Intelligent Security Starts at the Edge

With Akamai, you don’t have to compromise security to get maximum agility. Visit Booth 1522 to learn how Akamai turns security insights into automated protection for your business.

Meet our threat researchers face to face
Get advice on how to manage new exploitation vectors, attack types, and vulnerabilities.

Explore new tools
See how we use machine and deep learning models and emerging techniques to detect and defend against the latest threats.

Learn how Akamai can help you protect everything, everywhere
Protect your apps and APIs. Secure customer identity and experiences to stop fraud and credential abuse. Isolate the enterprise from Internet threats.

Akamai Crack the Code

Quick thinkers and sharp minds should get ready to Crack the Code to win Akamai merchandise and be entered for a chance to win one of three grand prizes.

Get crackin’ now! #AkamaiCrackTheCode

Booth Crawl

Come by the Akamai booth (1522) between 5:30 and 7:00 PM on August 7 for refreshments and a microbrew while learning how intelligent security starts at the Edge.

Booth Agenda

Tuesday, March 5
Stop Credential Abuse

10:30 - 10:45 AM
Credential stuffing, identity, and fraud
Learn more about identity management and how it will be the next evolution in combating credential stuffing and reducing the incidence and impact of web fraud.
Speaker: Josh Shaul, Vice President, Web Security


11:00 - 11:15 AM
Introduction to Credential Abuse
We'll discuss what credential abuse is and what are the factors leading to the overwhelming increase in credential abuse attacks. This includes a look at the impact it can have on an organization and the hidden costs from ignoring the potential risks.
Speaker: Michael Schmidt, Security Architect


11:30 - 11:45 AM
The escalation of bot detection tactics
A discussion of past, current, and future detection techniques, including strengths and weaknesses of those detections.
Speakers: Sean Flynn, Security Architect


1:30 - 1:45 PM
Understanding your credential stuffing attack surface
A look into understanding what credential stuffing is trying to exploit in your web presence and how Akamai protects those points of entry.
Speaker: Steven Schiffer, Security Architect


2:00 - 2:15 PM
When Bots Attack!: Stories About Fighting Credential Abuse
A discussion focused on two customers and the aggressive credential abuse campaigns leveraged against them.
Speaker: Joseph Martinez, Technical Security Consultant


2:30 - 2:45 PM
Credential stuffing, identity, and fraud
Learn more about identity management and how it will be the next evolution in combating credential stuffing and reducing the incidence and impact of web fraud.
Speaker: Josh Shaul, Vice President, Web Security


3:00 - 3:15 PM
Introduction to Credential Abuse
We'll discuss what credential abuse is and what are the factors leading to the overwhelming increase in credential abuse attacks. This includes a look at the impact it can have on an organization and the hidden costs from ignoring the potential risks.
Speaker: Michael Schmidt, Security Architect


3:30 - 3:45 PM
The escalation of bot detection tactics
A discussion of past, current, and future detection techniques, including strengths and weaknesses of those detections.
Speaker: Sean Flynn, Security Architect


4:00 - 4:15 PM
Understanding your credential stuffing attack surface
A look into understanding what credential stuffing is trying to exploit in your web presence and how Akamai protects those points of entry.
Speaker: Steven Schiffer, Security Architect


4:30 - 5:00 PM
When Bots Attack!: Stories About Fighting Credential Abuse
A discussion focused on two customers and the aggressive credential abuse campaigns leveraged against them.
Speaker: Joseph Martinez, Technical Security Consultant

Wednesday, March 6
Move to Zero Trust

10:30 - 10:45 AM
Moving Beyond The Perimeter With Akamai
There is no longer a need to debate the need for change. Traditional security models relying on network perimeter architectures are inadequate given today's IT infrastructure and user landscape. Learn how Akamai helps organizations move toward a Zero Trust security model.
Speaker: Tim Knudsen, Vice President Cloud Networking


11:00 - 11:15 AM
Elimination of the VPN
We'll discuss how Akamai is transforming enterprise security, with a focus on replacing legacy access technologies like virtual private networks.
Speakers: John Payne, Chief Architect
Joe Defelice, Sr. Director, Security and Infrastructure Engineering


11:30 - 11:45 AM
Dynamic Access & Threat Protection - Leveraging a multitude of signals for dynamic security decisions
Join this live demonstration to understand why controlling access to apps you control - and don't control - is the future of enterprise security.
Speaker: Sriram Balasubramanian, Product Line Director


1:30 - 1:45 PM
Zero Trust Demo
Join this live demonstration to understand why controlling access to apps you control - and don't control - is the future of enterprise security.
Speaker: Faraz Siddiqui, Security Solutions Engineer


2:00 - 2:15 PM
Controlling your enterprise security attack surface
Learn about how to mitigate risk associated with the ever expanding enterprise attack surface
Speaker: Tony Lauro, Security Technology and Strategy
Tim Strickland, Enterprise


2:30 - 2:45 PM
Akamai Zero Trust security vision & strategy
There is no longer a need to debate the need for change. Traditional security models relying on network perimeter architectures are inadequate given today's IT infrastructure and user landscape. Learn how Akamai helps organizations move toward a Zero Trust security model.
Speaker: Tim Knudsen, Vice President Cloud Networking


3:00 - 3:15 PM
Elimination of the VPN
We'll discuss how Akamai is transforming enterprise security, with a focus on replacing legacy access technologies like virtual private networks.
Speaker: John Payne, Chief Architect
Joe Defelice, Sr. Director, Security and Infrastructure Engineering


3:30 - 3:45 PM
Dynamic Access & Threat Protection - Leveraging a multitude of signals for dynamic security decisions
Join this live demonstration to understand why controlling access to apps you control - and don't control - is the future of enterprise security.
Speaker: Sriram Balasubramanian, Product Line Director


4:00 - 4:15 PM
Zero Trust Demo
Join this live demonstration to understand why controlling access to apps you control - and don't control - is the future of enterprise security.
Speaker: Faraz Siddiqui, Security Solutions Engineer


4:30 - 5:00 PM
Controlling your enterprise security attack surface
Learn about how to mitigate risk associated with the ever expanding enterprise attack surface
Speaker: Tony Lauro, Security Technology and Strategy
Tim Strickland, Enterprise

Thursday, March 7
Protect Apps & APIs

10:30 - 10:45 AM
Findings of Q1'19 SOTI Report
Underlining the importance of API protection as its use is growing exponentially and traditional security measures do not provide best protection.
Speaker: Martin McKeay, Editorial Director


11:00 - 11:15 AM
Akamai approach to WAF
Looking at some fundamental design principles that make a WAF the best defense against cyber attacks
Speaker: Volker Tegtmeyer, Product Marketing


11:30 - 11:45 AM
API Risk Exposure in Business Ecosystems
Risk exposure is growing in large business ecosystems. An attack on one may affect everyone.
Speaker: Mark Currence, Sr. Manager, Cloud Security Architecture


1:30 - 1:45 PM
Attack on Microservices
As network automation becomes the only way to manage large and complex networks, they too become interesting targets for cyberattacks.
Speaker: Tony Lauro, Security Technology and Strategy


2:00 - 2:15 PM
API protection made easy
New API implementations and microservices environment tend to have less protection out of the box. In the API development lifecycle there is more focus in functionality development than security. Automated Attack Groups are the perfect way to fill that gap without taking resources out of their focus.
Speaker: Esteban Roman, Security Architect

Section 4 -- Headline2

Day, Month Day, Time AM/PM – TIME AM/PM
Title
Descripton
Presented by: Person, Title
Location: XYZ

Lorem Ipsum

Day, Month Day, Time AM/PM – TIME AM/PM
Title
Descripton
Presented by: Person, Title
Location: XYZ

Lorem Ipsum

Day, Month Day, Time AM/PM – TIME AM/PM
Title
Descripton
Presented by: Person, Title
Location: XYZ

Lorem Ipsum

Join one of the Black Hat sessions led by Akamai security experts.

Be sure to join us at Black Hat. Our experts will share their knowledge on the latest developments in cybersecurity, offer details about the criminal economy, and discuss tech tools you need to stay ahead in this constantly evolving landscape.

Lunch and Learn Session:

The Economy of Financial Services Attacks


Martin McKeay, Editor in Chief, Akamai

When: Wednesday, August 7, 12:05–1:30 PM
Where: Palm B, Level 3

Innovation Session:

The Increasing Sophistication of Bot Attacks: Beyond Fingerprinting Defenses


Tyson Thomas, Ph.D., Principal Data Scientist, Akamai

Sreenath Kurupati, Senior Director Engineering, Akamai

When: Wednesday, August 7, 2:25–2:45 PM
Where: Innovation City Theater, Mandalay Bay Ballroom

Arsenal Session:

JSShell: An Interactive XSS Management & Browser Debugging


Daniel Abeles, Senior Security Researcher, Akamai

When: Wednesday, August 7, 10:00–11:20 AM
Where: Business Hall (Oceanside, Station 10)

Section 6 -- Headline2

Can one meeting change your view on cloud security? This one can.

Request a private meeting with an Akamai security expert by completing the form below. A representative will be in touch shortly to schedule your meeting.

Schedule a Meeting With Us