19-22 November 2024, Hilton Hotel, Prague
CONVERGENCE24 - The Cybersecurity Journey Continues
The changes in cybersecurity over the past 20 years have been continuous but incremental, never achieving the goal of delivering simplicity, flexibility, and agility - crucial elements in an organization’s quest for cyber resilience – in which cybersecurity need to play a key role.
Recent trends such as the convergence of networking and security and vendor consolidation have brought cybersecurity closer to its goal. When these are brought together to create a cybersecurity platform - leveraging commonality across multiple aspects such as management, threat intelligence, and AI-driven services – simplicity, flexibility, and agility become reality.
CONVERGENCE24 will focus on the drivers behind the key trends impacting how organizations need to protect themselves against today’s hyper-threat landscape, respond to an increasing number of regulations, and how simplifying a cybersecurity infrastructure can deliver operational simplicity and superior threat protection.
Join us in Prague, Czech Republic on 19 – 22 November to learn how you can benefit from convergence, consolidation, and the platform approach to cybersecurity.
Registration for Fortinet’s CONVERGENCE24 is now on Waitlist! If you wish to join the event, please register your interest and we'll get back to you as soon as possible.
LEARN...
...Get valuable insight into the challenges and trends impacting cybersecurity strategies and best practices.
SHARE…
…Share perspectives with Fortinet executives and subject matter experts on the solutions that matter most to your organization.
NETWORK…
…Meet peers from across EMEA and exchange common experiences to gain a new perspective on the challenges all organizations face in today's fast-moving climate.
CONVERGENCE23 Snapshot
PLENARY
09:00 - 09:10
CONVERGENCE24 Master of Ceremonies
09:10 - 09:20
09:20 - 09:45
Distinguishing the hype from the reality of what Generative AI can do in the realm of cybersecurity is confusing and can prevent organizations from appreciating its real value. This session will cut through the noise and provide a grounded perspective of the role of AI in improving cybersecurity capabilities.
09:45 - 10:05
Generative AI changed everything that we thought we knew about AI and cybersecurity. This session will look at how Fortinet responded to the disruption and how it has taken advantage of this next generation of AI.
10:05 - 10:25
Users, applications, transactions – this chain of events is so ingrained into our lives that we don’t give it a second thought, taking for granted the intrinsic relationship between the user and their device, the network, and the application. A relationship that only works when there is a contiguous, end-to-end, security relationship. This session will focus on the synergy between the different technologies securing the remote user, the network, and the applications.
10:25 - 11:10
11:10 - 11:30
When evaluating the different SASE solutions currently on the market, looking beyond the roadmap of features will give real insight to the solution with the greater value, a solution that will evolve as the organization’s requirements evolve. This session will focus on bigger picture that transforms SASE into Unified SASE.
11:30- 11:50
The legacy of Security Operations is about discovering and understanding something that happened in the past. But today’s threat landscape requires organizations to be operating in real-time and to anticipate the future. This session will focus on the matrix of technologies that are needed to give organizations insight into the past, the present, and the future.
11:50 - 12:20
A key component of modern security operations is threat detection and response but shouldn’t be limited to the traditional, physical network. The very nature of cloud environments requires security including threat detection and response. Cloud Native Application Protection Platform, CNAPP, provides comprehensive capabilities including threat detection and response. This session will focus on the role of CNAPP within a larger cloud security structure.
12:10 - 12:30
IT, OT, IoT, Cyber-Physical Systems. The names and use cases might have changed but the need for a consolidated cybersecurity approach has not. Whether manufacturing, utilities, or non-industrial critical infrastructure, these different environments share the same needs for comprehensive protection.
12:30 - 14:30
BREAKOUT SESSIONS
Breakout Sessions Topics
Fortify Your Networks
This track will focus on the different network and cloud security technologies needed by today’s enterprises.
Leveraging the Security Operations Platform
This track will focus on the components that make up the Security Operations platform across its different functional areas.
Tackling the OT and Cyber-Physical System Security Challenge
This track will focus on the requirements of traditional and emerging CPS segments and how a common platform approach to security applies equality to all domains.
The "C" Level Perspective
This track will focus on a number of key topics that while of interest to any attendee, will be of particular interest to “C” level attendees.
First Session
14:30 - 15:00
From introduction to mainstream acceptance in only 5 years, SASE as a replacement for VPN remote access is well entrenched. But SASE needs to be more than just a remote access replacement, it needs to continuously evolve to keep up with market demands and use cases. This session will focus on how Unified SASE is embracing the concepts of Continuous Integration/Continuous Deployment to drive it forward in a competitive market.
Pedro Briceno
Principal Consulting Systems Engineer, Fortinet
Claudio Salmin
Senior Director- Product Management, Fortinet
Threat intelligence is key to staying ahead of cyber threats. Join us to understand adversaries' tactics, techniques, and procedures (TTPs), and how security teams can quickly respond to incidents and minimize damage.
Kash Valji
Senior Director Consulting Systems Engineering, Fortinet
Convergence and digital transformation are driving OT environments and use cases at an accelerated rate. This session will focus on the key factors and cybersecurity challenges this evolution entails.
Antoine D’Haussy
OT Security Practice Head EMEA, Fortinet
Ronen Shpirer
Director Solutions Marketing, Fortinet
As Augmented Reality, Artificial Intelligence, and IoT are already contributing to the performance and productivity of millions of jobs, what are the cyber strategies and solutions that can mitigate the inherent risks?
Alain Sanchez
EMEA Field CISO, Fortinet
Second Session
15:00 - 15:30
There is a philosophical difference of opinion in the market regarding where security should be located - on-premises or in the cloud? Regardless of your organization’s point of view, the choice of SD-WAN should be able to accommodate both options. This session will focus on the evolution of functionality of Fortinet’s SD-WAN and how it supports both environments equally.
Guillaume Faveeuw
Senior Systems Engineering Manager, Fortinet
Managing both external and internal attack surfaces is crucial for robust cybersecurity to proactively identify and fix vulnerabilities before attackers can exploit them. This session will focus on continuous attack surface monitoring and management solutions.
Ahmad Arafat
Manager Consulting Systems Engineering, Fortinet
Although OT is key component in many verticals ability to operate, each vertical has its unique environments, requirements and use cases. This session will highlight verticals’ key differences and commonalities – and their cybersecurity impact.
Antoine D’Haussy
OT Security Practice Head EMEA, Fortinet
Ronen Shpirer
Director Solutions Marketing, Fortinet
In a rapidly changing world, resilience, agility, and flexibility are essential for business success. This session explores how optimizing Total Cost of Ownership (TCO), leveraging generative AI, and the application of ESG principles can empower organizations to navigate uncertain ground.
Ricardo Ferreira
EMEA Field CISO, Fortinet
15:30 - 16:15
Third Session
16:15 - 16:45
For too long, securing the access layer of a network was independent of how the network itself was secured. Convergence is the dynamic that changes this. Whether a remote site or campus environment, security for the access network – wired and wireless – should be an extension of the network’s security posture. This session will focus on how the concept of convergence makes this a reality.
Flavien Richard
Director CSE, Fabric Solutions, Fortinet
Unified Endpoint Security provides a streamlined, efficient approach to managing and protecting an organization’s endpoints. This session will explore Fortinet's unified endpoint security solutions that simplify the complexity of multiple endpoint solutions and enhance security posture.
Mokrane Hellal
Senior Consulting Systems Engineer, Fortinet
The ability to deploy an effective and efficient OT cybersecurity must rely on a common platform that provides the foundation for evolution and customization for all verticals and use cases. This session will outline Fortinet’s OT-CSP cybersecurity platform for all verticals.
Antoine D’Haussy
OT Security Practice Head EMEA, Fortinet
Jose Grandmougin
Sr Director Systems Engineering, Fortinet
What are the strategic implications of the Cloud in the new geo-political order? As concepts like sovereign clouds are emerging, are we about to witness blocks of clouds as we see new alliances reshaping our global village? How can a global company cope with the deglobalization trends as it shapes its global data strategy?
Daniele Mancini
EMEA Field CISO, Fortinet
Fourth Session
16:45 - 17:15
Hardware has some clear advantages but also some clear disadvantages such as the upfront purchase and its on-going maintenance. An emerging service, Hardware-as-a-Service, is changing this. This session will focus on the new FortiGate-as-a-Service offering and how this innovation service is enhancing the positive and minimizing the negative.
Patrick Grillo
Sr. Director Solutions Marketing, Fortinet
Detecting and isolating sophisticated human and automated attacks early before they inflict serious damage is a powerful strategy. Join this session to gain essential insights on implementing and utilizing deception technology to enhance a proactive security.
Raul Barragan
Principal Consulting Systems Engineer, Fortinet
The adoption of private mobile networks (4G and 5G) in industrial environments is growing. This session will outline some of the key use cases and their cybersecurity impact and solutions within an OT environment.
Ronen Shpirer
Director Solutions Marketing, Fortinet
Simon Bryden
Sr Manager Consulting Systems Engineering, Fortinet
Conclusion and wrap up
17:30 - 18:30
BREAKOUT SESSIONS
Breakout Sessions Topics
Fortify Your Networks
This track will focus on the different network and cloud security technologies needed by today’s enterprises.
Leveraging the Security Operations Platform
This track will focus on the components that make up the Security Operations platform across its different functional areas.
Tackling the OT and Cyber-Physical System Security Challenge
This track will focus on the requirements of traditional and emerging OT-CPS segments and how a common platform approach to security applies equality to all domains.
Partner Track
This track will focus on the value of partnership delivery by our tech partners sponsoring the event.
First Session
9:30- 10:00
The principles of convergence and consolidation are as valuable in cloud environments as they are on-premises. This session will focus on the latest ways to make resilience simpler and more effective for each cloud environment an organization may choose.
Bartek Moczulski
Consulting Systems Engineer Public Cloud, Fortinet
The growing volume, sophistication, and complexity of cyber threats are challenging traditional security measures. Discover how FortiAnalyzer, our Fabric analytics solution, addresses these challenges, harnessing AI assistance for real-time threat detection and automated responses.
Roland Stierli
NOC & SOC Team Lead, Fortinet
As the regulatory landscape densifies, cybersecurity has a key role to play in enabling OT organization to comply. This session will discuss the key cybersecurity mechanisms and best practices required to support regulatory compliance.
Daniele Mancini
EMEA Field CISO, Fortinet
Antoine D’Haussy
OT Security Practice Head EMEA, Fortinet
As enterprises move to the cloud, the usage of local Internet access is increasing, along with the presence of untrusted devices like guests, BYOD, and IoT.
Join us to learn how a joint Cloudi-Fi and Fortinet solution provides a unique cloud-based SaaS platform to manage Internet access for the entire scope of untrusted users and devices, while helping enterprises secure all their locations with real-life use cases.
Eric Ingrand
CMO
Cloudi-Fi
Second Session
10:00 - 10:30
Traditional CNAPPs or CSPMs rely on static rules to identify threats. That means they miss unknown threats, lack the bigger picture, and leave teams drowning in alerts. Come and see how an intelligent code-to-cloud platform uses machine learning and AI to quickly and easily identify malicious activity and focus on the threats that really matter.
Andreas Schneider
EMEA Field CISO, Fortinet
Manual processes, disparate tools, and fragmented threat data are making security operations ineffective to identify and respond to critical security incidents. Whether you’re exploring next-generation SIEM solutions or modern SOAR, join us to lay the foundation for a more advanced SOC.
Daniel Hanman
Director Product Management, Fortinet
Building an effective and sustainable OT security infrastructure must go beyond the critical aspect of protecting the attack surface and OT-specific threat vectors.
Operational efficiency and cost optimization are additional important aspects that must be taken into consideration.
This session will demonstrate how a joint Nozomi and Fortinet solution provides security, operational, and TCO optimization for asset owners.
Phillip Page
Director, OEM & Technology Partners, Nozomi Networks
The role of IT security is continually evolving. Reporting to the C-suite must include details on how a company addresses change visibility and the increasing complexity of its systems. Cybercriminals often seek to exploit misconfigurations, human errors, and exposed vulnerabilities. These issues can directly result from unnecessary complexity and a lack of visibility in a rapidly changing hybrid enterprise environment. In this presentation, we will discuss strategies for reducing the opportunities available to threat actors by using automation and enhancing change visibility.
Tim Woods
VP Technology Alliances
Firemon
10:30 - 11:15
Third Session
11:15 - 11:45
Web applications and APIs are prime targets for threat actors. Protecting them is critical, but in this dynamic environment, static protection makes for a lost battle. Enter machine learning, AI, and sandboxing to make protection simple and effective without slowing everything down.
Roy Scotford
Principal Consulting Systems Engineer, Fortinet
In today's digital landscape, cyber threats are a constant reality. Are you confident that your organization is adequately prepared and ready in case of a breach? Join us to discover how you can strengthen your defenses and be prepared for any cyberattack.
Hector Agustin Cozzetti
Senior Security Consultant - FortiGuard Proactive Services, Fortinet
With the growing complexity, exposure, and multiple use cases brought by convergence and CPSs, the ability to discover and mitigate threats everywhere and all the time - is critical. This session will explore the critical role of SecOps with OT context and how Unified SASE OT functionalities can play a key role as part of an integrated, secured-by-design OT architecture.
Daniele Mancini
EMEA Field CISO, Fortinet
Ronen Shpirer
Director Solutions Marketing, Fortinet
Organizations are facing multiple challenges to attain pervasive visibility of their network topology and configuration, centrally manage the change control process and automate workflow across network and security operations teams.
Join us to explore how Tufin, a Fortinet Fabric-Ready Partner, abstracts security policy management away from the underlying infrastructure, while reducing the risk of breach and non-compliance. This integration enables deploying, operating, and securing an increasingly complex and agile infrastructure.
Tim Shea
Director Technology Alliances
Tufin
Fourth Session
11:45 - 12:15
As the speed of change accelerates, agility has become a key business driver. Cloud-based PAYG services are great, but what about services that aren’t in cloud? Buying them used to be a slow, old-school process - until now. This session will present a new and innovative way to buy and consume cybersecurity services - for hardware and Cloud - with a digital points approach. Bonus - You can boost your Cloud Commits with them as well.
Sherelle Farrington
Manager Solutions Marketing, Fortinet
Amit Joshi
Senior Business Development Manager, Fortinet
Technology plays a crucial role in modern cybersecurity, but despite AI's advancements, the human element remains essential. In this session, Fortinet experts will discuss essential services that boost the effectiveness of security operations, from continuous training to professional services and incident response.
Hatem Dridi
Senior Business Development Services Solution, Fortinet
Paolo Grassi
Senior Director- Product Management, Fortinet
Gabriel Romero
Director Global Training Operations, Fortinet
Cybersecurity skill gap is a common challenge in all enterprises and even more so in industrial enterprises with the fast evolution of OT technology. This session will outline Fortinet’s OT services aimed in helping enterprises deal with OT cybersecurity skill shortage.
Antoine D’Haussy
OT Security Practice Head EMEA, Fortinet
Emmanuel Miranda
OT Professional Services Director EMEA, Fortinet
12:30 - 14:15
PLENARY
14:15 - 14:25
14:25 - 14:45
Convergence and consolidation are two recent security innovations to reduce complexity and improve an organization’s overall security posture. A third innovation, the platform approach, complements convergence and consolidation to further improve the security posture. But how do these innovations, sprinkled with a judicious dose of AI, work together to create a total that’s greater than the sum of its parts. John Maddison, Fortinet’s CMO, will provide the insight and answers.
14:45 - 15:05
Whenever a data breach is announced, the first question is always why - was it due to complacency, an over-estimation of their capabilities, or a lack of knowledge about the threats themselves? Knowing about the state of the threat landscape is one thing, making sure that the network has the appropriate protection against it is another.
15:05 - 15:30
Is it possible to build and maintain a cyber resilient world when change is at an ever-faster pace across so many facets? Change in the threat landscape, rapid technological advancement, changes in the business/economic climate and the expanding stakeholder landscape.
This session will explore how different aspects of change impacts an organization’s security posture and how it’s possible to harness the power of human and machine and bring together the different stakeholders to build a cyber resilient future together.
15:30 - 16:15
16:15 - 16:40
Within the enclosed environment that is cybersecurity, it’s too easy to focus on the “what, why, and how” of the technology and overlook the business benefits that these solutions bring to the organization. This session will focus on connecting the technologies to their tangible benefits.
16:40 - 17:00
Plotting a cybersecurity journey can a challenge for any IT organization, but those challenges are amplified for OT due to environment specific requirements and a shift in operating priorities. The session will focus on the journey that Engro, a petrochemical conglomerate in Pakistan, has undertaken to ensure digital transformation success.
17:00 - 17:30
All too often, clever PowerPoint slides about vision and strategy are taken at face value without question. But without the development arm of the organization, the vision and strategy on those slides is just another example of the “Emperor’s New Clothes”. This session will focus on how Fortinet’s development arm ensures that the vision and strategy communicated to the outside world is tangible and real.
17:30 - 17:40
19:00 - 23:00