Convergence – Beyond Digital Transformation
As organizations continue to evolve along their digital transformation journeys, the phenomenon of convergence is taking place. More and more use cases are being developed where technologies that had previously been distinct and separate are being integrated and deployed together. These use cases disrupt traditional ways of doing things across multiple segments of the market, generating greater flexibility, reactivity, and cost savings.
The inaugural Fortinet Convergence, Beyond Digital Transformation, took place in Monaco 18-20 October 2022, and it examined how the intersection of these technologies' impacts - and disrupts – enterprises, service providers, and every digitally-dependent organization. With over 350 attendees from across EMEA, delegates benefited from informative presentations, focused panel discussions, and insights from multiple industry voices on the evolution of technology and the cybersecurity needs of the digitally transformed enterprise.
Click on Watch On-Demand and access using your registration credentials.
If you have any questions, please contact us at email@example.com
Day 1 wrap-up video
Day 2 wrap-up video
14:00 - 14:10
An interview with Patrice Perche, about how Fortinet sees convergence and consolidation affecting our customers' decisions and how Fortinet is empowering them to reduce complexity while maintaining superior performance, providing operational and financial benefits to connect and protect the business.
14:10 - 14:30
Technology is the underpinning of digital leadership and brings both advantages and challenges. In order for any digital effort to succeed, the security of the underlying network is crucial. This session will focus on addressing the challenges that digital technologies bring.
14:30 - 14:50
The next 10 years will bring more change than the previous 100 years - a decade of utter transformation is ahead of us. What we do in the next 10 years is likely to set course for the future of humanity, period. Along with the ongoing digital revolution we are now in the midst of the sustainable (green) revolution, and soon to be joined by the human revolution (the convergence of biology and technology). Green is the new digital, and sustainable is becoming the new profitable. As we leap further into the exponential age, the future is clearly no longer an extension of the present, and it's no longer about 'tomorrow', either - the future is a mindset, and it's already here. Science fiction is increasingly becoming science fact as we head towards super-computing and super-connectivity, Web3, VR/AR and the Metaverse, and Intelligent Assistance -(IA)-everywhere. We now need to take a holistic and inclusive view when leading the transformation of our enterprises and organizations and consider the impact as well as the externalities of exponential technological change on our customers and clients, our people and our brand, as well as on the world-at-large. Strong leaders in this dawning era of digitization, decarbonisation and reformation will take a wider view, and practice 'coming back from the future’ 10 years out in order to make the right decisions, today: A future-ready enterprise gets to the future ahead of its customers and is ready to greet them when they arrive. Gerd will show what's ahead in the next decade, why 'the future is better than we think' and how to develop a Future Mindset.
14:50 - 15:10
A privileged glimpse into how technology is transforming the world of professional golf.
15:10 - 15:30
Disruptive innovative is a familiar phenomenon where technology is involved but rarely crosses distinct boundaries. This session will look at the disruption, and the potential that comes with it, as a result of the coming together of these three entities.
16:00 - 16:20
Zero Trust is getting a lot of headlines lately after languishing for several years. What hasn’t changed is the confusion over what exactly is Zero Trust, do I really need it and how can I get it. This session will cut through the confusion and focus on the value that Zero Trust can bring to any organization - as a philosophy, an architectural strategy, and any number of different technologies such as segmentation and identity and access management.
16:20 - 16:40
Whether called Secure SD-WAN, Zero Trust Edge, SASE or SSE it’s all about the convergence of networking and security. To make sense of this confusion there are 5 parameters to keep in mind - Who, What, Where, Why, and How? These are the key questions that should be addressed when evaluating the different options for converged networking and security to understand which approach best fits the organization’s requirements.
16:40 - 17:00
A key obstacle in effective cybersecurity protection is the lack of automation by the technologies themselves. This is compounded by the lack of highly skilled professionals who can quickly digest an event and take appropriate action. This session will look at how automation should be an integrated part of any cybersecurity infrastructure.
Advances in enterprise wireless technologies, such as WiFi-6E/7 and private 5G, are enabling greater and accelerated transformation in different verticals and use cases. This session will touch on business, technology, and security considerations of using advanced wireless technologies as an enterprise strategic asset.
09:10 - 09:30
The one constant in cybersecurity is the threat landscape - it never stops growing in volume, intensity, and creativity. For all of its promise, digital transformation has also been a feeding ground for advanced threats. This session will focus on the current “state of the threat” as well as looking at emerging trends.
09:30 - 09:50
Predictions for the future are easy to come by but in the midst of talk about the “Next Big Thing”, leaders need to focus and guide their organizations through a myriad of short and mid-term challenges that can have a greater impact on organizations and their security posture.
This session will feature Michela Menting of ABI Research who will give her insight into the concrete elements impacting the enterprise and share practical guidance on how to manage the risk and disruption that can be expected.
09:50 - 10:20
Although Cloud is a well-established component of digital transformation, questions about how secure it is are often at the top of any survey about barriers to its adoption. This session will look at the truths, half-truths and myths surrounding the relationship between the cloud and security.
10:20 - 10:40
Threat detection technologies are widely accepted and deployed in the typical enterprise network. But with the average “time to detect” greater than 6 months, threat detection needs to change to a more proactive approach. Can classic prevention and detection motions be complemented by deception and reconnaissance technologies to level the playing field?
11:10 - 11:30
The technology has been decided and the vendor chosen. What’s next? All too often it’s delays and missed targets due to underestimating the tasks at hand. This session will focus on the role of professional services as an accelerator to digital success.
11:30 - 11:50
With the convergence of multiple security products into a consolidated platform, such as the Next Generation Firewall, the resulting security services are often overlooked as discrete functions. However, these services must be continually updated to keep pace with the threat landscape to maintain their efficacy. This is the role of FortiGuard Threat Intelligence. This session will focus on how the FortiGuard ecosystem operates and the
business value that it provides.
11:50 - 12:10
Is digital transformation the end game in an OT environment or is it a launching point for a “new” OT network? Regardless, this session will present the “state of play” in OT, what’s new, and the potential for continued change through the adoption of non-traditional technologies such as cloud and 5G.
12:10 - 12:30
14:00 - 15:30
Work From Anywhere (WFA) is a perfect example of convergence – a social trend enabled and supported by a number of different technologies. This session will explore the three principal scenarios of WFA – Office, Home and Mobile – and the integrated mix of networking, cybersecurity and endpoint technologies needed to provide a seamless and consistent location-independent security profile that doesn’t increase operational complexity, for neither the end user or the network.
The rise in both ransomware and sophisticated attacks that are easier to launch and harder to detect is fueling the development of 24/7 security operations center (SOC), designed to identify, detect and respond to potential cybersecurity threats.The session will explore why and how to build and operate a next-generation SOC leveraging modern technologies like SIEM, EDR/XDR, SOAR, artificial intelligence (AI) and machine learning (ML). These technologies, when combined to other deception and broad digital risk protection solutions, help close the gaps to move from reactive to proactive and threat hunting operations.
Security Operations : Why?
Strategic imperatives and real-world learnings
The How? Choosing the right technologies and models
Best practices, technologies and keys to success
Automation, Deception and Reconnaissance for enhanced Next-Generation SOC
Traditional SOC vs Next-generation SOC, moving from manual to orchestrated and automated operations
Digital initiatives are critical to the success of production and operations in every industrial sector, with benefits in customer responsiveness, asset utilization, reducing downtime, and many others. Of course, as with most things, there are costs that go along with the benefits. One is that the interconnection of production technologies with IT opens up the formerly closed world of OT to cyber attack. This session will look at successful deployments of defenses in depth: security solutions designed to gain visibility into all assets, secure access to assets, identify threats before an attack, limit the scope of attacks that do occur, and respond effectively to incidents.
16:00 - 17:30
Addressing the need for convergence of Networking and Security everywhere to deliver consistent security and superior user experience. How hybrid infrastructure requires the approach of Single vendor SASE approach to drive to operation efficiency, shift to OPEX based business model, and consolidate multiple solutions across SWG, Universal ZTNA, Dual-mode CASB, FWaaS and SD-WAN to secure access to web, private applications and cloud services.
Cloud, in all its guises, is now key to digital success, and cybersecurity a critical ally. So what sets digital leaders apart?
Let’s take a look at why, how, and what it takes to change cybersecurity from an obstacle, a hindrance, or simply an obligation into a business accelerator that enables digital success.
Cloud Journey Insights
Real-world learnings and best practices from digital leaders
Rising to the Challenge
Tackling risks, threats, and resilience in a Cloud Native World
Security by Design and DevSecOps
Real-world security agility in action
Through the continued use of case studies, Part II will shift the session’s focus to the key solutions and integrations of key partners like Claroty and Nozomi in the OT ecosystem.