Hi [[ session.user.profile.firstName ]]

How to Mitigate Application Risk

Apps have become an integral part of the modern workplace, but has the speed of app adoption compromised business security?

Learn about the primary risks to your app, including those addressed by the Top 10, and how to make the most of development resources by using WAF to do the heavy lifting for you.
Recorded Apr 23 2019 54 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Wong Onn Chee - OWASP Singapore Charter Lead and Edwin Seo - Security Evangelist, F5 Networks
Presentation preview:  How to Mitigate Application Risk

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Downtime is Not an Option - Reprioritizing DNS Nov 27 2019 5:00 am UTC 38 mins
    Roger Barlow, Principal Product Manager F5 Networks & Keiichiro Nozaki, Senior Marketing Evangelist APAC, F5 Networks
    Domain Name Server (DNS) is an under-valued necessity for application delivery. It’s treated as a “set it and forget it” technology and people fail to consider the impact of an outage.

    In this webinar we’re going to reprioritize DNS by outlining some simple options for built-in failover, discussing the new role of applications developers play in DNS deployment, and helping you put protections in place for your applications.

    We’ll also review:

    - The biggest DNS outages and their impact
    - The most common DNS mistakes
    - Best practices for a successful, secure deployment
  • How to manage encryption while keeping new privacy policies Nov 13 2019 5:00 am UTC 44 mins
    Edwin Seo, Regional Systems Engineering Director, ASEAN, F5 Networks
    Phishing attacks are increasing in volume and sophistication every day. Attackers are also increasingly leveraging encryption certificates to bypass traditional inspection tools.

    Enterprises now have to consider new regulations such as General Data Protection Regulation (GDPR) to protect user data and privacy. With TLS (Transport Layer Security) 1.3 adoption - this mandate makes it much harder for enterprises to passively monitor traffic to inspect for malware, data breaches and malicious activity as well as troubleshoot performance problems. How do you balance privacy concerns and security needs given the privacy laws?

    Find out how F5’s SSL Orchestrator can help you manage encryption while complying with new regulations.

    In this session, you will learn:

    - The current regulations in place in Asia
    - How companies attempt to address the regulations
    - Recommended solutions
    - Demo: Demonstrate how F5 SSLO works and its benefits
  • Learn how to detect and block threats hidden in SSL streams Oct 30 2019 5:00 am UTC 37 mins
    Shain Singh, Solution Architect, F5 Networks & Shashwath Hegde, Solution Architect, FireEye
    Encryption is a fast-moving trend. Today, more than 65% of global web traffic is encrypted, and that number is growing exponentially. While this has enabled much greater privacy and help prevent data breaches, cyber criminals are using these encrypted channels to propagate malware and exfiltrate data knowing they can bypass traditional security inspection solutions that don’t decrypt traffic.

    Join this webinar to learn how F5 and FireEye can help you:

    - Implement advanced threat protection with greater performance and availability
    - Build a scalable architecture to easily protect from cyber threats and stop attacks
    - Increase visibility into encrypted traffic with threat intelligence, forensics, and analytics
  • How to increase CI/CD velocity through automation integration Recorded: Oct 16 2019 39 mins
    Scott van Kalken - Systems Engineer, F5
    CI/CD (Continuous Integration/Continuous Delivery) bridges the gap between development and operations teams by automating the building, testing and deployment of applications. It’s the overarching model for improving speed to delivery; the backbone of modern DevOps environment. With automation in place, developers can push changes more frequently while operations teams see greater stability.

    In the final installment of the “Automation & Orchestration” webinar series, learn how to tie everything you have learned to deploy and configure your F5 BIG-IP using a CI/CD tool like Gitlab CI or Jenkins.

    Find out how you can automate the steps in your software delivery process while ensuring that your apps are protected, available, and optimized.

    In this session, you will learn:

    - What is CI/CD and why it matters
    - F5 Automation & Orchestration Toolchain
  • How to simplify and speed deployment through automation Recorded: Sep 25 2019 36 mins
    Scott van Kalken - Systems Engineer, F5
    With automation and orchestration being so important to the success of the enterprise, the pressure is on NetOps to deliver self-service provisioning and adopt configuration- and infrastructure-as code methodologies. Organizations look to developers and DevOps groups to lead the way in standardizing on tools and cross-functional team structures that enable faster development, deployment, and delivery of applications.

    Take your automation game to the next level – learn how to deploy application services using Application Service Extension 3 (AS3) on F5 BIG-IP.

    In this session, you will learn:

    - What is Infrastructure as code and why does it matter
    - How Infrastructure as Code can simplify and accelerate your infrastructure provisioning processes and comply with policies
    - Infrastructure as code using Application Service Extension 3 (AS3)
  • DevSecOps - Web Application Firewall in a CI/CD Workflow Recorded: Jun 25 2019 60 mins
    Presenter: Clive Chan, Senior Consultant, F5 Networks. Moderator: Otto Lee, CISSP, CSSLP, Membership Chair, (ISC)²
    IT automation and orchestration, the key enabler of digitization is the number one IT initiate globally according to our state of application services report 2019. In addition, Zero Trust and Security-By-Design are key imperatives of organizations pursuing digital transformation as these organizations accelerate adoption of cloud technologies to gain speed, scale and accessibility to innovative technologies like AI and blockchains.

    In this webinar, we will look at the changing landscape of DevOps. We will explore the practice of scaling application security, controlling vulnerabilities and controlling advanced threats with the web application firewall in CI/CD environments. We will also take a look at how the technologies enable close collaboration between security teams and development teams on securing APPs without requiring application teams having in-depth knowledge of security.

    *This webinar will be conducted in Cantonese. (本次網上研討會將以粵語進行。)
  • Fight the Good Fight Against the Bad Bots Recorded: Jun 18 2019 60 mins
    Presenter: Shahnawaz Backer, Security Specialist, APAC, F5 Networks.Moderator: Chuan-Wei Hoo, CISSP, Technical Advisor, Asia-
    Identifying malicious bots and safeguarding against them is a top priority for organisations developing a sustainable security strategy.

    Attend this webinar to learn:
    • How bots infect, propagate, and attack applications
    • What types of application attacks are commonly performed by bots
    • How you can defend against bad bots without disrupting the good ones
  • How to Accelerate Application Deployment Recorded: Jun 11 2019 54 mins
    Nicholas Chia - Senior Principal Technical Product Manager, Red Hat and Shain Singh - Security Architect, F5 Networks
    To make application deployment more efficient and predictable, IT organisations are moving towards automation and orchestration. With the advent of DevOps, IT teams are under growing pressure to automate every part of the stack to continue accelerating application delivery. F5 and Ansible have partnered to provide a compelling solution that helps you quickly and reliably deploy secure applications in today’s multi-cloud infrastructures.
  • How to Prepare Your Data Centre For A Digital Makeover Recorded: Jun 4 2019 52 mins
    Cindy Borovick - Business Intelligence Director and Henry Tam - Senior Product Marketing Manager. F5 Networks.
    It seems like every organization, including yours, is exploring or adopting a digital transformation initiative. While the motives may differ, from delivering new digital customer experiences to supply chain streamlining, there is the expectation that IT optimization will result.

    To make that happen, it is important that IT has a seat at the digital table. But before you take your place, you’ll need a solid understanding of the digital transformation forces at play and a strategy that keeps your IT team and your business aligned.

    Attend this webinar to learn more about:
    - How new technologies and solutions are being used to change the way businesses develop, deploy and deliver applications
    - How to manage cloud adoption that offers flexibility and scale while keeping security top of mind
    - How a new approach to per-app services better enables your organization to respond to your application teams
  • How to Gain Visibility Into Encrypted Threats Recorded: May 28 2019 48 mins
    Shain Singh - Security Architect, F5 Networks

    Encrypting data-in-transit with SSL/TLS is standard practice among organisations today. Important security initiatives, such as built-in web browser warnings and stronger legislative GDPR changes, have significantly improved privacy awareness and helped to prevent data breaches. However, cybercriminals commonly hide threats within encrypted payloads and use encrypted channels to propagate malware and exfiltrate data, knowing they can bypass traditional security inspection solutions.

    Join us for this webinar to learn about:
    - Challenges with encrypted traffic and risks to businesses
    - How to efficiently decrypt and orchestrate traffic to reduce latency
    - How to intelligently manage decryption and re-encryption across your entire security inspection solutions (IPS, NGFW, DLP, WAF, Anti-Malware, etc.)
  • How to Maximize Your API Security Recorded: May 14 2019 39 mins
    Shahnawaz Backer - Security Specialist, F5 Networks
    Web applications have had a dramatic impact on the modern work setting, including organisational dependence on widely accepted apps.

    With modern applications being powered by Application Programming Interface (APIs), APIs represent a great opportunity for companies to integrate applications quickly and easily. But, APIs can be a double-edged sword: promising agility, while at the same time increasing the potential for risks.
    Due to this, security has never been more essential as we have thousands of applications making API calls. Join this session to learn how to maximize your organisations API security, including:
    - Secure access to API’s with industry standard protocols as OAuth2.0
    - Validate the content and look for hidden threats in the payload
    - Rate limit the access to APIs at Layer 7
    - Stop bad bots while letting the legitimate mobile applications in
  • Proactive Protection Against Web Application Attacks Recorded: May 7 2019 53 mins
    Sudarshan Sivaperumal - Solution Architect, F5 Networks.
    Web application attacks are the number one source of data breaches and the number and frequency of attacks are continuing to increase.

    A Web Application Firewall (WAF) is designed to provide critical security controls to protect web apps. However, not all WAF solutions are created the same or provide the same level of security to an organisation. While many can help an organisation protect their apps from common and known threats, most are inadequate against the myriad of attacks across the evolving risk landscape.

    Join this webinar to learn:
    - Provide strong, adaptable security for every app, whether on-premises or in the cloud
    - Defend web and mobile apps against malicious bots and exploits
    - How WAF can optimize and filter unwanted traffic to help you cut costs in the cloud.Prevent account takeover and stop large scale credential theft and abuse
    - Protect apps from layer 7 denial of service attacks
  • How to Mitigate Application Risk Recorded: Apr 23 2019 54 mins
    Wong Onn Chee - OWASP Singapore Charter Lead and Edwin Seo - Security Evangelist, F5 Networks
    Apps have become an integral part of the modern workplace, but has the speed of app adoption compromised business security?

    Learn about the primary risks to your app, including those addressed by the Top 10, and how to make the most of development resources by using WAF to do the heavy lifting for you.
With 20+ years of application service experience, F5 provides the broadest set of services and security for enterprise-grade apps, whether on-premises or across any multi-cloud environment.

F5 Networks APAC hosts a new webinar every month around cloud and security topics, so do stay tuned to this channel to get the latest information!

Follow @F5NetworksAPJ on Twitter for more information.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to Mitigate Application Risk
  • Live at: Apr 23 2019 5:00 am
  • Presented by: Wong Onn Chee - OWASP Singapore Charter Lead and Edwin Seo - Security Evangelist, F5 Networks
  • From:
Your email has been sent.
or close