Hi [[ session.user.profile.firstName ]]

NIST Zero Trust Architecture: Not Just for Federal Agencies Anymore

As many employees and other personnel continue to work remotely, organizations¬—including government agencies and ministries—have begun to evolve their thinking on Zero Trust security architectures. Organizations are becoming more comfortable with the idea of working remotely and are seeking to lay the foundation for securing this new working style. Most U.S. and foreign government agencies,—and even highly regulated private sector industries such as financial services and healthcare—are viewing the National Institute of Standards and Technology (NIST) Special Publication 800-207 Zero Trust Architecture as a guide on how to deploy a Zero Trust model. In this session, you’ll learn how F5’s security portfolio maps to the NIST 800-207 guidelines to assist not just U.S. federal agencies, but also foreign governments and private sector organizations, in rapidly adopting a Zero Trust architecture to augment their existing security investments, and to help develop new, safer workflows and operations.
Recorded Jul 12 2021 36 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jay Kelley, F5 | Manish Desai, F5
Presentation preview: NIST Zero Trust Architecture: Not Just for Federal Agencies Anymore

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Upgrading BIG-IP: 4 Tips that Matter Most Sep 30 2021 6:00 pm UTC 58 mins
    Jon Calalang, Solutions Architect, F5 | Sebastian Maniak, CEO and Co-founder, S144 inc
    Lifecycle management of BIG-IP platforms is a continuous task. Wondering where to start, where to go, and how to get there? Come along on the journey of an upgrade and hear examples of successful solutions to help you navigate.

    In this webinar, an F5 architect and a DevCentral MVP evangelist will explore steps taken to maintain BIG-IP. They'll be sharing real-world best practices and automation examples.

    In this webinar we'll cover:

    - The current BIG-IP recommended version, and why

    - Using automation for easier BIG-IP upgrades

    - F5 community solutions available for testing

    - Best practices on navigating support and real-world steps
  • Discover How to Manage F5 deployments in Azure with HashiCorp Terraform Cloud Sep 28 2021 5:00 pm UTC 54 mins
    Mark Menger, F5 | Justin Linn, HashiCorp
    The rate at which new applications are being deployed is continuing to increase, with organizations often employing 10 or more application services to power them. This drives the need for organizational visibility and enhanced collaboration among network, security, ops teams, and even developers to build and roll out applications securely and at speed.

    To deploy platform independent application services—that scale on demand without hindering deployment speeds—organizations need to implement a consistent way to both provision critical infrastructure and manage critical services while adhering to organizational policies. This is where F5 and HashiCorp comes in.

    In this webinar, we’ll cover:
    - Deploying and configuring F5 in Azure
    - Leveraging HashiCorp Sentinel policies for compliance and governance
    - Managing and versioning F5 configurations in Terraform Cloud
  • Real Attack Stories: Tales from the Front Lines Recorded: Sep 16 2021 61 mins
    Peter Silva, F5 | John Wagnon, F5 | Edgar Ojeda, F5
    F5’s Security Operations Center (SOC) analysts work 24x7 with customers to thwart attacks and add protections to keep their businesses up and running. Oftentimes, these attacks are easily mitigated. But occasionally, even we have to take a step back. Join our webinar to hear real attack stories, told by the analysts that stopped them.

    In this webinar, we’ll cover:
    - How, just a few weeks ago, one financial institution was the victim of the largest DDoS attack in Silverline history at 1.2 TB per second
    - How a state agency dealt with a widespread credential stuffing attack affecting unemployment benefits at the beginning of the COVID-19 pandemic
    - What happened when a relatively small bank was the focus of an extremely persistent account takeover attack
  • Introducing the Edge 2.0 Architecture Recorded: Sep 16 2021 65 mins
    Bart Salaets, Sr Director Solutions Engineering, F5 | Nico Cartron, Sr. Solutions Engineer, Volterra (Now Part of F5)
    Delivering rich digital experiences to your clients requires a combination of multiple networks, clouds, CDNs, and edges that are manually stitched together. This creates a lot of operational complexity as each platform has a unique set of tools and services.

    In addition, having your applications distributed over a multitude of different platforms exposes new ways for attackers to exploit vulnerabilities. Current edge solutions do not provide the level of functionality or defence required by today’s digital enterprises.

    The market is ready for a shift – the shift to Edge 2.0.

    Join us for this session to learn how new platforms will allow you to build the edge architecture of the future. We will cover the following key aspects:

    • Security-first: Security must be a fundamental aspect of an edge platform, not just an add-on

    • App-driven: The needs of the apps must define the edge, rather than the apps fitting the constraints of the edge

    • Unlimited scalability: The edge must be software-defined and able to expand outside the boundaries of the edge provider, including public clouds and private data centers
  • 10 Questions to Ask a Bot Mitigation Manager Recorded: Sep 15 2021 62 mins
    Byron McNaught, F5 | Rob Roj, Shape Security (Part of F5)
    Businesses need to consider the broader implications of bots and automated attacks in order to reduce fraud and operational complexity while improving customer conversion and revenue. See how bot mitigation can provide a critical component of a comprehensive strategy to stop automated fraud, prevent account takeover (ATO), and preserve the customer experience to maximize revenue potential—and what questions you should ask prospective bot mitigation vendors to ensure your business succeeds in the new digital world.


    Key Learning Objectives:

    - Learn why bot mitigation vendors should be evaluated on strategic business outcomes beyond security efficacy, including the ability to reduce fraud losses and improve the customer experience

    - Understand how motivated cybercriminals evolve their attacks from simple credential stuffing to more advanced automation using Browser Automation Studio

    - See how F5 Shape solutions maintain resilience and efficacy no matter how attackers retool to bypass security countermeasures
  • Defend your financial services organization against sophisticated fraud Recorded: Sep 14 2021 62 mins
    Shehzad Shahbuddin Sales Engineer, F5 and Carl Mosby III Manager of the West Region Solutions Engineering, F5
    In financial services, keeping gross fraud loss in check is critical to the brand and the bottom line. Unfortunately, financial services institutions are lucrative targets for organized crime rings and the tools that enable cybercriminals are becoming more sophisticated and less expensive. You need the latest intelligence if you want to protect your organization.

    Join this session to learn:
    • New threats from organized crime rings related to the credential marketplace landscape.
    • Insights and evidence around how criminal organizations are increasingly reverting to manual (i.e., human-driven) fraud methods, and how to stop them.
    • The latest machine learning algorithms trained by attack profile, risk surface, and historical fraud records that specifically protect banks, credit unions, and other financial institutions.

    Register Today
  • Episode 2: Shape Defense in Action - Think Like an Attacker Series Recorded: Sep 8 2021 42 mins
    Gates Lamb, Solutions Engineer, F5
    Shape Security (Part of F5), protects web and mobile applications from fraud and abuse by answering 3 fundamental questions about the user:



    Are you human?
    Are you good or bad?
    Are you who you say you are?
    By answering these questions, Shape makes it possible to stop malicious automated attacks, identify fraudulent human activity, and reward legitimate users all in real time. Interested in seeing Shape’s defense in action? Join us for an upcoming session.



    This interactive series will cover:

    - How an attacker thinks through constructing an automated attack.
    - The tools used by attackers and how quickly an attack can be launched.
    - Things to look for to detect if there is automation present in your environment.
    - How Shape’s understanding of the user protects and enables online web and mobile applications.
  • Avoid Costly Human Errors in Financial Services Using Ansible Automation and F5 Recorded: Aug 26 2021 61 mins
    James Lee, F5 | Cameron Skidmore, Red Hat
    With pressure to move quickly while also accounting for vulnerabilities and avoiding human error, securing applications can be challenging for financial institutions. Instead of using automation to simplify tasks and reduce overhead, financial services are forced to complete those tasks manually. A mounting challenge for SecOps teams is keeping up with the sheer volume and sophistication of attacks, often requiring investigation, diagnoses, and remediation of security threats.

    In this session will review how automation, combined with telemetry, can aid security teams to mitigate most common layer 7 attacks enabling SecOps teams to investigate and resolve more sophisticated threats.

    Join this webinar to:
    - Better understand the true cost of human error in the development cycle.
    - Learn how automation of security aids is protecting financial customer assets against multiple threat vectors.
    - See a live demo showing how F5, Elastic, Red Hat Ansible Automation Platform, and Red Hat OpenShift integrate to automate certain remediation tasks in your IT environment.
  • How to Prevent Ransomware with Encrypted Threat Protection Recorded: Aug 25 2021 61 mins
    Catherine Newcomb, F5 | Jay Kelley, F5
    In recent months, ransomware has successfully halted operations of several critical infrastructures, creating significant obstructions to various sectors of the U.S. economy. According to the 2021 Application Protection report from F5 labs, ransomware was a factor in approximately 30% of U.S. breaches within the last year, up from just 6% in 2019.

    In our webinar, we'll cover why it's essential that critical infrastructure and federal contractors protect their organizations against the threat of ransomware spawned by phishing attacks and malicious web page downloads.

    Join the webinar to learn how to:

    • Protect your organization from ransomware downloaded as a malicious email attachment or link
    • Prevent ransomware spawned by web downloads from encrypted web pages
    • Detect and halt encrypted malware before it enters or exist your network
  • Lighboard Lessons from F5, DevCentral: Elliptic Curve Cryptography Overview Recorded: Aug 24 2021 12 mins
    John Wagnon, DevCentral, F5
    John Wagnon from F5, DevCentral: discusses the basics and benefits of Elliptic Curve Cryptography (ECC) in this episode of Lightboard Lessons.
  • Lighboard Lessons from F5, DevCentral: SAML Overview Recorded: Aug 24 2021 11 mins
    John Wagnon, DevCentral, F5
    Lightboard Lessons from F5 DevCentral: 10 min video

    Hear from John Wagnon from F5, who covers the basics of SAML and how F5's Access Policy Manager can act as the service and/or identity provider to federate authentication services in this episode of Lightboard Lessons.
  • Lightboard Lessons from F5, DevCentral: What is a Proxy? Recorded: Aug 24 2021 11 mins
    Peter Silva, F5
    Lightboard Lessons: Short Video (10 mins)

    Peter Silva, from F5 lights up the various types of proxies. In networking and web traffic, a proxy is a device or server that acts on behalf of other devices. It sits between two entities and performs a service. Proxies are hardware or software solutions that sit between the client and the server and do something to requests and sometimes responses.
  • Cloud Native Edge-as-a-Service: Innovation from Core to Enterprise Edge Recorded: Aug 24 2021 48 mins
    Jun Shi, RVP, Outbound Product Management, Volterra (Now Part of F5) |Grace Petrucci, Sr. Industry SMM Service Provider, F5
    Bringing cloud-native operation to modernize app delivery from mobile core to the enterprise edge.

    Mobile network operators (MNOs) are in the business of delivering ever more creative and immersive digital experiences. With the introduction of 5G, edge computing has become a vital component in driving new business models where innovation now stems from seamlessly connecting workloads across distributed environments from multiple public and private cloud providers and the edge—requiring end-to-end cloud-native operations.

    MNOs now need to support complete lifecycle management of modern applications across their entire network. This is where the simplicity to build, deploy, operate, and secure applications is a pre-requisite in architecting your network.

    In this webinar, we'll cover:
    • Deep dive into the end-to-end cloud-native operations across the entire network from the 5G core data center into the enterprise edge.
    • How to close the gap and cloudify your infrastructure and applications.
    • How to reduce TCO and increase revenue with a single platform to build, deploy, secure, and scale your network from the core to the edge.
  • OWASP Top 10: Sensitive Data Exposure Recorded: Aug 20 2021 11 mins
    John Wagnon, DevCentral, F5
    Lightboard Lessons: Episode 4: 11 mins
    The OWASP Top 10 is a list of the most common security risks on the Internet today. Sensitive Data Exposure comes in at the #3 spot in the latest edition of the OWASP Top 10. In this video, our security specialist discusses this security risk and outlines some mitigation steps to make sure your web application doesn't expose any sensitive data.

    By watching this video, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • OWASP Top 10: Broken Authentication Recorded: Aug 20 2021 11 mins
    John Wagnon, DevCentral, F5
    Lightboard Lessons (Episode 3): 11 mins
    The OWASP Top 10 is a list of the most common security risks on the Internet today. Broken Authentication comes in at the #2 spot in the latest edition of the OWASP Top 10. In this video, our security specialist discusses broken authentication and outlines some mitigation steps to make sure your web application doesn't give access to the wrong users.
  • Introduction to OWASP Top Security Risk Cross-Site Scripting (XSS) Recorded: Aug 20 2021 12 mins
    John Wagnon, Devcentral, F5
    Lightboard Lessons: Episode 2: (12 min):
    The OWASP Top 10 is a list of the most common security risks on the Internet today. Cross Site Scripting (XSS) comes in at the #7 spot in the latest edition of the OWASP Top 10. XSS flaws occur whenever an application takes untrusted data and sends it to a web browser without proper validation or escaping. XSS allows attackers to execute scripts in the victim’s browser which can hijack user sessions, deface web sites, or redirect the user to malicious sites. In this video, we discuss how Cross Site Scripting works and outline some mitigation steps to make sure your web application stays secure against this threat.

    By watching this video, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • OWASP Top 10: Injection Attacks Recorded: Aug 20 2021 9 mins
    John Wagnon, DevCentral, F5
    Lightboard Lessons (Episode 1): 9 mins
    F5 security expert discusses the details of the top vulnerability listed in this year's OWASP Top 10 Security Risks: Injection Attacks. Defending against the OWASP Top 10 is one piece of a defence-in-depth strategy that will help you ensure the confidentiality, integrity, and availability of your apps, your data, and your business. Watch the video to learn more about injection attacks and how to guard against them.

    By watching this video, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Episode 1: Shape Defense in Action: Think Like an Attacker Series Recorded: Aug 19 2021 42 mins
    Gates Lamb, Shape (Part of F5)
    Shape Security (Part of F5), protects web and mobile applications from fraud and abuse by answering 3 fundamental questions about the user:

    Are you human?
    Are you good or bad?
    Are you who you say you are?

    By answering these questions, Shape makes it possible to stop malicious automated attacks, identify fraudulent human activity, and reward legitimate users all in real time. Interested in seeing Shape’s defense in action? Join us for an upcoming session.

    This interactive series will cover:




    How an attacker thinks through constructing an automated attack.

    - The tools used by attackers and how quickly an attack can be launched.
    - Things to look for to detect if there is automation present in your environment.
    - How Shape’s understanding of the user protects and enables online web and mobile applications.
  • Building a Fraud Profile with Device ID+ Recorded: Aug 18 2021 22 mins
    Wesley Hales, F5
    Device and user identifiers are the common thread that span the entire technology stack. Organizations use them to drive fraud prevention and critical business analytics. Device ID+ is a real-time, high-precision device identifier that utilizes advanced signal collection and machine learning algorithms to assign a unique identifier to each device visiting your site.

    In this session, we’ll give you a rundown on how Device ID+ works, why it’s important, and how to use it within your application.
  • F5 Sponsored 'ISA' Webinar: How to Stay Ahead of Motivated Cyber Attackers Recorded: Aug 17 2021 63 mins
    Shehzad Shahbuddin,Sr. Solutions Engineer, F5 | Rob Roj,Security Architect,F5
    Competing for customer loyalty in a digital world is hard. To add to this challenge, leaders must defend the business from motivated adversaries who have evolved their tactics to bypass security defenses and evade detection. Any business that operates eCommerce applications or manages user accounts of value is a potential target and the consequences are significant: account takeover (ATO), fraud losses, damaged brand, and other equally disastrous scenarios.

    In this webinar join Senior Solutions Engineer Shehzad Shahbuddin and senior Security Architect Rob Roj with f5 Shape Security to find solutions for vulnerability management. Then join ISA Cybersecurity Training Instructor Bryan Singer as he goes through a few case studies and shows exposure risks.

    Key Takeaways:
    1) How attacks originate from automation.
    2) Ways attackers adapt using imitation and human fraud.
    3) Introduce practices to defeat your adversaries and protect your business from online fraud.
    4) Case Study on Vulnerability Management
Your apps—fast, available and secure—in any cloud.
At F5, our mission is based on the fact that businesses depend on apps.
Our long-standing belief that applications are the most valuable assets of any organization in the digital age has been the foundation of our strategy to become the leader in multi-cloud application services. When you combine F5 and NGINX's expertise powering over half of the world's applications across all types of environments, with Shape's insight from mitigating 1 billion application attacks per day, you have a company that knows how to deliver and secure more applications, and more value, than any company in the industry.
This means that we are able to deliver and protect applications—revenue generating, brand-anchoring applications—from the point at which they are created through to the point where consumers interact with them. In other words, from "code to customer." This makes the combined forces of F5, NGINX, and Shape absolutely essential to every digital organization in the world, including the world's largest enterprises, service providers, financial and educational institutions, government entities, and consumer brands.

Visit F5 at: https://www.f5.com/company

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: NIST Zero Trust Architecture: Not Just for Federal Agencies Anymore
  • Live at: Jul 12 2021 6:00 pm
  • Presented by: Jay Kelley, F5 | Manish Desai, F5
  • From:
Your email has been sent.
or close