What

Curious about security automation but not quite sure where to start? We've got you covered. Join us on a journey of discovery where you’ll learn how to create a robust cybersecurity mesh architecture that allows you to detect, respond and recover from security incidents in real-time. Dive into the hottest topics around security automation and hear:

  • Updated perspective from analysts
  • Real-world tips and stories from your peers 
  • Hands-on, interactive deep tech sessions with our experts

Why

Operational complexity and complex manual process are challenging for security teams of any size. While it seems overwhelming, implementing an integrated security architecture with AI-driven analytics and automation capabilities can address and dramatically improve centralized visibility and time to respond against known and unknown cyber risks. Watch the Security Automation summit on-demand and gain the knowledge you need to create security that works for you - automatically.

Speakers

Agenda

10:05 - 10:25

Fortinet’s Karin Shopen and CDK Global's David Hahn kick off the Fortinet Security Automation Summit discuss the need for an automated security posture, and how to build one.

Karin Shopen
VP, Cybersecurity Strategy
Fortinet
David Hahn
CISO
CDK Global

10:25 - 10:55

When was the last time your playbooks were updated? When was the last time your peers outside of Info Security were engaged regarding their role in a cyber incident? These are but a few of the questions we’ll review as part of the people and process variables that go into not only creating but maintaining a strong cyber security plan.

Tony Giandomenico
Practice Director – Digital Forensics and Incident Response
Fortinet
Pamela Warren
Director of MDR, Incident Response & Readiness Services Marketing
Fortinet

10:55 - 11:25

It has become increasingly challenging for many organizations to identify malicious activity within their network. Persistent cybercriminals use evasive technics, weaponize Artificial Intelligence (AI), and exploit fragmented defenses. As a result, the actor's window of opportunity continuously expands, threat volume increases and produces a constant need for operational awareness. On the other end, countering these threats, organizations commonly use various siloed point products, cluttering the flow of information, and making it challenging to navigate through the pile of alerts. The difficulties extend, as frequently these businesses lack the skilled cybersecurity staff to build, maintain, and operationalize a 24x7x365 security operations centre (SOC). If you have the same concerns and are considering your options, join us to review these Fortinet service options, and example use cases that demonstrate their benefits.

Pamela Warren
Director of MDR, Incident Response & Readiness Services Marketing
Fortinet
Max Zeumer
Director of Product, Security Operations
Fortinet
Caroline Swartz
Information Security Operations Manager
Fortinet

11:25 - 11:50

Join Max Zeumer and Jon Speer to learn about Fortinet's integrated SOC Automation model across every size and stage of maturity an organization is at and the best ways to implement and scale. In this session you will discover why automation is critical to improving the effectiveness of your security operations, limiting complexity that often creates gaps that are exploited by threat actors, and how the speed of activities and response are vital to rapidly scoping, adapting and countering sophisticated attacks before it's too late.

Abhishek Narula
CTO/VP
Fortinet
Jon Speer
Director of Product, Security Operations
Fortinet
Max Zeumer
Director of Product, Security Operations
Fortinet