Skip to content
Akamai

Security Summit World Tour

Singapore Summit Registration

8 May, 2019 | 8:30AM - 4:30PM

Event Description

Your security architecture needs to intelligently transform from the data center, beyond the cloud, to the Edge. We designed our Security Summit World Tour to help you learn how cybersecurity can drive digital innovation and business growth.

Join us, and your peers, to learn about:

  • Application and API security
  • Protection against credential abuse and fraud
  • How you can enable a move to Zero Trust security
  • The latest threat intelligence and research

Complimentary seats are limited, so be sure to register today!


Complete the form below:

When and where?

8 May, 2019

8:30AM - 4:30PM

Andaz Singapore
5 Fraser Street
Singapore

Agenda

8:30 AM:
Registration

Come meet security experts from Akamai and Trustwave who are available to share insights and answer questions.

9:00 AM - 12:30 PM:
Presentations
  • The Fine Art of Creating A Cyber Security Strategy To Drive Transformation - Jinan Budge, Forrester Research – Principal Analyst
  • Intelligent Security Starts at the Edge - Mike Smith, Akamai – CTO for Security, APJ
  • Designing for Doomsday: Effective API Security Approaches from the Edge - Amol Mathur, Akamai – Director of Product Management, WW
  • Customer Identity & Access Management - Introducing Akamai Identity Cloud - Unmesh Deshmukhl, Akamai – Regional Vice President, Cloud Security & Identity, APJ
1:30 PM - 3:30 PM:
Breakout Sessions
  • Credential Stuffing, Identity and Fraud
  • Credential Abuse: Detection Strategies, Understanding Your Attack Surface, and Real-World Attack Examples
  • Moving Beyond Perimeter Security - Zero Trust, Does It Really Work?
  • Zero Trust in the Real World: Traditional VPN Access vs Zero Trust
3:45 PM - 4:30 PM:
Panel Discussion

Best Practices and Real-World Advice: Jinan Budge, Principal Analyst at Forrester Research; Vaughan Woods, Vice President at Akamai Technologies

 
Presentation Descriptions:
  • Intelligent Security Starts at the Edge

    Learn how Akamai makes the Internet fast, reliable and secure for customers the world over. Find out how our cloud delivery platform -- the world’s largest and most trusted -- empowers our customers to provide the best and most secure digital experiences on any device, anytime, anywhere. We'll share an overview of our security solution portfolio and our Adaptive Threat Protection for digital enterprises.

  • Designing for Doomsday: Effective API Security Approaches from the Edge

    API security has emerged as the single biggest challenge organizations face to securing their threat surface. In this session we will review real-world examples of how application and API design patterns expose businesses to risks ranging from misuse to outright abuse, and highlight why it's so challenging for businesses to detect and mitigate their exposure. By looking at threat intelligence data gleaned from billions of device and API interactions, we will show how to detect, defend, and ultimately design for doomsday so that you can stop the ticking clock and get back to business.​

  • Customer Identity & Access Management - Introducing Akamai Identity Cloud

    What is Customer Identity & Access Management and how can it help? Come learn about why identity is a pressing challenge for today's digital businesses and how Akamai Identity Cloud, the market leader in CIAM, can help you better leverage customer identities to improve your customer experience.
 
Breakout Session - Cloud Security
  • Credential Stuffing, Identity and Fraud

    The recent acquisition of Janrain, the market leader in customer identity & access management (CIAM), provides a new key ingredient to protecting login pages from attack. Join us to hear more about identity management and how it will be the next evolution in combating credential stuffing and reducing the incidence and impact of web fraud.

  • Credential Abuse: Detection Strategies, Understanding Your Attack Surface and Real-World Attack Examples

    Credential stuffing is among the top security challenges facing online businesses today. Come learn more about what credential abuse is and what you can do about it, including both solutions to address the problem as well as how your own application architecture could be making the problem worse.
 
Breakout Session - Enterprise Security
  • Moving Beyond Perimeter Security - Zero Trust, Does it Really Work?

    The “trust but verify” security model is no longer effective as new business models and processes move users, devices, applications and data beyond the traditional enterprise perimeter. The surge in new attack surfaces demands a new approach to security in the form of a zero trust model. Find out the four steps to start a zero trust security journey and immediately improve defenses.

  • Zero Trust in the Real World: Traditional VPN Access vs Zero Trust

    In this interactive demo, experience the parallel worlds where users interact with their corporate applications via VPN and Zero Trust. See how by using Zero Trust, users are able to securely access authorized applications while avoiding targeted attacks. Join us to find out.

Speakers

Jinan Budge,

Principal Analyst,,
Forrester Research

Speaker

< Speaker 2 Name >

< Speaker 2 Job Title >,
< Speaker 2 Company >

Speaker

Thank you to our Sponsors

    • AT&T
  • Register
Akamai secures and delivers digital experiences for the world’s largest companies. Akamai’s intelligent edge platform surrounds everything, from the enterprise to the cloud, so customers and their businesses can be fast, smart, and secure. Top brands globally rely on Akamai to help them realize competitive advantage through agile solutions that extend the power of their multi-cloud architectures. Akamai keeps decisions, apps and experiences closer to users than anyone — and attacks and threats far away. Akamai’s portfolio of edge security, web and mobile performance, enterprise access and video delivery solutions is supported by unmatched customer service, analytics and 24/7/365 monitoring. To learn why the world’s top brands trust Akamai, visit www.akamai.com, blogs.akamai.com, or @Akamai on Twitter. You can find our global contact information at www.akamai.com/locations. 
©2019 AKAMAI TECHNOLOGIES | Privacy & Policies | EMEA Legal Notices | Support | Webmaster | Sitemap