Defining Security Posture in a Zero Trust World

Logo
Presented by

Nick Hawkins, Senior Director, Product Management, Enterprise; Johnny Yeo, Senior Enterprise Security Architect, Akamai

About this talk

It is generally agreed that there are three key pillars of a zero trust approach - Access, Identity and Posture. In previous webinars we have explored how an identity driven approach can be used with a cloud proxy to better secure access to internal applications. In the first part of this webinar we will dive deeper into the third pillar – posture- understand what it means to a user and their devices and see how it can be integrated into a zero trust architecture. The second part will look at the mitigation aspect of posture. We’ll cover the API attack trends – how attacks are moving from web into API with the explosive growth of apps – and the lifecycle of credential fraud. Join Akamai Technologies and (ISC)² on May 22 to learn how to define security posture in a zero trust world. Presenter: Nick Hawkins, Senior Director, Product Management, Enterprise, Akamai Technologies Presenter: Johnny Yeo, Senior Enterprise Security Architect, Akamai Technologies Moderator: Kawin Boonyapredee, CISSP, Executive Security Advisor, IBM Security
Related topics:

More from this channel

Upcoming talks (6)
On-demand talks (215)
Subscribers (12201)
Leading companies worldwide choose Akamai to build, deliver, and secure their digital experiences — helping billions of people live, work, and play every day. Akamai Connected Cloud, a massively distributed edge and cloud platform, puts apps and experiences closer to users and keeps threats farther away. Learn more about Akamai’s cloud computing, security, and content delivery solutions.