Log in
E-mail
Password
Show password
Remember
Forgot password ?
Become a member for free
Sign up
Sign up
New member
Sign up for FREE
New customer
Discover our services
Settings
Settings
Dynamic quotes 
OFFON
  1. Homepage
  2. Equities
  3. United States
  4. Nasdaq
  5. Fortinet, Inc.
  6. News
  7. Summary
    FTNT   US34959E1091

FORTINET, INC.

(FTNT)
  Report
SummaryQuotesChartsNewsRatingsCalendarCompanyFinancialsConsensusRevisions 
SummaryMost relevantAll NewsAnalyst Reco.Other languagesPress ReleasesOfficial PublicationsSector newsMarketScreener Strategies

The More You Know: Get the Skills to Defeat the Cyber Kill Chain

10/11/2021 | 12:22pm EST

Narrow job titles are fading into the distance, and employers are looking for candidates with a wide variety of skills to join most fields. As in any industry, the more you know, the more attractive you will be for a role in cybersecurity. Amassing a breadth of security, cloud, and networking knowledge will help your chances of being a top candidate and help you execute in the long run as you combat all kinds of present-day and future attacks to defeat the cyber kill chain.

The recent convergence of networking and security calls for convergence in skills. Before the surge in digital transformation, OT and IT were separate, independent networks. OT systems were considered relatively safe from outside threats because they weren't connected to the internet. But as digital innovation continues, OT networks have converged with IT networks to reduce costs, increase productivity, and gain market share. Now all networks are suddenly exposed to the entire threat landscape. And a lot of threats mean we need a lot of different specialties. Unfortunately, as technology advances, so do cybercriminals.

The Cyber Kill Chain System

There are many threats out there coming from all sorts of areas, and combatting the cyber kill chain requires specific skills. If we look at the seven steps of the cyber kill chain-reconnaissance, weaponization, delivery, exploitation, installation, command and control, actions-we can shine the light on the processes and use that as a roadmap to see what kinds of skills we need to develop to thwart each step.

  1. Reconnaissance involves things like harvesting email addresses and compiling information. The skills needed to foil this step are just fundamental cybersecurity hygiene, such as recognizing phishing emails. Anyone can learn them at any age or stage in their career.
  2. Weaponizationuses that information to embed malware into a document, for example, or host the malware on a compromised domain. This is the stage when the attacker is creating the attack, and there are few security controls, even security awareness, that can have an impact at this stage.
  3. Delivery sends out the attack via email attachments and websites to transmit the malware to the victim's targeted environment. This is the step where people, not technology, can stop the attack in its tracks. Organization-wide training on what to look for can help employees obtain the skills needed to halt the delivery of an attack.
  4. Exploitation targets an application or operating system vulnerability. This is the step when the attack is "detonated." This is where we have trained IT personnel tasked with ensuring the systems are up to date and have an antivirus installed. They also ensure that all sensitive data is secured.
  5. Installation is when the attacker installs the malware on the victim. This step goes beyond the "human firewall" and requires trained staff to keep the system secure and look for abnormal behavior.
  6. Command and control is when the attacker has control of the machine. Malware is not often automated, so this stage happens manually. This step is once a system is compromised or infected. This is why "hunting" is a popular tactic- the hunters are looking for abnormal outbound activities.
  7. Actionson the objective of data exfiltration involve collecting, encrypting, and extracting information from the victim environment. Once the attacker has access and control inside an organization, they can execute on their objectives.

Knowing the cyber skill chain stages and their inherent outcomes is a first step in combatting cybercrime. Cybersecurity is all about learning how to adapt and be flexible, as things are constantly changing, and awareness training can be hugely beneficial.

Overcome the Cyber Kill Chain with New Skills

There are many free training programs out there to get started. The Fortinet NSE Certification Program prepares professionals for a career in cybersecurity and trains you on multiple Fortinet products. (It's best to get various vendor training to become familiar with other cybersecurity products as well.) Non-vendor training and penetration testing (also called "pen testing" or "ethical hacking") can also be interesting and educational. Concentrate on ethical hacking techniques to understand the mindset and tactics of cyber adversaries, but also find training and information on:

  • Incident response forensics
  • Coding techniques
  • Logging techniques
  • Network engineering
  • Threat intelligence

And instead of just focusing on one area of expertise, essential technical skills to develop include:

  • Threat hunting
  • Reverse malware engineering
  • Pen testing
  • Exploit dev exposure
  • Managing big data sets
  • Tools like virtualization, container-based tech, LINUX-based tech, scripting languages, JavaScript (is essential), and a solid understanding of networking
Pursue Your Passion and Learn the System

There is a growing need for qualified talent who can help in the fight against modern attacks like the cyber kill chain. And while some cybersecurity careers are molded in the traditional sense, through college programs and internships, there are other paths that individuals can take to enter this field independently.

The Fortinet NSE Training Institute helps develop career pathways and supports more than 300 academic institutes across 80 countries with programs for all levels. It encompasses the Certification Program, the Fortinet Security Academy Program, and the Veterans Program, all designed to help shrink the cybersecurity skills gap and kill the cyber kill chain. Fortinet also offers education pathways to develop security operations, Security-Driven Networking, Adaptive Cloud Security, and Zero Trust Access.

Any career can be fulfilling if you are doing something you love. Just getting a job and punching a clock day-to-day is not sustainable nor fulfilling. Along with developing a diverse skill set, bring forward your innate talents, problem-solving skills, an inquiring mind, tenacity. And you have to be flexible and willing to adapt along with the landscape, all the while being humble enough to admit that there will always be more things to learn.

Find out more about how Fortinet's Training Advancement Agenda (TAA) and NSE Training Institute programs, including the Certification Program, Security Academy Program and Veterans Program, are helping to solve the cyber skills gap and prepare the cybersecurity workforce of tomorrow.

Disclaimer

Fortinet Inc. published this content on 11 October 2021 and is solely responsible for the information contained therein. Distributed by Public, unedited and unaltered, on 11 October 2021 16:21:12 UTC.


ę Publicnow 2021
All news about FORTINET, INC.
12/03FORTINET : Understanding the Attack Chain Helps to Counter Threats
PU
12/01FORTINET IS THE SECURITY INNOVATION : More Than 1500 Patents Either Awarded or Pending
PU
11/30FORTINET : Engage Partner Program Delivers Opportunities to Partners
PU
11/29FORTINET : Eight Buying Considerations for EDR technology According to IDC
PU
11/29Compugen Wins Fortinet Achievement Award at NSE XPERTS Summit 2021
AQ
11/29FORTINET : Announces New Service Offerings on AWS, Including Custom-Built Cloud Architectu..
PU
11/23FORTINET : Got a FortiGate? You (Probably) Already Have ZTNA
PU
11/22FORTINET AGAIN NAMED A LEADER IN THE : Global SD-WAN Vendor Market
PU
11/18Fortinet Again Named a Visionary in the 2021 Gartner« Magic Quadrant™ for Enterpr..
GL
11/18Fortinet Again Named a Visionary in the 2021 Gartner« Magic Quadrant™ for Enterpr..
GL
More news
Analyst Recommendations on FORTINET, INC.
More recommendations
Financials (USD)
Sales 2021 3 339 M - -
Net income 2021 581 M - -
Net cash 2021 2 568 M - -
P/E ratio 2021 86,9x
Yield 2021 -
Capitalization 49 511 M 49 511 M -
EV / Sales 2021 14,1x
EV / Sales 2022 11,5x
Nbr of Employees 9 700
Free-Float 81,8%
Chart FORTINET, INC.
Duration : Period :
Fortinet, Inc. Technical Analysis Chart | MarketScreener
Full-screen chart
Technical analysis trends FORTINET, INC.
Short TermMid-TermLong Term
TrendsBearishBullishBullish
Income Statement Evolution
Consensus
Sell
Buy
Mean consensus OUTPERFORM
Number of Analysts 29
Last Close Price 302,82 $
Average target price 372,85 $
Spread / Average Target 23,1%
EPS Revisions
Managers and Directors
Ken Xie Chairman & Chief Executive Officer
Michael Xie President, Director & Chief Technology Officer
Keith Franklin Jensen CFO, Chief Accounting Officer & Controller
Phil Quade Chief Information Security Officer
William H. Neukom Lead Independent Director
Sector and Competitors
1st jan.Capi. (M$)
FORTINET, INC.110.81%49 511
ACCENTURE PLC37.87%228 288
TATA CONSULTANCY SERVICES LTD.27.17%178 952
INTERNATIONAL BUSINESS MACHINES CORPORATION-5.59%106 576
SNOWFLAKE INC.10.52%103 844
INFOSYS LIMITED38.20%97 940