Intelligente Sicherheit beginnt an der Edge

Mit Akamai müssen Sie keine Kompromisse eingehen beim Thema Sicherheit, um maximale Agilität zu gewährleisten. Besuchen Sie unseren Stand 9-220, um zu erfahren, wie Akamai Sicherheitserkenntnisse für einen automatisierten Schutz Ihres Unternehmens nutzt.

Treffen Sie unsere Threat Researcher bei einem persönlichen Meeting:
Lassen Sie sich beraten, wie Sie neue Angriffsvektoren, Angriffstypen und Schwachstellen managen.

Testen Sie neue Tools:
Erfahren Sie, wie wir maschinelle und tiefgehende Lernmodelle sowie neueste Technologien nutzen, um neue Bedrohungen zu erkennen und zu bekämpfen.

Lernen Sie wie Akamai Sie unterstützt alles überall zu schützen:
Schützen Sie Ihre Applikationen und APIs. Sichern Sie Kundenidentitäten und verhindern Sie Betrug und Datenmissbrauch. Isolieren Sie Ihr Unternehmen vor Internetbedrohungen.

Akamai Crack the Code

Quick thinkers and sharp minds should get ready to Crack the Code to win Akamai merchandise and be entered for a chance to win one of three grand prizes.

Get crackin’ now! #AkamaiCrackTheCode

Booth Crawl

Come by the Akamai booth (1522) between 5:30 and 7:00 PM on August 7 for refreshments and a microbrew while learning how intelligent security starts at the Edge.

Booth Agenda

Tuesday, March 5
Stop Credential Abuse

10:30 - 10:45 AM
Credential stuffing, identity, and fraud
Learn more about identity management and how it will be the next evolution in combating credential stuffing and reducing the incidence and impact of web fraud.
Speaker: Josh Shaul, Vice President, Web Security


11:00 - 11:15 AM
Introduction to Credential Abuse
We'll discuss what credential abuse is and what are the factors leading to the overwhelming increase in credential abuse attacks. This includes a look at the impact it can have on an organization and the hidden costs from ignoring the potential risks.
Speaker: Michael Schmidt, Security Architect


11:30 - 11:45 AM
The escalation of bot detection tactics
A discussion of past, current, and future detection techniques, including strengths and weaknesses of those detections.
Speakers: Sean Flynn, Security Architect


1:30 - 1:45 PM
Understanding your credential stuffing attack surface
A look into understanding what credential stuffing is trying to exploit in your web presence and how Akamai protects those points of entry.
Speaker: Steven Schiffer, Security Architect


2:00 - 2:15 PM
When Bots Attack!: Stories About Fighting Credential Abuse
A discussion focused on two customers and the aggressive credential abuse campaigns leveraged against them.
Speaker: Joseph Martinez, Technical Security Consultant


2:30 - 2:45 PM
Credential stuffing, identity, and fraud
Learn more about identity management and how it will be the next evolution in combating credential stuffing and reducing the incidence and impact of web fraud.
Speaker: Josh Shaul, Vice President, Web Security


3:00 - 3:15 PM
Introduction to Credential Abuse
We'll discuss what credential abuse is and what are the factors leading to the overwhelming increase in credential abuse attacks. This includes a look at the impact it can have on an organization and the hidden costs from ignoring the potential risks.
Speaker: Michael Schmidt, Security Architect


3:30 - 3:45 PM
The escalation of bot detection tactics
A discussion of past, current, and future detection techniques, including strengths and weaknesses of those detections.
Speaker: Sean Flynn, Security Architect


4:00 - 4:15 PM
Understanding your credential stuffing attack surface
A look into understanding what credential stuffing is trying to exploit in your web presence and how Akamai protects those points of entry.
Speaker: Steven Schiffer, Security Architect


4:30 - 5:00 PM
When Bots Attack!: Stories About Fighting Credential Abuse
A discussion focused on two customers and the aggressive credential abuse campaigns leveraged against them.
Speaker: Joseph Martinez, Technical Security Consultant

Wednesday, March 6
Move to Zero Trust

10:30 - 10:45 AM
Moving Beyond The Perimeter With Akamai
There is no longer a need to debate the need for change. Traditional security models relying on network perimeter architectures are inadequate given today's IT infrastructure and user landscape. Learn how Akamai helps organizations move toward a Zero Trust security model.
Speaker: Tim Knudsen, Vice President Cloud Networking


11:00 - 11:15 AM
Elimination of the VPN
We'll discuss how Akamai is transforming enterprise security, with a focus on replacing legacy access technologies like virtual private networks.
Speakers: John Payne, Chief Architect
Joe Defelice, Sr. Director, Security and Infrastructure Engineering


11:30 - 11:45 AM
Dynamic Access & Threat Protection - Leveraging a multitude of signals for dynamic security decisions
Join this live demonstration to understand why controlling access to apps you control - and don't control - is the future of enterprise security.
Speaker: Sriram Balasubramanian, Product Line Director


1:30 - 1:45 PM
Zero Trust Demo
Join this live demonstration to understand why controlling access to apps you control - and don't control - is the future of enterprise security.
Speaker: Faraz Siddiqui, Security Solutions Engineer


2:00 - 2:15 PM
Controlling your enterprise security attack surface
Learn about how to mitigate risk associated with the ever expanding enterprise attack surface
Speaker: Tony Lauro, Security Technology and Strategy
Tim Strickland, Enterprise


2:30 - 2:45 PM
Akamai Zero Trust security vision & strategy
There is no longer a need to debate the need for change. Traditional security models relying on network perimeter architectures are inadequate given today's IT infrastructure and user landscape. Learn how Akamai helps organizations move toward a Zero Trust security model.
Speaker: Tim Knudsen, Vice President Cloud Networking


3:00 - 3:15 PM
Elimination of the VPN
We'll discuss how Akamai is transforming enterprise security, with a focus on replacing legacy access technologies like virtual private networks.
Speaker: John Payne, Chief Architect
Joe Defelice, Sr. Director, Security and Infrastructure Engineering


3:30 - 3:45 PM
Dynamic Access & Threat Protection - Leveraging a multitude of signals for dynamic security decisions
Join this live demonstration to understand why controlling access to apps you control - and don't control - is the future of enterprise security.
Speaker: Sriram Balasubramanian, Product Line Director


4:00 - 4:15 PM
Zero Trust Demo
Join this live demonstration to understand why controlling access to apps you control - and don't control - is the future of enterprise security.
Speaker: Faraz Siddiqui, Security Solutions Engineer


4:30 - 5:00 PM
Controlling your enterprise security attack surface
Learn about how to mitigate risk associated with the ever expanding enterprise attack surface
Speaker: Tony Lauro, Security Technology and Strategy
Tim Strickland, Enterprise

Thursday, March 7
Protect Apps & APIs

10:30 - 10:45 AM
Findings of Q1'19 SOTI Report
Underlining the importance of API protection as its use is growing exponentially and traditional security measures do not provide best protection.
Speaker: Martin McKeay, Editorial Director


11:00 - 11:15 AM
Akamai approach to WAF
Looking at some fundamental design principles that make a WAF the best defense against cyber attacks
Speaker: Volker Tegtmeyer, Product Marketing


11:30 - 11:45 AM
API Risk Exposure in Business Ecosystems
Risk exposure is growing in large business ecosystems. An attack on one may affect everyone.
Speaker: Mark Currence, Sr. Manager, Cloud Security Architecture


1:30 - 1:45 PM
Attack on Microservices
As network automation becomes the only way to manage large and complex networks, they too become interesting targets for cyberattacks.
Speaker: Tony Lauro, Security Technology and Strategy


2:00 - 2:15 PM
API protection made easy
New API implementations and microservices environment tend to have less protection out of the box. In the API development lifecycle there is more focus in functionality development than security. Automated Attack Groups are the perfect way to fill that gap without taking resources out of their focus.
Speaker: Esteban Roman, Security Architect

Section 4 -- Headline2

Day, Month Day, Time AM/PM – TIME AM/PM
Title
Descripton
Presented by: Person, Title
Location: XYZ

Lorem Ipsum

Day, Month Day, Time AM/PM – TIME AM/PM
Title
Descripton
Presented by: Person, Title
Location: XYZ

Lorem Ipsum

Day, Month Day, Time AM/PM – TIME AM/PM
Title
Descripton
Presented by: Person, Title
Location: XYZ

Lorem Ipsum

Besuchen Sie die Vorträge der Akamai Security Experten

Effektive Sicherheit für APIs im Zeitalter der Mobile Apps


Gerhard Giese, Manager Enterprise Security Architects, Akamai

Halle 11: Dienstag 11:15 Uhr


Credential Stuffing - Schutz vor Missbrauch von Anmeldedaten und Betrug

Bernd König, Director Product Line Security EMEA, Akamai

Halle 10: Mittwoch 16:15 Uhr

Sichere Netzwerkumgebung in Zeiten der Cloud – warum der digitale Wandel ein Zero Trust Sicherheitsmodell erfordert

Elmar Witte, Product Marketing Manager Security, Akamai

Halle 9: Donnerstag 13:30 Uhr


Section 6 -- Headline2

Can one meeting change your view on cloud security? This one can.

Request a private meeting with an Akamai security expert by completing the form below. A representative will be in touch shortly to schedule your meeting.

Beratung mit einem Security Experten buchen