John Maddison

Sr. Vice President, Products and Solutions at Fortinet

John Maddison has more than 20 years of experience in the telecommunications, IT Infrastructure, and security industries. Previously he held positions as general manager data center division and senior vice president core technology at Trend Micro. Before that John was senior director of product management at Lucent Technologies. He has lived and worked in Europe, Asia, and the United States. John graduated with a bachelor of telecommunications engineering degree from Plymouth University, United Kingdom.

Unidentified Devices Leave Networks Vulnerable
BrandPost Fortinet

Unidentified Devices Leave Networks Vulnerable


Fireside Chat with School District of Philadelphia: Securing Virtual Servers,  Chromebooks, and Student Data

Fireside Chat with School District of Philadelphia: Securing Virtual Servers, Chromebooks, and Student Data

The School District of Philadelphia is the eighth-largest public school district in the United States, with more than 134,000 students and more than 18,000 staff. “Although we’re large, we are an inner-city district,” Keith Busby,...

Addressing the Cyber Skills Gap with Great Talent

Addressing the Cyber Skills Gap with Great Talent

One of the most pressing concerns of today’s CSO is filling positions in their security teams with qualified, trained, and motivated security professionals. The few applicants trickling out of universities may have deep...

The Value of Third Party Testing

The Value of Third Party Testing

We all wrestle with the challenges of security in today's digital marketplace. The security landscape and potential attack surfaces continue to expand, and malware and exploits continue to become more sophisticated. However, one...

Building an Adaptive and Secure SD-WAN Framework to Support Digital Transformation

Building an Adaptive and Secure SD-WAN Framework to Support Digital Transformation

Organizations are facing new business and technological pressures, such as the rise in the number and variety of smart devices, and the growth of an increasingly mobile workforce. Demands for greater performance across a...

Resolving the Challenges of IT-OT Convergence

Resolving the Challenges of IT-OT Convergence

For decades, computer and data networks – known as Information Technology (IT), and industrial control system (ICS) operations and process control groups – often labeled as Operations Technology (OT), have run as isolated and...

Machine Learning Stops Web Application Threats while Reducing False Positives

Machine Learning Stops Web Application Threats while Reducing False Positives

Cybercriminals are increasingly targeting public and internal web applications. Today, nearly half of all data breaches are caused by attacks targeting web application vulnerabilities. To protect your organization from such...

Fireside Chat with Halifax Health: Protecting Patient Data with Firewalls and AI

Fireside Chat with Halifax Health: Protecting Patient Data with Firewalls and AI

Halifax Health, based in Daytona Beach, is the largest healthcare provider in east central Florida, with 678 licensed beds and more than 500 doctors on its staff spread across two hospitals. “We are a hospital system that that...

Security Services Bridge Gaps Caused by Fragmented Network Environments

Security Services Bridge Gaps Caused by Fragmented Network Environments

Nearly everyone can agree that the security challenges enterprises face today require out of the box thinking. Our Quarterly Threat Landscape reports show today’s threats are designed to target multiple attack vectors, expose...

Realizing the Full Potential of Secure SD-WAN

Realizing the Full Potential of Secure SD-WAN

The growing appeal of SD-WAN technologies has caught the attention of the IT world. The benefits of efficient cloud adoption, broad application visibility, and lowered operating costs have combined to create a powerful value...

Your Multi-Cloud Security Checklist: 8 Things CISOs Need to Remember

Your Multi-Cloud Security Checklist: 8 Things CISOs Need to Remember

Cloud computing is an inherently dynamic and rapidly changing space. With the vast majority of organizations now adopting multi-cloud environments, the breadth and depth of the attack surface has expanded rapidly. This has...

Is Converging Your IT and OT Networks Putting Your Organization at Risk?

Is Converging Your IT and OT Networks Putting Your Organization at Risk?

In the new digital economy, data – and what you do with that data – is the key to success. Consumers and employees alike now demand instant access to critical information that allows them to solve problems, make informed...

Load More