Jonathan Nguyen-Duy

Vice President, Strategic Programs at Fortinet

Jonathan Nguyen-Duy leads Strategic Programs at Fortinet where he focuses on emerging technologies and key partnerships. He is a well-known cybersecurity leader who was most recently the Security CTO at Verizon Enterprise Solutions, where he was responsible for strategic technology partnerships, the Verizon Cyber Intelligence Center, and the data science team that produces the annual Data Breach Investigations Report. Prior to serving as Verizon’s Security CTO, Jonathan led security Product Management and was responsible for the analytics-driven transformation of its MSS platform to support nation-state grade continuous diagnostics and mitigation. Before joining Verizon, Jonathan served in the U.S. Foreign Commercial Service. He has more than 15 years of security and BCDR/COOP experience, managing security and IT operations around the world – working through business interruptions including armed conflict, civil strife, labor strikes, natural disasters, terrorist attacks, network outages and a wide range of cyber attacks. Jonathan holds a BA in International Economics and an MBA in IT Marketing and International Business from George Washington University.

How the General Data Protection Regulation (GDPR) Will Specifically Affect Healthcare

The Opportunity to Create Safer Schools and Campuses with Physical and Cybersecurity Solutions

The Opportunity to Create Safer Schools and Campuses with Physical and Cybersecurity Solutions

Educators across the country work to ensure students have access to safe and productive environments where they can advance their education and prepare for their careers. In 2018, achieving this goal is becoming increasingly...

Winning the Digital Transformation Cyberwar

Winning the Digital Transformation Cyberwar

The vast majority of cybercrime we deal with is opportunistic and automated. It is the domain of criminals trolling for the unaware and vulnerable. They target unpatched systems and vulnerable applications, exploit gullible end...

Securing the Next Generation of Digital Transformation

Securing the Next Generation of Digital Transformation

Cybercrime is a continually increasing problem due to the digital transformation-driven expansion of the attack surface and the growing sophistication of bad actors.  Corporations and government agencies of all sizes are rapidly...

Healthcare’s Secret Weapon for Securing the IoMT

Healthcare’s Secret Weapon for Securing the IoMT

Patient care is undergoing a Renaissance of technological advancements. Electronic health records (EHRs), healthcare applications, and connected medical devices are improving doctor/patient communication by enabling real-time...

Smart Cars: A Peek Into the Future of Converged Networks

Smart Cars: A Peek Into the Future of Converged Networks

Ask any CSO about their biggest challenges and you’re likely to hear some variation on digital transformation. Things like multi-cloud, IoT, mobile workers and devices, escalating consumer expectations, and shadow IT are...

3 Must-Haves for IoT Security: Learn, Segment & Protect

3 Must-Haves for IoT Security: Learn, Segment & Protect

Digital transformation is rapidly reshaping industries, generating explosive productivity growth, and creating entirely new business models. The Internet of Things (IoT) is an important technology pillar in today’s digital...

Managing Today’s Risks Demands A Security Fabric Approach

Managing Today’s Risks Demands A Security Fabric Approach

In today’s rapidly evolving IT environment, CIOs and CISOs face an increasing level of complexity, both in the IT systems we manage and the cyberthreats we face.  On top of managing and configuring the growing number of tools,...

How To Maintain Control When Moving To The Cloud

How To Maintain Control When Moving To The Cloud

Organizations of all sizes and across all industries are embracing a cloud-first strategy. Cloud services offer efficiencies and productivity, agility, and cost savings. It just makes sense for many organizations to move from...

Moving to the Cloud? Top Security Factors to Consider

Moving to the Cloud? Top Security Factors to Consider

It seems like everyone is talking about moving to the cloud these days. The efficiencies, productivity, agility, elasticity, and cost savings all make a compelling case for migrating from traditional private networks and data...

Load More