Hi [[ session.user.profile.firstName ]]

Audience Hijacking — How This Script-Based Attack Can Kill Online Business

According to W3Techs, more than 94% of websites rely on in-browser scripts to create better customer experiences. But third-party scripts have also created an expanded threat surface that bad actors are eager to exploit. Unwanted ads, pop-ups, and banners can be costly to the user experience and your bottom line, with an estimated 1 in 4 website transactions lost due to what we call audience hijacking. Even Google acknowledges that this type of in-browser script attack is the most common user complaint about Chrome.

This session explores several aspects of audience hijacking:
Different ways online audiences can be hijacked
The security and risk implications of this new attack vector
How today’s digital businesses can fight back and prevent these problems from persisting
Recorded Aug 25 2021 23 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Federico Dios Vila
Presentation preview: Audience Hijacking — How This Script-Based Attack Can Kill Online Business

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Does Fraud Mitigation Mean Customer Frustration? Sep 29 2021 1:00 pm UTC 45 mins
    Steve Winterfeld, Advisory CISO, Richard Meeus, Director of Security, Tracy Devlin, Director, Customer Experience, Akamai
    Companies accept a degree of loss as a cost of doing business. This may be from shrinkage, fraud or cybercrime. Controls, especially on the web, can be added to help mitigate this risk - but do the cost, complexity and friction that these controls create outweigh the benefits?

    Join us for a debate on how to balance friction against loss, finding the centre of gravity between customer experience, cybersecurity, and fraud losses.

    Why you should attend:
    - Learn how inline controls can be used to address fraud and loss
    - Understand the ROI for fraud mitigation
    - Determine customer experience expectations

    To hear our live debate, register today.
  • Credential Stuffing in Financial Services Sep 23 2021 1:00 pm UTC 42 mins
    Gerhard Giese, Industry Strategist, Financial Services, Akamai
    2020 presented a unique set of challenges for everyone, but that didn’t mean cybercriminals took time off. In fact, it turned out to be the opposite.

    Hackers targeted the financial services industry more than ever, with credential stuffing being the attack vector of choice last year.

    Join us as we explore the findings from our latest State of the Internet report.

    We found that:
    • 3.4 billion credential stuffing attacks were launched against financial services companies
    • There were 736,071,428 web attacks
    • 51% of attacks came through Local File Inclusion

    Register for our live webinar today to find out more.
  • Betting at the Edge Sep 21 2021 1:00 pm UTC 47 mins
    Lynette Kerry, Regional Director, Akamai, Graham Calder, Independent Consultant
    The on-line sports betting industry is one of the most dynamic and competitive markets in the world. With no restrictive contracts in place, operators focus on delivering a great player experience to avoid churn. Churn not only drives an immediate loss in revenue but also incurs significant costs to reacquire players.

    In this webinar, Akamai and EGR discuss extending the delivery network “edge” into a player’s device, near real time observability across the entire technical value chain can be dramatically improved. Moreover, by moving key operational processes to the edge, operators can not only reduce the impact of poor connectivity on the player experience, but also ensure they are best placed to take advantage of 5G latency improvements.

    Key discussion points

    What benefits can Edge technology offer sports betting marketing and operational teams alike in delivering a next gen gameplay experience and the opportunity to drive real competitive advantage?

    Edge technology helps sports betting operators to:

    ● Improve observability and strategic decision making through the delivery value chain.

    ● Move core functions closer to the players, providing a pathway towards fundamentally improving the gameplay experience and reducing issues.

    ● Ensure operators are able to take full advantage of the promise of 5G.
  • Cybersecurity in the C-Suite Recorded: Sep 15 2021 56 mins
    Diana Kelley, SecurityCurve | Richard Meeus, Akamai | John Jacobs, Fortinet | Mike Davis, ExactlyIT
    C-Level executives are increasingly being targeted by cyber criminals: according to an IBM survey, “64% of CFOs, CHROs and CMOs feel the least engaged in cybersecurity threat management activities, yet are the stewards of data most coveted by cybercriminals.” With cybersecurity no longer limited to the concerns of the IT department and the broader workforce, in 2021 the risk of breaches and attacks touch every part of the organisation.

    Integrating security controls at all business levels, sharing incident data and making cybersecurity an essential pillar of business considerations and training goes a long way to help CISOs and security leaders navigate the increasing threats and vulnerabilities.

    In this month’s episode of The (Security) Balancing Act we’ll be sharing how IT security leaders can ensure everyone - and every part - of the business is safe. Join as we evaluate:

    - To what extent cybersecurity should be a priority in the C-Suite
    - How C-Level execs should consider their role in relation to cybersecurity
    - How training and education can help CISOs navigate increased risk at all business levels
    - And more

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • How Zero Trust Enables Remote Working and Builds to a SASE Vision Recorded: Aug 31 2021 62 mins
    Richard Meeus, Director of Security, EMEA, Akamai, James Coker, Reporter, Infosecurity Brian Honan, CEO, BH Consulting
    IT and security leaders are moving forward with the new realities of the hybrid workplace. Working from home, or remotely, is now just ‘work’. As employees begin to mobilise again, organisations need to maintain an agile and frictionless security model, which at the same time compliments an ever-growing migration of applications to the cloud.

    In this webinar, a panel of expert speakers discuss how Zero Trust security was propelled forward in 2020, and the vital role of secure access service edge (SASE) in implementing this approach going forward, as more organisations undergo digital transformations.

    Discussion topics:
    - Why move to a user-centric and location-agnostic Zero Trust security model
    - How Zero Trust Network Access (ZTNA) can be the next step in your SASE adoption
    - How an edge strategy supports organisations’ future digital growth
  • How Zero Trust Network Access Can Help You Sleep at Night Recorded: Aug 30 2021 47 mins
    Richard Meeus, Director of Security Technology and Strategy, EMEA, Akamai
    Talking to CISOs today, there are two themes that keep coming up — ransomware and FoW (Future of Work).

    Complex and weighty problems they may be, but they can be addressed with adopting a single architecture that works with your continuing digital transformation plans.

    This session will cover how Zero Trust Network Access can:
    • Provide fast, secure access for your users wherever they are, as well as to your applications wherever they are
    • Prevent network-level access to your estate — reducing the risk of ransomware and its ability to spread
    • Fully enable identity-based access to your applications and easily implement least privilege
  • Audience Hijacking — How This Script-Based Attack Can Kill Online Business Recorded: Aug 25 2021 23 mins
    Federico Dios Vila
    According to W3Techs, more than 94% of websites rely on in-browser scripts to create better customer experiences. But third-party scripts have also created an expanded threat surface that bad actors are eager to exploit. Unwanted ads, pop-ups, and banners can be costly to the user experience and your bottom line, with an estimated 1 in 4 website transactions lost due to what we call audience hijacking. Even Google acknowledges that this type of in-browser script attack is the most common user complaint about Chrome.

    This session explores several aspects of audience hijacking:
    Different ways online audiences can be hijacked
    The security and risk implications of this new attack vector
    How today’s digital businesses can fight back and prevent these problems from persisting
  • Rethinking Risk in the Wake of DDoS Extortion Recorded: Aug 18 2021 29 mins
    Tim Westlake, Ingo Mommertz, Marcello Evangelista
    Your risk of a DDoS attack changed significantly in 2020, mostly driven by the largest global extortion campaign ever launched. But unlike other extortion activity from years past, where there was little follow-through on the actual threat, show-of-force attacks in 2020 reached 500+ Gbps — a clear sign of highly capable and motivated threat actors.

    The extortion campaign also signaled a notable shift in targeted verticals, with attackers expanding beyond commonly hit industries like finance, catching many organizations off guard and left scrambling for protection. With DDoS attackers more unpredictable, determined, and incented by extortion than ever before, it’s time to rethink DDoS defenses.

    Join this session to understand the evolution of DDoS extortion, its ramifications on 2021 security postures, and the latest best practices to fight back and reduce your risk.
  • What's hitting us lately: Attack vectors in Financial Industry Recorded: Aug 11 2021 26 mins
    Patrick Sullivan, CTO of Security Strategy, Akamai - Alberto Rey, BBVA
    The banking and financial services industry is under increasing threat from cyberattacks. In particular, data stored by financial organizations — including bank account and credit card numbers — remains a designated target both for direct exploitation and resale purposes in the deep web.

    The impact of a cyberattack can be devastating, so in response to this growing threat, the financial sector is creating proactive measures to thwart attempted cyberattacks.

    Join us in this session, where BBVA, one of the biggest banks in Spain and Patrick Sullivan will discuss the threatscape, touch on current trends and attack vectors within the financial services sector, and explain how to stay ahead of the game.
  • Technological Approaches to a Zero Trust Security Model Recorded: Jul 28 2021 59 mins
    John Tolbert, Lead Analyst, KuppingerCole, Richard Meeus, Director of Security, Technology and Strategy, EMEA, Akamai
    The traditional model of enforcing security at the network perimeter is no longer valid as employees, devices, and workloads move outside the corporate network.

    A Zero Trust model offers an alternative that secures data while ensuring it is accessible from wherever employees are working. But finding the right technological approaches to Zero Trust is challenging.

    Join this KuppingerCole webinar to:
    - Understand how best to approach implementing Zero Trust
    - Explore the technological considerations and options available
    - Learn how to create a smarter way for users to access applications
    - Discover effective ways to protect users from cyberthreats
    - Learn how to deliver a phish-proof MFA strategy
    - Get answers to your questions about Zero Trust
  • Protect Against Data Breaches with Phish-Proof MFA Recorded: Jul 27 2021 45 mins
    Andy Crail, EMEA Senior Manager Enterprise Solutions & Jim Black, Senior Product Marketing Manager, Akamai
    With 80% of breaches using compromised credentials*, authentication attacks are big business, and no one is immune to them. Multi-factor authentication (MFA) reduces the risk of compromised credentials, but traditional MFA can be easily circumvented by cyber criminals.

    In this webinar we will cover the types of bypass attacks against MFA and how to mitigate them to prevent employee account takeover and data breaches.

    We will also demo Akamai MFA, a next-generation solution that features a phish-proof authentication factor and leverages FIDO2 standards without the need of hardware keys.

    You will learn:
    - The role of MFA within your cybersecurity program
    - Different types of MFA solutions and why some are failing
    - Standards to base your solution on
    - Best practices to select a cost-effective and low-friction solution

    *https://enterprise.verizon.com/resources/reports/dbir/
  • Audience Hijacking — How This Script-Based Attack Can Kill Online Business Recorded: Jul 26 2021 23 mins
    Federico Dios Vila
    According to W3Techs, more than 94% of websites rely on in-browser scripts to create better customer experiences. But third-party scripts have also created an expanded threat surface that bad actors are eager to exploit. Unwanted ads, pop-ups, and banners can be costly to the user experience and your bottom line, with an estimated 1 in 4 website transactions lost due to what we call audience hijacking. Even Google acknowledges that this type of in-browser script attack is the most common user complaint about Chrome.

    This session explores several aspects of audience hijacking:
    Different ways online audiences can be hijacked
    The security and risk implications of this new attack vector
    How today’s digital businesses can fight back and prevent these problems from persisting
  • Rethinking Risk in the Wake of DDoS Extortion Recorded: Jul 26 2021 29 mins
    Tim Westlake, Ingo Mommertz, Marcello Evangelista
    Your risk of a DDoS attack changed significantly in 2020, mostly driven by the largest global extortion campaign ever launched. But unlike other extortion activity from years past, where there was little follow-through on the actual threat, show-of-force attacks in 2020 reached 500+ Gbps — a clear sign of highly capable and motivated threat actors.

    The extortion campaign also signaled a notable shift in targeted verticals, with attackers expanding beyond commonly hit industries like finance, catching many organizations off guard and left scrambling for protection. With DDoS attackers more unpredictable, determined, and incented by extortion than ever before, it’s time to rethink DDoS defenses.

    Join this session to understand the evolution of DDoS extortion, its ramifications on 2021 security postures, and the latest best practices to fight back and reduce your risk.
  • What's hitting us lately: Attack vectors in Financial Industry Recorded: Jul 26 2021 26 mins
    Patrick Sullivan, CTO of Security Strategy, Akamai - Alberto Rey, BBVA
    The banking and financial services industry is under increasing threat from cyberattacks. In particular, data stored by financial organizations — including bank account and credit card numbers — remains a designated target both for direct exploitation and resale purposes in the deep web.

    The impact of a cyberattack can be devastating, so in response to this growing threat, the financial sector is creating proactive measures to thwart attempted cyberattacks.

    Join us in this session, where BBVA, one of the biggest banks in Spain and Patrick Sullivan will discuss the threatscape, touch on current trends and attack vectors within the financial services sector, and explain how to stay ahead of the game.
  • Outmaneuver ATO Attackers Now Recorded: Jul 8 2021 37 mins
    Tony Lauro, Director, Security Technology and Strategy, Akamai
    Account takeovers (ATO) continue to rise in severity and pervasiveness, particularly in industries where digital valuables are getting created at a faster rate than physical ones.

    In this session, we’ll explore the innovations your organization can use to change the future from one where attackers have the upper hand to one where you can fight back against the disruptive nature of account takeover
  • Changing the Future: Outmaneuver Sophisticated Bots and ATO Attackers Now Recorded: Jul 7 2021 34 mins
    Samy Makki, Nils Rehm, Alex Baker, Daniel Burns
    Akamai Customer Panel:
    Automated attacks and account takeovers (ATO) continue to rise in sophistication, severity, and pervasiveness. And attackers are innovating constantly to try to increase their success rates as they work to evade detection and mitigation technologies in the kill chain. But the future isn’t just more and more attacks. Companies that are the intended targets can anticipate attackers’ next moves and apply new technologies and detections to stop them.

    In this panel session with customers from various industries (e.g. CTS Eventim, Zalando SE, and Next PLC), we’ll discuss the underground criminal economy of automated scraping and buying, as well as stealing and selling credentials and accounts. We’ll also talk about innovations that organizations use to change the future from one where attackers have the upper hand to one where they fight back against the disruptive nature of automated threats and ATO.
  • The Math Behind Bot Management Recorded: Jun 29 2021 68 mins
    Rob Yates, Senior Solutions Engineer and Adam Torres, Solutions Engineer
    Sophisticated bot attacks could put revenue, productivity, and reputation all at risk. No matter what your organization is calling it — credential abuse, credential stuffing, bad bots, or account takeover — preparing for and preventing these automated attacks doesn’t need to be your Achilles’ heel.

    Join Rob Yates, Senior Solutions Engineer and Adam Torres, Solutions Engineer at Akamai for an interactive workshop and a behind-the-scenes look at the configured actions on bot activity at the edge server.

    In this 45-minute workshop, Rob will cover:

    - Why bot detection is important, and the costs of bots to business and IT
    - The architectural challenge to employing today’s bot management solutions effectively
    - Best-practice approaches to bot management, including mobile SDK
  • EGR Virtual Series: Betting on the Edge Recorded: Jun 29 2021 47 mins
    Lynette Kerry, Regional Director, Akamai, Graham Calder, Independent Consultant
    The on-line sports betting industry is one of the most dynamic and competitive markets in the world. With no restrictive contracts in place, operators focus on delivering a great player experience to avoid churn. Churn not only drives an immediate loss in revenue but also incurs significant costs to reacquire players.

    In this webinar, Akamai and EGR discuss extending the delivery network “edge” into a player’s device, near real time observability across the entire technical value chain can be dramatically improved. Moreover, by moving key operational processes to the edge, operators can not only reduce the impact of poor connectivity on the player experience, but also ensure they are best placed to take advantage of 5G latency improvements.

    Key discussion points

    What benefits can Edge technology offer sports betting marketing and operational teams alike in delivering a next gen gameplay experience and the opportunity to drive real competitive advantage?

    Edge technology helps sports betting operators to:

    ● Improve observability and strategic decision making through the delivery value chain.

    ● Move core functions closer to the players, providing a pathway towards fundamentally improving the gameplay experience and reducing issues.

    ● Ensure operators are able to take full advantage of the promise of 5G.
  • Scale Digital Experiences with Customer Identity & Access Management Recorded: Jun 24 2021 27 mins
    John Summers, SVP & GM, Web Security, Akamai & Alex Bolante, Managing Director, CIAM, Deloitte & Touche LLP
    COVID-19 has scaled consumer adoption of digital, prompting businesses across industries to accelerate digital transformation initiatives. While digital is now the preferred channel for many consumers, expectations for seamless, highly personalized customer experiences have not changed.

    Watch this on-demand Akamai webinar, featuring Deloitte & Touche Managing Director Alex Bolante, to learn how to create exceptional, digital-first customer experiences with Customer Identity and Access Management (CIAM).

    You will hear:
    • How COVID-19 has changed consumer behaviors and CX expectations
    • Why customer identities are central to your digital-first strategy
    • Case studies from brands that scaled mission-critical applications with CIAM
    • Common pitfalls and critical success criteria to benchmark your CIAM solution

    Speakers:
    John Summers - SVP and General Manager, Web Security
    Akamai Technologies

    Alex Bolante - Managing Director, Customer Identity and Access Management
    Deloitte & Touche LLP

    Learn more:
    akamai.com/ciam
    http://deloitte.com/us/en/pages/risk/solutions/cyber-risk-services
  • How Whitbread Extends Website Security to Protect Customers Recorded: Jun 24 2021 47 mins
    Martin Jimmick Head of Information Security - Digital Whitbread
    2020 forced many organisations to rethink their online strategy and how to maintain the sale of goods or services effectively in the online world, absent of traditional routes to market.

    The exponential rise in website traffic has led to increased targets and more risk, with cyber criminals targeting every weakness, including the website supply chain.

    In this webinar we will cover:

    ● The steps that Whitbread take to keep their customers safe online
    ● Trends in website technology adoption and integration of third-party code
    ● How weaknesses in the website supply chain are being exploited to hide malicious code
    ● What steps you can take to protect your online customers from formjacking, web skimming and Magecart attacks
Discover the latest talks and webinars with Akamai expert perspectives
Akamai secures and delivers digital experiences for the world’s largest companies. Our intelligent edge platform keeps apps and experiences closer to users — and attacks and threats far away. Top brands globally rely on Akamai so their businesses can be fast, smart, and secure.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Audience Hijacking — How This Script-Based Attack Can Kill Online Business
  • Live at: Aug 25 2021 4:00 pm
  • Presented by: Federico Dios Vila
  • From:
Your email has been sent.
or close