Defining Security Posture in a Zero Trust World

Logo
Presented by

Nick Hawkins, Senior Director, Product Management, Enterprise; Johnny Yeo, Senior Enterprise Security Architect, Akamai

About this talk

It is generally agreed that there are three key pillars of a zero trust approach - Access, Identity and Posture. In previous webinars we have explored how an identity driven approach can be used with a cloud proxy to better secure access to internal applications. In the first part of this webinar we will dive deeper into the third pillar – posture- understand what it means to a user and their devices and see how it can be integrated into a zero trust architecture. The second part will look at the mitigation aspect of posture. We’ll cover the API attack trends – how attacks are moving from web into API with the explosive growth of apps – and the lifecycle of credential fraud. Join Akamai Technologies and (ISC)² on May 22 to learn how to define security posture in a zero trust world. Presenter: Nick Hawkins, Senior Director, Product Management, Enterprise, Akamai Technologies Presenter: Johnny Yeo, Senior Enterprise Security Architect, Akamai Technologies Moderator: Kawin Boonyapredee, CISSP, Executive Security Advisor, IBM Security
Related topics:

More from this channel

Upcoming talks (11)
On-demand talks (454)
Subscribers (69658)
Looking for expertise and information to advance your career and tackle your challenges? Subscribe and join us for the educational webinars in APAC time zone. Earn CPEs quickly and at no cost by attending webinars: 1 hour of webinar equals 1 CPE. We welcome members and non members alike.