Fortinet Thought Leadership Security Summit
SUMMIT AGENDA
Cybercrime continues to boom, compounded by a growing cybercrime as a service (CaaS) portfolio that is a catalyst to routine attacks we are observing at FortiGuard Labs and through FortiRecon. This includes the usual suspects from combo list sales, DDoS and Ransom as a Service – but also prevalent new models such as Initial Access Brokers which are high risk, high reward in nature. While threat actors continue to focus on Reconnaissance for strategic attacks, it’s imperative that we shine the light back on them through solutions including SecOps & External Attack Surface Management. This talk will unveil research examples of modern cybercrime services, marketplace & ecosystem on the darkweb, and try to answer the golden question of who is behind these attacks? Industry initiatives to disrupt this growing ecosystem will be discussed, including Cybercrime Atlas under the World Economic Forum.
Speakers
Rapidly evolving network and security strategies are driving the hyper-convergence of these technology domains. Successful organizations are leveraging convergence for more survivable, lower cost networking, more efficient security workflows with faster time to respond which is reducing organizational risk. Further, employee and customer experience is preserved through the optimized distribution and accessibility of applications which is driving better business outcomes. These kinds of network and security transformation come with plenty of challenges in managing top-to-bottom delivery of network, application, and platform services. Challenges include coordinating disparate underlay and overlay networks, which are both physical and virtual. Leveraging security-as-code to deliver automated scale for the SOC, and provide non-gating workflows to application teams and end consumers as network and application constructs are increasingly ephemeral. Fortinet’s panel of experts have lead their organizations through just these transformations and will share their experience to navigate toward successful outcomes of network and security modernization. Topics will include hybrid cloud adoption, security workflow automation, the adoption and security of AI, among other top of mind issues for the CIO/CTO/CISO.
Speakers
In "Asymmetric GenAI Readiness," we explore the necessity of adopting asymmetric thinking and operational approaches to fully leverage the opportunities and address the risks associated with Generative AI. This presentation highlights compelling examples of asymmetry in GenAI, practical use cases, and critical questions that need to be addressed. By examining these elements, we propose a strategic framework for evaluating and embracing AI opportunities. Join us to gain insights into how asymmetric approaches can enhance your GenAI readiness and effectiveness.
Speakers
If past is indeed prologue, our discussion will focus on AI, cybersecurity, public policy and how those dynamics will re-shape the ways we communicate, conduct commerce and govern. Please join our esteemed panelist as they draw from their experience in operations, law enforcement and national security to explore practical solutions and a preview of what’s in store as AI becomes a standard component of our networks.
Speakers
After a year in which Washington has examined many aspects of artificial intelligence, where does the government actually stand on AI and possible regulation? Have Administration and Congressional actions on AI made any impact on how AI is viewed and will be used going forward? What does the federal government believe are the cybersecurity issues surrounding AI design, development and deployment? In an election year, how is AI factoring in the debate and what should we expect the next administration’s policy will be on AI? Hear the latest on how Washington is approaching AI and cybersecurity and what might be the impact on industry.
Speakers
AI in many forms is already showing fascinating and interesting benefits across many industries and technology sectors, including the entertainment business. Where the balance point of positive use cases and ethical people across the planet and negative cases with nefarious goals from those with spurious ethics is being weighed right now by societies with massive consequences.
Imagine your voice, your likeness, used to spread lies, to manipulate, to extort. Picture your face grafted onto a pornographic video, your reputation tarnished forever. This isn't science fiction; it's the dark reality of today's digital world.
Deepfakes are more than just a tool for mischief. They're a potent weapon in disinformation campaigns, used to sow discord, to influence elections, to destabilize nations. Cyber threat actors leverage this technology to create chaos, to disrupt critical infrastructure, and to extort ransom.
But it's not just about money. Deepfakes are a tool of humiliation, a digital branding iron used to shame victims into submission. Companies, fearing the devastating consequences of a deepfake-fueled scandal, are increasingly willing to pay exorbitant ransoms.
The threat is real, and it's everywhere. No one is immune. From world leaders to everyday citizens, we're all vulnerable. It's time to take control of our digital identities. We must protect ourselves from this insidious threat, before it's too late.
Speakers
Receive 2 Park Hopper tickets to enjoy the spooktacular festivities at both Disneyland® Park and Disney California Adventure® Park.
Speakers
Meet up at a designated area for our group to watch the evening light show.
Speakers