2 events in 1
NASHVILLE WEATHER
Experience
Join us for four days of exclusive, forward-looking keynotes and technical workshops delivered by our own senior technical executives and experts. Compete for bragging rights and prizes in the Ultimate Fabric Challenge. Stick around to explore and demo the newest Fortinet solutions in our Tech Expo and network with your peers as we discover all that Nashville has to offer.
Content
During the Summit, you’ll have access to some of the brightest minds from Fortinet – our Consulting Systems Engineers. These are the people interacting with our customers every day, solving the toughest challenges they come up against – and they’ll be offering insightful workshops based on those use cases, only available at our XPERTS Summit, including:
- • SASE
• Secure SD-WAN
• ZTNA
• Operational Technologies
• Other emerging technologies
Location
Renowned for its country music roots, you won't find a city that is more accommodating, authentic, and accessible than Nashville, TN. And while you’ll be working hard during the days advancing your Fortinet skills, we wouldn’t bring you to Nashville without building in some time to play and experience the true nature of the “Music City” – a tour of the Grand Ole Opry, exclusive use of the Wild Horse Saloon where we’ll host the UFC finals, and an evening cruise along Cumberland River to experience the Nashville skyline from the water.
Evening Events
We're going work hard, but have some fun too!
The UFC is an eSports skills competition based on a series of cybersecurity challenges. Players are dropped into a virtual world (“the customer site”), where you will explore the environment to uncover the objectives and complete them using Fortinet technology.
During XPERTS Summit, the top 20 finishers in the first round (taking place on Day 1), will go on to compete in the US finals event, taking place on the main stage at the Wildhorse Saloon during our exclusive event on Saturday night.
The US XPERTS Summit is the opportunity to compete against your peers for prizes and is your chance to qualify to represent the US in the global UFC challenge at Accelerate 2024!
Workshops
This is definitely different than year's past! You'll find hard-core, in-depth workshops taught by Fortinet experts. Create your perfect, custom agenda when you register.
In this session, you will learn to configure FortiSandbox as part of the security fabric to detect and prevent malware in IT/OT environments. You will also learn how to configure and deploy FortiDeceptor to identify and isolate attackers and compromised endpoints using the Security fabric and dynamic quarantines. Additionally, students will learn to use deception tokens to help lure attackers to FortiDeceptor decoys, where their activities can be captured, tracked, and automatically acted upon.
In this session, you will learn to configure FortiWeb to protect web applications from various threats. Among other topics, we will address rule-based protection, API endpoint protection, and bot management.
FSW and FAP hands-on Labs and discussions covering use cases that address main customer challenges and integration in non-green fields. We will cover more complex switch topologies, updates to Fortilink, third-party compatibility, as well as proposals for displacing existing competitor wireless vendors and understanding enterprise-level functionalities that help in winning higher value deals.
Tired of doing the same repetitive tasks over and over (and over) again? You don’t need a PhD in programming to take advantage of automation and integration efforts that accelerate the efficiency of your workforce with every task. In this workshop, Fortinet has done the heavy lifting. We'll explore how to automate common needs such as enriching potential indicators of compromise extracted from emails and alerts, consuming events that are pending action from other products to streamline log-handling within your operations, performing common Zero Touch Provisioning (ZTP) tasks designed to elevate your NOC's use of FortiManager, building custom playbooks to manage your team's workflows to audit FortiGate policies, and managing vulnerable IT/OT asset's through firewall policy automation efforts.
You will automatically be enrolled in Part 2 of Understanding Fortinet Secure SD-WAN Solution if you register for Part 1
This Workshop begins by diving into the steps to successfully prepare for and deploy Fortinet's SD-WAN solution using FortiManager. The instructors will lead participants through a curriculum in a lecture/lab format that will mimic what would be expected in a new SD-WAN deployment. Participants will gain experience with the creation of templates, template groups, and variables as well as methods for provisioning devices. Once devices are fully configured, this workshop will shift focus to dissecting the details of a typical SD-WAN + ADVPN configuration to ultimately have a better understanding of how the solution works "under the hood". The instructors will lead participants through a curriculum highlighting key configuration items, explanations of configuration behaviors, and alternatives to those configurations.
In this session, participants will learn how FortiGate Cloud Native Firewall (FortiGate CNF) provides a lightweight, feature-rich security solution for egress, ingress, and east/west security inspection to protect AWS networks and applications. Participants will learn AWS and Fortinet security best practices and routing concepts through a hands-on deployment of FortiGate CNF inspection clusters and AWS services. Participants will be exposed to various management methodologies for deploying and managing security policies.
Operational Technology is one of the fastest-growing segments within Fortinet. It spans multiple segments, including electric utilities, water/wastewater, manufacturing, transportation, retail, and finance, among many others. In this course, you'll learn how we got to a connected environment with little to no security and what elements of operational networks make it different from IT. We'll then do a deep dive into OT switch networks, the MODBUS protocol, and how to use the Industrial Security Services within the FortiGate to analyze and control traffic.
Update on the latest features in FortiEDR 6.0. Hands-On knowledge of how FortiEDR detects threats using Machine Learning, Zero-Day Exploit Protection, and abuse of Living Off the Land Binaries, called LOLBins. Hands-On Labs addressing the configuration of advanced remediation playbooks and how to enable and use eXtended Detection and Response (XDR) capabilities.
Using FortiNAC to determine an inventory of connected devices within a FortiGate/FortiSwitch network environment and propagate this awareness of profiled, connected devices and users using Tags into FGT for the purpose of being leveraged within FortiGate Firewall Policy for granular control.
Using FAC to demonstrate administrative provisioning for directory integration, SAML authentication, token assignment and distribution, and basic network access control leveraging mac-authentication and 802.1x.
You will automatically be enrolled in Part 2 of Enforcing SASE Zero Trust Network Access on a Global Scale if you register for Part 1
If your customers need to support a remote workforce with secure and controlled access to Internet, SaaS, and internal corporate applications, FortiSASE's SIA, ZTNA, and Secure Private Access (SPA) capabilities will make that possible. You will learn to help your customers create new access infrastructures based on ZTNA principles or extend the utility of existing Fortinet SD-WANs to roaming users through SPA integration. This session will review the architectural principles of Fortinet's secure service edge and how FortiSASE can solve for typical use cases. We will progress to hands on provisioning of SIA, ZTNA, and SPA with examples of authentication integration typical of customer PoC requirements.
This Workshop will cover different analytic solutions to enable the participant to understand network, security, application, and infrastructure events. Participants will learn how to configure the FortiAnalyzer (FAZ), learning the key concepts of the FAZ and common FAZ deployments. They will review the different FAZ subscriptions for Indicators of Compromise, Outbreak Alert Service, and SOC playbook automation. Most customers’ FAZ deployments are under-utilized simply because the end-user doesn’t understand the full potential of FAZ event management. Participants will go through the full Event Management module to fully understand how to detect and be notified of the ‘needle in the haystack’ or the specific log pattern to identify. The course will talk to and demonstrate issues such as FAZ scale, better availability, and management procedures.
Participants will also discover the FortiMonitor (FMR) tool and the SOC as a Service (SOCaaS) offering. Participants will review the architecture of the FMR and delve into performance dashboards, incident response, the OnSight collectors, and automated onboarding with monitoring templates and policies. The full solution overview of SOCaaS will be shown and discussed to provide a deep understanding of how SOCaaS works and how it can help customers with different use cases. Knowledge of NSE 5 FAZ material is preferred; this is not an intro to FAZ course.
FSW and FAP hands-on Labs and discussions covering use cases that address main customer challenges and integration in non-green fields. We will cover more complex switch topologies, updates to Fortilink, third-party compatibility, as well as proposals for displacing existing competitor wireless vendors and understanding enterprise-level functionalities that help in winning higher value deals.
In this session, you will learn to configure FortiWeb to protect web applications from various threats. Among other topics, we will address rule-based protection, API endpoint protection, and bot management.
This Workshop will cover different analytic solutions to enable the participant to understand network, security, application, and infrastructure events. Participants will learn how to configure the FortiAnalyzer (FAZ), learning the key concepts of the FAZ and common FAZ deployments. They will review the different FAZ subscriptions for Indicators of Compromise, Outbreak Alert Service, and SOC playbook automation. Most customers’ FAZ deployments are under-utilized simply because the end-user doesn’t understand the full potential of FAZ event management. Participants will go through the full Event Management module to fully understand how to detect and be notified of the ‘needle in the haystack’ or the specific log pattern to identify. The course will talk to and demonstrate issues such as FAZ scale, better availability, and management procedures.
Participants will also discover the FortiMonitor (FMR) tool and the SOC as a Service (SOCaaS) offering. Participants will review the architecture of the FMR and delve into performance dashboards, incident response, the OnSight collectors, and automated onboarding with monitoring templates and policies. The full solution overview of SOCaaS will be shown and discussed to provide a deep understanding of how SOCaaS works and how it can help customers with different use cases. Knowledge of NSE 5 FAZ material is preferred; this is not an intro to FAZ course.
Tired of doing the same repetitive tasks over and over (and over) again? You don’t need a PhD in programming to take advantage of automation and integration efforts that accelerate the efficiency of your workforce with every task. In this workshop, Fortinet has done the heavy lifting. We'll explore how to automate common needs such as enriching potential indicators of compromise extracted from emails and alerts, consuming events that are pending action from other products to streamline log-handling within your operations, performing common Zero Touch Provisioning (ZTP) tasks designed to elevate your NOC's use of FortiManager, building custom playbooks to manage your team's workflows to audit FortiGate policies, and managing vulnerable IT/OT asset's through firewall policy automation efforts.
You will automatically be enrolled in Part 2 of Enforcing SASE Zero Trust Network Access on a Global Scale if you register for Part 1
If your customers need to support a remote workforce with secure and controlled access to Internet, SaaS, and internal corporate applications, FortiSASE's SIA, ZTNA, and Secure Private Access (SPA) capabilities will make that possible. You will learn to help your customers create new access infrastructures based on ZTNA principles or extend the utility of existing Fortinet SD-WANs to roaming users through SPA integration. This session will review the architectural principles of Fortinet's secure service edge and how FortiSASE can solve for typical use cases. We will progress to hands on provisioning of SIA, ZTNA, and SPA with examples of authentication integration typical of customer PoC requirements.
You will automatically be enrolled in Part 2 of Understanding Fortinet Secure SD-WAN Solution if you register for Part 1
This Workshop begins by diving into the steps to successfully prepare for and deploy Fortinet's SD-WAN solution using FortiManager. The instructors will lead participants through a curriculum in a lecture/lab format that will mimic what would be expected in a new SD-WAN deployment. Participants will gain experience with the creation of templates, template groups, and variables as well as methods for provisioning devices. Once devices are fully configured, this workshop will shift focus to dissecting the details of a typical SD-WAN + ADVPN configuration to ultimately have a better understanding of how the solution works "under the hood". The instructors will lead participants through a curriculum highlighting key configuration items, explanations of configuration behaviors, and alternatives to those configurations.
Operational Technology is one of the fastest-growing segments within Fortinet. It spans multiple segments, including electric utilities, water/wastewater, manufacturing, transportation, retail, and finance, among many others. In this course, you'll learn how we got to a connected environment with little to no security and what elements of operational networks make it different from IT. We'll then do a deep dive into OT switch networks, the MODBUS protocol, and how to use the Industrial Security Services within the FortiGate to analyze and control traffic.
In this session, you will learn to configure FortiSandbox as part of the security fabric to detect and prevent malware in IT/OT environments. You will also learn how to configure and deploy FortiDeceptor to identify and isolate attackers and compromised endpoints using the Security fabric and dynamic quarantines. Additionally, students will learn to use deception tokens to help lure attackers to FortiDeceptor decoys, where their activities can be captured, tracked, and automatically acted upon.
Update on the latest features in FortiEDR 6.0. Hands-On knowledge of how FortiEDR detects threats using Machine Learning, Zero-Day Exploit Protection, and abuse of Living Off the Land Binaries, called LOLBins. Hands-On Labs addressing the configuration of advanced remediation playbooks and how to enable and use eXtended Detection and Response (XDR) capabilities.
Using FortiNAC to determine an inventory of connected devices within a FortiGate/FortiSwitch network environment and propagate this awareness of profiled, connected devices and users using Tags into FGT for the purpose of being leveraged within FortiGate Firewall Policy for granular control.
Using FAC to demonstrate administrative provisioning for directory integration, SAML authentication, token assignment and distribution, and basic network access control leveraging mac-authentication and 802.1x.
In this session, participants will learn how FortiGate Cloud Native Firewall (FortiGate CNF) provides a lightweight, feature-rich security solution for egress, ingress, and east/west security inspection to protect AWS networks and applications. Participants will learn AWS and Fortinet security best practices and routing concepts through a hands-on deployment of FortiGate CNF inspection clusters and AWS services. Participants will be exposed to various management methodologies for deploying and managing security policies.
This Workshop will cover different analytic solutions to enable the participant to understand network, security, application, and infrastructure events. Participants will learn how to configure the FortiAnalyzer (FAZ), learning the key concepts of the FAZ and common FAZ deployments. They will review the different FAZ subscriptions for Indicators of Compromise, Outbreak Alert Service, and SOC playbook automation. Most customers’ FAZ deployments are under-utilized simply because the end-user doesn’t understand the full potential of FAZ event management. Participants will go through the full Event Management module to fully understand how to detect and be notified of the ‘needle in the haystack’ or the specific log pattern to identify. The course will talk to and demonstrate issues such as FAZ scale, better availability, and management procedures.
Participants will also discover the FortiMonitor (FMR) tool and the SOC as a Service (SOCaaS) offering. Participants will review the architecture of the FMR and delve into performance dashboards, incident response, the OnSight collectors, and automated onboarding with monitoring templates and policies. The full solution overview of SOCaaS will be shown and discussed to provide a deep understanding of how SOCaaS works and how it can help customers with different use cases. Knowledge of NSE 5 FAZ material is preferred; this is not an intro to FAZ course.
FSW and FAP hands-on Labs and discussions covering use cases that address main customer challenges and integration in non-green fields. We will cover more complex switch topologies, updates to Fortilink, third-party compatibility, as well as proposals for displacing existing competitor wireless vendors and understanding enterprise-level functionalities that help in winning higher value deals.
In this session, you will learn to configure FortiWeb to protect web applications from various threats. Among other topics, we will address rule-based protection, API endpoint protection, and bot management.
In this session, you will learn to configure FortiSandbox as part of the security fabric to detect and prevent malware in IT/OT environments. You will also learn how to configure and deploy FortiDeceptor to identify and isolate attackers and compromised endpoints using the Security fabric and dynamic quarantines. Additionally, students will learn to use deception tokens to help lure attackers to FortiDeceptor decoys, where their activities can be captured, tracked, and automatically acted upon.
Tired of doing the same repetitive tasks over and over (and over) again? You don’t need a PhD in programming to take advantage of automation and integration efforts that accelerate the efficiency of your workforce with every task. In this workshop, Fortinet has done the heavy lifting. We'll explore how to automate common needs such as enriching potential indicators of compromise extracted from emails and alerts, consuming events that are pending action from other products to streamline log-handling within your operations, performing common Zero Touch Provisioning (ZTP) tasks designed to elevate your NOC's use of FortiManager, building custom playbooks to manage your team's workflows to audit FortiGate policies, and managing vulnerable IT/OT asset's through firewall policy automation efforts.
Part 2 of Understanding Fortinet Secure SD-WAN Solution added to your agenda if you select Part 1 during registration
This Workshop begins by diving into the steps to successfully prepare for and deploy Fortinet's SD-WAN solution using FortiManager. The instructors will lead participants through a curriculum in a lecture/lab format that will mimic what would be expected in a new SD-WAN deployment. Participants will gain experience with the creation of templates, template groups, and variables as well as methods for provisioning devices. Once devices are fully configured, this workshop will shift focus to dissecting the details of a typical SD-WAN + ADVPN configuration to ultimately have a better understanding of how the solution works "under the hood". The instructors will lead participants through a curriculum highlighting key configuration items, explanations of configuration behaviors, and alternatives to those configurations.
Part 2 of Enforcing SASE Zero Trust Network Access on a Global Scale is automatically added to your agenda if you select Part 1 during registration
If your customers need to support a remote workforce with secure and controlled access to Internet, SaaS, and internal corporate applications, FortiSASE's SIA, ZTNA, and Secure Private Access (SPA) capabilities will make that possible. You will learn to help your customers create new access infrastructures based on ZTNA principles or extend the utility of existing Fortinet SD-WANs to roaming users through SPA integration. This session will review the architectural principles of Fortinet's secure service edge and how FortiSASE can solve for typical use cases. We will progress to hands on provisioning of SIA, ZTNA, and SPA with examples of authentication integration typical of customer PoC requirements.
Update on the latest features in FortiEDR 6.0. Hands-On knowledge of how FortiEDR detects threats using Machine Learning, Zero-Day Exploit Protection, and abuse of Living Off the Land Binaries, called LOLBins. Hands-On Labs addressing the configuration of advanced remediation playbooks and how to enable and use eXtended Detection and Response (XDR) capabilities.
Operational Technology is one of the fastest-growing segments within Fortinet. It spans multiple segments, including electric utilities, water/wastewater, manufacturing, transportation, retail, and finance, among many others. In this course, you'll learn how we got to a connected environment with little to no security and what elements of operational networks make it different from IT. We'll then do a deep dive into OT switch networks, the MODBUS protocol, and how to use the Industrial Security Services within the FortiGate to analyze and control traffic.
Using FortiNAC to determine an inventory of connected devices within a FortiGate/FortiSwitch network environment and propagate this awareness of profiled, connected devices and users using Tags into FGT for the purpose of being leveraged within FortiGate Firewall Policy for granular control.
Using FAC to demonstrate administrative provisioning for directory integration, SAML authentication, token assignment and distribution, and basic network access control leveraging mac-authentication and 802.1x.
In this session, participants will learn how FortiGate Cloud Native Firewall (FortiGate CNF) provides a lightweight, feature-rich security solution for egress, ingress, and east/west security inspection to protect AWS networks and applications. Participants will learn AWS and Fortinet security best practices and routing concepts through a hands-on deployment of FortiGate CNF inspection clusters and AWS services. Participants will be exposed to various management methodologies for deploying and managing security policies.
Using FortiNAC to determine an inventory of connected devices within a FortiGate/FortiSwitch network environment and propagate this awareness of profiled, connected devices and users using Tags into FGT for the purpose of being leveraged within FortiGate Firewall Policy for granular control.
Using FAC to demonstrate administrative provisioning for directory integration, SAML authentication, token assignment and distribution, and basic network access control leveraging mac-authentication and 802.1x.
FSW and FAP hands-on Labs and discussions covering use cases that address main customer challenges and integration in non-green fields. We will cover more complex switch topologies, updates to Fortilink, third-party compatibility, as well as proposals for displacing existing competitor wireless vendors and understanding enterprise-level functionalities that help in winning higher value deals.
In this session, you will learn to configure FortiWeb to protect web applications from various threats. Among other topics, we will address rule-based protection, API endpoint protection, and bot management.
Operational Technology is one of the fastest-growing segments within Fortinet. It spans multiple segments, including electric utilities, water/wastewater, manufacturing, transportation, retail, and finance, among many others. In this course, you'll learn how we got to a connected environment with little to no security and what elements of operational networks make it different from IT. We'll then do a deep dive into OT switch networks, the MODBUS protocol, and how to use the Industrial Security Services within the FortiGate to analyze and control traffic.
This Workshop will cover different analytic solutions to enable the participant to understand network, security, application, and infrastructure events. Participants will learn how to configure the FortiAnalyzer (FAZ), learning the key concepts of the FAZ and common FAZ deployments. They will review the different FAZ subscriptions for Indicators of Compromise, Outbreak Alert Service, and SOC playbook automation. Most customers’ FAZ deployments are under-utilized simply because the end-user doesn’t understand the full potential of FAZ event management. Participants will go through the full Event Management module to fully understand how to detect and be notified of the ‘needle in the haystack’ or the specific log pattern to identify. The course will talk to and demonstrate issues such as FAZ scale, better availability, and management procedures.
Participants will also discover the FortiMonitor (FMR) tool and the SOC as a Service (SOCaaS) offering. Participants will review the architecture of the FMR and delve into performance dashboards, incident response, the OnSight collectors, and automated onboarding with monitoring templates and policies. The full solution overview of SOCaaS will be shown and discussed to provide a deep understanding of how SOCaaS works and how it can help customers with different use cases. Knowledge of NSE 5 FAZ material is preferred; this is not an intro to FAZ course.
Cloud routing is becoming increasingly sophisticated as new transitive, cloud on-ramp and segmentation requirements evolve in enterprise use cases and cloud provider features. In this session, participants will have an in-depth, hands-on experience configuring Azure routing services with Virtual WAN, VNETs, and routing intent to submit to security best practices for north/south and east/west security inspection. Skills involved include Azure, FortiGate, BGP, and VPN.
Join Fortinet and AWS to test your abilities against other Xperts to solve multiple security and AWS deployment challenges. The AWS Security Jam is a gamified platform that presents participants with security challenges where points are scored for the most efficient and fastest solution to various challenges. In this Security Jam, participants will use FortiWeb features to securely expose an application, block active threats targeting known vulnerabilities, and use machine learning to block zero-day threats safely. Participants will come away with improved knowledge of AWS and understand the impact of an unprotected cloud application and the value that FortiWeb provides for ingress application protection.
Update on the latest features in FortiEDR 6.0. Hands-On knowledge of how FortiEDR detects threats using Machine Learning, Zero-Day Exploit Protection, and abuse of Living Off the Land Binaries, called LOLBins. Hands-On Labs addressing the configuration of advanced remediation playbooks and how to enable and use eXtended Detection and Response (XDR) capabilities.
Tired of doing the same repetitive tasks over and over (and over) again? You don’t need a PhD in programming to take advantage of automation and integration efforts that accelerate the efficiency of your workforce with every task. In this workshop, Fortinet has done the heavy lifting. We'll explore how to automate common needs such as enriching potential indicators of compromise extracted from emails and alerts, consuming events that are pending action from other products to streamline log-handling within your operations, performing common Zero Touch Provisioning (ZTP) tasks designed to elevate your NOC's use of FortiManager, building custom playbooks to manage your team's workflows to audit FortiGate policies, and managing vulnerable IT/OT asset's through firewall policy automation efforts.
Cloud security operators must manage an ever-increasing volume and velocity of threat signals. New skillsets are being adopted in the IT security delivery model to cope with the requirements of a software-defined cloud. Automation and service integration are key requirements to scaling the enterprise cloud security practice. In this session, participants will get hands-on experience implementing security in an Azure environment to automate the delivery of “day 1” security infrastructure and create automation for “day 2” security workflows. Participants will come away with knowledge of IaC solutions, FortiGate Fabric Connectors and Automation Stitches, and Azure functions through the use of services such as Terraform, Powershell, and Python.
In this session, you will learn to configure FortiSandbox as part of the security fabric to detect and prevent malware in IT/OT environments. You will also learn how to configure and deploy FortiDeceptor to identify and isolate attackers and compromised endpoints using the Security fabric and dynamic quarantines. Additionally, students will learn to use deception tokens to help lure attackers to FortiDeceptor decoys, where their activities can be captured, tracked, and automatically acted upon.
Speakers
Top experts sharing unique insights and training available nowhere else.
Voice of the Customer
Over 615,000+ customers trust us with their cybersecurity solutions Fortinet offers the most comprehensive solutions to help industries accelerate security, maximize productivity, preserve user experience, and lower total cost of ownership.
At Accelerate 2023 you will hear from customers who have been there, done that, all with Fortinet's broad range of solutions.
Breakout Session Tracks
Nearly 100 breakout sessions to choose from, each created to help you in our cybersecurity journey.
Voice of the Customer
Keynotes and breakout sessions by world-class customers and experts to help you navigate your way to a more secure business environment.
Technical
Sessions to intensify and strengthen your skills with Fortinet solutions. Get direct information from the experts at Fortinet.