Remote Workforce Security For The Future
1 – 9 September, 2021
IT teams and employees had to adapt to new ways of business overnight as a result of the Covid-19 pandemic. It’s fundamentally changed how IT decision-makers look at work – it’s no longer ‘Remote Work’, ‘Working from home’ – it’s just ‘Working’!
With this shift, organisations and IT professionals need to prioritise their security investments to enable and secure the future of work (whatever form it takes in the coming years). It’s time for organizations to accelerate the implementation of robust security models like Zero Trust.
This four part Security Briefing series will bring an unbiased perspective to the following:
– The most basic (often overlooked) layer of infrastructure protection for DNS services
– The latest advanced Phishing methods being deployed against employees
– Insights into some of the recent Ransomware attacks that made headlines
– The latest workflows for securing Internal (Private) Applications and Network Access
We’ll also offer a peek into how Akamai’s Threat Intelligence Services’ are tuned to provide Security Operations teams accurate, real time domain intelligence to drive risk decisions about activity in their network.
Dissecting Recent Ransomware Attacks & DNS Security with a Live Demonstration
DNS is a standard and necessary technology in today’s world, and is the most basic requirement to do business online. DNS services are frequently targeted by criminals because of their critical nature and this can cause damage to websites, web applications, users and the network. When your DNS is compromised, your brand…
How Zero Trust Network access improves business outcomes
Zero Trust is not a ‘trend’ – it’s here to stay. As enterprises and, in turn, employees, shifted to working from anywhere over the last 18 months, the fundamental definition of the enterprise perimeter was put to the test and the pace of Zero Trust Network Access (ZTNA) deployment accelerated rapidly. While…
How to Phish-proof your Multi-Factor Authentication
80% of security breaches involve compromised credentials and while password hygiene is culpable in part, even complex, indecipherable passwords developed by algorithms can be problematic. A recent dark web audit revealed 15 billion stolen logins from 100,000 breaches. MFA has been seen as a ‘silver bullet’ against compromised credentials- but is it…
Why your Security Operations Team needs Advanced Threat Intelligence
The Akamai platform scale and depth is immense, but why is that important? Up to 30% of the total web traffic today is on the Akamai platform, over 50% of the world’s recursive DNS queries are resolved by Akamai (2.2 trillion queries daily). This unprecedented visibility provides insights into DNS and IP…
Director Security Technology & Strategy
Director Security Technology
Senior Lead Enterprise Security
Senior Manager Solutions Engineering
Director Security Technology