Hi [[ session.user.profile.firstName ]]

Defending every application in a multi-cloud world

In a digital transformation world, your applications ARE your business. That’s where you interact with your customers, where you deliver value, and where your experiences differentiate your business. The problem is, the bad guys know that too. That’s why we are seeing an escalating war on web and mobile apps across every vertical in every market.

F5 and Shape have joined forces to defend EVERY app from attack, with a comprehensive application security portfolio, powered by a proven AI/ML engine, to slash fraud and abuse, prevents reputational damage, and eliminate business disruptions.

Join us for this informative webinar on the future of application security.
Recorded May 27 2020 31 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Joel Moses, Office of the CTO & Shuman Ghosemajumder, Global Head of AI, F5
Presentation preview: Defending every application in a multi-cloud world

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • 5G Opportunities and Challenges for Infrastructure Modernization Aug 18 2021 3:30 am UTC 47 mins
    Shain Singh, Cloud/5G Security Architect, F5 and Dan Bieler, Principal Analyst, Forrester Research
    5G will play a key role to businesses seeking to address the growing customer demand for low-latency and very-high bandwidth product features and service experiences. But 5G requires a new approach to the design and operations of network infrastructures. 5G success depends on specific use-case-based network infrastructure design – and therefore on outcome-based metrics; business service levels; and support for specific stakeholders.

    Join experts from F5 and guest speaker Forrester in this 45-min webinar session to explore ways to help enterprise and tech vendors to prepare for the 5G impact and to modernize their network infrastructure.
  • Tools and Techniques used in Automated Threats Aug 4 2021 3:30 am UTC 64 mins
    Shain Singh, Cloud Security Lead, F5 and Benjamin Francis, Fraud Specialist, Shape Security F5
    The use of automation and bots for attacks have been around from the earliest days of OWASP and web application firewalls. What has changed over the years is the increased exposure to these threats with the increasing use of public clouds and explosion of applications. Malicious actors have also evolved into more sophisticated adversaries as there is a growing financial gain from successful breaches.

    Learn from our industry experts on the common tools used to bypass common mitigation techniques, as well as how the OWASP Automated Threat list can be implemented for a comprehensive defense strategy.
  • Surviving the World of Digital Fraud Recorded: Jul 21 2021 44 mins
    Shahnawaz Backer, Principal Security Advisor, F5 and Vaibhav Khandelwal, Fraud Solutions, Shape Security, F5
    As more transactions are moving online, fraudsters are finding ways to game the system and illegally monetize legitimate business processes. According to a recent 451 Research report, the business impacts of online fraud can cause a ripple effect across the business—from losses and missed revenue opportunities to damaged trust that can cripple operations.

    In this session our experts from F5 Labs and Shape Security will cover tools and tactics leveraged by fraudsters to illegally monetize businesses. There will be in-depth coverage of techniques such as Account Take Over, Collusion Fraud, along with what it takes to build a robust defense mechanism to combat digital fraud, mitigate risk and maximize business outcomes.
  • How to Modernize your Application Strategy in a COVID-era Recorded: Jul 7 2021 48 mins
    Cindy Borovick, Market and Competitive Strategy Lead, F5 and Keiichiro Nozaki, Senior Marketing Evangelist, APCJ, F5
    Applications are so central to how we live, work, and interact that the technologies used to deliver those apps and protect application security have become essential to business growth. That’s why an application strategy is now a crucial component of any successful business strategy.

    The global COVID-19 crisis vastly accelerated digital transformation toward more automated, integrated, and AI-assisted business. The explosion in our use of digital tools—and the ramifications for managing and securing those tools—are reflected in our 2021 State of Application Strategy Report.

    Join us in this lively webinar as we dive into the report findings and highlight the significant difference we found between global and Asia Pacific when it comes to modernizing an application strategy in a COVID-era.

    Key webinar highlights include:

    - Research findings on 2021 State of Application Strategy Report
    - Key technology trends across Asia Pacific
    - Common challenges Asia Pacific organizations faced due to rapid digital transformation
  • Can a WAF be in front of every web application? Recorded: Jun 23 2021 47 mins
    Shain Singh, Cloud/5G Security Architect - APCJ Lead
    We routinely use security technologies such as firewalls to protect all of our applications, not just the most critical ones.

    Yet when it comes to web apps, there is a tendency to only deploy WAFs where absolutely necessary.

    Why is that? The list of reasons has grown over the years, including:

    ● The need to constantly tune policies instead of a set-and-forget approach
    ● A fear of generating false positives that cause user experience issues
    ● A lack of skills
    ● An inability to deploy across hybrid and container-based environments with consistent policies

    As web applications increasingly move to public clouds and container-based environments, there’s an increasingly pressing need to provide across-the-board protection.

    Fortunately, F5’s WAF isn’t stuck in the past. It’s a modern solution that is practical to deploy in front of every one of your web applications.

    Join us for a 45-minute session to learn how you can protect your organization’s online assets.
  • 5G Opportunities and Challenges for Infrastructure Modernization Recorded: Jun 17 2021 47 mins
    Shain Singh, Cloud/5G Security Architect, F5 and Dan Bieler, Principal Analyst, Forrester Research
    5G will play a key role to businesses seeking to address the growing customer demand for low-latency and very-high bandwidth product features and service experiences. But 5G requires a new approach to the design and operations of network infrastructures. 5G success depends on specific use-case-based network infrastructure design – and therefore on outcome-based metrics; business service levels; and support for specific stakeholders.

    Join experts from F5 and guest speaker Forrester in this 45-min webinar session to explore ways to help enterprise and tech vendors to prepare for the 5G impact and to modernize their network infrastructure.
  • Tools and Techniques used in Automated Threats Recorded: Jun 17 2021 64 mins
    Shain Singh, Cloud Security Lead, F5 and Benjamin Francis, Fraud Specialist, Shape Security F5
    The use of automation and bots for attacks have been around from the earliest days of OWASP and web application firewalls. What has changed over the years is the increased exposure to these threats with the increasing use of public clouds and explosion of applications. Malicious actors have also evolved into more sophisticated adversaries as there is a growing financial gain from successful breaches.

    Learn from our industry experts on the common tools used to bypass common mitigation techniques, as well as how the OWASP Automated Threat list can be implemented for a comprehensive defense strategy.
  • Surviving the World of Digital Fraud Recorded: Jun 17 2021 44 mins
    Shahnawaz Backer, Principal Security Advisor, F5 and Vaibhav Khandelwal, Fraud Solutions, Shape Security, F5
    As more transactions are moving online, fraudsters are finding ways to game the system and illegally monetize legitimate business processes. According to a recent 451 Research report, the business impacts of online fraud can cause a ripple effect across the business—from losses and missed revenue opportunities to damaged trust that can cripple operations.

    In this session our experts from F5 Labs and Shape Security will cover tools and tactics leveraged by fraudsters to illegally monetize businesses. There will be in-depth coverage of techniques such as Account Take Over, Collusion Fraud, along with what it takes to build a robust defense mechanism to combat digital fraud, mitigate risk and maximize business outcomes.
  • How to Modernize your Application Strategy in a COVID-era Recorded: Jun 17 2021 48 mins
    Cindy Borovick, Market and Competitive Strategy Lead, F5 and Keiichiro Nozaki, Senior Marketing Evangelist, APCJ, F5
    Applications are so central to how we live, work, and interact that the technologies used to deliver those apps and protect application security have become essential to business growth. That’s why an application strategy is now a crucial component of any successful business strategy.

    The global COVID-19 crisis vastly accelerated digital transformation toward more automated, integrated, and AI-assisted business. The explosion in our use of digital tools—and the ramifications for managing and securing those tools—are reflected in our 2021 State of Application Strategy Report.

    Join us in this lively webinar as we dive into the report findings and highlight the significant difference we found between global and Asia Pacific when it comes to modernizing an application strategy in a COVID-era.

    Key webinar highlights include:

    - Research findings on 2021 State of Application Strategy Report
    - Key technology trends across Asia Pacific
    - Common challenges Asia Pacific organizations faced due to rapid digital transformation
  • Banking Predictions 2021 Recorded: Jun 2 2021 55 mins
    Shahnawaz Backer, Principal Security Advisory and Zhi-Ying Barry, Senior Analyst, Digital Business Strategy, Forrester
    COVID-19 has brought uncertainty and reduced profitability to banking, and 2021 will see consolidation and lower appetites for risk. Forrester predicts many banks, traditional and digital, will bite the dust or emerge from 2021 both poorer and leaner. Join this webinar to understand which banking priorities will dominate banking execs’ agenda for 2021 and the technological transformation that will play a crucial role. The session also highlights some elements required to succeed in the transformational exercise and meet the challenges banks will face in the next phase of recovery from the pandemic.
  • Stop Fraud Without Friction: How to stay ahead of motivated attackers Recorded: May 19 2021 58 mins
    Dan Woods, VP Threat Intelligence Center, Shape Security
    Competing for customer loyalty in a digital world is hard. To add to this challenge, leaders must defend the business from motivated adversaries who have evolved their tactics to bypass security defenses and evade detection. Any business that operates e-commerce applications or manages user accounts of value is a potential target and the consequences are significant - account takeover (ATO), fraud losses, and damaged brand to name a few.

    Join us for this webinar as Dan Woods, VP Shape Threat Intelligence Center and former FBI Agent, discusses:

    - Attacker economics and the attractive ROI of cyber crime
    - Where attacks originate – automation
    - How attackers adapt – imitation and human fraud
    - How to defeat your adversaries and protect your business from online fraud
  • Can a WAF be in front of every web application? Recorded: May 4 2021 47 mins
    Shain Singh, Cloud/5G Security Architect - APCJ Lead
    We routinely use security technologies such as firewalls to protect all of our applications, not just the most critical ones.

    Yet when it comes to web apps, there is a tendency to only deploy WAFs where absolutely necessary.

    Why is that? The list of reasons has grown over the years, including:

    ● The need to constantly tune policies instead of a set-and-forget approach
    ● A fear of generating false positives that cause user experience issues
    ● A lack of skills
    ● An inability to deploy across hybrid and container-based environments with consistent policies

    As web applications increasingly move to public clouds and container-based environments, there’s an increasingly pressing need to provide across-the-board protection.

    Fortunately, F5’s WAF isn’t stuck in the past. It’s a modern solution that is practical to deploy in front of every one of your web applications.

    Join us for a 45-minute session to learn how you can protect your organization’s online assets.
  • 5G: An Opportunity to Get Security Right Recorded: Apr 30 2021 46 mins
    Shain Singh, Cloud/5G Security Architect and Max Iftikhar, Account Director Service Providers
    Implementing security relies on creating an effective threat model of an environment. 5G networks are presenting a challenge for service providers, as it brings connectivity and access for atypical endpoints.

    Network slicing and use of automation provide some of the building blocks of a 5G network but how are they used when modelling threats and looking through the lens of malicious behaviour?

    Join us as we provide some insights into customers' investment priorities and architectural patterns for securing their 5G network.

    We will review some key findings from ENISA's 2019 report of the threat landscape for 5G networks along with Heavy Reading's 2019 5G Security Market Leadership study to highlight where service providers are focusing their planning efforts for 5G security.

    Sign up for this webinar to learn about:

    -5G security architectural patterns
    -Implementing security automation
    -Providing network defences for 5G networks
  • Banking Predictions 2021 Recorded: Apr 29 2021 55 mins
    Shahnawaz Backer, Principal Security Advisory and Zhi-Ying Barry, Senior Analyst, Digital Business Strategy, Forrester
    COVID-19 has brought uncertainty and reduced profitability to banking, and 2021 will see consolidation and lower appetites for risk. Forrester predicts many banks, traditional and digital, will bite the dust or emerge from 2021 both poorer and leaner. Join this webinar to understand which banking priorities will dominate banking execs’ agenda for 2021 and the technological transformation that will play a crucial role. The session also highlights some elements required to succeed in the transformational exercise and meet the challenges banks will face in the next phase of recovery from the pandemic.
  • Stop Fraud Without Friction: How to stay ahead of motivated attackers Recorded: Apr 28 2021 58 mins
    Dan Woods, VP Threat Intelligence Center, Shape Security
    Competing for customer loyalty in a digital world is hard. To add to this challenge, leaders must defend the business from motivated adversaries who have evolved their tactics to bypass security defenses and evade detection. Any business that operates e-commerce applications or manages user accounts of value is a potential target and the consequences are significant - account takeover (ATO), fraud losses, and damaged brand to name a few.

    Join us for this webinar as Dan Woods, VP Shape Threat Intelligence Center and former FBI Agent, discusses:

    - Attacker economics and the attractive ROI of cyber crime
    - Where attacks originate – automation
    - How attackers adapt – imitation and human fraud
    - How to defeat your adversaries and protect your business from online fraud
  • State of Open Banking: Lessons from Australia and Singapore Recorded: Mar 24 2021 52 mins
    Shahnawaz Backer, Principal Security Advisor, F5, Zhi-Ying Barry, Senior Analyst, Forrester
    Open banking now an inevitable facet of the future for banks around the globe. In countries where open banking is mandatory, such as Australia, many banks face a steep learning curve to implement an open approach. In Singapore and elsewhere, regulators have taken a more market-driven, organic approach to gradually push the agenda forward. Some banks are embracing open banking as an opportunity while others drag their feet to implement open banking as they see it as a threat.

    Join this webinar to find out:

    - How banks are responding to open banking
    - The challenges they face
    - The common traits that leaders adopt
    - What you should do to make open banking successful
  • How 5G Success Starts With Your Cloud-Native Infrastructure Recorded: Mar 17 2021 46 mins
    Shain Singh, Cloud/5G Security Architect, F5
    Cloud-native infrastructure is foundational to a Service Provider’s 5G success. The ability to define, manage, and control 5G cloud-native infrastructure enables Service Providers to bring processing power within sub millisecond latency to the edge of the network, opening up a new world of innovation opportunities for customers.

    In order to provide optimal customer experience, it’s best practice to deploy cloud-native infrastructure based on Kubernetes from the core all the way to the edge and far edge of the network. The challenge is that Kubernetes isn’t natively equipped to meet the visibility, control and security requirements of the teams that manage the infrastructure.

    In this session we will examine the F5 solution for efficiently deploying and managing your 5G cloud-native infrastructure.

    Learn how to support your transition from 4G with:

    - BIG-IP Service Proxy for Kubernetes (SPK), a multi-protocol container-based signaling control, security and visibility solution.
    - Carrier-Grade Aspen Mesh, a service mesh based on Istio that provides critical features for operating at the scale required by carriers.
  • 2020 Phishing and Fraud Report: Insights into what modern phishing looks like Recorded: Mar 10 2021 39 mins
    David Warburton, Senior Threat Research Evangelist, F5
    The 2020 Phishing and Fraud Report is out now and it’s one of the most comprehensive publications released by F5 Labs. The report combines data from the F5 Security Operations Center (SOC), BrightCloud's Webroot platform, darknet threat intelligence from Vigilante, and features research and insights from F5 and Shape security research teams. Join our webinar to discover the report and the world of phishing.

    During the session we will…

    - Explore what modern phishing attacks look like and how attackers are evolving and adapting
    - Delve into the major findings from the report
    - Learn ways that business and consumers can mitigate the risk of phishing and fraudulent activities
  • A Practical Lesson in Cloud Controls from Breach Analysis Recorded: Jan 6 2021 59 mins
    Shain Singh, Cloud Security Lead; Shahnawaz Backer, Principal Security Advisor
    The cloud has become ubiquitous and synonymous more with deployment patterns than as an application environment. Organizations have also become quite established in their adoption of as-a-Service type models for application and business operational needs. Yet despite the ubiquity of cloud, controls around its use are still not as well understood and governed in most organizational practices.

    Join our panel of industry experts from threat intelligence and cloud security fields as we take a practical approach to cloud controls by learning from high profile breaches.
  • Current Trends in DDoS And Mitigation Options Recorded: Dec 17 2020 38 mins
    James Tin, Senior Director of Global Security & Fraud Solutions
    In this webinar, we will explore the current trends around DDoS and how attackers are weaponizing tools like AI to bypass traditional security options.

    This includes a mitigation plan as well as an example case study with financial services customers.

    Come join us in this webinar so you're prepared for everything around DoS.
YOUR APPS—FAST, AVAILABLE, AND SECURE—IN ANY CLOUD.
With 20+ years of application service experience, F5 provides the broadest set of services and security for enterprise-grade apps, whether on-premises or across any multi-cloud environment.

F5 Networks APAC hosts a new webinar every month around cloud and security topics, so do stay tuned to this channel to get the latest information!

Follow @F5NetworksAPJ on Twitter for more information.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Defending every application in a multi-cloud world
  • Live at: May 27 2020 3:00 am
  • Presented by: Joel Moses, Office of the CTO & Shuman Ghosemajumder, Global Head of AI, F5
  • From:
Your email has been sent.
or close