Full Name
                                                    Sigalit Kaidar
                                                    Job Title
                                                    Director, PMM
                                                    Company
                                                    Fortinet
                                                    Speaker Bio
                                                    A highly-experienced cybersecurity product marketing veteran with in-depth knowledge of the cybersecurity landscape. In her role at Fortinet, Sigalit is responsible for developing and leading GTM strategy, in addition to heading key marketing initiatives for several Fortinet products. Sigalit brings over two decades of diverse leadership experience in the cybersecurity space, where she was instrumental in taking applications, solutions, and services to market, working with broad ecosystem of technology and channel partners to drive sales.
Speaking At
                                                    Extend Your Threat Intelligence Beyond the Perimeter: Protect Your Brand and Internet-exposed Assets
How To Use Deception Technology To Protect Your OT/ IT Networks
Extend Your Threat Intelligence Beyond the Perimeter: Protect Your Brand and Internet-exposed Assets
How To Use Deception Technology To Protect Your OT/ IT Networks
Extend Your Threat Intelligence Beyond the Perimeter: Protect Your Brand and Internet-exposed Assets
How To Use Deception Technology To Protect Your OT/ IT Networks
Extend Your Threat Intelligence Beyond the Perimeter: Protect Your Brand and Internet-exposed Assets
How To Use Deception Technology To Protect Your OT/ IT Networks
                        How To Use Deception Technology To Protect Your OT/ IT Networks
Extend Your Threat Intelligence Beyond the Perimeter: Protect Your Brand and Internet-exposed Assets
How To Use Deception Technology To Protect Your OT/ IT Networks
Extend Your Threat Intelligence Beyond the Perimeter: Protect Your Brand and Internet-exposed Assets
How To Use Deception Technology To Protect Your OT/ IT Networks
Extend Your Threat Intelligence Beyond the Perimeter: Protect Your Brand and Internet-exposed Assets
How To Use Deception Technology To Protect Your OT/ IT Networks
