Enable Agile Development
Build more powerful apps faster while reducing your attack surface.
Minimize Business Risk
Enact a single security policy to provide a consistent security posture.
Protect Everything, Everywhere
Keep applications safe through cloud migration projects, from on-prem to AWS and more.
10:30 - 10:45 AM
Credential stuffing, identity, and fraud
Learn more about identity management and how it will be the next evolution in combating credential stuffing and reducing the incidence and impact of web fraud.
Speaker: Josh Shaul, Vice President, Web Security
11:00 - 11:15 AM
Introduction to Credential Abuse
We'll discuss what credential abuse is and what are the factors leading to the overwhelming increase in credential abuse attacks. This includes a look at the impact it can have on an organization and the hidden costs from ignoring the potential risks.
Speaker: Michael Schmidt, Security Architect
11:30 - 11:45 AM
The escalation of bot detection tactics
A discussion of past, current, and future detection techniques, including strengths and weaknesses of those detections.
Speakers: Sean Flynn, Security Architect
1:30 - 1:45 PM
Understanding your credential stuffing attack surface
A look into understanding what credential stuffing is trying to exploit in your web presence and how Akamai protects those points of entry.
Speaker: Steven Schiffer, Security Architect
2:00 - 2:15 PM
When Bots Attack!: Stories About Fighting Credential Abuse
A discussion focused on two customers and the aggressive credential abuse campaigns leveraged against them.
Speaker: Joseph Martinez, Technical Security Consultant
2:30 - 2:45 PM
Credential stuffing, identity, and fraud
Learn more about identity management and how it will be the next evolution in combating credential stuffing and reducing the incidence and impact of web fraud.
Speaker: Josh Shaul, Vice President, Web Security
3:00 - 3:15 PM
Introduction to Credential Abuse
We'll discuss what credential abuse is and what are the factors leading to the overwhelming increase in credential abuse attacks. This includes a look at the impact it can have on an organization and the hidden costs from ignoring the potential risks.
Speaker: Michael Schmidt, Security Architect
3:30 - 3:45 PM
The escalation of bot detection tactics
A discussion of past, current, and future detection techniques, including strengths and weaknesses of those detections.
Speaker: Sean Flynn, Security Architect
4:00 - 4:15 PM
Understanding your credential stuffing attack surface
A look into understanding what credential stuffing is trying to exploit in your web presence and how Akamai protects those points of entry.
Speaker: Steven Schiffer, Security Architect
4:30 - 5:00 PM
When Bots Attack!: Stories About Fighting Credential Abuse
A discussion focused on two customers and the aggressive credential abuse campaigns leveraged against them.
Speaker: Joseph Martinez, Technical Security Consultant
10:30 - 10:45 AM
Moving Beyond The Perimeter With Akamai
There is no longer a need to debate the need for change. Traditional security models relying on network perimeter architectures are inadequate given today's IT infrastructure and user landscape. Learn how Akamai helps organizations move toward a Zero Trust security model.
Speaker: Tim Knudsen, Vice President Cloud Networking
11:00 - 11:15 AM
Elimination of the VPN
We'll discuss how Akamai is transforming enterprise security, with a focus on replacing legacy access technologies like virtual private networks.
Speakers: John Payne, Chief Architect
Joe Defelice, Sr. Director, Security and Infrastructure Engineering
11:30 - 11:45 AM
Dynamic Access & Threat Protection - Leveraging a multitude of signals for dynamic security decisions
Join this live demonstration to understand why controlling access to apps you control - and don't control - is the future of enterprise security.
Speaker: Sriram Balasubramanian, Product Line Director
1:30 - 1:45 PM
Zero Trust Demo
Join this live demonstration to understand why controlling access to apps you control - and don't control - is the future of enterprise security.
Speaker: Faraz Siddiqui, Security Solutions Engineer
2:00 - 2:15 PM
Controlling your enterprise security attack surface
Learn about how to mitigate risk associated with the ever expanding enterprise attack surface
Speaker: Tony Lauro, Security Technology and Strategy
Tim Strickland, Enterprise
2:30 - 2:45 PM
Akamai Zero Trust security vision & strategy
There is no longer a need to debate the need for change. Traditional security models relying on network perimeter architectures are inadequate given today's IT infrastructure and user landscape. Learn how Akamai helps organizations move toward a Zero Trust security model.
Speaker: Tim Knudsen, Vice President Cloud Networking
3:00 - 3:15 PM
Elimination of the VPN
We'll discuss how Akamai is transforming enterprise security, with a focus on replacing legacy access technologies like virtual private networks.
Speaker: John Payne, Chief Architect
Joe Defelice, Sr. Director, Security and Infrastructure Engineering
3:30 - 3:45 PM
Dynamic Access & Threat Protection - Leveraging a multitude of signals for dynamic security decisions
Join this live demonstration to understand why controlling access to apps you control - and don't control - is the future of enterprise security.
Speaker: Sriram Balasubramanian, Product Line Director
4:00 - 4:15 PM
Zero Trust Demo
Join this live demonstration to understand why controlling access to apps you control - and don't control - is the future of enterprise security.
Speaker: Faraz Siddiqui, Security Solutions Engineer
4:30 - 5:00 PM
Controlling your enterprise security attack surface
Learn about how to mitigate risk associated with the ever expanding enterprise attack surface
Speaker: Tony Lauro, Security Technology and Strategy
Tim Strickland, Enterprise
10:30 - 10:45 AM
Findings of Q1'19 SOTI Report
Underlining the importance of API protection as its use is growing exponentially and traditional security measures do not provide best protection.
Speaker: Martin McKeay, Editorial Director
11:00 - 11:15 AM
Akamai approach to WAF
Looking at some fundamental design principles that make a WAF the best defense against cyber attacks
Speaker: Volker Tegtmeyer, Product Marketing
11:30 - 11:45 AM
API Risk Exposure in Business Ecosystems
Risk exposure is growing in large business ecosystems. An attack on one may affect everyone.
Speaker: Mark Currence, Sr. Manager, Cloud Security Architecture
1:30 - 1:45 PM
Attack on Microservices
As network automation becomes the only way to manage large and complex networks, they too become interesting targets for cyberattacks.
Speaker: Tony Lauro, Security Technology and Strategy
2:00 - 2:15 PM
API protection made easy
New API implementations and microservices environment tend to have less protection out of the box. In the API development lifecycle there is more focus in functionality development than security. Automated Attack Groups are the perfect way to fill that gap without taking resources out of their focus.
Speaker: Esteban Roman, Security Architect
Day, Month Day, Time AM/PM – TIME AM/PM
Title
Descripton
Presented by: Person, Title
Location: XYZ
Day, Month Day, Time AM/PM – TIME AM/PM
Title
Descripton
Presented by: Person, Title
Location: XYZ
Day, Month Day, Time AM/PM – TIME AM/PM
Title
Descripton
Presented by: Person, Title
Location: XYZ
Request a private meeting with an Akamai security expert by completing the form below. A representative will be in touch shortly to schedule your meeting.