How 5G Success Starts With Your Cloud-Native Infrastructure
Cloud-native infrastructure is foundational to a Service Provider’s 5G success. The ability to define, manage, and control 5G cloud-native infrastructure enables Service Providers to bring processing power within sub millisecond latency to the edge of the network, opening up a new world of innovation opportunities for customers.
In order to provide optimal customer experience, it’s best practice to deploy cloud-native infrastructure based on Kubernetes from the core all the way to the edge and far edge of the network. The challenge is that Kubernetes isn’t natively equipped to meet the visibility, control and security requirements of the teams that manage the infrastructure.
In this session we will examine the F5 solution for efficiently deploying and managing your 5G cloud-native infrastructure.
Learn how to support your transition from 4G with:
- BIG-IP Service Proxy for Kubernetes (SPK), a multi-protocol container-based signaling control, security and visibility solution.
- Carrier-Grade Aspen Mesh, a service mesh based on Istio that provides critical features for operating at the scale required by carriers.
RecordedMar 17 202146 mins
Your place is confirmed, we'll send you email reminders
Open banking now an inevitable facet of the future for banks around the globe. In countries where open banking is mandatory, such as Australia, many banks face a steep learning curve to implement an open approach. In Singapore and elsewhere, regulators have taken a more market-driven, organic approach to gradually push the agenda forward. Some banks are embracing open banking as an opportunity while others drag their feet to implement open banking as they see it as a threat.
Join this webinar to find out:
- How banks are responding to open banking
- The challenges they face
- The common traits that leaders adopt
- What you should do to make open banking successful
Cloud-native infrastructure is foundational to a Service Provider’s 5G success. The ability to define, manage, and control 5G cloud-native infrastructure enables Service Providers to bring processing power within sub millisecond latency to the edge of the network, opening up a new world of innovation opportunities for customers.
In order to provide optimal customer experience, it’s best practice to deploy cloud-native infrastructure based on Kubernetes from the core all the way to the edge and far edge of the network. The challenge is that Kubernetes isn’t natively equipped to meet the visibility, control and security requirements of the teams that manage the infrastructure.
In this session we will examine the F5 solution for efficiently deploying and managing your 5G cloud-native infrastructure.
Learn how to support your transition from 4G with:
- BIG-IP Service Proxy for Kubernetes (SPK), a multi-protocol container-based signaling control, security and visibility solution.
- Carrier-Grade Aspen Mesh, a service mesh based on Istio that provides critical features for operating at the scale required by carriers.
David Warburton, Senior Threat Research Evangelist, F5
The 2020 Phishing and Fraud Report is out now and it’s one of the most comprehensive publications released by F5 Labs. The report combines data from the F5 Security Operations Center (SOC), BrightCloud's Webroot platform, darknet threat intelligence from Vigilante, and features research and insights from F5 and Shape security research teams. Join our webinar to discover the report and the world of phishing.
During the session we will…
- Explore what modern phishing attacks look like and how attackers are evolving and adapting
- Delve into the major findings from the report
- Learn ways that business and consumers can mitigate the risk of phishing and fraudulent activities
Shain Singh, Cloud Security Lead; Shahnawaz Backer, Principal Security Advisor
The cloud has become ubiquitous and synonymous more with deployment patterns than as an application environment. Organizations have also become quite established in their adoption of as-a-Service type models for application and business operational needs. Yet despite the ubiquity of cloud, controls around its use are still not as well understood and governed in most organizational practices.
Join our panel of industry experts from threat intelligence and cloud security fields as we take a practical approach to cloud controls by learning from high profile breaches.
James Tin, Senior Director of Global Security & Fraud Solutions
In this webinar, we will explore the current trends around DDoS and how attackers are weaponizing tools like AI to bypass traditional security options.
This includes a mitigation plan as well as an example case study with financial services customers.
Come join us in this webinar so you're prepared for everything around DoS.
In this short 20 minute webinar, we will explore best practice design for Modern Information Gateways to creating an architecture that focuses on optimising applications' performance and security.
We will also explore in more detail, methods to help filter for DDoS attacks, TLS offloading, and more.
Shain Singh, Cloud Security Lead; Shahnawaz Backer, Principal Security Advisor
The cloud has become ubiquitous and synonymous more with deployment patterns than as an application environment. Organizations have also become quite established in their adoption of as-a-Service type models for application and business operational needs. Yet despite the ubiquity of cloud, controls around its use are still not as well understood and governed in most organizational practices.
Join our panel of industry experts from threat intelligence and cloud security fields as we take a practical approach to cloud controls by learning from high profile breaches.
Attackers are getting more sophisticated, agile, and more creative. Traditional cybersecurity defenses have been pretty static. Artificial intelligence (AI) and Machine Learning (ML) can be used to detect and analyze cybersecurity threats effectively at an early stage. To match the evolving threats, we explore the industry trends of evolving AI and ML to adapt to the ever-changing landscape.
In this session, you will gain an understanding of:
• The need to utilize AI and ML in cybersecurity.
• The use cases and impact of AI and ML in cybersecurity.
• What is working and what has not worked.
• Practical steps you can take now to begin leveraging these technologies to improve your cybersecurity posture.
Join our panel of industry experts as we explore this brave new frontier in cybersecurity.
Hindsight is 20/20. That holds true for the OWASP Top 10, the threat awareness report that details the most critical security risks to web applications each year. Traditional methods for security controls are lagging behind the need to deploy production-ready apps for continuous deployment.
Join us in exploring the real-world impact of the OWASP Top 10 and why the guidance is relevant in maintaining a foundational security posture in an era of digital transformation. We’ll dive into real attacks that have recently exploited OWASP Top 10 vulnerabilities and discuss how we can learn from these to provide countermeasures at the speed of DevOps.
Apps should not be defined by network or topology boundaries. They should be defined by SLA/SLO and regulation/compliance; this means that we move from a 'should this app sit behind a WAF' to a 'does this app require more fine-grained control because of compliance than my other apps.'
The move towards the cloud and SaaS-based service should be not restricted to applications alone. Security services can also be consumed in a self-service manner for application security. SaaS-based WAF protects origin servers on both cloud and on-prem locations and in a way that enables self-services from application owners to integrate into their delivery pipelines.
However, this does not mean that security personnel are out of the loop. They will provide the guardrail controls that can be consumed by app owners and allows SecOps auditor level access across all app environments for governance. For apps that require more fine-grained controls, a managed service approach can be used for the highly regulated scenarios.
Join us for a 45mins session to better understand the latest WAF deployment options and find out which is the right WAF for you.
Cybersecurity is on every company’s mind. Having not only risk mitigations and security procedures in place but also communicating that risk to an entire organisation has never been so important.
In the RSA conference earlier this year in San Francisco, many topics were covered over the 5 days with guest speakers from Government, industry, vendors, practitioners, etc.
In this webinar we will discuss:
- The major trends and topics to come out of the conference
- How we view these trends and topics, and how to incorporate them in your business
Manoj Menon - Managing Director & Founder - Twimbit, Keiichiro Nozaki - Senior Marketing Evangelist for APAC F5
In this webinar, we look at the current state of Open Banking across the Asia Pacific region, with a particular focus on ANZ.
In this session, we will discuss:
- How you can mature your Open Banking strategy to enable the communication between various third parties
- Streamlining services for banking customers and create insights to new business opportunities that open up in the new age of competition during and post COVID19
Featured Speakers
Manoj Menon, Managing Director & Founder, Twimbit
Keiichiro Nozaki, Senior Marketing Evangelist for Asia Pacific, China, and Japan, F5 Networks
Attackers are getting more sophisticated, agile, and more creative. Traditional cybersecurity defenses have been pretty static. Artificial intelligence (AI) and Machine Learning (ML) can be used to detect and analyze cybersecurity threats effectively at an early stage. To match the evolving threats, we explore the industry trends of evolving AI and ML to adapt to the ever-changing landscape.
In this session, you will gain an understanding of:
• The need to utilize AI and ML in cybersecurity.
• The use cases and impact of AI and ML in cybersecurity.
• What is working and what has not worked.
• Practical steps you can take now to begin leveraging these technologies to improve your cybersecurity posture.
Join our panel of industry experts as we explore this brave new frontier in cybersecurity.
Jonathan George, Manager of Product Manager and Adil Laari, Senior Product Manager
Gain Full Visibility of Your Application Portfolio and Obtain Actionable Insights To Make Better Informed Decisions
Applications are the driving force behind value creation in the age of digital transformation. Gaining visibility into your applications is the cornerstone of properly managing and leveraging your application portfolio.
Attend this webinar to learn how you can:
- Gain full visibility into the health and performance of your entire application portfolio, complete with robust analytics
- Reduce Mean Time To Innocence (MTTI), and Mean Time To Repair (MTTR) by quickly identifying where issues are in the application path
- Get easy-to-consume, actionable insights to help you make fast business decisions
Applications are fuelling our digital business today like never before in the past. Applications are the crown jewels and the new currency of digital economy and they are under constant attack. While security is top-of-mind for many, it hasn’t always been for developers that may lead to vulnerabilities in our applications.
The trick is balancing the need for faster go-to-market in this competitive era of digital business and safeguarding our apps to keep our business secure and compliant.
Enter F5’s Essential App Protect Service.
It takes the complexity and guesswork out of safeguarding applications delivering simple, fast, and scalable cloud-based security for web apps—wherever they are deployed.
Join our webinar as we discuss:
- How Essential App Protect makes it easy to defend web-facing apps as-as-Service—without sacrificing the speed and agility application owners and developers need to keep delivering innovative offerings to market
- Features of our Essential App Protect Service
- How to secure your apps in minutes with our Essential App Protect Service
Shain Singh, F5, Foo Bang Chan, F5 and Rad Kanapathipillai, Shelde
Current industry trends involve integrating security earlier in development cycles as part of a "shift left" paradigm. This is seen through the approaches for DevSecOps and has increased the prominence of source code analysis and static testing methods. However, this only covers applications through the build process and into production environments. There is still a need to look at the mitigating controls once an application is live in production.
In this interactive session we will cover tools that can be used to integrate security into your CI/CD pipeline as well as deployment of a WAF policy. We will cover how a WAF policy can leverage development processes to automatically cater for false positives found during functional testing.
In this webinar, we will have an interactive session with field experts to cover:
- How to start implementing security in CI/CD workflows
- Demonstration of security tools that can be used in pipelines
- How functional testing can be used to automate false positives in a WAF policy with a demonstration
Having a proper architecture is essential when building and scaling complex modern web application projects. Without this, delivering these apps would mean multiple teams stepping on each other’s toes especially when trying to work on a single product.
This is where micro frontends has helped teams.
Micro frontends can be defined as: “An Architectural style where independently deliverable frontend applications are composed into a greater whole”.
By decomposing frontend monoliths into smaller chunks so features can be developed, tested and deployed independently whilst still reaching the final goal of delivering a single completed application to the customer.
However without a proper API management system in place to help expose APIs, things can get troublesome when trying to utilise this technique.
In this webinar, we will explore how organisations are:
- Defining what are micro frontends and microservices
- Why they are important in an app centric world
- Why good API management is essential for proper micro frontends usage
Tafara Muwandi, Director for Threat Analytics and Reporting at Shape Security
Shape Security encourages aggregators to move away from storing user financial credentials, and switch to APIs supported by the financial institutions they source from for enhanced security.
Currently protecting many of the world’s largest global banks from automated fraud and rogue aggregators, Shape Security works with both the financial institutions and the aggregators to make this transition. This on-demand session with Tafara Muwandi, Director of Threat Analytics and Reporting at Shape discusses different types of third-party user enabled FinTech groups, and focuses on key learnings about the different types of aggregators.
By attending this session, you will learn the techniques and strategies that Fortune 500 Banks use to partner with aggregators, and better serve their clients
Shain Singh, Cloud/5G Security Architect and Max Iftikhar, Account Director Service Providers
Implementing security relies on creating an effective threat model of an environment. 5G networks are presenting a challenge for service providers, as it brings connectivity and access for atypical endpoints.
Network slicing and use of automation provide some of the building blocks of a 5G network but how are they used when modelling threats and looking through the lens of malicious behaviour?
Join us as we provide some insights into customers' investment priorities and architectural patterns for securing their 5G network.
We will review some key findings from ENISA's 2019 report of the threat landscape for 5G networks along with Heavy Reading's 2019 5G Security Market Leadership study to highlight where service providers are focusing their planning efforts for 5G security.
Troy Hunt - Have I Been Pwned, Mike Plante - Security Evangelist, Matthew Egan Managing Director - Innovatus Media
Automated cyber threats are one of the biggest challenges facing enterprise organisations online. Attackers are harnessing the power of automation and machine learning to drive a scale on their attacks that have never before been seen.
So how can you look to respond to this changing environment? And what measure can you take online to ensure your digital assets are available to your customer, but not exposed to the criminals?
Join us for a 45-minute discussion that will look to focus on emerging IT security trends in the IT security landscape for the financial services industry. Join industry experts like Troy Hunt (Founder of Have I Been Pwned) and hear global technology perspectives on how the emergence of automated threats is impacting how organisations approach online security.
YOUR APPS—FAST, AVAILABLE, AND SECURE—IN ANY CLOUD.
With 20+ years of application service experience, F5 provides the broadest set of services and security for enterprise-grade apps, whether on-premises or across any multi-cloud environment.
F5 Networks APAC hosts a new webinar every month around cloud and security topics, so do stay tuned to this channel to get the latest information!
Follow @F5NetworksAPJ on Twitter for more information.
How 5G Success Starts With Your Cloud-Native InfrastructureShain Singh, Cloud/5G Security Architect, F5[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]46 mins