Hi [[ session.user.profile.firstName ]]

How 5G Success Starts With Your Cloud-Native Infrastructure

Cloud-native infrastructure is foundational to a Service Provider’s 5G success. The ability to define, manage, and control 5G cloud-native infrastructure enables Service Providers to bring processing power within sub millisecond latency to the edge of the network, opening up a new world of innovation opportunities for customers.

In order to provide optimal customer experience, it’s best practice to deploy cloud-native infrastructure based on Kubernetes from the core all the way to the edge and far edge of the network. The challenge is that Kubernetes isn’t natively equipped to meet the visibility, control and security requirements of the teams that manage the infrastructure.

In this session we will examine the F5 solution for efficiently deploying and managing your 5G cloud-native infrastructure.

Learn how to support your transition from 4G with:

- BIG-IP Service Proxy for Kubernetes (SPK), a multi-protocol container-based signaling control, security and visibility solution.
- Carrier-Grade Aspen Mesh, a service mesh based on Istio that provides critical features for operating at the scale required by carriers.
Recorded Mar 17 2021 46 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Shain Singh, Cloud/5G Security Architect, F5
Presentation preview: How 5G Success Starts With Your Cloud-Native Infrastructure

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • State of Open Banking: Lessons from Australia and Singapore Recorded: Mar 24 2021 52 mins
    Shahnawaz Backer, Principal Security Advisor, F5, Zhi-Ying Barry, Senior Analyst, Forrester
    Open banking now an inevitable facet of the future for banks around the globe. In countries where open banking is mandatory, such as Australia, many banks face a steep learning curve to implement an open approach. In Singapore and elsewhere, regulators have taken a more market-driven, organic approach to gradually push the agenda forward. Some banks are embracing open banking as an opportunity while others drag their feet to implement open banking as they see it as a threat.

    Join this webinar to find out:

    - How banks are responding to open banking
    - The challenges they face
    - The common traits that leaders adopt
    - What you should do to make open banking successful
  • How 5G Success Starts With Your Cloud-Native Infrastructure Recorded: Mar 17 2021 46 mins
    Shain Singh, Cloud/5G Security Architect, F5
    Cloud-native infrastructure is foundational to a Service Provider’s 5G success. The ability to define, manage, and control 5G cloud-native infrastructure enables Service Providers to bring processing power within sub millisecond latency to the edge of the network, opening up a new world of innovation opportunities for customers.

    In order to provide optimal customer experience, it’s best practice to deploy cloud-native infrastructure based on Kubernetes from the core all the way to the edge and far edge of the network. The challenge is that Kubernetes isn’t natively equipped to meet the visibility, control and security requirements of the teams that manage the infrastructure.

    In this session we will examine the F5 solution for efficiently deploying and managing your 5G cloud-native infrastructure.

    Learn how to support your transition from 4G with:

    - BIG-IP Service Proxy for Kubernetes (SPK), a multi-protocol container-based signaling control, security and visibility solution.
    - Carrier-Grade Aspen Mesh, a service mesh based on Istio that provides critical features for operating at the scale required by carriers.
  • 2020 Phishing and Fraud Report: Insights into what modern phishing looks like Recorded: Mar 10 2021 39 mins
    David Warburton, Senior Threat Research Evangelist, F5
    The 2020 Phishing and Fraud Report is out now and it’s one of the most comprehensive publications released by F5 Labs. The report combines data from the F5 Security Operations Center (SOC), BrightCloud's Webroot platform, darknet threat intelligence from Vigilante, and features research and insights from F5 and Shape security research teams. Join our webinar to discover the report and the world of phishing.

    During the session we will…

    - Explore what modern phishing attacks look like and how attackers are evolving and adapting
    - Delve into the major findings from the report
    - Learn ways that business and consumers can mitigate the risk of phishing and fraudulent activities
  • A Practical Lesson in Cloud Controls from Breach Analysis Recorded: Jan 6 2021 59 mins
    Shain Singh, Cloud Security Lead; Shahnawaz Backer, Principal Security Advisor
    The cloud has become ubiquitous and synonymous more with deployment patterns than as an application environment. Organizations have also become quite established in their adoption of as-a-Service type models for application and business operational needs. Yet despite the ubiquity of cloud, controls around its use are still not as well understood and governed in most organizational practices.

    Join our panel of industry experts from threat intelligence and cloud security fields as we take a practical approach to cloud controls by learning from high profile breaches.
  • Current Trends in DDoS And Mitigation Options Recorded: Dec 17 2020 38 mins
    James Tin, Senior Director of Global Security & Fraud Solutions
    In this webinar, we will explore the current trends around DDoS and how attackers are weaponizing tools like AI to bypass traditional security options.

    This includes a mitigation plan as well as an example case study with financial services customers.

    Come join us in this webinar so you're prepared for everything around DoS.
  • The Modern Secure Information Gateway Recorded: Dec 15 2020 17 mins
    Shain Singh, Cloud Security Lead, F5
    In this short 20 minute webinar, we will explore best practice design for Modern Information Gateways to creating an architecture that focuses on optimising applications' performance and security.

    We will also explore in more detail, methods to help filter for DDoS attacks, TLS offloading, and more.

    Come join us for this short webinar!
  • A Practical Lesson in Cloud Controls from Breach Analysis Recorded: Dec 8 2020 60 mins
    Shain Singh, Cloud Security Lead; Shahnawaz Backer, Principal Security Advisor
    The cloud has become ubiquitous and synonymous more with deployment patterns than as an application environment. Organizations have also become quite established in their adoption of as-a-Service type models for application and business operational needs. Yet despite the ubiquity of cloud, controls around its use are still not as well understood and governed in most organizational practices.

    Join our panel of industry experts from threat intelligence and cloud security fields as we take a practical approach to cloud controls by learning from high profile breaches.
  • Advancing AI & Machine Learning in Cybersecurity Threat Prevention Recorded: Dec 2 2020 58 mins
    Sudarshan Sivaperumal, Security Solution Architect, APCJ; Matthew Hum, Security Solution Architect, APCJ
    Attackers are getting more sophisticated, agile, and more creative. Traditional cybersecurity defenses have been pretty static. Artificial intelligence (AI) and Machine Learning (ML) can be used to detect and analyze cybersecurity threats effectively at an early stage. To match the evolving threats, we explore the industry trends of evolving AI and ML to adapt to the ever-changing landscape.

    In this session, you will gain an understanding of:
    • The need to utilize AI and ML in cybersecurity.
    • The use cases and impact of AI and ML in cybersecurity.
    • What is working and what has not worked.
    • Practical steps you can take now to begin leveraging these technologies to improve your cybersecurity posture.

    Join our panel of industry experts as we explore this brave new frontier in cybersecurity.
  • Defend Against OWASP Top 10 Threats Recorded: Nov 25 2020 56 mins
    Shahnawaz Backer, Principal Security Advisor, Shain Singh, Cloud Security Lead, F5
    Hindsight is 20/20. That holds true for the OWASP Top 10, the threat awareness report that details the most critical security risks to web applications each year. Traditional methods for security controls are lagging behind the need to deploy production-ready apps for continuous deployment.

    Join us in exploring the real-world impact of the OWASP Top 10 and why the guidance is relevant in maintaining a foundational security posture in an era of digital transformation. We’ll dive into real attacks that have recently exploited OWASP Top 10 vulnerabilities and discuss how we can learn from these to provide countermeasures at the speed of DevOps.
  • Which WAF Is Right For You? Recorded: Nov 18 2020 41 mins
    Shain Singh, Cloud Security Lead, F5
    Apps should not be defined by network or topology boundaries. They should be defined by SLA/SLO and regulation/compliance; this means that we move from a 'should this app sit behind a WAF' to a 'does this app require more fine-grained control because of compliance than my other apps.'

    The move towards the cloud and SaaS-based service should be not restricted to applications alone. Security services can also be consumed in a self-service manner for application security. SaaS-based WAF protects origin servers on both cloud and on-prem locations and in a way that enables self-services from application owners to integrate into their delivery pipelines.

    However, this does not mean that security personnel are out of the loop. They will provide the guardrail controls that can be consumed by app owners and allows SecOps auditor level access across all app environments for governance. For apps that require more fine-grained controls, a managed service approach can be used for the highly regulated scenarios.

    Join us for a 45mins session to better understand the latest WAF deployment options and find out which is the right WAF for you.
  • RSA Cybersecurity Conference Recap 2020 Recorded: Nov 13 2020 56 mins
    David Arthur, Security Solutions Architect, F5
    Cybersecurity is on every company’s mind. Having not only risk mitigations and security procedures in place but also communicating that risk to an entire organisation has never been so important.

    In the RSA conference earlier this year in San Francisco, many topics were covered over the 5 days with guest speakers from Government, industry, vendors, practitioners, etc.

    In this webinar we will discuss:
    - The major trends and topics to come out of the conference
    - How we view these trends and topics, and how to incorporate them in your business
  • Embracing the Open Banking Opportunity in ANZ Post COVID19 Recorded: Nov 11 2020 61 mins
    Manoj Menon - Managing Director & Founder - Twimbit, Keiichiro Nozaki - Senior Marketing Evangelist for APAC F5
    In this webinar, we look at the current state of Open Banking across the Asia Pacific region, with a particular focus on ANZ.

    In this session, we will discuss:
    - How you can mature your Open Banking strategy to enable the communication between various third parties
    - Streamlining services for banking customers and create insights to new business opportunities that open up in the new age of competition during and post COVID19

    Featured Speakers
    Manoj Menon, Managing Director & Founder, Twimbit
    Keiichiro Nozaki, Senior Marketing Evangelist for Asia Pacific, China, and Japan, F5 Networks
  • Advancing AI & Machine Learning in Cybersecurity Threat Prevention Recorded: Nov 10 2020 59 mins
    Sudarshan Sivaperumal, Security Solution Architect, APCJ; Matthew Hum, Security Solution Architect, APCJ
    Attackers are getting more sophisticated, agile, and more creative. Traditional cybersecurity defenses have been pretty static. Artificial intelligence (AI) and Machine Learning (ML) can be used to detect and analyze cybersecurity threats effectively at an early stage. To match the evolving threats, we explore the industry trends of evolving AI and ML to adapt to the ever-changing landscape.

    In this session, you will gain an understanding of:
    • The need to utilize AI and ML in cybersecurity.
    • The use cases and impact of AI and ML in cybersecurity.
    • What is working and what has not worked.
    • Practical steps you can take now to begin leveraging these technologies to improve your cybersecurity posture.

    Join our panel of industry experts as we explore this brave new frontier in cybersecurity.
  • Gain Full Visibility of Your Application Portfolio and Obtain Actionable Insight Recorded: Oct 28 2020 44 mins
    Jonathan George, Manager of Product Manager and Adil Laari, Senior Product Manager
    Gain Full Visibility of Your Application Portfolio and Obtain Actionable Insights To Make Better Informed Decisions

    Applications are the driving force behind value creation in the age of digital transformation. Gaining visibility into your applications is the cornerstone of properly managing and leveraging your application portfolio.

    Attend this webinar to learn how you can:
    - Gain full visibility into the health and performance of your entire application portfolio, complete with robust analytics
    - Reduce Mean Time To Innocence (MTTI), and Mean Time To Repair (MTTR) by quickly identifying where issues are in the application path
    - Get easy-to-consume, actionable insights to help you make fast business decisions
  • Taking The Complexity Out of Safeguarding Your Apps Recorded: Oct 21 2020 47 mins
    Sudarshan Sivaperumal, Solutions Architect, F5
    Applications are fuelling our digital business today like never before in the past. Applications are the crown jewels and the new currency of digital economy and they are under constant attack. While security is top-of-mind for many, it hasn’t always been for developers that may lead to vulnerabilities in our applications.

    The trick is balancing the need for faster go-to-market in this competitive era of digital business and safeguarding our apps to keep our business secure and compliant.

    Enter F5’s Essential App Protect Service.

    It takes the complexity and guesswork out of safeguarding applications delivering simple, fast, and scalable cloud-based security for web apps—wherever they are deployed.

    Join our webinar as we discuss:
    - How Essential App Protect makes it easy to defend web-facing apps as-as-Service—without sacrificing the speed and agility application owners and developers need to keep delivering innovative offerings to market
    - Features of our Essential App Protect Service
    - How to secure your apps in minutes with our Essential App Protect Service
  • Application Security for Modern Application Deployments Recorded: Oct 14 2020 32 mins
    Shain Singh, F5, Foo Bang Chan, F5 and Rad Kanapathipillai, Shelde
    Current industry trends involve integrating security earlier in development cycles as part of a "shift left" paradigm. This is seen through the approaches for DevSecOps and has increased the prominence of source code analysis and static testing methods. However, this only covers applications through the build process and into production environments. There is still a need to look at the mitigating controls once an application is live in production.

    In this interactive session we will cover tools that can be used to integrate security into your CI/CD pipeline as well as deployment of a WAF policy. We will cover how a WAF policy can leverage development processes to automatically cater for false positives found during functional testing.

    In this webinar, we will have an interactive session with field experts to cover:

    - How to start implementing security in CI/CD workflows
    - Demonstration of security tools that can be used in pipelines
    - How functional testing can be used to automate false positives in a WAF policy with a demonstration
  • How To Better Manage your APIs: Micro Frontends and Microservices Recorded: Oct 8 2020 41 mins
    Scott Van Kalken, Solutions Architect
    Having a proper architecture is essential when building and scaling complex modern web application projects. Without this, delivering these apps would mean multiple teams stepping on each other’s toes especially when trying to work on a single product.

    This is where micro frontends has helped teams.

    Micro frontends can be defined as: “An Architectural style where independently deliverable frontend applications are composed into a greater whole”.

    By decomposing frontend monoliths into smaller chunks so features can be developed, tested and deployed independently whilst still reaching the final goal of delivering a single completed application to the customer.

    However without a proper API management system in place to help expose APIs, things can get troublesome when trying to utilise this technique.

    In this webinar, we will explore how organisations are:

    - Defining what are micro frontends and microservices
    - Why they are important in an app centric world
    - Why good API management is essential for proper micro frontends usage
  • Innovate Alongside User Enabled FinTech Recorded: Oct 1 2020 46 mins
    Tafara Muwandi, Director for Threat Analytics and Reporting at Shape Security
    Shape Security encourages aggregators to move away from storing user financial credentials, and switch to APIs supported by the financial institutions they source from for enhanced security.

    Currently protecting many of the world’s largest global banks from automated fraud and rogue aggregators, Shape Security works with both the financial institutions and the aggregators to make this transition. This on-demand session with Tafara Muwandi, Director of Threat Analytics and Reporting at Shape discusses different types of third-party user enabled FinTech groups, and focuses on key learnings about the different types of aggregators.

    By attending this session, you will learn the techniques and strategies that Fortune 500 Banks use to partner with aggregators, and better serve their clients
  • 5G: An Opportunity to Get Security Right Recorded: Sep 2 2020 45 mins
    Shain Singh, Cloud/5G Security Architect and Max Iftikhar, Account Director Service Providers
    Implementing security relies on creating an effective threat model of an environment. 5G networks are presenting a challenge for service providers, as it brings connectivity and access for atypical endpoints.

    Network slicing and use of automation provide some of the building blocks of a 5G network but how are they used when modelling threats and looking through the lens of malicious behaviour?

    Join us as we provide some insights into customers' investment priorities and architectural patterns for securing their 5G network.

    We will review some key findings from ENISA's 2019 report of the threat landscape for 5G networks along with Heavy Reading's 2019 5G Security Market Leadership study to highlight where service providers are focusing their planning efforts for 5G security.

    Sign up for this webinar to learn about:

    -5G security architectural patterns
    -Implementing security automation
    -Providing network defences for 5G networks
  • Open and Secure: Addressing the Challenge of Automated Cyberthreats. Recorded: Aug 28 2020 55 mins
    Troy Hunt - Have I Been Pwned, Mike Plante - Security Evangelist, Matthew Egan Managing Director - Innovatus Media
    Automated cyber threats are one of the biggest challenges facing enterprise organisations online. Attackers are harnessing the power of automation and machine learning to drive a scale on their attacks that have never before been seen.

    So how can you look to respond to this changing environment? And what measure can you take online to ensure your digital assets are available to your customer, but not exposed to the criminals?

    Join us for a 45-minute discussion that will look to focus on emerging IT security trends in the IT security landscape for the financial services industry. Join industry experts like Troy Hunt (Founder of Have I Been Pwned) and hear global technology perspectives on how the emergence of automated threats is impacting how organisations approach online security.
YOUR APPS—FAST, AVAILABLE, AND SECURE—IN ANY CLOUD.
With 20+ years of application service experience, F5 provides the broadest set of services and security for enterprise-grade apps, whether on-premises or across any multi-cloud environment.

F5 Networks APAC hosts a new webinar every month around cloud and security topics, so do stay tuned to this channel to get the latest information!

Follow @F5NetworksAPJ on Twitter for more information.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How 5G Success Starts With Your Cloud-Native Infrastructure
  • Live at: Mar 17 2021 6:00 am
  • Presented by: Shain Singh, Cloud/5G Security Architect, F5
  • From:
Your email has been sent.
or close