’t Know” May 30 2017 9:00 am UTC 45 mins
    Patrick Grillo, Senior Director, Security Solutions, Fortinet
    The clock is ticking on the General Data Protection Regulation (GDPR) coming into effect and while there isn’t wide scale panic yet, lots of organizations are either 1) in denial or 2) just coming to grips with its implications.

    The difficulty with GDPR is that the regulation states the “WHAT” but pretty much is silent on the “HOW”. The overwhelming majority of the regulation deals with process, procedure and is it really necessary to collect the data and stresses the rights of the data subject. How to protect the data, in movement and in rest, is left to individual organizations to decide except for the vague mention of “continuous risk assessment” and “state of the art”.

    Another major change from the existing national regulations, which were enacted during the mid to late 1990s, GDPR takes into account the massive change in how technology plays in everyday. To protect the data subject, the punitive aspect of non-compliance is significant with penalties of €20M or 4% of annual turnover, whichever is GREATER.

    So in this confusing and changing environment, where do cyber security technologies come into play?

    This session will focus on the role of the underlying network in any organization’s GDPR compliance efforts and how to take advantage of certain aspects of GDPR to avoid the substantial penalties associated with the regulation.
  • A Deep Dive into the WannaCryThreat Recorded: May 22 2017 31 mins
    Alex Harvey, Director TME CyberSecurity, Fortinet
    WannaCry has made a statement, impacting more than 300,000 victims across more than 150 countries.

    Join us to learn how threats like ransomware can become so widespread so quickly, the impact that not being prepared and protected can have on your business, and how to ensure you are well positioned to avoid the IT chaos future threats may pose.
  • Using Authentication and Identity Management to Secure a Financial Network Recorded: May 9 2017 32 mins
    Patrick Grillo, Senior Director, Security Solutions, Fortinet
    Using Authentication and Identity Management to Secure a Financial Network:
    The Door is Still Open and the Horse is Almost out of the Barn

    Carbanak. JP Morgan/Chase. Dyre Wolf. Bank of America. Bangladesh. Tesco Bank. This roll call should be proof enough of the attractiveness of the FSI to the hacker/cyber criminal community. While not all of them can be associated with Authentication and Identity Management issues, it’s undeniable that they have played a prominent role.

    An increased focus on authentication and identity management is a right step forward but just confirming a user’s identify is only half the task. With the concept of Zero Trust gaining momentum, authentication and identification must be reinforced by the network itself through policy based access and segmentation.

    This session will look back at some of the data breaches that have been attributed to weak authentication methods and how they might have been prevented. At the same time, the concept of internal network segmentation will be presented to show how both halves of the equation need to be brought together to effectively close off this common attack vector.
  • Faster, Wider and Stronger Cyber Security with SIEM Recorded: Mar 29 2017 45 mins
    Dan Hanman, Consulting Systems Engineer SIEM
    Locks, barriers and traps will eventually be broken and overcome. The enterprise security infrastructure must continuously evolve in order to continue to protect the enterprise’s assets and provide mitigation in case of a breach.

    Security operations tools can play a critical role in maintaining the enterprise security posture through internal and external evolution.

    During this presentation, we will explore the role of SIEM as an enabler and how FortiSIEM can be a catalyst for a more efficient, effective and complete cybersecurity infrastructure.
  • Securing the Migration to Industry 4.0 Recorded: Mar 15 2017 49 mins
    Ronen Shpirer, Security Solutions Architect, Fortinet
    Digital Transformation, alongside European and country specific initiatives, liberalisation and competitive pressures, is transforming utilities, factories and critical infrastructure and their Operational Technology.

    With emphasis on Cyber Physical Systems, design-Customer-Supply chain collaboration, mobility and the cloud as the core enablers of his transformation, OT security must evolve to meet today’s cyber security challenges.

    This session will provide a high level view of these changes, the security challenges they present, and the security solutions which must be put in place to ensure a secured industrial transformation.
  • Securing The Multi-Dimensional Cloud Recorded: Feb 22 2017 44 mins
    Ronen Shpirer, Security Solutions Architect, Fortinet
    Software is eating the world – driving digital transformation and changing the way businesses do business. Cloud is a core enabler in every enterprise’s digital transformation voyage - facilitating innovation, agility and cost efficiency.

    But harnessing the power of the cloud creates a multi-dimensional environment where applications, data and information are borderless and yet, regardless of their changing location and existence, must be protected and secured as part of the enterprise overall security strategy and posture.

    This session will provide an overview of the unique security challenges in a multi-dimensional cloud environment, and the solution framework required for empowering and securing digital transformation.
  • It’s My Life but I no Longer Have Control Over it! Recorded: Dec 7 2016 45 mins
    Simon Bryden, Consulting Systems Engineer
    We all know that technology plays a role in our everyday life but do you know the extent of that role? Advertising tells us to spend more and more of our life online and embrace technology in our homes, cars and everywhere else a microchip can be placed.

    But nowhere is there a message about the consequences of the misuse of that technology. 2016 has seen a rise in the number of incidents involving ransomware, IoT, and simply well intentioned connectivity gone wrong. That momentum is set to continue into 2017 and beyond.

    Although past performance does not guarantee future results, this session will focus on what we have seen this year and what we expect to see in the near future.
  • One Firewall to Rule them All! Recorded: Nov 8 2016 27 mins
    Patrick Grillo, Senior Director, Security Solutions, Fortinet
    The firewall wars have caused nothing but confusion in the market. Lines have been drawn between UTM and NGFW; are they different or are they the same thing? Unfortunately that confusion has led to introducing complexity and vulnerability in enterprise networks. There is a better way. Rather than fighting through a sea of acronyms, focus on what’s really important - How can I simplify my security infrastructure and improve my ability to fight off advanced attacks, no matter where they occur in the network?

    This session will present a new way of thinking about firewalls, one without the confusion, acronyms and complexity.
  • Stop Taking a Reactive Approach to Network Security Recorded: Oct 11 2016 42 mins
    Patrick Grillo, Senior Director, Security Solutions, Fortinet
    Preparation and advance planning are key words for a number of activities but when it comes to securing a network, it seems that being reactive is more the norm.

    This session will focus on the consequences of not taking a proactive approach: dealing with the consequences of past decisions while trying to respond to the challenges of today.
  • Scaling & Segmenting the Agile Data Center with Software Defined Security Recorded: Sep 21 2016 43 mins
    Ronen Shpirer, Security Solutions, Fortinet
    Data center transformation with server and network virtualization are leading to agile IT environments that accelerate business initiatives and deliver more responsive applications.

    How can security itself be made more elastic and agile in Software-Defined Data Centers?

    A vision for Software-Defined Security is introduced, and a three-part framework will outline how network security is evolving across all layers of the network architecture, from the data plane to the control plane to the management plane.
  • Secure Unified Access Layer – Creating Universal Solutions Recorded: Jun 23 2016 36 mins
    Ben Wilson, Senior Director, Product Management, Fortinet
    During the past 15 years, access layer solutions have evolved, especially in terms wireless connectivity.

    Today's wireless connectivity has multiple approaches, each better meeting the specific requirements of organisations through a choice of different architectures. Whether its a refresh, redeployment, change of application or a brand new site, there are a lot of options.

    During this webinar we’ll examine different approaches and how to apply them to different verticals or deployment scenarios. As wireless connectivity continues to evolve, we will also look to the future and see how trends in new hardware can provide cutting edge solutions to meet the potential needs of tomorrow's organisations.

    The presentation will end with an overview of Fortinet's Secure Access Architecture and how it can meet today's and tomorrow's wireless requirements.
  • Advanced Threat Protection – Can Technology Alone Deliver What’s Needed? Recorded: Jun 15 2016 36 mins
    Patrick Grillo, Senior Director, Security Strategy
    More and more solutions are crowding into the market but data breaches are still happening and there’s no end in sight. Is an over reliance of technology creating a false sense of “everything’s okay”? This session will focus on the three key aspects of comprehensive advanced threat protection; technology, awareness and in particular the role of threat intelligence.
  • The Internet of Things – Good, Bad or just plain Ugly? Recorded: May 26 2016 28 mins
    Patrick Grillo, Senior Director, Security Solutions, Fortinet
    IoT is everywhere these days and like most new and shiny things our attention is focused on its coolness factor.

    However, behind that pleasing and shining exterior lurks a potentially devastating menace. In the rush to bring product to market, very few if any manufacturers are security conscious, and as more and more of these products are deployed in the enterprise, the risk of a successful network breach increases exponentially.

    This session will focus on the potential dangers with IoT and look at the question of how and why IoT security is different from traditional IT security.
  • Securing ICS/SCADA Networks Recorded: May 17 2016 48 mins
    Ronen Shpirer, Security Solutions Architect, Fortinet
    Automation is at the base of many industries and Supervisory Control And Data Acquisition (SCADA) is the base architecture enabling interactive automation of the industrial environment. The industrial environment has been going through rapid innovation, moving from isolated legacy systems to IP based, interconnected systems. In recent years, the Industrial Control Systems (ICS) upon which much of our critical infrastructure and manufacturing industry depends, have come under increasingly frequent and sophisticated cyber-attacks.

    Join Fortinet to learn more about the ICS/SCADA specific environment, its security challenges and Fortinet’s unique solutions for the industrial environment.
  • Gartner on demand Webcast: The Growing Need for Internal Segmentation Firewall Recorded: May 10 2016 40 mins
    Lawrence Pingree, Research Director, Gartner & Warren Wu, Fortinet
    Cloud applications and BYOD have brought new functionality to enterprise networks - and unfortunately, also new security weaknesses and opportunities for cyber espionage. The addition of an Internal Segmentation Firewall (ISFW) offers strategic protections within the network that can bolster existing defenses and limit potential exposures.

    This webcast – “Strong on the Inside: The Growing Need for Internal Segmentation Firewalls” – features leading experts from Gartner and Fortinet as they discuss the latest in internal network security for today’s threat landscape, including:

    •Why targeted attacks worldwide are becoming more pervasive, and how a single malicious breach can cripple a company
    •How ISFWs differ from traditional firewalls - and why they can uniquely reduce the attack surface, contain internal threats, and minimize damages after a breach occurs
    •Why multi-gigabit performance is critical to an ISFW’s ability to provide deep visibility without slowing down the network
  • Your Money or Your Life: Defeating Ransomware Recorded: Apr 13 2016 47 mins
    Simon Bryden, Consulting Systems Engineer
    Ransomware is an ever-increasing threat to enterprises and new strains are being seen on a regular basis. This presentation starts by tracing the history of ransomware from its roots as being not much more than an annoyance, to the current highly sophisticated encrypting varieties.
    Following this will be a deep dive into how the malware is delivered to the victim, and an analysis of the different stages of an attack.
    Finally, we will look at methods of mitigating the attack in order to minimise or eliminate the damage done.
  • Security that counts: What’s in your Data Center? Recorded: Mar 17 2016 43 mins
    Patrick Grillo, Senior Director, Security Solutions, Fortinet
    The Data Center is not an island. It is part of a complex ecosystem, working and evolving together for the overall benefit of the enterprise.

    Data Center security can no longer be treated as an island. It must integrate and interact with the overall enterprise ecosystem and security infrastructure to provide a real-time, effective security posture.

    This webinar will present a high level view as to the importance of deploying an integrated, end-to-end enterprise security platform for achieving data center security.

    Because sometimes, the best data center security solution has nothing to do with the data center!
  • Lessons learned about Advanced Threat Protection Recorded: Mar 17 2016 38 mins
    Tyson Macaulay, Chief Security Strategist and VP Security Services
    According to recent surveys, the majority of IT Security Executives are concerned about protecting customer data from cybercriminals, but only 1 in 3 is concerned about the loss of their own company’s intellectual property. While understandable, such thinking can also be disastrous, for organizations small and large.

    In this webinar, Fortinet Chief Security Strategist Tyson MacAulay, discusses accounts of real-world attacks on unsuspecting businesses, targeted by sophisticated cybercriminals, as well as the measures they have taken to successfully defend themselves.
  • Deploy Next Generation Firewalls for Internal Protection Recorded: Mar 15 2016 2 mins
    John Kindervag, Forrester VP and Principal Analyst
    John Kindervag from Forrester talks about protecting your organization against internal threats through a zero trust approach that you can start to deploy today by using Next Generation Firewalls (NGFW) to protect internal network segments.
Fortinet EMEA
Fortinet is a global leader and innovator in Network Security. Our mission is to deliver the most innovative, highest performing network security platform to secure and simplify your IT infrastructure.

We are a provider of network security appliances and security subscription services for carriers, data centers, enterprises, distributed offices and MSSPs. Because of constant innovation of our custom ASICs, hardware systems, network software, management capabilities and security research, we have a large, rapidly growing and highly satisfied customer base, including the majority of the Fortune Global 100, and we continue to set the pace in the Network Security market.

Our market position and solution effectiveness has been widely validated by industry analysts, independent testing labs, business organizations, and the media worldwide. Our broad product line of complementary solutions goes beyond Network Security to help secure the extended enterprise.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Panel: BYOD: If You Cannot Fight it, How Will You Secure it?
  • Live at: Jul 16 2013 2:00 pm
  • Presented by: Peter Judge, TechWeekEurope (moderator); Andi Scott, Incoming Thought; Robert Berlin, Fortinet
  • From:
Your email has been sent.
or close