6 May, 2019 | 8:30AM - 4:30PM
Your security architecture needs to intelligently transform from the data center, beyond the cloud, to the Edge. We designed our Security Summit World Tour to help you learn how cybersecurity can drive digital innovation and business growth.
Join us, and your peers, to learn about:
Complimentary seats are limited, so be sure to register today!
6 May, 2019
8:30AM - 4:30PM
Makati Shangri-La Manila
Ayala Avenue corner Makati Avenue, Makati City, 1200, Philippines
Manila
Come meet security experts from Akamai who are available to share insights and answer questions.
• The Fine Art of Creating A Cyber Security Strategy To Drive Transformation - Jinan Budge, Forrester Research – Principal Analyst
• Intelligent Security Starts at the Edge - Fernando Serto, Akamai – Head of Security Technology & Strategy, APJ
• Designing for Doomsday: Effective API Security Approaches from the Edge - Amol Mathur, Akamai – Director of Product Management, WW
• Customer Identity & Access Management - Introducing Akamai Identity Cloud - Unmesh Deshmukh, Akamai – Regional Vice President, Cloud Security & Identity, APJ
• Credential Stuffing, Identity and Fraud
• Credential Abuse: Detection Strategies, Understanding Your Attack Surface, and Real-World Attack Examples
• Moving Beyond Perimeter Security - Zero Trust, Does It Really Work?
• Zero Trust in the Real World: Traditional VPN Access vs Zero Trust
• Content Security Protection
• Secure your infrastructure. Protect your intellectual property. Fireside chat - Debunk Zero Trust Security - Does It Really Work?
Session Description
Best Practices and Real-World Advice: Jinan Budge, Principal Analyst at Forrester Research; Vaughan Woods, Vice President at Akamai Technologies
• Intelligent Security Starts at the Edge
Learn how Akamai makes the Internet fast, reliable and secure for customers the world over. Find out how our cloud delivery platform -- the world’s largest and most trusted -- empowers our customers to provide the best and most secure digital experiences on any device, anytime, anywhere. We'll share an overview of our security solution portfolio and our Adaptive Threat Protection for digital enterprises.
• Designing for Doomsday: Effective API Security Approaches from the Edge
API security has emerged as the single biggest challenge organizations face to securing their threat surface. In this session we will review real-world examples of how application and API design patterns expose businesses to risks ranging from misuse to outright abuse, and highlight why it's so challenging for businesses to detect and mitigate their exposure. By looking at threat intelligence data gleaned from billions of device and API interactions, we will show how to detect, defend, and ultimately design for doomsday so that you can stop the ticking clock and get back to business.
• Customer Identity & Access Management - Introducing Akamai Identity Cloud
What is Customer Identity & Access Management and how can it help? Come learn about why identity is a pressing challenge for today's digital businesses and how Akamai Identity Cloud, the market leader in CIAM, can help you better leverage customer identities to improve your customer experience.
• Credential Stuffing, Identity and Fraud
The recent acquisition of Janrain, the market leader in customer identity & access management (CIAM), provides a new key ingredient to protecting login pages from attack. Join us to hear more about identity management and how it will be the next evolution in combating credential stuffing and reducing the incidence and impact of web fraud.
• Credential Abuse: Detection Strategies, Understanding Your Attack Surface and Real-World Attack Examples
Credential stuffing is among the top security challenges facing online businesses today. Come learn more about what credential abuse is and what you can do about it, including both solutions to address the problem as well as how your own application architecture could be making the problem worse.
• Moving Beyond Perimeter Security - Zero Trust, Does it Really Work?
The “trust but verify” security model is no longer effective as new business models and processes move users, devices, applications and data beyond the traditional enterprise perimeter. The surge in new attack surfaces demands a new approach to security in the form of a zero trust model. Find out the four steps to start a zero trust security journey and immediately improve defenses.
• Zero Trust in the Real World: Traditional VPN Access vs Zero Trust
In this interactive demo, experience the parallel worlds where users interact with their corporate applications via VPN and Zero Trust. See how by using Zero Trust, users are able to securely access authorized applications while avoiding targeted attacks. Join us to find out.
• Content Security Protection
Broadcasters, OTT vendors and telecommunications companies are increasing their investment in content to capture the growth in online video industry and improve their business. Not able to protect its content would result in loss of revenues, audience and reputation. Find out ways to protect content from piracy, combat credential stuffing and reduce the incidence of fraud.
• Debunk Zero Trust Security - Does it Really Work?
We are more vulnerable than ever. Attack surfaces keep shifting. Trust based on network location is no longer relevant. Digital transformation opens up new ways of improving business and ever more complex systems which result in more risk. Internal apps are getting attacked from “trusted sources” by CSRF and a host of other common app layer attacks. Malicious actors are moving laterally based on “most privilege”, and exfiltrating data using less monitored channels like DNS. Is zero trust model the new security approach?
Vice President,
Forrester Research
Speaker
< Speaker 2 Job Title >,
< Speaker 2 Company >
Speaker