Fortinet Summit 2024: Experts Discuss Cyber Trends, Risks, & Diversity

thumbnail Fortinet Summit 2024: Experts Discuss Cyber Trends, Risks, & Diversity

Experts at Fortinet Cybersecurity Summit 2024 explore emerging tech, quantum threats, AI’s role, industry risks, and the need for diversity in cybersecurity.

Written By: Jordan Smith
Nov 20, 2024
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Cybersecurity is a shifting landscape that frequently sees emerging technologies coming in to disrupt the status quo and change the way we approach security. Whether that’s AI or quantum computing, these technologies can advance cybersecurity to new heights but also can provide threat actors with new means to coordinate and execute breaches.

In addition to emerging technologies, regulations and data privacy play key roles in cybersecurity that organizations must continuously consider. During Fortinet’s Cybersecurity Summit 2024, a panel of experts from differing organizations discussed the various aspects of cybersecurity and digital transformation.

In addition to discussing the advancements and challenges in cybersecurity, the panel also touched on the importance of hybrid work models, the need for diverse representation in cybersecurity, and the challenges of maintaining security in a decentralized environment.

Cyber risks and compliance in various industries

One of the biggest hurdles regarding cybersecurity can appear through the merger and acquisition process. Due diligence is required to ensure cyber posture remains strong, as companies can have their own respective policies or strategies around cybersecurity.

“We do use a wide variety of tools that are out there and we try to do external scans to get as good of a picture as we can before we acquire those companies,” said CEO of Constellation Software Ka-On Tong, when discussing his company’s acquisition process. “But sometimes you don’t know what you don’t know until you get the organization.”

Tong’s company acquires close to 100 companies a year and continues to grow. With around 2,000 companies worldwide, Constellation Software relies on in-depth assessments of the security posture as part of the due diligence process.

The healthcare industry must consider various cybersecurity, regulatory, and data privacy hurdles. Kevin Watkins, director of cybersecurity at TELUS Health, said that they aim to balance regulations, innovation, and customer needs through a robust framework.

“There’s a lot of scope for really putting automating, digitizing, and using AI across healthcare, but we need to do so against the backdrop of those regulations,” Watkins said during the panel. “Within TELUS Health, we’re trying to balance that. We have a very robust data privacy AI framework which looks at the intent of the concept. What are you trying to do with the data? Does it meet the requirements for accountability? And we take everything through that at a very early stage, but in the background.”

AI, quantum computing, and fusion centers

According to Watkins, TELUS Health has a team of AI experts to keep pace with emerging technology specifically within security use cases. However, it takes a level of responsibility when utilizing the technology to ensure customers’ data is protected and maintained.

“I think we’re in the Victorian era of AI. In the Victorian era, no solution was good unless it involved the steam train. Now, no solution is good unless it involves AI,” said Watkins “The challenge that we have across security and healthcare is: how do we use it? We don’t want practitioners becoming overly dependent on AI because it’s still the practitioner who’s accountable.”

Along with AI, quantum computing is another advanced technology that has invaded the cybersecurity space– both as a resource and as a possible threat.

There are a number of potential benefits to using quantum computing, including solving complex problems and supply chain optimization. However, the threats, including those to encryption and dark web attacks, can be significant to an organization.

“There’s a real threat that is happening right now and that’s called ‘harvest now, decrypt later,’” Atty Mashatan, Head of Rogers School of Business explained. “Attackers are sitting on a vast volume of encrypted data just waiting for the opportune time that they can break it and much of that data may be obsolete, but if it’s customer data, health data, financial data, social security numbers, we want them to be kept confidential for the life of the entity that owns it.”

Mashatan explained that with advancements in quantum computing over the next few years, threat actors will be able to decrypt that information and have access to it. And that it might already be too late for some of that data.

Lastly, fusion centers are a combination of pillars that typically would be very siloed to each other and bring the data between them together to improve the visibility of incidents that are occurring across these siloes.

“Essentially, a fusion center is a combination of pillars that typically would be very siloed to each other. In banking, which is the industry that I work in, you have your fraud department, corporate security, and cyber functions,” explained Elena Carroll, Director, Information Security, at DAVIES WARD PHILLIPS & VINEBERG, during the panel discussion. “And fusion centers seek to bring the data between all of those groups together and kind of unify that so you can actually have good visibility of incidents that are occurring across all three.

 “You typically don’t have a fraud incident that also doesn’t impact cybersecurity anymore, especially as fraud techniques evolve, so having that visibility across is very critical.”

Diversity in cybersecurity

Traditionally, cybersecurity draws from non-diverse fields, leading to the underrepresentation of women and minorities in this field. This stagnation can lead to a small pool of cybersecurity professionals.

According to Mashatan, we’re not just seeing a glass ceiling with the cybersecurity profession but a sticky floor.

“We’re not looking at the entry level because there’s a lot of companies that are doing great work in recruitment to hire more diverse talent and that’s great,” Mashatan said. “Now, it’s time to move on and look at the board, look at the C-suite, and ask why those are not diverse?”

The sticky floor that Mashatan refers to is that while underrepresented groups are being included in the cybersecurity field, they’re unable to advance and get passed over for promotion, creating a pipeline issue.

Carroll recommends that those looking to continue an upward trajectory find people internally and externally who will advocate for them and push them out of their comfort zone.

“My biggest piece of advice is just to really make space for yourself, identify those mentors, and find people who will advocate for you and push you into some of those roles and push you to do things that you’re not comfortable with,” Carroll said. “I see so many women who are totally qualified and they’re doing amazing work, and they’re being recognized for that work, but they’re not necessarily comfortable in doing the uncomfortable piece about pushing themselves up and maybe having those conversations and asking for those roles as well.”

Fortinet’s Cybersecurity Summit served as a significant platform for experts around the channel to discuss cybersecurity best practices and solutions. Discover more about global cybersecurity challenges discussed at the event and their impact on the future of business.

thumbnail Jordan Smith

Jordan Smith is a news writer who has seven years of experience as a journalist, copywriter, podcaster, and copyeditor. He has worked with both written and audio media formats, contributing to IT publications such as MeriTalk, HCLTech, and Channel Insider, and participating in podcasts and panel moderation for IT events.

Recommended for you...

Malwarebytes Launches New Email Security Module

Malwarebytes adds AI-powered email protection to ThreatDown, unifying endpoint and email security for MSPs via IRONSCALES tech and Nebula console.

Jordan Smith
Jul 23, 2025
Galactic Advisors on Addressing Vulnerabilities in the Channel

Galactic Advisors uncovered critical flaws in Kaseya’s Network Detective; both firms moved fast to patch issues and highlight MSP risk assessment best practices.

Jordan Smith
Jul 23, 2025
Cynomi’s State of the vCISO: MSPs & MSSPs Expanding Services

Cynomi report shows vCISO demand tripled as MSPs turn to AI for scalable cybersecurity. 96% now offer or plan to offer vCISO in the next two years.

Victoria Durgin
Jul 23, 2025
MSPs More Popular Than Ever for Security: Barracuda

Barracuda study: Businesses rely on MSPs for security needs, with most willing to pay more for premium AI, integration, and 24/7 support.

Franklin Okeke
Jul 16, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.