Jonathan Nguyen-Duy

Vice President, Strategic Programs at Fortinet

Jonathan Nguyen-Duy leads Strategic Programs at Fortinet where he focuses on emerging technologies and key partnerships. He is a well-known cybersecurity leader who was most recently the Security CTO at Verizon Enterprise Solutions, where he was responsible for strategic technology partnerships, the Verizon Cyber Intelligence Center, and the data science team that produces the annual Data Breach Investigations Report. Prior to serving as Verizon’s Security CTO, Jonathan led security Product Management and was responsible for the analytics-driven transformation of its MSS platform to support nation-state grade continuous diagnostics and mitigation. Before joining Verizon, Jonathan served in the U.S. Foreign Commercial Service. He has more than 15 years of security and BCDR/COOP experience, managing security and IT operations around the world – working through business interruptions including armed conflict, civil strife, labor strikes, natural disasters, terrorist attacks, network outages and a wide range of cyber attacks. Jonathan holds a BA in International Economics and an MBA in IT Marketing and International Business from George Washington University.

Cybersecurity Skills Report: Today’s CISO is Shifting Toward Strategic Business Enablement

The Cybersecurity Regulations Healthcare, Financial Services, and Retail Industries Must Know About

The Cybersecurity Regulations Healthcare, Financial Services, and Retail Industries Must Know About

Cyberattacks are often motivated by the desire to steal and sell sensitive data, such as credit card and financial records, personally identifiable information (PII) including social security numbers, or protected health...

How Digital Transformation Has Impacted Security and How to Minimize Risk

How Digital Transformation Has Impacted Security and How to Minimize Risk

While digital transformation is having a significant impact on technology—from data-driven decision-making to cloud adoption, mobility, and the explosion in Internet-of-Things (IoT)—it goes beyond just deploying new solutions....

How the General Data Protection Regulation (GDPR) Will Specifically Affect Healthcare

How the General Data Protection Regulation (GDPR) Will Specifically Affect Healthcare

The European Union’s General Data Protection Regulation (GDPR) will begin May 25, 2018, and businesses across the globe are bracing for the updated legislation. The GDPR is changing more than data compliance—it’s changing the way...

The Opportunity to Create Safer Schools and Campuses with Physical and Cybersecurity Solutions

The Opportunity to Create Safer Schools and Campuses with Physical and Cybersecurity Solutions

Educators across the country work to ensure students have access to safe and productive environments where they can advance their education and prepare for their careers. In 2018, achieving this goal is becoming increasingly...

Winning the Digital Transformation Cyberwar

Winning the Digital Transformation Cyberwar

The vast majority of cybercrime we deal with is opportunistic and automated. It is the domain of criminals trolling for the unaware and vulnerable. They target unpatched systems and vulnerable applications, exploit gullible end...

Securing the Next Generation of Digital Transformation

Securing the Next Generation of Digital Transformation

Cybercrime is a continually increasing problem due to the digital transformation-driven expansion of the attack surface and the growing sophistication of bad actors.  Corporations and government agencies of all sizes are rapidly...

Healthcare’s Secret Weapon for Securing the IoMT

Healthcare’s Secret Weapon for Securing the IoMT

Patient care is undergoing a Renaissance of technological advancements. Electronic health records (EHRs), healthcare applications, and connected medical devices are improving doctor/patient communication by enabling real-time...

Smart Cars: A Peek Into the Future of Converged Networks

Smart Cars: A Peek Into the Future of Converged Networks

Ask any CSO about their biggest challenges and you’re likely to hear some variation on digital transformation. Things like multi-cloud, IoT, mobile workers and devices, escalating consumer expectations, and shadow IT are...

3 Must-Haves for IoT Security: Learn, Segment & Protect

3 Must-Haves for IoT Security: Learn, Segment & Protect

Digital transformation is rapidly reshaping industries, generating explosive productivity growth, and creating entirely new business models. The Internet of Things (IoT) is an important technology pillar in today’s digital...

Managing Today’s Risks Demands A Security Fabric Approach

Managing Today’s Risks Demands A Security Fabric Approach

In today’s rapidly evolving IT environment, CIOs and CISOs face an increasing level of complexity, both in the IT systems we manage and the cyberthreats we face.  On top of managing and configuring the growing number of tools,...

How To Maintain Control When Moving To The Cloud

How To Maintain Control When Moving To The Cloud

Organizations of all sizes and across all industries are embracing a cloud-first strategy. Cloud services offer efficiencies and productivity, agility, and cost savings. It just makes sense for many organizations to move from...

Load More