The 2022 Fortinet Championship

September 12 - 18 | Silverado Resort & Spa | Napa, CA

Introducing the 2022 Fortinet Championship

The Security Summit includes a full-day Symposium of keynotes, panels and round table discussions with leading experts from Google, AWS, Intel, and more. We'll also be joined by 35 vendor partners participating in our Technology Expo - and the entire agenda is built to provide you with innovative ideas and best practices that will drive your digital transformation. Read More In conjunction with the Symposium, you will have the opportunity to participate in the Vendor Expo featuring more than 35 partners such as AWS, CDW, Exclusive Networks, Google, Tufin, Intel, Ingram Micro, Velocity Global, and World Wide Technology. With malicious cyberattacks on the rise, the full-day Security Summit allows professionals to challenge existing knowledge and further protect their organization against growing attacks. Read Less

For more information, contact the Fortinet Championship Team.

The Security Summit is comprised of a full-day speaking Symposium and Partner Technology Expo. This Symposium features some of the brightest minds in the industry, discussing topics relevant to your business’s objectives and growth. This diverse world-class agenda provides the opportunity to network and collaborate with top industry visionaries and thought leaders.

Jim Overbeck
Jim Overbeck
SVP, Marketing

       

With work-from-home and hybrid work environments, organizations are now moving some of their infrastructure to the cloud. This is blurring the edge of the enterprise network, with both SD-WAN and broadband connections to access applications across private cloud, public cloud and edge locations. Network security teams are now often tasked with securing the cloud hub, including East-West and North-South connectivity inside the enterprise cloud environment. The variety of security controls, different stakeholders and complexity of the environment make this essentially “mission impossible”. It’s time to use a different approach to securing connectivity in the cloud – the right way!

Tufin Logo

Ruvi Kitov
Ruvi Kitov
Chairman, CEO and Founder

       

Adversaries don’t discriminate when it comes to their targets and unfortunately, no one is immune. Organizations big and small in every sector around the globe face the threat of constant attack where the stakes are high. It is not a matter of if, but when you may be attacked. What separates the good from the bad and the ugly, is how prepared you are. This session will provide proactive strategies to help protect, defend, and respond to when the adversaries comes for you.

CDW Logo

Aletha Noonan
Aletha C. Noonan
SVP, Product & Partner Marketing

Renee Tarun
Renee Tarun
Deputy CISO/VP Information Security
Fortinet

Erika Walk
Erika Walk
Senior Director, Digital Business Services
Waste Management

Amanda Kane
Amanda Kane
Director
Guidehouse

 

Understanding the role cyber security plays in the adoption of new technologies and innovations is essential. As enterprises move more of their applications to the edge, the pace of digital transformation is accelerating, and security is becoming increasingly critical in this ever-changing landscape. Innovation is driving new ways for enterprises to connect, and it is vital to safeguard those applications, data, infrastructure and endpoints, while being responsive to emerging cybersecurity threats.

AT&T Logo

Jill Sanders
Jill Sanders
Asst. Vice President

       

Military commanders face ambiguous and fast-moving circumstances which can change in rapid and unexpected ways. The complexity and uncertainty of today’s business environment requires a deep and comprehensive understanding of risk and the linking of risk and strategy in order to build resilience. It also means building the right culture of trust and empowerment. In this talk, NATO’s former Deputy Supreme Allied Commander Europe explores what business leaders can learn from the military approach to managing risk.

Strategia Worldwide Logo

General Sir Richard Shirreff
General Sir Richard Shirreff
Co-Founder and Managing Partner, Strategia Worldwide | Ret. British Army NATO's Deputy Supreme Commander

       

Trust is embedded in nearly every aspect of our lives and foundational to our ability to leverage technology. Topics will included the historical evolution of Trust in computational systems and the resulting impacts to modern Security approaches.

WWT Logo

Jim Overbeck
Mike McGlynn
VP, Security Solutions

       

As digital transformation continues, the number and type of devices connecting to the industrial network – smart sensors, valves, and gauges – expands the attack surface making industrial environments low-hanging fruit for an attack. Cloud adoption has also increased to improve data analytics and support the growing need for remote access.  As headlines highlight, attackers have industrial organizations in their sites. OT environments can be difficult to defend due to the mix of modern and legacy equipment. This panel of OT experts will discuss the threats, challenges, and strategies being used to secure industrial environments including cloud connectivity, 5G and industrial IoT devices.

 

Matt Cowell
Matt Cowell
VP of Business Development
Dragos

Mary Beth Connolly
Mary Beth Connolly
VP of Strategy
Schneider Electric

Greg Barnes
Greg Barnes
CISO
AMGEN

Roberto Gutierrez
Roberto Gutierrez
CISO
OSI Group

Willi Nelson
Willi Nelson
CISO, Operational Technology
Fortinet

We are in the midst of a tectonic shift to the cloud and it’s obvious why. Cost is very compelling and almost always the conversation starter, but the number one reason businesses are migrating to the cloud is the speed and flexibility it offers for innovation. Of course, to maximize this benefit, organizations have to be confident that they can secure their workloads effectively and have the business processes to move with the agility demanded. In this talk, Chris Grusz will share insights Amazon Web Services has garnered from working with thousands of the world’s leading enterprises and governments on their cloud adoption journey while keeping security the priority.

AWS Logo

Chris Grusz
Chris Grusz
General Manager, WW ISV Alliances & Marketplace

       

Cybersecurity conversations and solutions focus on threats and vulnerabilities. But effectively managing cyber risks requires an emphasis on understanding consequences, not only to the network but to the operations and reputation of the company. That means the entire enterprise, including the board, must be part of assessing, prioritizing, and mitigating cyber risks.

Homeland Security

Suzanne Spaulding
Suzanne Spaulding
Sr Adviser, Homeland Security, Int'l Security Program and Dir of the Defending Democratic Institutions Project at the Center for Strategic and International Studies (CSIS)

       

The cyber insurance market and expectations have changed significantly over the last 18 months. The market has hardened. Greater underwriting emphasis on controls and risk differentiation. Hear what you need to know as an applicant or renewing client going into purchasing cyber insurance and how you can prepare to have a better experience and outcome. What are the key controls insurance carriers want to better understand in order to determine your cyber resiliency.

AIG

Phil Kibler
Philip Kibler
Head of Cyber Risk Advisory Services

       

Fortinet’s leadership team brings decades of extensive industry knowledge and experience, plus a well-rounded business perspective. The team’s expertise and passion for continually improving security without compromise is demonstrated by the consistent delivery of industry-leading, end-to-end solutions to hundreds of thousands of satisfied customers.

Fortinet (NASDAQ: FTNT) makes possible a digital world that we can always trust through its mission to protect people, devices, and data everywhere. This is why the world’s largest enterprises, service providers, and government organizations choose Fortinet to securely accelerate their digital journey.

Fortinet Logo

Ken Xie
Ken Xie
Founder and CEO

Keith Jensen
Keith Jensen
CFO

John Maddison
John Maddison
CMO & EVP Products

Michael Xie
Michael Xie
Founder, President, and CTO

Patrice Perche
Patrice Perche
CRO & EVP Support

 

Hear from Max Homa, PGA Tour Professional and winner of the 2021 Fortinet Championship at this live Q&A. Learn from Max on how to enhance your golf game in a personal environment, and get the chance to ask a PGA TOUR Professional the secrets of the game.

Fortinet Logo

Max Homa
Max Homa
PGA Tour Professional

Jim Overbeck
Jim Overbeck
SVP, Marketing

     

The Security Summit is comprised of a full-day speaking Symposium and Partner Technology Expo. This Symposium features some of the brightest minds in the industry, discussing topics relevant to your business’s objectives and growth. This diverse world-class agenda provides the opportunity to network and collaborate with top industry visionaries and thought leaders.

Jim Overbeck
Jim Overbeck
SVP, Marketing

       

2020 has accelerated the digital transformation of every industry: manufacturers want connected products, telecommunications companies are broadening their network with 5G to bring computation closer to people. Even in industries like agriculture and sustainability, technology can be used to understand the changes in the environment.

The public sector is no different, and the Cloud offers opportunities for the federal workforce to modernize, gain insights from their massive datasets, and support their hybrid workforce. The cloud is not a far-off, theoretical destination; it’s where critical services are routinely delivered, yet it’s essential that these services stay resilient in the face of many unexpected and unpredictable events.

Join Jeanette Manfra, Vice President and Chief Technology Officer at Google Cloud, and Jonathan Nguyen-Duy at Fortinet on how organizations in the public sector can become more resilient and high-performing in 2022 and beyond.

Google Cloud Logo

Jeanette Manfra
Jeanette Manfra
Global Director Risk and Compliance

Jonathan Nguyen Duy
Jonathan Nguyen-Duy
Vice President, Field CISO
Fortinet

     

Today, Intel is primarily known as a semiconductor market leader, providing multiple technologies in almost every market segment, however beyond this, Intel directly works as a technical/independent advisor on solving key pain points and problems of end users with Brands and Consumer Industries. While Intel invest in solving end-user problems with brands, also invest in the ecosystem of solution providers by working closely with Fortinet and 1000s Intel ecosystem partners. In this session, Shailesh Chaudhry, GM, Consumer Industries, Network and Edge Computing Group, Intel will give an overview on Intel’s role and investment in Consumer Industries.

Intel Logo

Shailesh Chaudhry
Shailesh Chaudhry
GM, Consumer Industries Networking and Edge Computing Group

       

Commissioner Rachelle Chong, a national thought leader on advanced communications and energy, will discuss issues involving resiliency and reliability of the electric grid in a time of global warming, wildfires and other natural disasters. She will look at how advanced communications trends have impacted the electric sector. Join this session to understand the drivers behind the rise of Smart Grids, Smart Homes, the Internet of Things, Microgrids and the Electrification of Vehicles. Gain insights on the Net Zero Energy movement due to Climate Change goals and electrification of the transportation sector may impact your business processes. Finally, she will discuss the influx of federal grant money due to the Infrastructure Investment and Jobs Act to the energy sector and opportunities for grants for EV charging infrastructure, microgrids and more.

R36 Solutions Logo

Rachelle Chong
Rachelle Chong
National Advisor in Communications, Energy and Transportation Regulatory Issues

       

Borders are no longer barriers when filling key positions. It’s a worker’s market and finding skilled professionals is harder than ever. That’s why cybersecurity leaders go overseas to expand the talent pool. Discover a better way to quickly hire internationally, maintain workforce compliance, and protect your IP by building a world-class cybersecurity team with an Employer of Record. Finding talent overseas is no longer just an option for cybersecurity companies—it’s a necessity. Velocity Global’s Global Work Platform™ enables businesses and talent to work with anyone, anywhere, anyhow.

Velocity Global Logo

Wade Burgess
Wade Burgess
Chief Revenue Officer

       

Adversaries don’t discriminate when it comes to their targets and unfortunately, no one is immune. Organizations big and small in every sector around the globe face the threat of constant attack where the stakes are high. It is not a matter of if, but when you may be attacked. What separates the good from the bad and the ugly, is how prepared you are. This session will provide proactive strategies to help protect, defend, and respond to when the adversaries comes for you.

Sponsored by:

CDW Logo

Renee Tarun
Renee Tarun
Deputy CISO/VP Information Security
Fortinet

Salwa Rafee
Salwa Rafee
Global Managing Director
Accenture Security

Nicole Dove
Nicole Dove
Head of Security, Games Division
Riot Games

Renee Fosberg
Renee Fosberg
Vice President and Chief Information Officer
Emerson Hospital

 

Hybrid work, cloud adoption, and automation are driving major changes to how organizations need to look at connectivity and security. Like-for-like replacement of network and security equipment at the next refresh cycle is not likely to position organizations for success in the future. Instead, the IT architecture for the future demands new models for connecting users to applications with the right visibility, policy, and user experience. How the architecture is managed and operated will also fundamentally shift.

In this session we’ll explore the major drivers and discuss where we see the architecture moving in the future to deliver the right productivity experience for users and IT. How quickly you adapt may determine whether your organization survives or thrives.

WWT Logo

Neil Anderson
Neil Anderson
VP, Cloud & Infrastructure Solutions

       

We are in the big data era. Amazon, Facebook, and Google own the data every consumer company needs to reach the right customers. Retailers and small brands are hugely disadvantaged. Individuals do not own their personal data. Governments are getting involved with new and onerous regulations. Lean back advertising is giving way to online engagement. Fewer employees are coming into the office or classroom. How do business leaders manage in this crazy and fast changing world?

Curriki Logo

Scott McNealy
Scott McNealy
Co-Founder, and Board Member, Curriki | Co-Found, Former Chairman of the Board, and CEO, Sun Microsystems, Inc.

       

As companies move to the cloud to evolve and differentiate their business, understanding their security responsibility within the cloud is a key component for a successful migration. In this session we will focus on the AWS shared responsibility model, what customers should be aware of when it comes to their security responsibilities, and how AWS and partners such as Fortinet help customers with their security responsibilities on AWS.

AWS Logo

Scott Ward
Scott Ward
Principal Solutions Architect, External Security Services

       

Gary Locke has served as a state governor, Federal cabinet secretary, US ambassador, corporate board member, and university president. Join us for this wide-ranging fireside discussion with Governor Locke on topics such as tips to forge effective public-private partnerships and how public and private infrastructure providers can maximize the impact of $1.2 trillion in Federal infrastructure funding to cybersecurity education and the role of Federal organizations such as the National Institute of Standards and Technology (NIST).

Bellevue University

Gary Locke
Gary Locke
Former Governor of the State of Washington, US Ambassador to China, and Secretary of Commerce | Current President of Bellevue College and Chair of Fortinet’s PSAC

Jim Richberg
Jim Richberg
Public Sector Field CISO
Fortinet

     

As digital transformation continues, the number and type of devices connecting to the industrial network – smart sensors, valves, and gauges – expands the attack surface making industrial environments low-hanging fruit for an attack. Cloud adoption has also increased to improve data analytics and support the growing need for remote access. As headlines highlight, attackers have industrial organizations in their sites. OT environments can be difficult to defend due to the mix of modern and legacy equipment. This panel of OT experts will discuss the threats, challenges, and strategies being used to secure industrial environments including cloud connectivity, 5G and industrial IoT devices.

 

M.K. Palmore
M.K. Palmore
CISM, CISSP - Director, Office of the CISO
Google Cloud

Chris Lukas
Chris Lukas
Chief Information Security Officer
Chevron

Grant Geyer
Grant Geyer
Chief Product and Strategy Officer
Claroty

Jim Guinn
Jim Guinn
Sr Managing Director - Security, Strategy & Consulting Lead
Accenture Global

Willi Nelson
Willi Nelson
CISO, Operational Technology
Fortinet

Fortinet’s leadership team brings decades of extensive industry knowledge and experience, plus a well-rounded business perspective. The team’s expertise and passion for continually improving security without compromise is demonstrated by the consistent delivery of industry-leading, end-to-end solutions to hundreds of thousands of satisfied customers. Fortinet (NASDAQ: FTNT) makes possible a digital world that we can always trust through its mission to protect people, devices, and data everywhere. This is why the world’s largest enterprises, service providers, and government organizations choose Fortinet to securely accelerate their digital journey.

Fortinet Logo

Ken Xie
Ken Xie
Founder and CEO

Keith Jensen
Keith Jensen
CFO

John Maddison
John Maddison
CMO and EVP Products

Michael Xie
Michael Xie
Founder, President, & CTO

   

Premier Sponsors

Tech Expo Sponsors