Hi [[ session.user.profile.firstName ]]

Why your Security Operations Team needs Advanced Threat Intelligence

The Akamai platform scale and depth is immense, but why is that important?

Up to 30% of the total web traffic today is on the Akamai platform, over 50% of the world’s recursive DNS queries are resolved by Akamai (2.2 trillion queries daily). This unprecedented visibility provides insights into DNS and IP traffic that inform our customers’ Security Operations teams.

Akamai’s threat research team has developed a security stack based primarily off of our proprietary algorithms to detect real, current & accurate threats stemming from Akamai’s Carrier grade Recursive DNS and Web Proxy networks.

Akamai’s Enterprise Threat Intelligence is a platform that allows organizations’ Threat Intelligence and Security Operations to directly query Akamai’s Domain, URL and Hash risk severity via open API and automatic integration via MISP.

Join this session to learn more about:
- The various sources of the data and how this intelligence can be used by Security Operations teams
- Some of the major threats that we’ve been able to identify
- The mitigation techniques that customers could leverage from Akamai’s Enterprise Security offering
- How this intelligence is being leveraged by our customers
Recorded Sep 9 2021 64 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Nicholas Hawkins, Director Security Technology, Akamai & Strategy
Presentation preview: Why your Security Operations Team needs Advanced Threat Intelligence
  • Channel
  • Channel profile
  • 脅威分析ウェビナー特別編 with カーボンブラック~脅威インテリジェンス観点の最新セキュリティ動向~ Recorded: Oct 12 2021 91 mins
    Makoto Murata, Toshiya Ando, Haru Kaneko - Akamai | Tadao Nakayama- VMware
    今年から始まった人気の「脅威分析ウェビナー」シリーズ。
    7回目となる今回は、VMware社カーボンブラックチームのセキュリティエキスパート 中山 忠夫氏を招いた特別編としてお届けします。
    本セミナーでは、直近の脅威動向と、それに対する脅威インテリジェンスを活用した保護、そしてアカマイのゼロトラスト・セキュリティにおけるVMware社カーボンブラックとの連携についてご紹介します。
    ぜひご視聴ください。
  • 脅威分析ウェビナー:MFAバイパスとパスワードレスの未来 Recorded: Sep 16 2021 67 mins
    アジェイ・ミスラ - セキュリティストラテジー ディレクター | 金子 春信 - シニアプロダクト マーケティングマネージャー
    今年から始まった人気の「脅威分析ウェビナー」シリーズ。
    今回で6回目となる今回は、認証サービスに関連する脅威分析を行います。

    近年、標的型ランサムウェア、VPN脆弱性への攻撃、サプライチェーン攻撃など、コロナ災害によって混乱し、変化するビジネスやライフスタイルで多くのセキュリティケースが確認されています。
    そのため、アカマイは脅威分析セミナーを随時開催しており、現在の脅威の傾向を理解し、将来のセキュリティを検討するのに役立ちます。

    このセミナーでは、ランサムウェアを中心とした最新の脅威動向を紹介し、認証バイパス手法とアカマイの認証強化への取り組みについて詳しく説明します。
  • Dissecting Client-Side Attack Techniques and Their Protections Recorded: Sep 15 2021 35 mins
    Tim Wong, Sr. Solutions Engineer, Akamai Technologies
    Hackers are leveraging client-side attack techniques, also known as man-in-the-browser (MITB) attacks, to intercept and control client browsers, exfiltrate data, and disrupt the end-user experience.

    In this talk, we will analyse several sophisticated client-side attack techniques that hackers are using to achieve maximum return on investment.

    Protecting these attacks can be difficult; we will discuss several best practices that organisations can use to protect their end-users and data against these attacks.
  • Why your Security Operations Team needs Advanced Threat Intelligence Recorded: Sep 9 2021 64 mins
    Nicholas Hawkins, Director Security Technology, Akamai & Strategy
    The Akamai platform scale and depth is immense, but why is that important?

    Up to 30% of the total web traffic today is on the Akamai platform, over 50% of the world’s recursive DNS queries are resolved by Akamai (2.2 trillion queries daily). This unprecedented visibility provides insights into DNS and IP traffic that inform our customers’ Security Operations teams.

    Akamai’s threat research team has developed a security stack based primarily off of our proprietary algorithms to detect real, current & accurate threats stemming from Akamai’s Carrier grade Recursive DNS and Web Proxy networks.

    Akamai’s Enterprise Threat Intelligence is a platform that allows organizations’ Threat Intelligence and Security Operations to directly query Akamai’s Domain, URL and Hash risk severity via open API and automatic integration via MISP.

    Join this session to learn more about:
    - The various sources of the data and how this intelligence can be used by Security Operations teams
    - Some of the major threats that we’ve been able to identify
    - The mitigation techniques that customers could leverage from Akamai’s Enterprise Security offering
    - How this intelligence is being leveraged by our customers
  • How to Phish-proof your Multi-Factor Authentication Recorded: Sep 7 2021 71 mins
    Jano Van Deventer, Senior Solutions Engineers & Johnny Yeo, Senior Cloud Security Architect, APJ
    80% of security breaches involve compromised credentials and while password hygiene is culpable in part, even complex, indecipherable passwords developed by algorithms can be problematic. A recent dark web audit revealed 15 billion stolen logins from 100,000 breaches. MFA has been seen as a ‘silver bullet’ against compromised credentials- but is it really?

    With the corporate network perimeter becoming a faint memory as a result of the global pandemic, the pressure to protect against breaches is mounting. Employees working outside the corporate network perimeter are exposed to multiple authentication attack vectors such as credential stuffing, password spray and other brute-force mechanisms, local discovery and insider efforts, phishing and social engineering, keystroke logging, malicious proxy and reply campaigns. While MFA has steadily grown popular, it is still a form of perimeter security – which doesn’t solve for today’s ‘work from anywhere’ workforce.

    Join this session for a walkthrough of Akamai’s next gen Phish-proof MFA service at the Edge
    and to learn more about:
    - How today’s standard push MFA services work and how attackers can bypass these
    - How the FIDO2 standard prevents MFA bypass attacks – a Phish-proof MFA
  • How Zero Trust Network access improves business outcomes Recorded: Sep 3 2021 77 mins
    Fernando Serto, Director Security Technology & Strategy, Akamai
    Zero Trust is not a ‘trend’ - it’s here to stay. As enterprises and, in turn, employees, shifted to working from anywhere over the last 18 months, the fundamental definition of the enterprise perimeter was put to the test and the pace of Zero Trust Network Access (ZTNA) deployment accelerated rapidly. While the pandemic may have pushed deployment forward, this shift was bound to happen – not if but when.

    According to Gartner, Zero Trust Network Access improves the flexibility, agility, and scalability of application access, enabling digital businesses to thrive without exposing internal applications directly to the internet, reducing risk of attack.

    As part of this session, you’ll be able to take advantage of a brief walkthrough of an Akamai technical setup for securing internal applications.

    Join this session to hear our key takeaways from Zero Trust Network Access deployments globally and learn the following:
    - Why the traditional castle-and-moat security perimeters are not the way forward in securing your workforce and internal applications
    - What the key drivers that have propelled Zero Trust Network Access adoption for other organizations are
    - How your WAF, corporate applications, and support tools need to be assessed and setup while leveraging a cloud-based identity aware proxy like Zero Trust Network Access
  • Dissecting Recent Ransomware Attacks & DNS Security with a Live Demonstration Recorded: Sep 1 2021 93 mins
    Ajay Mishra, Director Security Technology, Akamai & Strategy
    DNS is a standard and necessary technology in today’s world, and is the most basic requirement to do business online. DNS services are frequently targeted by criminals because of their critical nature and this can cause damage to websites, web applications, users and the network.

    When your DNS is compromised, your brand is too.

    Criminals today leverage DNS vulnerabilities to launch increasingly sophisticated & frequent Phishing attacks which can have severe impacts on organisations. In order to stay ahead of cyber criminals, organisations must ensure they are aware of the evolution of such attack vectors, and what countermeasures are available.

    As part of this session, you’ll be able to experience a live demonstration of how attackers are using advanced phishing methods with real-life examples of recently deployed hacking methods and how you can be better prepared to handle such threats.

    Join this session to learn:
    - Why the core of your security strategy needs to start with holistic DNS security – Authoritative and Recursive DNS
    - The top considerations to address in your existing or future DNS implementations and service provider
    - How attackers are using advanced phishing methods and how your organization can be better prepared to handle such threats.
  • Live Tech Workshop | The Path to Passwordless: Phish-proof MFA Recorded: Jul 15 2021 50 mins
    Jano Van Deventer, Senior Solutions Engineers & Johnny Yeo, Senior Cloud Security Architect, APJ
    Multi-factor Authentication (MFA) can dramatically improve the security for workforce logins and minimizes the risk of employee accounts being compromised. But, not all MFA solutions are equal and now attackers are targeting inherent weaknesses in some MFA services to successfully take over employee accounts.

    In this workshop you will learn:

    - How today’s standard push MFA services work and how attackers can bypass these
    - Understand what industry standards have been developed to close these security gaps
    - How these standards prevent MFA bypass attacks
    - What the admin and end user experience looks like for Akamai’s new phish-proof MFA service
  • Live Tech Workshop: Breaking Down the Cloud Firewall Recorded: Jul 7 2021 46 mins
    Sarah Lim & Boon Wah Tay, Senior Solutions Engineers, Akamai
    On-prem, hybrid, or cloud? Whatever the flavor of application deployment you prefer, a cloud WAF gives you scale, flexibility, and reliability by extending your security perimeter to the edge. The edge is where your users and threat actors operate and where you want to secure your applications to keep the bad actors at bay.

    In this workshop, you will learn about:
    • The cloud WAF
    • WAF management options: manual vs. automatic
    • What to look for when choosing a WAF
    • A behind-the-scenes look at Akamai’s WAF

    Join our Akamai solution engineers for an interactive deep dive on cloud WAF.
  • 脅威分析ウェビナー:Webブラウザーへの攻撃総分析と有効な対策の検証 Recorded: Jul 5 2021 88 mins
    アジャイミシュラ-セキュリティ戦略ディレクター、中西和弘-製品マーケティングマネージャー
    <好評の脅威分析ウェビナー第5回目!>
    現在のWeb攻撃のアタックサーフェスは、これまでのサーバーサイドだけでなくクライアントサイドに拡大しています。リアルタイムでの発見が難しく、個人情報や機密情報の窃取、不正送金などの被害を引き起こしているWebスキミングやマン・イン・ザ・ブラウザ(MITB)攻撃などの、「クライアントサイド」攻撃の最新実態を、攻撃のライブデモ、Akamaiが検知した実際の高度な攻撃例の解説を交えて明らかにし、対策の有効性を検証します。
  • State of the Internet / Security: Phishing for Finance Recorded: Jun 16 2021 36 mins
    Siddharth Deshpande, Director, Security Strategy, APJ
    It was another record-breaking year for cyberattacks against the financial industry. Credential stuffing attacks were up 45%, while SQL Injection and Local File Inclusion were the most common web attacks. Along with an overall increase in incidents, 2020 saw new daily peaks, with attacks reaching 63 million attacks in one day in November. And we witnessed the rise of phishing kits, which introduced a whole new approach for hackers to take. In our latest report, we team up with WMC Global to bring you a complete, in-depth look at the current state of cyberthreats against FinServ businesses.

    Join Sid Deshpande, Director of Security Strategy, APJ, for this live webinar on the latest trends and key insights from the State of the Internet / Security: Phishing for Finance report.
  • 「SaaSへの侵入から自社を守れー新製品Akamai MFAご紹介ー」のご案内 Recorded: May 28 2021 40 mins
    金子晴信-シニアプロダクトマーケティングマネージャー
    本セミナーでは、企業セキュリティ検討に役立つ多要素認証の情報をお届けします。

    昨今のパンデミック対策下の働き方では、テレワーク、ビデオ会議をはじめとするインターネット利用が標準です。同時にセキュリティの懸念も大きく取り沙汰される様になりました。そこで、SaaSやWebサービスなどの企業システムにおいて入口にあたる「ログイン認証」は、セキュリティの最重要要素の一つですが、方式として脆弱な「パスワード認証」が今も広く使われています。

    アカマイは、ゼロトラスト・セキュリティにおける考慮事項である多要素認証を実現するクラウドサービス「Akamai MFA」を発売しました。これは、スマートフォンを利用したユーザーフレンドリーな多要素認証を企業のシステムに容易に展開出来るソリューションです。利用者にとって操作は簡単でありながら、「フィッシング対抗」という強固なセキュリティ機構を実装した革新的な製品です。

    本セミナーでは、認証における課題を整理し、新製品Akamai MFAをご紹介します。ぜひご参加ください。
  • 「脅威分析ウェビナー:セキュリティエキスパートによるマルウェア超解析とゼロトラストセキュリティ」 Recorded: Apr 21 2021 90 mins
    アジェイ・ミスラ - セキュリティストラテジー ディレクター | 金子 春信 - シニアプロダクト マーケティングマネージャー
    <好評の脅威分析ウェビナー第4弾!>
    昨年2020年は、VPNの脆弱性への攻撃、多重脅迫型ランサムウェア、Emotetの進化、サプライチェーン攻撃などコロナ禍で混乱・変容する業務・生活様式のなか、数多くのセキュリテイ事案が確認されました。地政学的な軋轢も踏まえ、そのリスクは2021年以降も、さらなる注視が必要な状況であります。

    今回のウェビナーでは、引き続き猛威を振るうランサムウェアや標的型攻撃にも使われるマルウェアをリバースエンジニアリングすることでその攻撃手法を理解し、対策についても検討します。
    アカマイのセキュリティエキスパートによる攻撃手法デモやゼロトラストセキュリティの紹介も含めて、脅威対策に役立つ情報をお伝えします。ぜひご参加ください。
  • 脅威分析ウェビナー:Web脆弱性への攻撃総分析と対策 Recorded: Apr 9 2021 90 mins
    アジャイミシュラ-セキュリティ戦略ディレクター、中西和弘-製品マーケティングマネージャー
    新しい日常の中で、非対面でも収益を上げるWeb・モバイルアプリを活用したビジネス基盤が重要さを増しています。そこでアカマイでは、それらの脆弱性対策を改めて考える視座を、2020-2021年の攻撃の動向を踏まえて整理し、提供したいと考えております。

    インターネットで日々大量のデータを中継するAkamaiが集積した、悪意ある攻撃トラフィックの蓄積・分析を通じて、Akamai Cloud Security Intelligenceと呼ぶデータベースを構築しております。また、セキュリテイ製品のエンジンに利用するとともに、高いスキルを持ったスペシャリストが世界で起きている攻撃を直接見ることで、お客様に知見を提供しています。
    今回のWebセミナーでは、Webやスマートフォンアプリケーションについて、Akamai Cloud Security Intelligenceが捉えた攻撃の最新動向を交えて解説するとともに、この種の攻撃手法の進化、そして対策側で検討すべき最新の戦略を詳細に解説します。
    ぜひご参加ください。
  • DDoS Briefing: Can DDoS Attacks Be Stopped in Zero Seconds? Recorded: Apr 9 2021 56 mins
    Aseem Ahmed, Sr Product Manager, Cloud Security & Liam Farley, Sr Cloud Security Architect | Akamai Technologies
    Last year marked a comeback for DDoS attacks. Akamai saw a huge increase in DDoS attack activity with over 1800 DDoS attacks mitigated in Q4 2020, up 40% year on year. To keep business-critical assets up and running, organisations need access to proactive mitigation controls and a world-class global SOC.

    Join Akamai security experts Liam Farley and Aseem Ahmed for an interactive briefing on DDoS mitigation. They’ll share insights about the latest attack campaigns before diving into the details of how our platform, people, processes and defensive technologies can work together to protect your business.

    During this briefing, you will:

    • Understand multi-vector DDoS attack patterns, including recent extortion campaigns
    • Learn how Akamai delivers on its Zero-second DDoS mitigation SLA
    • Review reference architectures for multi-layered DDoS protection
    • Receive specific advice on how to strengthen your current DDoS protections
  • Deliver A Secure Customer Experience and Strengthen Digital Trust Recorded: Mar 26 2021 60 mins
    Scott Dinsdale, John Batistich, Frank De Sa & Dominic Lovell
    Optimised digital properties are more make or break to a retailer’s financial performance than ever. Some retailers are fortunate because online demand for their goods and services has surged during the pandemic and will remain at elevated levels. Others have to deal with big fluctuations of site traffic and engagement depending on evolving Covid-19 restrictions.

    Many need to develop increasingly integrated omni-channel experiences. There’s a wide range of circumstances, but all retailers share the common challenges of far greater complexity and expanded cyber risk.

    This virtual briefing will help retailers understand how to streamline digital engagements and safeguard their online business.

    The industry panel will cover a wide range of topics, including:
    - How are retailers adapting to evolving consumer behaviours and digital expectations?
    - What do they see as the critical components of a superior customer experience?
    - How are they mitigating the evolving cyber risks they face?
    - How do leading retailers decide how to allocate their finite resources to have the biggest impact to their business?

    Following the industry panel, Dominic Lovell will share technical advice and best practices for:
    - Streamlining customer acquisition and engagement
    - Protecting websites, apps and infrastructure from damaging cyber attacks
    - Stopping malicious bots and fraud
    - Increasing digital trust by protecting confidential data and IT systems
  • Building Trust – Aligning to changing security goal posts Recorded: Mar 25 2021 48 mins
    L.S Subramanian, Aseem Ahmed, K.M Reddy, Piyush Chawla, Sanjay Tiwari, Akhil Verma, R Vijay
    Akamai's Aseem Ahmed chats with security leaders from the top BFSI organizations on their security priorities
  • Accelerate your shift to Digital Business – Trends for South-East Asia Recorded: Mar 25 2021 55 mins
    Achim Granzen, Principal Analyst, Forrester & Sid Deshpande, Director of Security Strategy, Akamai Technologies
    2021 will be the year that every company in Asia Pacific doubles down on technology-driven business model innovation and accelerates their journey to becoming a digital business. Asia Pacific is finally entering a decade of a digitally leveled playing field in which firms in the region will be on par with or even exceed the rest of the world in terms of technology-driven business model innovation.

    Forrester Principal Analyst Achim Granzen highlights trends for 2021 for cloud, digital transformation, automation and security, and discusses with Sid Deshpande of Akamai Technologies why organizations in South East Asia growth markets must make investments now to accelerate their digital transformation in 2021.
  • 脅威分析ウェビナー:VPN脆弱性を狙う社内ネットワーク侵入の解析と対策 Recorded: Mar 12 2021 86 mins
    Akamai Technologies
    2020年は、VPNの脆弱性への攻撃、多重脅迫型ランサムウェア、Emotetの進化、
    サプライチェーン攻撃などコロナ禍で混乱・変容する業務・生活様式のなか、
    数多くのセキュリティ事案が確認されました。地政学的な軋轢も踏まえ、
    そのリスクは、2021年以降も、さらなる注視が必要な状況であります。

    そこでアカマイは、今後のセキュリティ検討に役立つ、脅威分析セミナーを
    開催する運びとなりました。
    今回のセミナーでは、昨年猛威をふるったVPN脆弱性をついた攻撃のリスク、
    手法とその対策について分析します。
    アカマイのセキュリティエキスパートによる攻撃手法デモも含めて、
    脅威対策に役立つ情報をお伝えします。

    ゲストとして伊藤忠テクノソリューションズ株式会社から
    エキスパートエンジニアである大元 隆志氏をお呼びして、
    一連のVPN製品脆弱性に対する洞察についてもお話頂きます。
    ぜひご参加ください。

    開催概要
    1.日時:2021年3月12日(金) 10:30 - 11:55
    2.開催方式:ウェビナー
    3.対象:情報システム担当者、セキュリティ担当者
    4.受講料:無料
    5.主催:アカマイ・テクノロジーズ合同会社

    [プログラム]

    10:30 - 11:00
    VPN製品に相次いだ脆弱性。脆弱性の悪用を許してしまった3つの問題点

    伊藤忠テクノソリューションズ株式会社
    エキスパートエンジニア
    CISA・国士館大学非常勤講師
    大元 隆志 氏

    11:00 - 11:30
    VPN脆弱性をついたネットワーク侵入手法デモ

    アカマイ・テクノロジーズ合同会社
    セキュリティストラテジー ディレクター
    アジェイ・ミスラ

    11:30 - 11:45
    ネットワーク侵害を排除、ゼロトラストアクセスソリューション

    アカマイ・テクノロジーズ合同会社
    シニアプロダクトマーケティングマネージャー
    金子春信

    11:45 - 11:55
    Q&A
  • 脅威分析ウェビナー:セキュリティエキスパートによるフィッシング手法総分析と対策 Recorded: Feb 26 2021 70 mins
    アジェイ・ミスラ -セキュリティ戦略ディレクター|
    2020年は、VPNの脆弱性への攻撃、多重脅迫型ランサムウェア、Emotetの進化、
    サプライチェーン攻撃などコロナ禍で混乱・変容する業務・生活様式のなか、
    数多くのセキュリテイ事案が確認されました。
    地政学的な軋轢も踏まえ、そのリスクは2021年以降も、さらなる注視が
    必要な状況であります。
    そこでアカマイは、今後のセキュリティ検討に役立つ、脅威分析セミナーを
    開催する運びとなりました。
    悪意ある攻撃トラフィックの蓄積・分析を通じ、対策を講じるアカマイ
    のCSI(Cloud Security Intelligence)。
    その知見を元に、マルウェア、ランサムウェア、フィッシング、DNS データ窃盗、
    高度なゼロデイ攻撃など、標的型脅威にフォーカスを当て、各種脅威についての
    深い分析をお伝えします。
    ぜひご参加ください。
Discover the latest talks and webinars with Akamai expert perspectives
Akamai secures and delivers digital experiences for the world’s largest companies. Our intelligent edge platform keeps apps and experiences closer to users — and attacks and threats far away. Top brands globally rely on Akamai so their businesses can be fast, smart, and secure.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Why your Security Operations Team needs Advanced Threat Intelligence
  • Live at: Sep 9 2021 3:30 am
  • Presented by: Nicholas Hawkins, Director Security Technology, Akamai & Strategy
  • From:
Your email has been sent.
or close