Hi [[ session.user.profile.firstName ]]

Cybersecurity in the C-Suite

C-Level executives are increasingly being targeted by cyber criminals: according to an IBM survey, “64% of CFOs, CHROs and CMOs feel the least engaged in cybersecurity threat management activities, yet are the stewards of data most coveted by cybercriminals.” With cybersecurity no longer limited to the concerns of the IT department and the broader workforce, in 2021 the risk of breaches and attacks touch every part of the organisation.

Integrating security controls at all business levels, sharing incident data and making cybersecurity an essential pillar of business considerations and training goes a long way to help CISOs and security leaders navigate the increasing threats and vulnerabilities.

In this month’s episode of The (Security) Balancing Act we’ll be sharing how IT security leaders can ensure everyone - and every part - of the business is safe. Join as we evaluate:

- To what extent cybersecurity should be a priority in the C-Suite
- How C-Level execs should consider their role in relation to cybersecurity
- How training and education can help CISOs navigate increased risk at all business levels
- And more

This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
Recorded Sep 15 2021 56 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Diana Kelley, SecurityCurve | Richard Meeus, Akamai | John Jacobs, Fortinet | Mike Davis, ExactlyIT
Presentation preview: Cybersecurity in the C-Suite
  • Channel
  • Channel profile
  • Keep Ahead of the Trends: Security in 2022 Jan 19 2022 5:00 pm UTC 60 mins
    Diana Kelley, SecurityCurve | Richard Meeus, Akamai
    Security is fast-changing, and keeping up to date with new trends and predictions is key to staying ahead of the race to secure your business. This is why we’re kicking off 2022 with an episode focused on the year ahead.

    How will the role of a CISO change in 2022? Do we need a BISO? How can I prepare for what’s to come? What tools and processes are available to me today? In this session we’ll be answering these questions and much more.

    Join Diana Kelley and expert thought leaders as they discuss:
    - The top 5 security trends and predictions for 2022
    - Why 2022 is the year for user awareness
    - AI and ML in IT Security
    - What the threatscape looks like in 2022
    - And much more!
  • [state of the internet] / security API: The Attack Surface that Connects Us All Nov 17 2021 2:00 pm UTC 45 mins
    Richard Meeus, Director of Security Technology and Strategy, Akamai, Mike Elissen, Developer Advocate, Akamai
    These days, just about every enterprise web application uses APIs. And that’s led to a growing deluge of API attacks. Fact is, APIs ...

    • Can be difficult to defend with traditional web application security solutions
    • Create hidden security gaps in mobile applications
    • Appear to have played a role the tripling of web attacks from 2020’s record year

    In this webinar, you’ll learn about practices that can lead to the release of vulnerable applications, steps you can take today to mitigate potential threats, and other findings from our upcoming State of the Internet / Security report.
  • How CTS Eventim Keeps Fraudsters Out and Trust Intact Nov 4 2021 2:00 pm UTC 45 mins
    Nils Rehm, Lead Project Manager Information Security, CTS Eventim, Richard Meeus, Akamai
    Trust is everything. Protect your customers from fraud.

    Want to find out who’s really logging in, account owners or impostors? Then register for this live webinar where we discuss with CTS Eventim, a leading international provider of ticketing and live entertainment, the challenge of account takeover and the steps they have put into place to protect their customers.

    You will learn how to:
    - Detect impostors and in turn stop human-driven fraud
    - Challenge fraudulent login attempts without impacting legitimate users
    - Recognise the steps in the ATO cyber kill chain and how to respond.
  • IDC Security - From Secure to Trusted: A Journey to Digital Leadership Oct 28 2021 1:00 pm UTC 14 mins
    Martin Sundblad, Research Manager, IDC, Richard Meeus, Akamai
    This new decade has already provided many lessons. One is that the mantra “never let a good crisis go to waste” could have been written for the cybercriminal fraternity. Another is that the concept of digital trust is rapidly becoming a business imperative in the digital era. At the heart of all this, as always, is security: the critical barrier between data integrity and compromise; and a fundamental building block for digital trust. Engendering digital trust is a business imperative, but it requires leadership and governance from board level to ensure that it becomes part of the very fabric of the business. Hence the theme of this event.

    On behalf of Akamai, Richard Meeus joined the fire-side chat with IDC analyst Martin Sundland. They talked about security @ work and why it needs a larger view, combining the new technologies with work culture, user experience and leadership.
  • How to Avoid Breaches Caused by Zero-Day Hacks Oct 26 2021 1:00 pm UTC 44 mins
    Richard Meeus, Director of Security Technology and Strategy, EMEA, Akamai
    The past few months have been a very dynamic time in the world of security for hackers and threat researchers, but they have been an extended nightmare for CISOs responsible for securing their enterprise networks.

    With multiple zero-day exploits being used to attack on-premises versions of Microsoft Exchange Server; the Silicon Valley security camera company, Verkada; and F5 BIG-IP products, you may be left wondering how this happened.

    This webinar will take an in-depth look at these breaches and how they could have been avoided, including:

    - What should and shouldn't be exposed to the public internet
    - Why moving to a zero trust–based security model can help
    - How to reduce the threat surface
  • How Public Sector Are Enabling Secure Cloud Based Application Access Recorded: Oct 20 2021 33 mins
    Robert Craig ICT Infrastructure Team Lead NHS Forth Valley, Richard Meeus Director Security Technology Strategy, Akamai
    This webinar looks at a case study of NHS Forth Valley and how they were able to quickly enable secure access to their application estate during COVID-19.

    What we will cover:
    - How NHS Forth Valley implemented their remote working practices
    - How NHS Forth Valley eliminated their VPN challenges, created a reliable user experience, and enhanced security
    - Best practices to achieve fast, secure, and easy access to all applications
    - How to grant the right user the right level of access to the right data at the right time
  • Does Fraud Mitigation Mean Customer Frustration? Recorded: Sep 29 2021 54 mins
    Steve Winterfeld, Advisory CISO, Richard Meeus, Director of Security, Tracy Devlin, Director, Customer Experience, Akamai
    Companies accept a degree of loss as a cost of doing business. This may be from shrinkage, fraud or cybercrime. Controls, especially on the web, can be added to help mitigate this risk - but do the cost, complexity and friction that these controls create outweigh the benefits?

    Join us for a debate on how to balance friction against loss, finding the centre of gravity between customer experience, cybersecurity, and fraud losses.

    Why you should attend:
    - Learn how inline controls can be used to address fraud and loss
    - Understand the ROI for fraud mitigation
    - Determine customer experience expectations

    To hear our live debate, register today.
  • Credential Stuffing in Financial Services Recorded: Sep 23 2021 42 mins
    Gerhard Giese, Industry Strategist, Financial Services, Akamai
    2020 presented a unique set of challenges for everyone, but that didn’t mean cybercriminals took time off. In fact, it turned out to be the opposite.

    Hackers targeted the financial services industry more than ever, with credential stuffing being the attack vector of choice last year.

    Join us as we explore the findings from our latest State of the Internet report.

    We found that:
    • 3.4 billion credential stuffing attacks were launched against financial services companies
    • There were 736,071,428 web attacks
    • 51% of attacks came through Local File Inclusion

    Register for our live webinar today to find out more.
  • What’s New at the Edge Recorded: Sep 22 2021 48 mins
    Hassan Al Naqbi, Khazna Data Centers, Marco Brandstaetter, DE-CIX, Mahesh Jaishankar, Arc Solutions, Elie Abouatme, Akamai
    Listen to our virtual event to hear why edge technology is crucial to successfully create exceptional, digital-first customer experiences. Hear from our guest panellists from Khazna Data Centers, DE-CIX, and Arc Solutions on what they see as catalysts for digitisation and business growth in the MENA region.

    You will learn:

    - The benefits of being at the edge
    - How to enable immersive experience with performance, scale, and reliability
    - How to streamline operations and manage costs

    Panellists:
    Hassan Al Naqbi, CEO, Khazna Data Centers
    Marco Brandstaetter, Regional Director, Middle East and South Asia, DE-CIX
    Mahesh Jaishankar, CEO, Arc Solutions

    Presenter:
    Elie Abouatme, Senior Engagement Manager and Managing Director, Dubai, Akamai
  • Betting at the Edge Recorded: Sep 21 2021 47 mins
    Lynette Kerry, Regional Director, Akamai, Graham Calder, Independent Consultant
    The on-line sports betting industry is one of the most dynamic and competitive markets in the world. With no restrictive contracts in place, operators focus on delivering a great player experience to avoid churn. Churn not only drives an immediate loss in revenue but also incurs significant costs to reacquire players.

    In this webinar, Akamai and EGR discuss extending the delivery network “edge” into a player’s device, near real time observability across the entire technical value chain can be dramatically improved. Moreover, by moving key operational processes to the edge, operators can not only reduce the impact of poor connectivity on the player experience, but also ensure they are best placed to take advantage of 5G latency improvements.

    Key discussion points

    What benefits can Edge technology offer sports betting marketing and operational teams alike in delivering a next gen gameplay experience and the opportunity to drive real competitive advantage?

    Edge technology helps sports betting operators to:

    ● Improve observability and strategic decision making through the delivery value chain.

    ● Move core functions closer to the players, providing a pathway towards fundamentally improving the gameplay experience and reducing issues.

    ● Ensure operators are able to take full advantage of the promise of 5G.
  • Cybersecurity in the C-Suite Recorded: Sep 15 2021 56 mins
    Diana Kelley, SecurityCurve | Richard Meeus, Akamai | John Jacobs, Fortinet | Mike Davis, ExactlyIT
    C-Level executives are increasingly being targeted by cyber criminals: according to an IBM survey, “64% of CFOs, CHROs and CMOs feel the least engaged in cybersecurity threat management activities, yet are the stewards of data most coveted by cybercriminals.” With cybersecurity no longer limited to the concerns of the IT department and the broader workforce, in 2021 the risk of breaches and attacks touch every part of the organisation.

    Integrating security controls at all business levels, sharing incident data and making cybersecurity an essential pillar of business considerations and training goes a long way to help CISOs and security leaders navigate the increasing threats and vulnerabilities.

    In this month’s episode of The (Security) Balancing Act we’ll be sharing how IT security leaders can ensure everyone - and every part - of the business is safe. Join as we evaluate:

    - To what extent cybersecurity should be a priority in the C-Suite
    - How C-Level execs should consider their role in relation to cybersecurity
    - How training and education can help CISOs navigate increased risk at all business levels
    - And more

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • How Zero Trust Enables Remote Working and Builds to a SASE Vision Recorded: Aug 31 2021 62 mins
    Richard Meeus, Director of Security, EMEA, Akamai, James Coker, Reporter, Infosecurity Brian Honan, CEO, BH Consulting
    IT and security leaders are moving forward with the new realities of the hybrid workplace. Working from home, or remotely, is now just ‘work’. As employees begin to mobilise again, organisations need to maintain an agile and frictionless security model, which at the same time compliments an ever-growing migration of applications to the cloud.

    In this webinar, a panel of expert speakers discuss how Zero Trust security was propelled forward in 2020, and the vital role of secure access service edge (SASE) in implementing this approach going forward, as more organisations undergo digital transformations.

    Discussion topics:
    - Why move to a user-centric and location-agnostic Zero Trust security model
    - How Zero Trust Network Access (ZTNA) can be the next step in your SASE adoption
    - How an edge strategy supports organisations’ future digital growth
  • How Zero Trust Network Access Can Help You Sleep at Night Recorded: Aug 30 2021 47 mins
    Richard Meeus, Director of Security Technology and Strategy, EMEA, Akamai
    Talking to CISOs today, there are two themes that keep coming up — ransomware and FoW (Future of Work).

    Complex and weighty problems they may be, but they can be addressed with adopting a single architecture that works with your continuing digital transformation plans.

    This session will cover how Zero Trust Network Access can:
    • Provide fast, secure access for your users wherever they are, as well as to your applications wherever they are
    • Prevent network-level access to your estate — reducing the risk of ransomware and its ability to spread
    • Fully enable identity-based access to your applications and easily implement least privilege
  • Technological Approaches to a Zero Trust Security Model Recorded: Jul 28 2021 59 mins
    John Tolbert, Lead Analyst, KuppingerCole, Richard Meeus, Director of Security, Technology and Strategy, EMEA, Akamai
    The traditional model of enforcing security at the network perimeter is no longer valid as employees, devices, and workloads move outside the corporate network.

    A Zero Trust model offers an alternative that secures data while ensuring it is accessible from wherever employees are working. But finding the right technological approaches to Zero Trust is challenging.

    Join this KuppingerCole webinar to:
    - Understand how best to approach implementing Zero Trust
    - Explore the technological considerations and options available
    - Learn how to create a smarter way for users to access applications
    - Discover effective ways to protect users from cyberthreats
    - Learn how to deliver a phish-proof MFA strategy
    - Get answers to your questions about Zero Trust
  • Protect Against Data Breaches with Phish-Proof MFA Recorded: Jul 27 2021 45 mins
    Andy Crail, EMEA Senior Manager Enterprise Solutions & Jim Black, Senior Product Marketing Manager, Akamai
    With 80% of breaches using compromised credentials*, authentication attacks are big business, and no one is immune to them. Multi-factor authentication (MFA) reduces the risk of compromised credentials, but traditional MFA can be easily circumvented by cyber criminals.

    In this webinar we will cover the types of bypass attacks against MFA and how to mitigate them to prevent employee account takeover and data breaches.

    We will also demo Akamai MFA, a next-generation solution that features a phish-proof authentication factor and leverages FIDO2 standards without the need of hardware keys.

    You will learn:
    - The role of MFA within your cybersecurity program
    - Different types of MFA solutions and why some are failing
    - Standards to base your solution on
    - Best practices to select a cost-effective and low-friction solution

    *https://enterprise.verizon.com/resources/reports/dbir/
  • Outmaneuver ATO Attackers Now Recorded: Jul 8 2021 37 mins
    Tony Lauro, Director, Security Technology and Strategy, Akamai
    Account takeovers (ATO) continue to rise in severity and pervasiveness, particularly in industries where digital valuables are getting created at a faster rate than physical ones.

    In this session, we’ll explore the innovations your organization can use to change the future from one where attackers have the upper hand to one where you can fight back against the disruptive nature of account takeover
  • Changing the Future: Outmaneuver Sophisticated Bots and ATO Attackers Now Recorded: Jul 7 2021 34 mins
    Samy Makki, Nils Rehm, Alex Baker, Daniel Burns
    Akamai Customer Panel:
    Automated attacks and account takeovers (ATO) continue to rise in sophistication, severity, and pervasiveness. And attackers are innovating constantly to try to increase their success rates as they work to evade detection and mitigation technologies in the kill chain. But the future isn’t just more and more attacks. Companies that are the intended targets can anticipate attackers’ next moves and apply new technologies and detections to stop them.

    In this panel session with customers from various industries (e.g. CTS Eventim, Zalando SE, and Next PLC), we’ll discuss the underground criminal economy of automated scraping and buying, as well as stealing and selling credentials and accounts. We’ll also talk about innovations that organizations use to change the future from one where attackers have the upper hand to one where they fight back against the disruptive nature of automated threats and ATO.
  • The Math Behind Bot Management Recorded: Jun 29 2021 68 mins
    Rob Yates, Senior Solutions Engineer and Adam Torres, Solutions Engineer
    Sophisticated bot attacks could put revenue, productivity, and reputation all at risk. No matter what your organization is calling it — credential abuse, credential stuffing, bad bots, or account takeover — preparing for and preventing these automated attacks doesn’t need to be your Achilles’ heel.

    Join Rob Yates, Senior Solutions Engineer and Adam Torres, Solutions Engineer at Akamai for an interactive workshop and a behind-the-scenes look at the configured actions on bot activity at the edge server.

    In this 45-minute workshop, Rob will cover:

    - Why bot detection is important, and the costs of bots to business and IT
    - The architectural challenge to employing today’s bot management solutions effectively
    - Best-practice approaches to bot management, including mobile SDK
  • EGR Virtual Series: Betting on the Edge Recorded: Jun 29 2021 47 mins
    Lynette Kerry, Regional Director, Akamai, Graham Calder, Independent Consultant
    The on-line sports betting industry is one of the most dynamic and competitive markets in the world. With no restrictive contracts in place, operators focus on delivering a great player experience to avoid churn. Churn not only drives an immediate loss in revenue but also incurs significant costs to reacquire players.

    In this webinar, Akamai and EGR discuss extending the delivery network “edge” into a player’s device, near real time observability across the entire technical value chain can be dramatically improved. Moreover, by moving key operational processes to the edge, operators can not only reduce the impact of poor connectivity on the player experience, but also ensure they are best placed to take advantage of 5G latency improvements.

    Key discussion points

    What benefits can Edge technology offer sports betting marketing and operational teams alike in delivering a next gen gameplay experience and the opportunity to drive real competitive advantage?

    Edge technology helps sports betting operators to:

    ● Improve observability and strategic decision making through the delivery value chain.

    ● Move core functions closer to the players, providing a pathway towards fundamentally improving the gameplay experience and reducing issues.

    ● Ensure operators are able to take full advantage of the promise of 5G.
  • Scale Digital Experiences with Customer Identity & Access Management Recorded: Jun 24 2021 27 mins
    John Summers, SVP & GM, Web Security, Akamai & Alex Bolante, Managing Director, CIAM, Deloitte & Touche LLP
    COVID-19 has scaled consumer adoption of digital, prompting businesses across industries to accelerate digital transformation initiatives. While digital is now the preferred channel for many consumers, expectations for seamless, highly personalized customer experiences have not changed.

    Watch this on-demand Akamai webinar, featuring Deloitte & Touche Managing Director Alex Bolante, to learn how to create exceptional, digital-first customer experiences with Customer Identity and Access Management (CIAM).

    You will hear:
    • How COVID-19 has changed consumer behaviors and CX expectations
    • Why customer identities are central to your digital-first strategy
    • Case studies from brands that scaled mission-critical applications with CIAM
    • Common pitfalls and critical success criteria to benchmark your CIAM solution

    Speakers:
    John Summers - SVP and General Manager, Web Security
    Akamai Technologies

    Alex Bolante - Managing Director, Customer Identity and Access Management
    Deloitte & Touche LLP

    Learn more:
    akamai.com/ciam
    http://deloitte.com/us/en/pages/risk/solutions/cyber-risk-services
Discover the latest talks and webinars with Akamai expert perspectives
Akamai secures and delivers digital experiences for the world’s largest companies. Our intelligent edge platform keeps apps and experiences closer to users — and attacks and threats far away. Top brands globally rely on Akamai so their businesses can be fast, smart, and secure.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cybersecurity in the C-Suite
  • Live at: Sep 15 2021 4:00 pm
  • Presented by: Diana Kelley, SecurityCurve | Richard Meeus, Akamai | John Jacobs, Fortinet | Mike Davis, ExactlyIT
  • From:
Your email has been sent.
or close