Hi [[ session.user.profile.firstName ]]

How Prepared Are You for a Credential Attack?

With the shift to a fully digital world, resulting in more online consumers, creating multiple accounts, each with their own login details, organisations and their consumers have never been more vulnerable to credential attacks.

Credential stuffing is a distinct part of the cybercrime economy, and for criminals, it’s a lucrative one. As criminals continue to advance their attack methods, it is increasingly difficult to protect against them.

In this talk Hamish Rose and Gerd Giese will discuss the anatomy of a credential stuffing attack and the common challenges organisations face. They will also explore approaches to mitigating the increasingly sophisticated attack methods.

You will learn more about:
1) Best practice on preventing data leaks in the authentication chain
2) Providing the best possible customer experience
3) Ensuring necessary security controls
4) Delivering an operational and cost-effective technical solution
Recorded May 13 2020 31 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Gerd Giese, Industry Strategist, Akamai and Hamish Rose, Senior Solutions Engineer, Akamai
Presentation preview: How Prepared Are You for a Credential Attack?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Live Webinar: Delivering Fast Online Experiences, When it Matters the Most Jun 17 2020 1:00 pm UTC 45 mins
    Oliver Hunt, Senior Solutions Engineer, Akamai Technologies & Nadeem Mian, Senior Product Marketing Manager Web Experience, A
    We are all observing extraordinary changes in the way people use the internet for almost all facets of life. The online landscape has truly changed, with businesses trying their utmost to improve digital customer experience and ensure their online platform is ready for unpredictable changes in traffic volume, traffic patterns, and user behaviour.

    Businesses are trying to retain their customer relationships and revenue by experimenting with new ways to engage with their end users digitally. The dramatic and rapid shift from in-person to online transactions, may create scaling and performance issues for many customers. The other challenge is that user behaviour is changing at a fast pace.
    As a result, it can be very challenging to quickly scale and improve applications. Spikes in demand can overwhelm application infrastructure and slow download times to a degree that makes visitors abandon the site.

    In this webinar we will introduce and demonstrate how Akamai’s Digital Performance Management, can be used to provide intelligence from real user monitoring:

    • How fast your online performance is now (identify what’s slowing you down)
    • How fast you need to be (calculate the business impact)
    • How to get there (diagnose, prioritize the fix)
    • How to maintain the best online performance (continuous performance monitoring)
    • Answer the question: “Are you ready for unpredictable surges in traffic?”
  • Dati personali e carte di credito: come proteggerli dagli hacker Jun 16 2020 12:00 pm UTC 60 mins
    Nicola Ferioli, Senior Lead Solutions Engineer, e Nicola Dalla Vecchia, Solutions Engineer, Akamai
    Le pagine web si basano su JavaScript per interagire con gli utenti per comuni funzioni, come SEO, social media e pagamenti.
    Questo sistema ha tuttavia creato una nuova base di attacco per i gruppi di hacker, come Magecart, che puntano ai dati personali e ai dati di pagamento.
    La maggior parte delle protezioni offre un aiuto limitato per questo metodo di attacco.
    Questo webinar descrive gli elementi degli attacchi Magecart, confrontandoli con i pro e contro di diversi approcci impiegati per combatterli.
    Scoprirai:
    • Perché gli attacchi Magecart emergono adesso
    • Perché sono difficili da combattere
    • Come contrastarli
    • Cosa fare per adottare il giusto approccio contro questi attacchi
  • Protecting Your Customers' PII from Magecart Jun 3 2020 1:00 pm UTC 45 mins
    Richard Meeus, Security Technology and Strategy Director, and Mike Kane, Senior Product Marketing Manager, Akamai
    Many modern web pages rely heavily on JavaScript to interact with users for popular functions such as account SEO, social media, logins, and payments.

    This has created a new attack surface for hacker groups such as Magecart that put your users’ personal data at risk and expose your business to regulatory punishments.

    Unfortunately, most current protections offer limited help for this sophisticated attack method.

    In this webinar, we will explore the elements of Magecart attacks, and compare specific pluses and minuses of different approaches that security teams can employ to combat this new threat.

    You will learn more about:
    • Why Magecart attacks arose now and why they are not going away
    • Why Magecart attacks are so much harder to defeat than other types of script attacks
    • What options are in the market today to use against Magecart and how they will work for you
    • What you can do now to get control of JavaScript security and develop the right approach to beating Magecart
  • AAPP y Educación: disponibilidad, escalabilidad y seguridad de sus contenidos Jun 2 2020 8:00 am UTC 60 mins
    David Sánchez, Sales Manager Akamai y Federico Dios, Pre-Sales Manager Akamai
    Disponibilidad, escalabilidad y seguridad de sus contenidos y aplicaciones en Internet.
    Cómo prepararse desde la Administración Pública y las Universidades

    La información y servicios que proporcionan los organismos públicos a la ciudadanía son fundamentales. Entregar contenido y aplicaciones en internet a cualquier tipo de dispositivo, en cualquier momento y ofreciendo una buena experiencia de usuario, no es sencillo. Por otro lado, las amenazas de seguridad son cada vez más recurrentes, sofisticadas y de mayor volumetría. Todos los organismos y universidades deben estar preparados.

    Regístrese a nuestro Webinar para dar solución a estos temas tan relevantes para la Administración Pública y el sector de la educación:
    •Rendimiento, disponibilidad y escalabilidad cuando el tráfico en las webs crecen de forma exponencial. Soluciones.
    •Seguridad. Protección frente ataques a nivel aplicación y DDoS. Cómo estar preparados. Ejemplos.
    •Integración y operación de las soluciones de forma ágil.

    En directo el 2 de junio de 2020, a las 10:00 hrs y disponible después bajo demanda. | 45 min.
  • Managing Your WAF, Your Way Recorded: May 19 2020 48 mins
    Pratyush Sinha, Technical Account Manager, Akamai
    With 178 billion WAF rule triggers every 24 hours, Akamai harnesses unmatched visibility into attacks to deliver curated and highly accurate WAF protections that keep up with the latest threats.

    In this webinar we cover Akamai’s flagship security solution - Kona Site Defender (KSD), and how it protects the apps & APIs of the who’s who of the internet at the Edge. Seamlessly built on the Akamai Intelligent Edge Platform, Kona Site Defender provides Always-On protection from DDoS and application-layer attacks, with dramatically lower management overhead.

    Agenda:

    1. Trends and Review of the Threat Landscape
    2. Overview of Kona Site Defender
    3. Analytics
    4. Logs & Alerts
    5. Integration & Support
    6. Product Demo
  • How Prepared Are You for a Credential Attack? Recorded: May 13 2020 31 mins
    Gerd Giese, Industry Strategist, Akamai and Hamish Rose, Senior Solutions Engineer, Akamai
    With the shift to a fully digital world, resulting in more online consumers, creating multiple accounts, each with their own login details, organisations and their consumers have never been more vulnerable to credential attacks.

    Credential stuffing is a distinct part of the cybercrime economy, and for criminals, it’s a lucrative one. As criminals continue to advance their attack methods, it is increasingly difficult to protect against them.

    In this talk Hamish Rose and Gerd Giese will discuss the anatomy of a credential stuffing attack and the common challenges organisations face. They will also explore approaches to mitigating the increasingly sophisticated attack methods.

    You will learn more about:
    1) Best practice on preventing data leaks in the authentication chain
    2) Providing the best possible customer experience
    3) Ensuring necessary security controls
    4) Delivering an operational and cost-effective technical solution
  • Code Less, Optimise More: How to Automate Image and Video Management at Scale Recorded: Apr 28 2020 48 mins
    Adam Newman Global Sr. Product Manager, Web Performance Solutions Akamai, Sven Dummer Global Sr. Product Market
    Our lives have shifted online. Without the ability to see and touch, images and videos are providing the connections to our physical world. Consumers rely on what they can see online before making a buying decision.

    But these are also times of limited bandwidth and network overload. Media-rich websites and apps are creating challenges for marketers, visual design teams, and web developers alike. Delivering high-quality images and video with speed and impact is more difficult than ever. Nothing is more frustrating for consumers if they want to zoom in on a detail and all they get is a pixelated, blurry mess.

    Imagine all your videos and images delivered in the optimal format, tailored to the screen size of each end user, and always with the best possible visual quality — all without the need to touch your code or your image and video files. And imagine you could do this in a heartbeat across all your websites and apps without having to touch every single one of them.

    Too good to be true? In this webinar, we will introduce and demonstrate how Image & Video Manager can be used to:

    - Simplify and automate the process of image and video optimisation
    - Deliver the right formats, sizes, and visual quality tailored to each end user’s specific browser, device, and network connection in real time
    - Decrease page weight by reducing file sizes without quality degradation
    - Do all of the above without the need to write complex code and generate countless derivative renditions of your media assets
    - In fact, do all of the above without writing any code, generating any derivatives, or making any changes to your digital asset management (DAM)

    You’ll also learn about next steps for your free trial of Image & Video Manager.
  • Register now for Akamai Edge Live - 7 April, 2020 Recorded: Apr 3 2020 1 min
    Akamai Technologies
    Register now: https://www.akamai.com/us/en/campaign/edge-live.jsp

    The Akamai Edge Live | Virtual Summit 2020 is a virtual conference that brings together industry leaders, technologists, developers, business executives, and thought leaders looking for the latest strategies to maintain business continuity, protect technology from ever-evolving threats, and accelerate digital transformation during challenging times.

    Please join us for this no-stress, no-travel, all-digital event — taking place live in three global regions — and learn how scale, resiliency, and intelligence at the edge help protect and deliver your business, no matter what comes your way.

    The broadcasts will take place on the following dates and times:
    UK&I: 7 April, 2:00 - 5:00 pm BST
    Rest of Europe: 7 April, 1:00 - 4:00 pm GMT
    Americas: 7 April, 1:00 - 4:00 PM ET
    APJ: 8 April, 9:00 - 12:00 PM SGT
  • Acceso ágil y seguro para sus trabajadores remotos Recorded: Apr 1 2020 48 mins
    Enric Mañez, Enterprise Specialist, Akamai, María Ramínez, Enterprise Security, Akamai
    Facilite la continuidad del negocio

    Organizaciones de todo el mundo han pedido a sus trabajadores que trabajen desde casa. Sin embargo, la mayoría de las empresas no están preparadas para un aumento tan repentino de usuarios remotos. Este fuerte aumento desborda las soluciones de VPN existentes, plantea nuevos desafíos de seguridad y reduce la productividad de los trabajadores.

    Akamai puede ayudarle a gestionar y proteger el acceso remoto.

    La mayoría de las configuraciones corporativas de VPN no están pensadas para dar cabida a un gran número de trabajadores remotos, y adaptar ese acceso con tecnologías tradicionales es caro, lento y complicado.

    Con la solución de Akamai, podrá ofrecer un acceso remoto seguro de forma inmediata a todos los usuarios: sin hardware, sin tiempo de inactividad y sin cambios en la red.

    En este Webinar, Enric Mañez y María Ramírez, le explicarán:

    - Cómo nuestros clientes están implantando el teletrabajo en sus empresas.

    - Cómo desplegar la solución de Akamai (EAA) en su arquitectura existente.

    - Cómo poder usar la solución gratis durante 60 días con implementación asistida.


    En directo el 1 de abril de 2020, a las 12:00 hrs y disponible después bajo demanda. | 45 min.
  • Secure Your Remote Workforce Recorded: Mar 26 2020 45 mins
    Andy Crail, EMEA Manager Solutions Engineering, Enterprise Solutions, Akamai and María Ramírez, Enterprise Security, Akamai
    Enable business continuity in today’s challenging global environment.

    Organizations across the globe have asked their workforce to work from home. Security becomes even more important for remote users.
    This sudden increase in remote users is a challenge for many organizations. Corporate VPN setups are typically not scoped for large numbers of off-site workers, and scaling access is expensive, slow, and complicated for most businesses.

    In this webinar Andy and Maria will discuss:
    - How EAA fits in your architecture
    - See how to quickly deploy EAA for fast secure remote access
    - How users use the remote access
  • State of the Internet / Security — Financial Services Hostile Takeover Attempts Recorded: Feb 20 2020 59 mins
    Martin McKeay, Editorial Director and Security Researcher, Akamai
    Learn about the newest attack patterns and how to defend against them.

    Akamai researchers recently looked back at 24 months of data and observed distinct developments in attacks on financial services organizations.

    The industry appears to be experiencing growth in both numbers and sophistication of attacks, — trends that may soon spread to other industries. Among the findings we’ll review in this live webinar are:

    - The issues in API development that create the most headaches for security professionals
    - How error response messages help criminals improve their targeting
    - Where criminals are finding new LFI vulnerabilities, and new ways to exploit them
    - High-density DDoS attacks that may be used to obfuscate other types of attacks, including SQLi and LFI
    - The elements of the Zero Trust toolkit that can help limit the effectiveness of known and unknown attack types
  • Offloading and Simplifying PSD2 Compliance Recorded: Jan 29 2020 40 mins
    Richard Meeus, Security Technology and Strategy Director, Akamai Technologies and Mark Haine, Founder, considrd.consulting
    The revised Payment Services Directive (PSD2) and Open Banking, the UK implementation of PSD2, are regulatory requirements, but they also offer financial institutions an opportunity to gain competitive advantage by delivering superior user experiences and customer-focused financial services.

    This webinar provides technology leaders of larger enterprises with an overview of PSD2 compliance requirements, its challenges and opportunities as well as a roadmap to optimise implementations.

    You will learn more about the five key business goals for successful PSD2 compliance:

    1) Meeting regulatory requirements
    2) Providing the best possible customer experience
    3) Building a competitive advantage
    4) Ensuring necessary security controls
    5) Delivering an operational and cost-effective technical solution
  • The Technical Implications of CCPA Recorded: Dec 3 2019 30 mins
    Sven Dummer Senior Product Marketing Manager, Akamai, Elmar Witte Senior Product Marketing Manager, Akamai
    Similar to the EU General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA) is regarded as one of the toughest and most impactful data protection regulations on the planet. When it goes into effect on January 1, its impact will be global: Compliance is required from any company that stores personal data of residents of California — the world’s fifth-largest economy. The California Department of Justice estimates that businesses in the U.S. alone will spend $55 billion just for initial compliance.

    And companies face more challenges as lawmakers around the world aim to put an end to the Wild West of consumer data collection. Personal data is now being regulated in over 130 countries with more than 500 privacy laws.

    Watch this 30-minute on-demand webinar for a brief overview of the CCPA, who it impacts, and how it compares to other high-profile data privacy regulations like GDPR. We dive into its technical implications and how central identity management can help to achieve multi-jurisdictional compliance.

    You will learn:

    - What systems and practices are needed to scalably comply with CCPA
    - Technical best practices to address common data privacy requirements, CCPA, and beyond
    - How to eliminate data silos that complicate regulatory compliance
    - How granular customer preference and scoped access management can help to achieve compliance and prevent toxic data
  • How Leading Brands Build Trust with CIAM Recorded: Oct 2 2019 60 mins
    John Tolbert, Lead Analyst, KupperingCole, Mayur Upadhyaya, Senior Director, Identity Cloud, Akamai
    Analyst tips to balance privacy & security with user experience

    Digital trust is what sets brands apart from their competitors. Taking and storing customer data is a duty of care, and brands cannot afford data breaches or compromises. To gain digital trust, leading brands need an airtight data protection strategy that gives customers control of their personal data without compromising user experiences.

    KuppingerCole Lead Analyst & Managing Director John Tolbert, joined by Akamai Senior Director of Identity Cloud Mayur Upadhyaya, will discuss the state of digital trust today and how to make trust a competitive differentiator with customer identity and access management (CIAM).

    Watch this on-demand webinar to learn CIAM best practices to:

    - Enable trust across every digital interaction between your brand and your customers
    - Meet regional privacy requirements around the globe
    - Consolidate insights across all channels to gain better visibility into your end-users’ behaviors and preferences
  • How corporate network projects benefit from Zero Trust Recorded: Sep 24 2019 44 mins
    Richard Meeus, Director of Security Technology & Strategy, EMEA, Maria Ramirez, Solution Engineer, Enterprise Security
    Consider adding Zero Trust Security to your corporate network transformation project. It will enhance your project significantly – regardless of your preferred solution covering multi-cloud with AWS or Microsoft, hybrid or software-defined networks. This on-demand webinar covers:
    • How Zero trust improves cost-efficiency, performance and security of corporate networks
    • What network architectures that include Zero Trust security look like
    • How you can start implementing Zero Trust by 3 simple steps
  • Security Attacks in Financial Services: DDos, Phishing, and Beyond Recorded: Sep 18 2019 57 mins
    Martin McKeay, Editorial Director and Security Researcher, Steve Ragan, Editor, Security Research and Publications, Akamai
    Criminals go where the money is, and the financial services industry has attracted more than its share of malicious traffic. Akamai security experts recently reviewed 18 months of data and found some patterns that should interest security professionals in every industry.

    Join this session to hear their findings and learn about:

    - The leading DDoS and application-layer attack vectors used to target financial services institutions
    - Why criminals launch DDoS attacks against financial institutions, even when there’s little chance of success
    - The data points that tell criminals you’ve improved their odds for a successful account break-in
    - How the attack economy slices, dices, and exploits the massive troves of stolen logins you hear about on the news
    - The little-known phishing variant that resulted in almost $1.2 billion of losses in 2018
  • Driving Trust and Customer Identity in Financial Services Recorded: Jul 17 2019 44 mins
    Mayur Upadhyaya, Senior Director - Identity Cloud (EMEA), Richard Meeus, Security Director (EMEA), Akamai Technologies
    Today’s financial services consumers are digital first, and expect seamless and secure brand interactions that provide valuable online experiences while protecting their personal data privacy and preferences.

    Organisations need to ensure customer identity and access management in order to provide trusted digital experiences for their end users.

    Join this live webinar to learn more about:
    - Customer expectations over control of their identity and identity in the digital economy
    - The identity challenge of developing efficient and effective Know Your Customer (KYC) processes
    - The impact of Open Banking, PSD2, and GDPR on Identity requirements in financial services
    - The digital challenges of an emerging identity perimeter

    Speakers:
    Mayur Upadhyaya, Senior Director - Identity Cloud (EMEA), Akamai Technologies
    Richard Meeus, Security Technology and Strategy Director (EMEA), Akamai Technologies
  • How IKEA monitors and evaluates the performance of their website Recorded: Jun 18 2019 42 mins
    Magnus Dahl, Product Specialist, Web Customer Meeting Points, IKEA Digital, Nadeem Mian, Akamai
    A slow-performing or error-prone website can cost millions in lost revenue. That’s why digital performance management is IKEA’s key to monitoring, optimising, and validating the business impact of web performance strategies.

    This Webinar, in partnership with Ingka Group and Internet Retailing, reveals how IKEA measures website performance, and the different strategies they employ to improve it. We’ll learn how:

    - Real user data helps IKEA monitor and evaluate the performance of their website
    - The split between mobile and desktop impacts performance
    - IKEA optimises the front end of their website for performance improvements
    - IKEA handles the tradeoff between web performance and 3rd party javascript
  • How to Strengthen your Security Posture Beyond the Network Edge Recorded: Apr 10 2019 48 mins
    Andy Crail, EMEA Manager Solutions Engineering, Akamai
    The network perimeter no longer exists. And this isn’t just theory. This is evident in the massive amount of data breaches we’ve seen in the last five years, the vast majority of which happened as a result of trust being abused inside of the perimeter. The problem is further compounded by the fact that applications which were designed to live inside of a network perimeter often have the worst security profiles.

    Join Andy Crail, EMEA Manager Solutions Engineering with Akamai Technologies, as he discusses how to move beyond perimeter security, and focus on:

    - How trust is not an attribute of location
    - Why a pessimistic view on security where every machine and user should be untrusted until proven otherwise is the future
    - How Google BeyondCorp and Software Defined Parameters can help mitigate attacks focused on north/south traffic
    - How microsegmentation can help mitigate attacks focused on east/west traffic
    - Best practices to adopt a zero trust, continuously adaptive risk and trust security model
  • PSD2: Best Practices for Compliance and Risk Mitigation Recorded: Mar 12 2019 33 mins
    Richard Meeus, Security Technology and Strategy Director, Akamai Technologies
    PSD2, the revised Payment Services Directive, requires financial institutions to grant access to the account data of their customers to certified service providers. This requirement creates not only security challenges but also performance concerns, that can fundamentally affect the customer experience. In this webinar, we’ll look at PSD2, one year on and discuss ways in which payment service providers can mitigate risk, giving specific examples of how Akamai has helped its customers implement the directive.

    Join this live webinar to learn more about:

    * The impact of PSD2 on financial institutions security posture
    * How to ensure secure messaging between the service provider and the institution
    * What advanced security controls are needed to mitigate the increased risks
    * How to ensure only authenticated access requests are processed
    * Real life examples of how Akamai is helping its customers implement PSD2
Intelligent Security Starts at the Edge
Akamai secures and delivers digital experiences for the world’s largest companies. Akamai’s intelligent edge platform surrounds everything, from the enterprise to the cloud, so customers and their businesses can be fast, smart, and secure. Top brands globally rely on Akamai to help them realize competitive advantage through agile solutions that extend the power of their multi-cloud architectures. Akamai keeps decisions, apps and experiences closer to users than anyone — and attacks and threats far away. Akamai’s portfolio of edge security, web and mobile performance, enterprise access and video delivery solutions is supported by unmatched customer service, analytics and 24/7/365 monitoring. To learn why the world’s top brands trust Akamai, visit www.akamai.com, blogs.akamai.com, or @Akamai on Twitter.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How Prepared Are You for a Credential Attack?
  • Live at: May 13 2020 1:00 pm
  • Presented by: Gerd Giese, Industry Strategist, Akamai and Hamish Rose, Senior Solutions Engineer, Akamai
  • From:
Your email has been sent.
or close