Build anywhere. Secure everywhere.
Agility and protection for your apps and APIs

Enable Agile Development
Build more powerful apps faster while reducing your attack surface.

Minimize Business Risk
Enact a single security policy to provide a consistent security posture.

Protect Everything, Everywhere
Keep applications safe through cloud migration projects, from on-prem to AWS and more.

We invite you to try the world's most powerful edge platform for fast, secure deployment which can enable you to:

  • Provide a consistent security posture across your application infrastructure.
  • Enable your developers to focus on building better apps, and realizing better agility and faster time to market by offloading the hard work of consistent security, availability, and capacity for your users to a trusted, proven edge provider.
  • Ensure visibility across the middle and last mile delivery of applications, as well as external security threats through SIEM integration that can be integrated into their analytics systems.
  • Support your DevOps / CI/CD processes with a programmable edge and the abiltiy to script and automate typical deployment and real-time operational use cases.
Akamai Free Trials
Akamai Booth
Akamai Booth

Booth Agenda

Tuesday, March 5
Stop Credential Abuse

10:30 - 10:45 AM
Credential stuffing, identity, and fraud
Learn more about identity management and how it will be the next evolution in combating credential stuffing and reducing the incidence and impact of web fraud.
Speaker: Josh Shaul, Vice President, Web Security


11:00 - 11:15 AM
Introduction to Credential Abuse
We'll discuss what credential abuse is and what are the factors leading to the overwhelming increase in credential abuse attacks. This includes a look at the impact it can have on an organization and the hidden costs from ignoring the potential risks.
Speaker: Michael Schmidt, Security Architect


11:30 - 11:45 AM
The escalation of bot detection tactics
A discussion of past, current, and future detection techniques, including strengths and weaknesses of those detections.
Speakers: Sean Flynn, Security Architect


1:30 - 1:45 PM
Understanding your credential stuffing attack surface
A look into understanding what credential stuffing is trying to exploit in your web presence and how Akamai protects those points of entry.
Speaker: Steven Schiffer, Security Architect


2:00 - 2:15 PM
When Bots Attack!: Stories About Fighting Credential Abuse
A discussion focused on two customers and the aggressive credential abuse campaigns leveraged against them.
Speaker: Joseph Martinez, Technical Security Consultant


2:30 - 2:45 PM
Credential stuffing, identity, and fraud
Learn more about identity management and how it will be the next evolution in combating credential stuffing and reducing the incidence and impact of web fraud.
Speaker: Josh Shaul, Vice President, Web Security


3:00 - 3:15 PM
Introduction to Credential Abuse
We'll discuss what credential abuse is and what are the factors leading to the overwhelming increase in credential abuse attacks. This includes a look at the impact it can have on an organization and the hidden costs from ignoring the potential risks.
Speaker: Michael Schmidt, Security Architect


3:30 - 3:45 PM
The escalation of bot detection tactics
A discussion of past, current, and future detection techniques, including strengths and weaknesses of those detections.
Speaker: Sean Flynn, Security Architect


4:00 - 4:15 PM
Understanding your credential stuffing attack surface
A look into understanding what credential stuffing is trying to exploit in your web presence and how Akamai protects those points of entry.
Speaker: Steven Schiffer, Security Architect


4:30 - 5:00 PM
When Bots Attack!: Stories About Fighting Credential Abuse
A discussion focused on two customers and the aggressive credential abuse campaigns leveraged against them.
Speaker: Joseph Martinez, Technical Security Consultant

Wednesday, March 6
Move to Zero Trust

10:30 - 10:45 AM
Moving Beyond The Perimeter With Akamai
There is no longer a need to debate the need for change. Traditional security models relying on network perimeter architectures are inadequate given today's IT infrastructure and user landscape. Learn how Akamai helps organizations move toward a Zero Trust security model.
Speaker: Tim Knudsen, Vice President Cloud Networking


11:00 - 11:15 AM
Elimination of the VPN
We'll discuss how Akamai is transforming enterprise security, with a focus on replacing legacy access technologies like virtual private networks.
Speakers: John Payne, Chief Architect
Joe Defelice, Sr. Director, Security and Infrastructure Engineering


11:30 - 11:45 AM
Dynamic Access & Threat Protection - Leveraging a multitude of signals for dynamic security decisions
Join this live demonstration to understand why controlling access to apps you control - and don't control - is the future of enterprise security.
Speaker: Sriram Balasubramanian, Product Line Director


1:30 - 1:45 PM
Zero Trust Demo
Join this live demonstration to understand why controlling access to apps you control - and don't control - is the future of enterprise security.
Speaker: Faraz Siddiqui, Security Solutions Engineer


2:00 - 2:15 PM
Controlling your enterprise security attack surface
Learn about how to mitigate risk associated with the ever expanding enterprise attack surface
Speaker: Tony Lauro, Security Technology and Strategy
Tim Strickland, Enterprise


2:30 - 2:45 PM
Akamai Zero Trust security vision & strategy
There is no longer a need to debate the need for change. Traditional security models relying on network perimeter architectures are inadequate given today's IT infrastructure and user landscape. Learn how Akamai helps organizations move toward a Zero Trust security model.
Speaker: Tim Knudsen, Vice President Cloud Networking


3:00 - 3:15 PM
Elimination of the VPN
We'll discuss how Akamai is transforming enterprise security, with a focus on replacing legacy access technologies like virtual private networks.
Speaker: John Payne, Chief Architect
Joe Defelice, Sr. Director, Security and Infrastructure Engineering


3:30 - 3:45 PM
Dynamic Access & Threat Protection - Leveraging a multitude of signals for dynamic security decisions
Join this live demonstration to understand why controlling access to apps you control - and don't control - is the future of enterprise security.
Speaker: Sriram Balasubramanian, Product Line Director


4:00 - 4:15 PM
Zero Trust Demo
Join this live demonstration to understand why controlling access to apps you control - and don't control - is the future of enterprise security.
Speaker: Faraz Siddiqui, Security Solutions Engineer


4:30 - 5:00 PM
Controlling your enterprise security attack surface
Learn about how to mitigate risk associated with the ever expanding enterprise attack surface
Speaker: Tony Lauro, Security Technology and Strategy
Tim Strickland, Enterprise

Thursday, March 7
Protect Apps & APIs

10:30 - 10:45 AM
Findings of Q1'19 SOTI Report
Underlining the importance of API protection as its use is growing exponentially and traditional security measures do not provide best protection.
Speaker: Martin McKeay, Editorial Director


11:00 - 11:15 AM
Akamai approach to WAF
Looking at some fundamental design principles that make a WAF the best defense against cyber attacks
Speaker: Volker Tegtmeyer, Product Marketing


11:30 - 11:45 AM
API Risk Exposure in Business Ecosystems
Risk exposure is growing in large business ecosystems. An attack on one may affect everyone.
Speaker: Mark Currence, Sr. Manager, Cloud Security Architecture


1:30 - 1:45 PM
Attack on Microservices
As network automation becomes the only way to manage large and complex networks, they too become interesting targets for cyberattacks.
Speaker: Tony Lauro, Security Technology and Strategy


2:00 - 2:15 PM
API protection made easy
New API implementations and microservices environment tend to have less protection out of the box. In the API development lifecycle there is more focus in functionality development than security. Automated Attack Groups are the perfect way to fill that gap without taking resources out of their focus.
Speaker: Esteban Roman, Security Architect

Section 4 -- Headline2

Day, Month Day, Time AM/PM – TIME AM/PM
Title
Descripton
Presented by: Person, Title
Location: XYZ

Lorem Ipsum

Day, Month Day, Time AM/PM – TIME AM/PM
Title
Descripton
Presented by: Person, Title
Location: XYZ

Lorem Ipsum

Day, Month Day, Time AM/PM – TIME AM/PM
Title
Descripton
Presented by: Person, Title
Location: XYZ

Lorem Ipsum

Watch Ari's Presentation




Build anywhere. Secure everywhere.

Watch Ari's Presentation

Section 6 -- Headline2

Can one meeting change your view on cloud security? This one can.

Request a private meeting with an Akamai security expert by completing the form below. A representative will be in touch shortly to schedule your meeting.

Schedule a Meeting With Us