Discover how to address some of the widespread concerns of electoral security. Join our expert as we unpack some of the challenges faced when protecting election systems, and gain valuable insights about how to develop an integrated security framework. Walk away with strategies on what to look for when architecting a security solution and the benefits centralized visibility and control provide to outpace cybercriminals and keep electoral data secure.
RecordedOct 7 201940 mins
Your place is confirmed, we'll send you email reminders
According to Verizon’s 2020 Data Breach Investigation Report (DBIR), over 80% of hacking-related breaches involved the use of lost or stolen credentials - and approximately 35% of all breaches were initiated due to weak or compromised credentials.
Last year, we kicked off The (Security) Balancing Act series with a panel of identity experts to help us understand the landscape. Join us for this 1 year check-in to learn what has changed for organizations in the last 12 months and the security implications of shifting to a more remote workforce.
- 2020 vs 2019: Key changes & challenges for cybersecurity
- How work from home has opened the door to attackers
- Regulatory updates that may impact identity management programs
- Why attackers are focused on credentials and authentication systems
- What businesses can do to keep track of all endpoints, manage identities and privileged access, protect their data and maintain compliance
- Angela Leifson, Forensic Analyst for Oracle Cloud Infrastructure
- Aidan Walden, Director, Public Cloud Architecture & Engineering at Fortinet
- Shareth Ben, Executive Director, Insider Threat & Cyber Threat Analytics at Securonix
This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
Brian Schwarz, Director of Cloud Product Marketing, Fortinet, Shawn Brady, Head of Global Partnerships, Edge Services, AWS
Today, you not only need to build applications that meet the global scale and performance requirements demanded by your customers, but also secure those applications against an ever expanding and evolving threat landscape. To help you keep pace with modern application deployments, Fortinet, an industry leader in application security, and Amazon CloudFront, AWS’s secure and high performing Content Delivery Network, have partnered to provide customers industry-leading performance and security on AWS.
Watch this webinar to learn how the combined offerings of Amazon Cloudfront, AWS WAF, Fortinet WAF Managed Rules and Fortiweb:
- Secures your entire infrastructure including network, web applications, and APIs for both cloud and/or on-premises environments
- Protects against known vulnerabilities such as the OWASP Top 10 and zero-day threats
-Provides the high availability and low latency required for your data, applications, and APIs
-Quickly deploys in AWS Marketplace with minimal management resources
Sameer Kumar Vasanthapuram, Vinod Sundarraj, and Anish John
Autodesk had a goal to build a virtual data center on the cloud for core and security services. Though its customer-facing business was moving towards the cloud, Autodesk was previously running business-critical, back-office applications on premises. The global software company had to monitor and correlate logs in a time-consuming process. Autodesk also required that each of its Amazon Virtual Private Cloud (VPC) instances had its own firewall, which meant they had hundreds of VPCs in some regions, making this a large task that also led to latency issues.
Join this webinar to hear how Fortinet's Virtual Next-Generation Firewall consistently manage its security posture across all of its Amazon VPCs. As a result, Autodesk now deploys firewalls that satisfy business requirements and, in the process, has minimized latency by 97%.
In This Webinar, You'll Learn To:
Centrally manage, view, and control applications deployed across your Amazon Web Services (AWS) infrastructure
Address the most critical security challenges, whether in networked, application, cloud, or mobile environments
Save time and enable collaboration by leveraging automated security provisioning processes
Build scalable and resilient architecture with minimal latency while maintaining cloud application security
Improve your network management toolset by deploying virtual firewalls, erasing the need for manual updates
Douglas Jose Pereira dos Santos, Security Strategist, FortiGuard Labs
Organizations that are too reactive in their security can't keep up with an ever-evolving threat landscape. Learn from FortiGuard Labs, the threat intelligence unit at Fortinet, about the major threat trends from the 1st half of 2020, how to prepare security teams heading into 2021, and how to make strategic security decisions based on threat insights. Join this detailed discussion with experts from FortiGuard Labs and receive key data and insights on how should security teams position their people and technology heading into the next 12 months.
-Tsailing Merrem, Dir., Products & Solutions, Anthony Giandomenico, Practice Dir., Digital Forensics & Incident Response
Endpoint visibility alone isn't enough, and EDR solutions have needed to evolve dramatically to keep pace with an expanding threat landscape. Learn why FortiEDR helps you achieve true endpoint resilience, including: the critical combination of prevention, detection, and real-time response capabilities, the ability to automate key workflows , and robust support for remote work environments where endpoint protection is typically inadequate.
Brian Schwarz, Director, Product Marketing, Application Security Fortinet
Learn all about all about how to deliver security for APIs. The use of traditional web applications is declining, replaced by API-based applications that can provide a richer, more responsive user experience, especially for mobile device users. Come learn how to deliver improved experience for users on a wide range of devices without sacrificing security. FortiWeb offers an API gateway that provides a single point of entry for API access and a number of benefits to ensure a safe, secure application experience.
Vinod Sundarraj, Sr. Director, Products and Solutions
This era of Cloud, creates demand for networking and security teams to constantly balance security, complexity, and application performance. Learn how to design a Secure SD-WAN solution right for you, from optimizing CapEx and OpEx, to increasing overall visibility and control of your environment. Join us to find out how to create a seamless cloud-to-cloud approach to maximize your business outcomes.
Anthony Giandomenico, Practice Director, Digital Forensics and Incident Response, Damien Lim, Director, Products & Solutions
Learn how ten years of ML and AI development has contributed to our self-learning Deep Neural Networks (DNN) based solution that will revolutionize your SOC and help your teams be at their best by assisting investigation, detection, and respond to security incidents in less than a second. Our experts will provide best practices for using AI-driven solutions, the role of tailored threat intelligence in improving your SOC, and how to maximize human- and machine-based resources to stay ahead of threats.
Joe Robertson, Director of Information Security and Senior CISO Evangelist Rick Peters, CISO, Operational Technology
Ready to keep the board from getting bored? Cybersecurity and OT are critical investments to get right. All security teams need a set of measures that give meaning to technology investment as a true solution, maximizing value and minimizing risk. Join this webinar to gain advice and tips from our experts on how to properly explain the ROI of cybersecurity and OT to your C-suite and board in terms of minimizing business risk. Learn how to craft conversations and get your proposals approved!
Satish Veerapuneni, Director, Products and Solutions
Networking teams want to solve for the ever-growing complexity of multiple solutions and get more out of their investments. Join our expert as we look into multiple use cases and look at how a single-console approach to management helps improve efficiency, decrease TCO, and helps to close the gap of cyber risk.
Satish Veerapuneni, Director, Products and Solutions
Most of today's SOCs are needlessly complex, with too many vendors, too many alerts, slow response times, and a lack of trained staff. Join this new webinar to learn how Fortinet can simplify security operations with the Fortinet Security Fabric and FortiSOAR.
Kevin Morrison, Vice President of IT & CISO, Rollins, Inc. Thomas Duffy, Regional Account Manager, Fortinet, Inc.
In this special presentation, Rollins CISO Kevin Morrison will share how Rollins tackles its hardest security and management challenges, keeps 2 million customers informed, and keeps services running smoothly—all with an anticipated ROI of $5 million over 5 years.
Nicola Kabar, Solutions Architect - Tigera; Ali Bidabadi, Director of Cloud Architecture - Fortinet
Companies are leveraging the power of Kubernetes to accelerate the delivery of resilient and scalable applications to meet the pace of business. These applications are highly dynamic, making it operationally challenging to securely connect to databases or other resources protected behind firewalls.
Tigera and Fortinet have joined forces to solve this operational challenge. With the combination of FortiGate Next-Gen firewalls and Calico Enterprise, you gain full visibility into the container environment and can define fine-grained policies to determine which Kubernetes workloads are allowed to talk to the enterprise’s crown jewels running outside the Kubernetes cluster.
In this webinar, you will learn how Calico Enterprise and FortiGate enables you to:
Implement network security control requirements in Kubernetes
Dynamically populate Kubernetes objects in FortiGate to enforce security policies
Gain deep visibility into network traffic within your Kubernetes clusters.
Peter Newton, Sr. Director of Products and Solutions
Digital transformation is creating new threat edges. One threat edge is the number of IP-based devices that are coming onto networks that must be discovered, identified, and controlled. Additionally, network administrators need to identify and provide appropriate access to all the users that come and go from the network. Fortinet’s Zero-Trust Network Access approach provides the framework and the tools necessary to know everyone and everything that is attaching to the network and to provide them with the right level of access.
James Plyer, Dr. SD-WAN Product Management, WE, Mark Winer, S.Dr., WE Connect Portal, WE, Satish Madiraju, Dr., Fortinet
Discover how to transform your retail network with the speed and security to support optimal eCommerce experiences with a joint Windstream Enterprise and Fortinet solution. Learn how Windstream Enterprise SD-WAN with Fortinet enhancements ensures uptime without compromising performance or security. Tune in to hear three customer success stories about retailers who have implemented Windstream Enterprise SD-WAN with Fortinet enhancements plus see a live demo of the Windstream Enterprise WE Connect customer portal.
John Maddison, CMO and EVP, Products and Solutions, Vince Hwang, Sr. Director, Products and Solutions, FortiOS & Fortinet
Find out why we’re so excited about FortiOS 6.4.1! With too many new innovations to list, this FortiOS launch is here to empower your digital innovations across all four tenants of the Fortinet Security Fabric from security-driven networking to dynamic cloud.
Learn how broad visibility can help you take control of the network, integrations help simplify disparate solutions, and automation can help lean security teams work smarter.
Diana Kelley | Susan Whittemore | Jay Ryerse | Courtney Radke
Smaller businesses have a common problem when it comes to cybersecurity - limited expertise, resources and budget.
The board is asking for, clients are demanding to know whether the company is secure, IT team can't articulate the cybersecurity program, because there isn't one.
Cybersecurity is sometimes an afterthought for a start-up, or delegated to one engineer. There's a tendency to think of cybersecurity as a set of tactical, technical implementations to cover obvious threats rather than a business problem.
We'll discuss the role of the CISO in terms of providing the leadership and strategy for a cohesive, risk based program. Ideally, the role is not a technician.
With an ever-evolving threat landscape and a growing business, where does a business start to build and maintain an affordable program? We'll discuss a baseline program, technologies required, focusing on fewest technologies for maximum benefit.
This episode is part of The (Security) Balancing Act series with Diana Kelley. Viewers are encouraged to ask questions during the live Q&A.
Vinod SundarrajSr. Director, Products and Solutions
Learn how you can easily protect the entire evolving attack surface while delivering secure remote access to critical applications and meeting compliance—all with a single pane of glass with the FortiGate-VM next-generation firewall which delivers a unified security solution from on-premises to multi-cloud environments. You'll discover key use cases for securing the entire infrastructure and come away with a stronger security strategy and architecture plan for deploying a unified security platform while enabling business continuity.
Ray Watson, VP of Innovation, Masergy - Satish Madiraju, Director of Products and Solutions, Fortinet
Join experts from Masergy and Fortinet to hear how this managed service works as well as customer success stories and actionable use cases. This joint discussion will dive into how Masergy Managed Secure SD-WAN services backed by Fortinet Secure SD-WAN delivers advanced routing, security, and SD-WAN for distributed branches which enables a true WAN Edge transformation to support digital innovations, streamline operations and empower enterprises across the globe.
A sudden shift to a remote workforce presents new challenges for many networks. Organizations need to support their employees with VPN access at scale, all without sacrificing security. We will share some recent attack methods cybercriminals have been leveraging in wake of a new remote workforce.
Network, Cloud, and IoT/OT Security Information from Fortinet
From the start, the Fortinet vision has been to deliver broad, truly integrated, high-performance security across the IT infrastructure.
We provide top-rated network and content security, as well as secure access products that share intelligence and work together to form a cooperative fabric. Our unique security fabric combines Security Processors, an intuitive operating system, and applied threat intelligence to give you proven security, exceptional performance, and better visibility and control--while providing easier administration.
Our flagship enterprise firewall platform, FortiGate, is available in a wide range of sizes and form factors to fit any environment and provides a broad array of next-generation security and networking functions. Complementary products can be deployed with a FortiGate to enable a simplified, end-to-end security infrastructure covering:
Web Application Security
Advanced Threat Protection
Secure Unified Access
Management and Analytics
Our market position and solution effectiveness have been widely validated by industry analysts, independent testing labs, business organizations, and media outlets worldwide. We are proud to count the majority of Fortune 500 companies among our satisfied customers.
Fortinet is headquartered in Sunnyvale, California, with offices around the globe. Founded in 2000 by Ken Xie, the visionary founder and former president and CEO of NetScreen, Fortinet is led by a strong management team with deep experience in networking and security.