It’s not just in cybersecurity that complexity can have a detrimental effect in how things work and understanding if they are performing as expected.  In cybersecurity however, complexity decreases the efficacy of the deployed technologies and increases an organization’s risk profile, the likelihood of a successful cyberattack, and the network’s Total Cost of Ownership (TCO).

Why does complexity exist?  A large part of it is from the growth in users, devices, and applications, located anywhere and everywhere - resulting in an expansion of the attack surface and the deployment of a security technology to address an immediate need.  The end result is a collection of individual products that can’t work together, disrupting visibility, hindering automation, and most importantly, restricting effective threat detection and response.

The key to reducing complexity is not to get rid of technologies but to consolidate and re-examine how the technologies are being deployed and how future technologies, including artificial intelligence (AI), can be leveraged to improve an organization’s overall security posture.

Fortinet’s Convergence23 will focus on the key drivers and market trends that contribute to complexity and how a new approach is needed to ensure that today’s networks can better meet the current and future challenges and demands being placed on it.

Join us in Monaco on 8-10 November 2023 to learn more about the dangers of complexity and how a consolidated approach to cybersecurity can enable resiliency and accelerate business outcomes.

Don't miss the keynote presentations from Michael Xie, John Maddison and Derek Manky.

Why Attend Convergence 2023?



14:00 - 14:10

14:10 - 14:30

One of the biggest barriers to effective cybersecurity is complexity in the network itself.  It’s no surprise then, give the number of column inches that it has generated, to learn that AI is the secret ingredient to reducing complexity.  While AI certainly has a role to play in cybersecurity, the question is at “what cost”.  This session will look at AI through a different lens, examining it from a societal, ethical, and environmental perspective.

Gerd Leonhard
AI and the Future of Business, Society and Humanity
The Futures Agency

14:30 - 14:50

Cybersecurity is increasingly challenged due to the sheer number of sophisticated threats and attacks facing enterprises.  In responding to these challenges, organizations inadvertently end up with a complex mix of technologies that hinders their ability to detect and respond to attacks.  However, there are two key principles that organizations can follow to combat complexity - Convergence and Consolidation. 

John Maddison
Chief Marketing Officer

14:50 - 15:10

Organizations have many network and security technology choices available to them and will often piece any number of them together.  This approach may work but will the resulting collection of products work together effectively and efficiently as planned.  Identifying and removing performance bottlenecks in both the network and its cybersecurity infrastructure is key to maintaining an optimum security posture.

Filippo Cassini Cassini
Global Technical Officer, SVP of Engineering, Head of Pre-sales

15:10 - 15:30

Operational Technology – OT - whether manufacturing, critical infrastructure, or building management systems is often overlooked from a cybersecurity perspective.  While often a primary target of cyberattacks, cyber-physical systems – both industrial and non-industrial – are also targeted because of IT-OT convergence and the inter-dependencies between IT and OT.While OT environments have specific requirements, the technologies, best practices, and products used to protect IT networks are also relevant in OT.

Antoine D'haussy
OT Security Practice Head EMEA

15:30 - 15:50

NIS2. DORA. PDPL. Egypt Fintech Law. Organizations are faced with a wide array of national and regional regulations from data protection and privacy to incident reporting and beyond.  While each one of the individual regulations is written for a specific purpose, organizations face a significant challenge ensuring that they are compliant to each one. Cybersecurity decisions must go beyond the “bells and whistles” and include how it supports an organization’s compliance efforts.

Ricardo Ferreira

16:30 - 16:50

Secure SD-WAN and SASE are both prime examples of the convergence between networking and security but have largely evolved into two separate use cases with organizations managing two separate solutions, increasing operational complexity.  But the time has come for these converged solutions to themselves converge, creating a single solution that satisfies both use cases, reduces complexity and gives organizations greater flexibility in supporting their digital initiatives.

Nirav Shah
VP, Products and Solutions

16:50 - 17:10

Whenever “Security Operations” is mentioned, the image of engineers sitting in front of a bank of monitors immediately comes to mind.  But Security Operations is more than just monitoring events and alarms.  Threat detection and response, across the organization’s attack surface and beyond, is a critical part of Security Operations and relies on several different technologies beyond the SOC.  But these technologies must be designed to work together for optimal operation and avoid introducing complexity into an already complex environment.

Kash Valji
Senior Director Consulting Systems Engineering

17:10 - 17:30

From the on-premises datacenter to Software as a Service (SaaS), from VMs and containers to serverless computing, Cloud technology never seems to stop evolving.  While the upside of evolution brings increased opportunity, the downside is complexity that interferes with properly securing cloud assets, introducing risk.  But within the cloud itself are the solutions that enable organizations to take advantage of everything that cloud has to offer – supported by flexible licensing - and not compromise on security.

Bartek Moczulski
Consulting Systems Engineer, Public Cloud

09:00 - 09:10

09:10 - 09:30

Cybersecurity never stops evolving and the new era that we are entering requires that we look beyond the technology and focus on proactive measures, resilience, and adaptability. From the rise of quantum computing and AI to the importance of public awareness and collaboration, the journey ahead requires a comprehensive, forward-thinking approach.

Michael Xie
Founder, President, and CTO
Melih Kirkgoz
Senior Director Solutions Architecture

09:30 - 10:00

2024 will soon be upon us and this is the perfect time to get a sneak preview of what might be in the annual FortiGuard threat predictions.

Derek Manky
Global VP Threat Intelligence

10:00 - 10:20

Regardless of the prevailing economic climate, investments in technology will not stop. In fact, the latest figures even indicate a 26% CAGR from 2023 to 2030.   But even with this projected growth, cybersecurity purchasing decisions should look beyond the final purchase price.  A structured cybersecurity strategy must include both a technological and financial perspective including innovative licensing options to maximize protection and investment return.

Alain Sanchez

10:20 - 10:50

Technology is the enabler of today’s digital world.  But when technology is compromised, are the consequences beyond the financial impact fully appreciated?  In this moderated round table discussion, participants will examine the proposition that cybersecurity should be thought of in terms other than as a technology. 

Derek Manky
Global VP Threat Intelligence
Adrian Koltermann
Victor Gimeno Granda
Venture Capital Managing Director | Chief Sustainability & Digital Officer
Capital Energy

11:30 - 11:50

Although networks are constantly evolving, the firewall remains the cornerstone of any cybersecurity strategy.  But the firewall must evolve as well to meet new challenges and requirements. The Hybrid Mesh Firewall concept, recently announced by Gartner, picks up where a Next Generation Firewall leaves off, providing consistent functionality, protection, and management regardless of form factor or network placement.

Benjamin David
Sr. Director Systems Engineering

11:50 - 12:30

Anticipating the future is a key part of any organization’s strategy.  In cybersecurity, looking ahead is more than just the shiny new box, it’s about finding the right balance between technology, people and process to best equip organizations to meet the challenges in combating the threat landscape.

Carl Windsor
SVP Product and Technologies

12:30 - 14:00

Converged Secure Networking

Cybersecurity Operations

Securing Cyber-Physical Systems in OT

14:00 - 14:30

Users, devices, and applications.  All of these are network edges and each one represents a potential weak link in the security chain.  It’s not a question of whether to secure each of these edges but rather how to secure them and improve the overall security posture of the network. This session will focus on how a strategic security approach ensures maximum protection while minimizing complexity at the same time.

Patrick Grillo
Sr. Director, Solutions Marketing

The Security Operations Center (SOC) is the nerve center of any response to a cyber-attack.  Having the right tools and the right information when it’s needed are critical to a successful defense. This session will focus on the critical technologies that every SOC should have and the role of Threat Intelligence in incident response.

Kash Valji
Senior Director Consulting Systems Engineering
Mehdi Halit
Sr. Manager Solutions Marketing

OT assets owners, vendors, and the larger OT ecosystem is evolving at an ever-increasing pace. Convergence, advanced wireless, the sustainability journey, the threat landscape, and changing regulation are all at play. This session will focus on determining the cybersecurity impact and what is needed to be able to securely enable your OT evolution? 

Daniele Mancini
Ronen Shpirer
Director, Telco Solutions Marketing
Antoine D'haussy
OT Security Practice Head EMEA

14:30 - 15:00

Secure Service Access Edge, or SASE, is one of the most disruptive networking trends in decades. But with a wide range of use cases and requirements, not all SASE offerings are able to support both remote users and location. FortiSASE is a single-vendor SASE offering with integrated SD-WAN capabilities and enables universal ZTNA for all users.

Dragoslav Joksimovic
Consulting Systems Engineer

“Sometimes the best defense is a good offense” is an often-used sports expression.  But it also applies to cybersecurity. Cutting edge technology now gives organizations the ability to proactively protect themselves rather than responding reactively to an attack. This session will focus on the technologies that are key to this transformation.

Ahmad Arafat
consulting Systems Engineering Manager

OT asset owners and vendors drive innovation and enable increased efficiency, lower cost of ownership and a better ROI through adoption of various cutting-edge technologies. Cybersecurity is no different. 
This session will introduce Fortinet’s Single-Vendor SASE solution and how it enables a wide breath of dynamic cybersecurity capabilities in an OT ecosystem with simplicity, flexibility, and cost effectiveness.

Antoine D'haussy
OT Security Practice Head EMEA
Ronen Shpirer
Director, Telco Solutions Marketing

15:45 - 16:15

Since its introduction in 2016, the Fortinet Security Fabric has always included Cloud Security. But as cloud has become a bigger and bigger part of an organization’s digital strategy, the role that security must play has become bigger as well. This is why Fortinet has evolved cloud security to the CloudSec Fabric, a key subset of the Fortinet Security Fabric. This session will focus on the “What is it”, “Why the change”, and “How to create a CloudSec Fabric” for my organization.

Bartek Moczulski
Consulting Systems Engineer, Public Cloud

It is often said that “Complexity is the enemy of security” and its most noticeable impact is on time. Manually sorting through logs and alarms dramatically lengthens the amount of time it takes to detect when there has been an incident and even longer to respond. The key to combating this is automation. This session will focus on the role that Security Orchestration Automation and Response (SOAR) technology plays in an automated SOC.

With the NIS directive being enforced in all EU countries and its version 2 taking effect on October 2024, Information Sharing and Cyber Risk Management in compliance with OT cybersecurity frameworks are critical for Critical Infrastructures across several industrial vertical. This session will look at what does this directive mean for asset owners, and what is needed to get ready to comply?

Antoine D'haussy
OT Security Practice Head EMEA
Daniele Mancini

16:15 - 16:45

One of the key drivers for Cloud has always been increased flexibility, both in deploying resources as well as in the OPEX versus CAPEX financial model.  But as the cloud continues to evolve, additional flexibility is needed.  This panel discussion will focus on the different licensing options, known as Fortinet Flexible Service (FortiFlex),  to enable organizations to maximize their investments in their cloud strategy.

Lisa Lewison
Head of AWS Marketplace Engagement Success
Sdnei Avelar
Director, Product Management
Tonny Roelofs
Cloud Strategy Lead EMEA

Technology is essential but regardless of claims about AI replacing humans, the human element is still very much needed in cybersecurity. Threat readiness and professional services are just two of the services that can dramatically increase the effectiveness of Security Operations. This session will focus on the different services available from Fortinet that can improve the efficacy and efficiency of Security Operations.

Hatem Dridi
Sales Services Manager
Paolo Grassi
Sr Director Product Management
Hector Agustin Cozzetti
Senior Security Consultant
Frederique Tenthoff
Business Development Manager

OT consists of a fast-evolving ecosystem of assets, technologies, and services – all working together to deliver a desired set of outcomes - and the role of technical partnerships between ecosystem players is a key enabler. Fortinet is delighted to host Schnieder Electric to demonstrate how the two companies’ technical partnership delivers greater value working together. 

Antoine D'haussy
OT Security Practice Head EMEA
umberto cattaneo
EURA Cybersecurity Business Consultant director

16:45 - 17:30


Delegate Fee

A delegate fee of €695 is applied upon registration. 

Monaco Fairmont Hotel