Sydney, 28 November 2018 @ 3:30 PM
Event capacity has been reached so registrations for the Security Summit are no longer available. If you would like to attend the party only, please contact Amy Moss at amoss@akamai.com
Wednesday, 28 November 2018
3:30 PM – 4:00 PM Registration and Refreshments
4:00 PM – 6:00 PM Security Summit
6:00 PM – 9:00 PM End of Year Party
All Hands Brewing House
King St Wharf
Sydney, NSW 2000
Fernando Serto, Head of Security Technology and Strategy, APAC
We'll start the summit with a brief overview of our security solution portfolio and our Adaptive Threat Protection for digital enterprises.
James Tin, Principal Security Specialist, ANZ
Recently, memcached reflection attacks have taken the DDoS scene by storm, affecting all sizes and types of organisations and industries. In fact, the latest extortion attempts use memcached payloads to deliver the message. Hear us reveal insider details about the largest attack seen to date by Akamai, and how we mitigated this record-setting1.3 Tbps attack.
Fernando Serto, Head of Security Technology and Strategy, APAC
Many websites, most cloud-based apps, and all native, mobile, and single-page apps are powered by API calls. And just like web servers, API endpoints are at risk of attack from hackers and bots. Their code can even be a conduit for Distributed Denial of Service attacks or attacks against authentication methods. Find out what you need to consider when developing APIs and how Akamai provides solutions to secure entire API portfolios.
Johnny Yeo, Enterprise Security Architect, ANZ
Websites give your business an unprecedented — and invaluable — level of contact with your customers. However, they also place sensitive data where it can be easily accessed by those with malicious intent, through the use of automated tools called bots. One of the most harmful and costly activities these malicious bots engage in is credential stuffing, which can affect any organization with a login page on its website. Find out more about the growing credential stuffing problem and how to combat it.
James McKinlay, Enterprise Security Specialist, ANZ
The “trust but verify” security model is no longer effective as new business models and processes move users, devices, applications and data beyond the traditional enterprise perimeter. The surge in new attack surfaces demands a new approach to security in the form of a zero trust model. Learn the four steps to start a zero trust security journey and immediately improve defenses.
Fernando Serto, Head of Security Technology and Strategy, APAC
Through an interactive panel discussion, we'll cover the latest security trends and what organisations can do to prepare themselves for 2019. Craft beer will be served during this session.
Head of Security Technology & Strategy, Akamai
Speaker
Security Specialist, Akamai
Speaker
Regional Vice President, Akamai
Speaker
Regional Sales Manager, Akamai
Speaker
Senior Enterprise Security Architect, Akamai
Speaker
Senior Enterprise Sales Executive, Akamai
Speaker
Senior Enterprise Sales Executive, Akamai
Speaker