Hi [[ session.user.profile.firstName ]]

2021 ‘Year of the Hybrid’ and How it Impacts Governments

2021 will be a year of blended activity by organizations, employees, and threat actors alike. Work patterns and locations will continue to shift, process automation will affect how organizations operate and support their customers and citizens, and threat activity will evolve in terms of types of attack, tactics, and impact. We’ll discuss changing trends in federal, state and local governments and how this impacts their ability to protect their people, systems and data.

Join us to hear:

- What governments are doing in response to this changing dynamic
- Lessons learned that can help public sector organizations in this hybrid mode
- Recommendations on three specific areas your organization should focus on to expand your digital services efficiently and securely -- even if your security budgets are declining.
Recorded Aug 10 2021 54 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jim Richberg, Federal CISO, Fortinet
Presentation preview: 2021 ‘Year of the Hybrid’ and How it Impacts Governments

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Why the Future of Web Application Security is Cloud-Native Nov 16 2021 4:00 pm UTC 45 mins
    Johna Till Johnson, Sameer Vasanthapuram, Aidan Walden
    The third and final installment in Fortinet & AWS’s series exploring next-gen cloud security capabilities, this episode will delve into the topic of ingress web security, highlighting the pitfalls of traditional web application security measures and revealing the advantages of new cloud-native solutions.

    Hear from our host Johna Till Johnson of Nemertes alongside speakers Sameer Vasanthapuram of AWS and Aidan Walden of Fortinet to understand how AWS’s content delivery network is deploying Fortinet’s cutting-edge in-cloud network security to enable flexible, scalable, and safe web application experiences that drive businesses’ bottom lines. Areas of discussion include:

    -Evolutions in the cloud network landscape that have led to greater cyberthreat risk and need for innovative security solutions
    -Why more traditional web application security measures like IPS and firewall solutions are no longer sufficient
    -How cloud-native solutions like the FortiWeb Cloud WAF-as-a-Service can deliver superior security while allowing for reduced latency and simplified compliance
    -Business outcomes of implementing cloud-native web application security solutions
  • Think Fast! - Machine Learning for Improved Security Nov 2 2021 3:00 pm UTC 45 mins
    John Jacobs, Chief Information Security Officer, Fortinet
    Cloud computing has ushered in an explosion of tools and resources to swiftly adapt applications, business processes, and even create entire industries. With this rapid growth comes an expanded compute surface and an exponentially increased challenge to maintain user, device, and data security. Cybersecurity can no longer adequately scale by adding another analyst, tool, or console.



    Machine Learning can ingest and act upon correlated information from multiple sources, saving time and money, and most importantly: reducing exposure and closing security gaps. Security orchestration, automation, and response (SOAR) is a growing technology that can help scale burdened staff while improving the time-to-resolve, measured results and efficiency of repetitive and known tasks.
  • Ransomware in the Remote Work Era Recorded: Oct 26 2021 61 mins
    Diana Kelley, SecurityCurve | Nicole Hoffman, GroupSense | Courtney Radke, Fortinet | Patrick Lee, Rapid7
    Phishing and ransomware attacks continue to rise, according to Proofpoint’s State of the Phish report for 2020. Organizations in the U.S. are at risk, the increase in remote work due to the pandemic has fueled a spike in attacks, and phishing attempts are up by 14 percent compared to the previous year.

    Email continues to be the number 1 delivery vehicle, but other social engineering schemes that rely on social media, voicemail (“vishing"), SMS phishing (“smishing”), and malicious USB drops are also of concern for organizations. Ransom demands are also on the rise, but according to the report, paying the ransom is not guaranteed to work as many companies that paid the ransom failed to receive a decryption key.

    Join this month's episode of The (Security) Balancing Act as Diana Kelley and guests discuss why ransomware is surging again, which sectors are most at risk, the threat to enterprises and how it is being used for more than just ransom (ex: distractionware, destructionware, etc).
    - The rise in ransomware under the cloak of the pandemic
    - Why email continues to be the channel of choice
    - The difference between fully automated and human-operated campaigns
    - How to decide whether or not to pay or not to pay the ransom
    - Why your backups may not be immune to ransomware
    - Addressing the threat with best practices

    Speakers
    - Nicole Hoffman, Intelligence Analyst, GroupSense
    - Courtney Radke, CISO for National Retail, Fortinet
    - Patrick Lee, Senior Incident Response Consultant, Rapid7

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • Zero Trust for the New Normal Recorded: Oct 19 2021 61 mins
    Diana Kelley, SecurityCurve| Mari Galloway, Women's Society of Cyberjutsu | Jonathan Nguyen Duy, Fortinet | Bob Rudis, Rapid7
    Working remotely has become the new normal. This, and many other changes organizations adopted last year in response to the pandemic are likely to stay for the long term. According to Gallup, about two-thirds of U.S. remote workers want to continue to work remotely. So, how can organizations continue to support their growing distributed workforce at a time where reports of security threats have increased by 400% compared to pre-pandemic levels? 

    Here is where the zero-trust approach to security comes into play. 

    Join this month's episode of The (Security) Balancing Act with Diana Kelley and guests as they discuss the emergence of zero trust (“Trust Nothing, Verify Everything”) and what it helps achieve for enterprises in the age of cloud and remote work.

    Viewers will learn about:
    - The evolution of the security perimeter and the shift to zero trust
    - Why zero trust is an approach and not a product
    - Zero Trust Network Access (ZTA) vs. corporate VPN
    - Real-world stories and practical hands-on guidance from people who have deployed a ZTA

    Speakers:
    - Mari Galloway, CEO, Women's Society of Cyberjutsu
    - Jonathan Nguyen Duy, Vice President, Global Field CISO Team, Fortinet
    - Bob Rudis, Chief Data Scientist, Rapid7

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • Practical Strategies for Getting Cloud, Security and Networking Right Recorded: Oct 14 2021 44 mins
    Jonathan Nguyen Duy, Cloud CISO Fortinet
    Enterprise IT strategies are driving the dynamics of centralized and distributed computing. Indeed, one could say that networking and security always follow the compute. Rapid adoption of cloud means networks are now more distributed than ever before and business value is shifting to agility, innovation, and software - leading to the rise of the software defined enterprise. Cloud adoption is also driving three strategic technology trends: Zero Trust, SD-WAN, and SASE. Going forward, IT teams will have to grapple with these key trends.

    Join cybersecurity experts from Fortinet and Cybersecurity Insiders for this live webinar to explore:
    • Consideration for managing a combination of in-house and provider solutions and balancing risk management with business objectives and customer experiences.
    • How to think about computing, networking, and security when enterprises own less and less infrastructure, platform, and software?
    • Practical strategies for securing clouds while delivering better outcomes and experiences.
  • New Horizons: Bringing Cloud-Native Security into the Data Center & Edge Recorded: Oct 6 2021 44 mins
    Johna Till Johnson, Sameer Vasanthapuram, Aidan Walden
    In the previous episode, we explored designing for transparent cloud network security and how implementing solutions like a gateway load balancing tool can drive business results by enabling consistent performance and security. Building upon that discussion, the next question and focal point of this episode will explore why and how to extend cloud-native security into the cloud data center and edge.

    In this second episode in AWS & Fortinet’s series about next-gen cloud security capabilities, hear from our host Johna Till Johnson of Nemertes alongside speakers Sameer Vasanthapuram of AWS and Aidan Walden of Fortinet to learn best-in-class solutions for extended cloud-native security that help businesses safely enable better transparency for app developers and users. Key topics include:

    -Evolutions in cloud computing that have led to a greater need for cloud-native security solutions
    -Why cloud-native is now particularly relevant for the cloud data center and also computing edges
    -How AWS outposts are implementing cloud-native solution FortiGate and enabling high availability
    -Business outcomes of implementing cloud-native solutions
  • A New Approach to Cloud Security for Financial Services with Fortinet and AWS Recorded: Sep 23 2021 34 mins
    Diana Kelley, Jennifer Code and Jonathan Nguyen-Duy
    Many Financial Services organizations have kick-started their migration to the cloud. But how should you approach security and development to make the most of what cloud services can offer? Fortinet security solutions and Amazon Web Services (AWS) can help FinServ organizations enhance their security in the cloud.

    Fortinet’s partnership with AWS is a better-together combination that ensures your workloads on AWS are protected by best-in-class security solutions powered by comprehensive threat intelligence. In this conversation between Fortinet and AWS experts, learn how to:

    • Stay on top of emerging security threats
    • Ensure you’re meeting industry privacy and regulatory requirements
    • Better automate and gain visibility into your security data
    • Use AI to bolster security
    • Keep developers moving fast and secure

    Hear from:
    •Diana Kelley, CTO & Founding Partner, SecurityCurve
    •Jonathan Nguyen-Duy, Vice President, Field CISO Strategic Services, Fortinet
    •Jennifer Code, Sr. Manager – GFS CSM, Principal – FSI Cloud Governance, AWS
  • Cybersecurity in the C-Suite Recorded: Sep 15 2021 56 mins
    Diana Kelley, SecurityCurve | Richard Meeus, Akamai | John Jacobs, Fortinet | Mike Davis, ExactlyIT
    C-Level executives are increasingly being targeted by cyber criminals: according to an IBM survey, “64% of CFOs, CHROs and CMOs feel the least engaged in cybersecurity threat management activities, yet are the stewards of data most coveted by cybercriminals.” With cybersecurity no longer limited to the concerns of the IT department and the broader workforce, in 2021 the risk of breaches and attacks touch every part of the organisation.

    Integrating security controls at all business levels, sharing incident data and making cybersecurity an essential pillar of business considerations and training goes a long way to help CISOs and security leaders navigate the increasing threats and vulnerabilities.

    In this month’s episode of The (Security) Balancing Act we’ll be sharing how IT security leaders can ensure everyone - and every part - of the business is safe. Join as we evaluate:

    - To what extent cybersecurity should be a priority in the C-Suite
    - How C-Level execs should consider their role in relation to cybersecurity
    - How training and education can help CISOs navigate increased risk at all business levels
    - And more

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • The Advantages of Transparent Cloud Network Security Recorded: Sep 7 2021 36 mins
    Aidan Walden, Sameer Vasanthapuram, Johna Till Johnson
    Maintaining and enhancing cloud network visibility has never been more important for driving business results — and yet the challenges to enabling this necessary transparency are quickly evolving and increasingly complex, with 75% of organizations now in need of better network visibility. In a cloudscape of more insidious network threats and sophisticated attackers, how can businesses better protect their workload applications without compromising availability for both users and developers, which is imperative to their organization’s productivity and growth?

    In this inaugural episode in AWS & Fortinet’s series about next-gen cloud security capabilities, hear from our host and expert guest speakers to learn about best-in-class solutions for cloud network security that help businesses safely enable better transparency for app developers and users — ultimately, driving their organization’s bottom line. Key topics include:

    -Challenges to maintaining cloud network transparency — and why doing so is critical
    -Solutions for enabling network security transparency that doesn’t compromise security
    -Business outcomes of implementing the solutions

    Presented by Fortinet's Aidan Walden, Global Director of Public Cloud Architecture and Engineering; AWS's Sameer Vasanthapuram, Partner Solutions Architect; and Johna Till Johnson, CEO of Nemertes
  • Defend your High Performance Web Applications with Amazon and Fortinet Recorded: Sep 2 2021 49 mins
    Brian Schwarz, Application Security, Fortinet, Shawn Brady, Head of Global Partnerships, Edge Services, AWS
    Securing Your Entire Infrastructure with Amazon CloudFront and Fortinet Web Application and API Security Solutions You need applications to provide the scale and performance that your customers demand. Watch this webinar to learn how Fortinet Web Application and API Security Solutions for Amazon CloudFront: secure your entire infrastructure, protect against known and unknown vulnerabilities, and provide high availability and low latency for data, apps, and APIs
  • Getting Hybrid Clouds, Security and Networking Right Recorded: Aug 25 2021 32 mins
    Jonathan Nguyen-Duy, Vice President, Field CISO Team, Fortinet
    Rapid adoption of hybrid clouds means networks are now more distributed than ever before and business values are shifting toward agility, innovation and software, leading to the rise of the software-defined enterprise.

    Hybrid cloud adoption is also driving three strategic technology trends: zero trust, SD-WAN and SASE. Going forward, IT teams must grapple with these key trends, while managing a combination of in-house and service-provider solutions and balancing risk management with business objectives and customer experiences. How should we think about computing, networking, and security when enterprises own less infrastructure, platform and software?

    In this session, you’ll learn:
    - strategies to deploy adaptive cloud security, zero trust, SD-WAN and SASE in an integrated fashion;
    - practical strategies to secure hybrid clouds; and
    - how to deliver better outcomes and experiences.
  • SASE for the Hybrid Workforce Recorded: Aug 18 2021 62 mins
    Diana Kelley, Host | Jonathan Nguyen-Duy, Fortinet | Mark Guntrip, Menlo Security | Charles Kolodgy, Security Mindsets
    In the last year, the move to remote and hybrid working models - and newly distributed employees accessing data from distributed locations - has opened up a need for more stringent and secure network access security models.

    This is balanced with the need for remote employees to have access to reliable, low-latency access and connectivity to cloud and data center applications. So what’s the solution? According to many, it’s SASE. SASE provides a flexible, simplistic no-fuss, secure access model and Gartner predicts that by 2024, at least 40% of enterprises will have explicit strategies to adopt SASE. But what is SASE and why is it being heralded as the future of network security?

    Join us in this episode of The (Security) Balancing Act as security experts discuss:

    - What exactly SASE offers that traditional network security controls don’t
    - How SASE adoption has been in part fuelled by the pandemic, and what this means moving forward into the ’new normal’
    - The future of secure access models, and what to expect over the next 12 months
    - And more
  • 2021 ‘Year of the Hybrid’ and How it Impacts Governments Recorded: Aug 10 2021 54 mins
    Jim Richberg, Federal CISO, Fortinet
    2021 will be a year of blended activity by organizations, employees, and threat actors alike. Work patterns and locations will continue to shift, process automation will affect how organizations operate and support their customers and citizens, and threat activity will evolve in terms of types of attack, tactics, and impact. We’ll discuss changing trends in federal, state and local governments and how this impacts their ability to protect their people, systems and data.

    Join us to hear:

    - What governments are doing in response to this changing dynamic
    - Lessons learned that can help public sector organizations in this hybrid mode
    - Recommendations on three specific areas your organization should focus on to expand your digital services efficiently and securely -- even if your security budgets are declining.
  • Protecting the Expanding Attack Surface of Line of Business Web Applications Recorded: Jul 27 2021 46 mins
    Zeus Kerravala, ZK Research, Brian Schwarz, Fortinet
    As Web applications, and the APIs that support them, increasingly become the front door to your most critical line of business applications, your security posture must evolve to cover the full attack surface. Basic NGFW and WAF controls aren’t enough - a comprehensive solution must extend to include advanced detection, bot mitigation, and API security controls. As we add these additional controls, however, you don’t always have the luxury of expanding your security team so you also need solutions that are easy to manage and deploy.

    Join us to learn how Fortinet delivers security solutions that follow your applications and data and deliver consistent, seamless security and streamlined operations across all clouds.

    What You Will Learn:
    * How a consistent Web Application and API security solution can enable line of business web applications
    * How increasing use of APIs changes the attack surface of your most critical Web applications
    * How to maintain a consistent security posture across all of the cloud providers you rely on
  • Ethical Hackers: Redefining The Security Landscape Recorded: Jul 14 2021 61 mins
    Diana Kelley, SecurityCurve | Jim Richberg, Fortinet | Nuno Almeida, BitSight | Luke Tucker, HackerOne |
    As security breaches and attacks become more sophisticated and complex, managing your vulnerabilities and gaining a human perspective on your security gaps is an effective way to protect your attack surface.

    With 34% of ethical hackers and vulnerability researchers reporting that they have seen more bugs due to pandemic-driven Digital Transformation initiatives (HackerOne), now is the time to integrate a human element into your security controls.

    In this episode of The (Security) Balancing Act we’ll deep dive into the threat landscape, looking at why the insights of an outsider might be just what your organization needs.

    Join us as we discuss:

    - The value ethical hackers and vulnerability researchers can bring to your organization
    - Why ethical hackers and vulnerability researchers are more valuable now than ever before
    - Considerations for crowdsourcing ethical hacking and penetration testing
    - How bug bounty programs benefit companies and the research community
    - What to know if you are thinking of launching a bug bounty program
    - How ethical hackers and vulnerability researchers enhance vulnerability management
    - The 2021 threat landscape
  • Practical Strategies for Getting Cloud, Security and Networking Right Recorded: Jun 22 2021 44 mins
    Jonathan Nguyen Duy, Cloud CISO, Fortinet
    Enterprise IT strategies are driving the dynamics of centralized and distributed computing. Indeed, one could say that networking and security always follow the compute. Rapid adoption of cloud means networks are now more distributed than ever before and business value is shifting to agility, innovation, and software - leading to the rise of the software defined enterprise. Cloud adoption is also driving three strategic technology trends: Zero Trust, SD-WAN, and SASE. Going forward, IT teams will have to grapple with these key trends.

    Join cybersecurity experts from Fortinet and Cybersecurity Insiders for this live webinar to explore:
    • Consideration for managing a combination of in-house and provider solutions and balancing risk management with business objectives and customer experiences.
    • How to think about computing, networking, and security when enterprises own less and less infrastructure, platform, and software?
    • Practical strategies for securing clouds while delivering better outcomes and experiences.
  • Zero Trust for the New Normal Recorded: Jun 16 2021 61 mins
    Diana Kelley, SecurityCurve| Mari Galloway, Women's Society of Cyberjutsu | Jonathan Nguyen Duy, Fortinet | Bob Rudis, Rapid7
    Working remotely has become the new normal. This, and many other changes organizations adopted last year in response to the pandemic are likely to stay for the long term. According to Gallup, about two-thirds of U.S. remote workers want to continue to work remotely. So, how can organizations continue to support their growing distributed workforce at a time where reports of security threats have increased by 400% compared to pre-pandemic levels? 

    Here is where the zero-trust approach to security comes into play. 

    Join this month's episode of The (Security) Balancing Act with Diana Kelley and guests as they discuss the emergence of zero trust (“Trust Nothing, Verify Everything”) and what it helps achieve for enterprises in the age of cloud and remote work.

    Viewers will learn about:
    - The evolution of the security perimeter and the shift to zero trust
    - Why zero trust is an approach and not a product
    - Zero Trust Network Access (ZTA) vs. corporate VPN
    - Real-world stories and practical hands-on guidance from people who have deployed a ZTA

    Speakers:
    - Mari Galloway, CEO, Women's Society of Cyberjutsu
    - Jonathan Nguyen Duy, Vice President, Global Field CISO Team, Fortinet
    - Bob Rudis, Chief Data Scientist, Rapid7

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • Ransomware in the Remote Work Era Recorded: May 12 2021 61 mins
    Diana Kelley, SecurityCurve | Nicole Hoffman, GroupSense | Courtney Radke, Fortinet | Patrick Lee, Rapid7
    Phishing and ransomware attacks continue to rise, according to Proofpoint’s State of the Phish report for 2020. Organizations in the U.S. are at risk, the increase in remote work due to the pandemic has fueled a spike in attacks, and phishing attempts are up by 14 percent compared to the previous year.

    Email continues to be the number 1 delivery vehicle, but other social engineering schemes that rely on social media, voicemail (“vishing"), SMS phishing (“smishing”), and malicious USB drops are also of concern for organizations. Ransom demands are also on the rise, but according to the report, paying the ransom is not guaranteed to work as many companies that paid the ransom failed to receive a decryption key.

    Join this month's episode of The (Security) Balancing Act as Diana Kelley and guests discuss why ransomware is surging again, which sectors are most at risk, the threat to enterprises and how it is being used for more than just ransom (ex: distractionware, destructionware, etc).
    - The rise in ransomware under the cloak of the pandemic
    - Why email continues to be the channel of choice
    - The difference between fully automated and human-operated campaigns
    - How to decide whether or not to pay or not to pay the ransom
    - Why your backups may not be immune to ransomware
    - Addressing the threat with best practices

    Speakers
    - Nicole Hoffman, Intelligence Analyst, GroupSense
    - Courtney Radke, CISO for National Retail, Fortinet
    - Patrick Lee, Senior Incident Response Consultant, Rapid7

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • Taking Down Nation State Botnets Recorded: Apr 14 2021 59 mins
    Diana Kelley, SecurityCurve | Johna Till Johnson, Nemertes Research | Craig Harber, Fidelis | Derek Manky, Fortinet
    This month's episode of The (Security) Balancing Act will focus on botnets as a growing threat to the enterprise, examples from the real world, and what enterprises can do to better protect against botnet-fueled state sponsored attacks.

    Join this interactive roundtable discussion with security experts and industry leaders to learn more about:
    - How botnets have become a tool for cyber criminals and nation state actors
    - Real-world examples & known botnet attacks
    - Nation state ransomware attacks
    - DDoS attacks
    - Cyber espionage
    - ATPs
    - The trouble with attribution
    - What enterprises and governments can do to address the threat

    Panelists:
    - Johna Till Johnson, CEO and Founder of Nemertes Research
    - Derek Manky, Chief, Security Insights & Global Threat Alliances, Fortinet
    - Craig Harber, Chief Customer Success Officer, Fidelis

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • How to architect a security-driven networking strategy in the AWS Cloud Recorded: Mar 25 2021 61 mins
    Fortinet & AWS
    Architecting a security-driven network provides flexibility for highly dynamic environments, allowing organization-wide networks to scale and change without compromising security and performance. A security-driven network is stronger when created with a defense-in-depth approach through layered security tools, controls, and techniques.

    In this webinar, SANS and AWS Marketplace will discuss how to create a security-driven networking strategy for the AWS Cloud. They will cover technologies, processes, and policies that can be used to enhance the security of your environment, traffic, and network-accessible assets. This includes practical guidance to execute on this strategy and insights on how tools can work together to adapt to changing network infrastructures.

    Attendees of this webinar will learn how to:
    - Protect data without compromising network performance
    - Understand layered defense strategies that encompass perimeter protection, applications, and other security zones
    - Enhance visibility and control across complex networking environments
    - Implement network segmentation to prevent unauthorized east-west movement
    - Identify AWS Marketplace third-party solutions that can work together to enable a security-driven networking strategy
Dynamic Cloud Security for AWS: Consistent multi-layered security
Fortinet Solutions for AWS Security
Many enterprises are turning to AWS to build new applications, extend internal data centers, and ultimately take advantage of the elasticity of the public cloud. While AWS security covers its infrastructure, customers are responsible for protecting everything they build and store within it.

Fortinet accelerates the journey to AWS with purpose-built cloud security. Fortinet dynamic cloud security solutions protect workloads and business applications across on-premises data centers and cloud environments—with multilayer security for cloud-based applications. Organizations can achieve: a consolidated view of their security posture, a single console for policy management and governance reporting, and event monitoring regardless of physical, virtual, or cloud infrastructure, and across private, public, and hybrid clouds.

Fortinet offers Software-as-a-Service (SaaS), virtual machine (VM), container, and API-based protection that delivers natively integrated security functionality that complements AWS services such as GuardDuty, Security Hub, and AWS Outposts. Supporting the broadest set of use cases, Fortinet products offer comprehensive security for AWS workloads including firewall, security gateway, intrusion prevention, and web application security.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 2021 ‘Year of the Hybrid’ and How it Impacts Governments
  • Live at: Aug 10 2021 3:00 pm
  • Presented by: Jim Richberg, Federal CISO, Fortinet
  • From:
Your email has been sent.
or close