Intelligent Security Starts at the Edge

To drive innovation, your security architecture needs to transform from the data center, beyond the cloud, to the Edge.

Visit Akamai in Booth N 6153 to learn how we help:

  • Protect Internet-facing apps and APIs
  • Secure customer experiences to stop fraud and credential abuse
  • Keep users safe from targeted threats in the move to Zero Trust
  • Secure corporate application access

Find it, Crack it, Win it.

There’s a real code puzzle hidden somewhere in our booth. Find it, then crack the code to win swag and get entered for a chance to win one of three 3D printers valued at $2,500.

Go on, get crackin’! #AkamaiCrackTheCode

Win VIP Mayhem Party Pass.

You and a friend can enjoy red-carpet treatment, access to the VIP lounge, and open bar all night. Complete the ticket in your RSAC goodie bag and bring it to Booth N 6153 on Tuesday, March 5.

Drawing is at 4 PM. Party starts at 8 PM.

Booth Agenda

Tuesday, March 5
Stop Credential Abuse

10:30 - 10:45 AM
Credential stuffing, identity, and fraud
Learn more about identity management and how it will be the next evolution in combating credential stuffing and reducing the incidence and impact of web fraud.
Speaker: Josh Shaul, Vice President, Web Security


11:00 - 11:15 AM
Introduction to Credential Abuse
We'll discuss what credential abuse is and what are the factors leading to the overwhelming increase in credential abuse attacks. This includes a look at the impact it can have on an organization and the hidden costs from ignoring the potential risks.
Speaker: Michael Schmidt, Security Architect


11:30 - 11:45 AM
The escalation of bot detection tactics
A discussion of past, current, and future detection techniques, including strengths and weaknesses of those detections.
Speakers: Sean Flynn, Security Architect


1:30 - 1:45 PM
Understanding your credential stuffing attack surface
A look into understanding what credential stuffing is trying to exploit in your web presence and how Akamai protects those points of entry.
Speaker: Steven Schiffer, Security Architect


2:00 - 2:15 PM
When Bots Attack!: Stories About Fighting Credential Abuse
A discussion focused on two customers and the aggressive credential abuse campaigns leveraged against them.
Speaker: Joseph Martinez, Technical Security Consultant


2:30 - 2:45 PM
Credential stuffing, identity, and fraud
Learn more about identity management and how it will be the next evolution in combating credential stuffing and reducing the incidence and impact of web fraud.
Speaker: Josh Shaul, Vice President, Web Security


3:00 - 3:15 PM
Introduction to Credential Abuse
We'll discuss what credential abuse is and what are the factors leading to the overwhelming increase in credential abuse attacks. This includes a look at the impact it can have on an organization and the hidden costs from ignoring the potential risks.
Speaker: Michael Schmidt, Security Architect


3:30 - 3:45 PM
The escalation of bot detection tactics
A discussion of past, current, and future detection techniques, including strengths and weaknesses of those detections.
Speaker: Sean Flynn, Security Architect


4:00 - 4:15 PM
Understanding your credential stuffing attack surface
A look into understanding what credential stuffing is trying to exploit in your web presence and how Akamai protects those points of entry.
Speaker: Steven Schiffer, Security Architect


4:30 - 5:00 PM
When Bots Attack!: Stories About Fighting Credential Abuse
A discussion focused on two customers and the aggressive credential abuse campaigns leveraged against them.
Speaker: Joseph Martinez, Technical Security Consultant

Wednesday, March 6
Move to Zero Trust

10:30 - 10:45 AM
Moving Beyond The Perimeter With Akamai
There is no longer a need to debate the need for change. Traditional security models relying on network perimeter architectures are inadequate given today's IT infrastructure and user landscape. Learn how Akamai helps organizations move toward a Zero Trust security model.
Speaker: Tim Knudsen, Vice President Cloud Networking


11:00 - 11:15 AM
Elimination of the VPN
We'll discuss how Akamai is transforming enterprise security, with a focus on replacing legacy access technologies like virtual private networks.
Speakers: John Payne, Chief Architect
Joe Defelice, Sr. Director, Security and Infrastructure Engineering


11:30 - 11:45 AM
Dynamic Access & Threat Protection - Leveraging a multitude of signals for dynamic security decisions
Join this live demonstration to understand why controlling access to apps you control - and don't control - is the future of enterprise security.
Speaker: Sriram Balasubramanian, Product Line Director


1:30 - 1:45 PM
Zero Trust Demo
Join this live demonstration to understand why controlling access to apps you control - and don't control - is the future of enterprise security.
Speaker: Faraz Siddiqui, Security Solutions Engineer


2:00 - 2:15 PM
Controlling your enterprise security attack surface
Learn about how to mitigate risk associated with the ever expanding enterprise attack surface
Speaker: Tony Lauro, Security Technology and Strategy
Tim Strickland, Enterprise


2:30 - 2:45 PM
Akamai Zero Trust security vision & strategy
There is no longer a need to debate the need for change. Traditional security models relying on network perimeter architectures are inadequate given today's IT infrastructure and user landscape. Learn how Akamai helps organizations move toward a Zero Trust security model.
Speaker: Tim Knudsen, Vice President Cloud Networking


3:00 - 3:15 PM
Elimination of the VPN
We'll discuss how Akamai is transforming enterprise security, with a focus on replacing legacy access technologies like virtual private networks.
Speaker: John Payne, Chief Architect
Joe Defelice, Sr. Director, Security and Infrastructure Engineering


3:30 - 3:45 PM
Dynamic Access & Threat Protection - Leveraging a multitude of signals for dynamic security decisions
Join this live demonstration to understand why controlling access to apps you control - and don't control - is the future of enterprise security.
Speaker: Sriram Balasubramanian, Product Line Director


4:00 - 4:15 PM
Zero Trust Demo
Join this live demonstration to understand why controlling access to apps you control - and don't control - is the future of enterprise security.
Speaker: Faraz Siddiqui, Security Solutions Engineer


4:30 - 5:00 PM
Controlling your enterprise security attack surface
Learn about how to mitigate risk associated with the ever expanding enterprise attack surface
Speaker: Tony Lauro, Security Technology and Strategy
Tim Strickland, Enterprise

Thursday, March 7
Protect Apps & APIs

10:30 - 10:45 AM
Findings of Q1'19 SOTI Report
Underlining the importance of API protection as its use is growing exponentially and traditional security measures do not provide best protection.
Speaker: Martin McKeay, Editorial Director


11:00 - 11:15 AM
Akamai approach to WAF
Looking at some fundamental design principles that make a WAF the best defense against cyber attacks
Speaker: Volker Tegtmeyer, Product Marketing


11:30 - 11:45 AM
API Risk Exposure in Business Ecosystems
Risk exposure is growing in large business ecosystems. An attack on one may affect everyone.
Speaker: Mark Currence, Sr. Manager, Cloud Security Architecture


1:30 - 1:45 PM
Attack on Microservices
As network automation becomes the only way to manage large and complex networks, they too become interesting targets for cyberattacks.
Speaker: Tony Lauro, Security Technology and Strategy


2:00 - 2:15 PM
API protection made easy
New API implementations and microservices environment tend to have less protection out of the box. In the API development lifecycle there is more focus in functionality development than security. Automated Attack Groups are the perfect way to fill that gap without taking resources out of their focus.
Speaker: Esteban Roman, Security Architect

Section 4 -- Headline2

Day, Month Day, Time AM/PM – TIME AM/PM
Title
Descripton
Presented by: Person, Title
Location: XYZ

Lorem Ipsum

Day, Month Day, Time AM/PM – TIME AM/PM
Title
Descripton
Presented by: Person, Title
Location: XYZ

Lorem Ipsum

Day, Month Day, Time AM/PM – TIME AM/PM
Title
Descripton
Presented by: Person, Title
Location: XYZ

Lorem Ipsum

Watch Us

Humans Are Awesome at Risk Management

Presented by: Andy Ellis
Date: Tuesday, March 5
Time: 11:00 AM – 11:50 AM
Where: Moscone South 207

Designing for Doomsday: Effective API Security Approaches from the Edge

Presented by: Josh Shaul
Date: Wednesday, March 6
Time: 2:50 PM – 3:40 PM
Where: Moscone South Esplanade 153

Section 6 -- Headline2

Can one meeting change your view on cloud security? This one can.

Request a private meeting with an Akamai security expert by completing the form below. A representative will be in touch shortly to schedule your meeting.

Schedule a Meeting With Us