Hi [[ session.user.profile.firstName ]]

PerimeterX Podcast Ep. 9: Conversion Rate and Revenue Protection

PerimeterX cybersecurity evangelist Reesha Dedhia joins us to discuss conversion rate optimization and revenue protection, with impact stats from the recent Aberdeen Research report conducted with PerimeterX.
Recorded Sep 25 2020 20 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Reesha Dedhia, Cybersecurity Evangelist and Eric Pestana, Corporate Communications Manager
Presentation preview: PerimeterX Podcast Ep. 9: Conversion Rate and Revenue Protection

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • DevSecOps: The 2021 Cyber Threat Landscape Feb 22 2021 4:00 pm UTC 60 mins
    Helen Beal - DevOps Institute | Gemma Allen - Barracuda | Ameet Naik - PerimeterX | Ben Zilberman - Radware
    “COVID-19 created an opportunity to drive innovation and build a DevSecOps culture that emphasizes speed and agility while integrating security seamlessly throughout the software lifecycle”, according to DevProJournal. With the impact of the pandemic felt across all job departments and industries, it’s time we take a closer look at what these opportunities are and how they are influencing the 2021 cyber threat landscape.

    Join us for episode 11 of Day-to-Day DevOps, where host Helen Beal and guests will share what DevSecOps and DevOps teams must know about DevSecOps in 2021. They’ll be discussing:

    - Tips to create more open and communicative DevSecOps teams across the SDLC
    - What threats teams need to be aware of to ensure that applications are protecting data, brands and customers
    - How to effectively plan and embrace discipline by incorporating SAST tools into development processes
    - Why teams must test like attackers, not defenders
    - And more


    Guests:
    - Gemma Allen - Consulting Solutions Architect at Barracuda
    - Ameet Naik - Director of Product Marketing at PerimeterX
    - Ben Zilberman - Director of Product Marketing at Radware
  • Stop eGift Card and Loyalty Points Fraud Recorded: Jan 20 2021 48 mins
    Liel Strauch Director of Product Research and Pan Kamal Cybersecurity Evangelist PerimeterX
    The gift card market has skyrocketed and is valued at over $381B for 2020, growing at a rate of 6% annually. With the crackdown on CNP fraud, e-gift cards have become a more productive target for fraudsters. Brute force account takeover attacks have consistently targeted e-gift card pages for major brands throughout the year.

    Join PerimeterX and collaboration with Merchant Risk Council to explore:

    -Recent e-gift card attacks and trends
    -Brute force tactics hackers use to target e-gift cards and loyalty points
    -How to avoid damage to your brand reputation
  • Supply Chain Risks in Website Code Recorded: Jan 12 2021 43 mins
    Avishai Shafir, Director of Product Management and Ameet Naik, Director of Cybersecurity Strategy at PerimeterX
    Your software supply chain is the new attack surface. Web applications are especially vulnerable as your code shifts to the client side where your legacy security tools are blind. Join this webinar to learn how attackers are exploiting this client-side blind side to carry out digital skimming, formjacking and Magecart attacks.

    This webinar will cover:
    -Vulnerabilities introduced by third-party scripts in your web applications
    -Attack detection methods and challenges
    -Website risk analysis tools to help you identify and mitigate supply chain risks

    Register now to save your spot and get a link to the on-demand recording to watch at your leisure.
  • PerimeterX Podcast Ep. 10: What is Credential Stuffing? Recorded: Dec 14 2020 12 mins
    Ido Safruti, CTO; Liel Strauch, Director of Cybersecurity Research; Eric Pestana, Corporate Communications Manager
    PerimeterX CTO and co-founder Ido Safruti and director of cybersecurity research Liel Strauch return to discuss brute force attacks and account takeover attacks, also known as credential stuffing attacks.
  • Adapting to Change: Five Cybersecurity Predictions for 2021 Recorded: Dec 10 2020 49 mins
    Ido Safruti, CTO and Kim DeCarlis, CMO
    2020 will forever be known as the Year of COVID. The way we live, work, play and shop all radically changed to mitigate COVID risks. Cybercriminals followed these changes and responded with an increased volume of web attacks.

    Join PerimeterX executives Ido Safruti, CTO and Kim DeCarlis, CMO to learn how these trends can impact your business in 2021. We will help you to:
    - Understand the rapidly developing cybercriminal ecosystem
    - Improve security of your GraphQL APIs
    - Understand the risks of Buy-Online-Pickup-In-Store (BOPIS)
  • Watch a Live Magecart Attack in Action Recorded: Dec 10 2020 31 mins
    Deepak Patel, VP of Product Marketing and Ameet Naik, Director of Product Marketing at PerimeterX
    It’s a busy time of year for everyone, especially hackers. Companies continue to struggle with an increasing number of Magecart, digital skimming and formjacking attacks. These attacks leave businesses exposed to data theft, compliance penalties and brand damage.

    But how do these attacks actually happen? In this on-demand webinar, we show a Magecart attack simulation. You will learn about:

    •Methods and tricks used to compromise websites
    •Data exfiltration mechanisms used by malicious scripts
    •Detection techniques and their limitations

    Watch now to see how digital skimming and Magecart attacks steal credit card numbers from your websites, and how you can stop them.
  • 2021 Readiness: Balancing Security in a Post-COVID World Recorded: Dec 9 2020 60 mins
    Diana Kelley | Mark Weatherford | Ted Harrington | Amir Shaked
    Earlier this year many companies experienced an incredible shift to fully remote work almost overnight, in response to the COVID-19 pandemic. This accelerated the “digital transformation” journey for many companies compressing what was a multi-year timeline into a few months and making 2020 different than any other previous year. In this episode we’ll explore how the balance between security, privacy and productivity was tipped this year, and what can we expect to see in 2021 as some, but not all, organizations head back to office work with a post-pandemic mindset.

    The audience will hear from CISOs and Security Directors about how this year was different, what they're going to do differently going forward, and what they expect (or have already seen) as organizations get back to pre-COVID levels.

    Topics covered:
    - 2020 in review
    - The hard lesson that a mobile workforce is not the same as a remote workforce
    - How the attack surface expanded and what CISOs are doing to ensure risk doesn’t expand too
    - How digital transformation sped up and what they meant for security, privacy and productivity
    - During the speedy journey to the cloud - what mistakes were made?
    - Lessons learned that will be carried forward for security teams
    - What CISOs are doing to prepare for whatever 2021 may bring

    Panelists:
    - Mark Weatherford, Chief Strategy Officer and Board Member, National Cybersecurity Center
    - Amir Shaked - VP, R&D, PerimeterX
    - Ted Harrington, Executive Partner, Independent Security Evaluators [ISE]

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • Reduce the Risk of Payment Fraud Due to Carding Attacks Recorded: Dec 8 2020 56 mins
    Liel Strauch, Director of Product Research PerimeterX and Pan Kamal, Cybersecurity Evangelist PerimeterX
    PerimeterX discusses in-depth how to detect and stop fraudulent transactions originating from carding bots to save thousands of dollars in payment processing charges.

    This webinar will also cover:

    -Carding attacks from the wild
    -How carding attacks evade detection
    -Trends leading into the holiday season

    This webinar is in collaboration with Merchant Risk Council.
  • [PANEL] Cloud Security Risks and Solutions Recorded: Dec 8 2020 59 mins
    Clarify360 | PerimeterX | Google Cloud | Appgate | Anitian
    In a recent report, the Cloud Security Alliance (CSA) outlined the top 11 threats to cloud computing for 2020. Data breaches, misconfiguration and inadequate change control, a lack of cloud security architecture and strategy, and insufficient identity and access management were among the biggest security challenges for all industries operating in the cloud.

    These issues are not unique to any particular industry, but fortunately, they have common solutions. It’s clear that protecting public cloud assets is key. COVID-19 pandemic was a major accelerant for organizations to quickly move forward with the migration of business infrastructure and applications to the cloud.

    Cloud Controls and Breach Prevention are top of mind for IT leadership and team alike.

    In this panel discussion, we’ll discuss the importance of cloud controls and breach protection during this accelerated move to the cloud

    - What the C Suite Needs to Know about Cloud Security
    - Why Cloud Security is not an IT problem, it’s a business problem
    - The Revenue and Brand ROI of Preventing Data Breaches
    - Real productivity results from correcting misconfiguration and inadequate change control
    - The importance of building a cloud security architecture and strategy
    - Why managing sufficient identity, credential, access, and key policies
    - Cross Training and Upskilling your team


    Moderated by: Jo Peterson, Vice President, Cloud & Security Services, Clarify360

    Dr. Anton Chuvakin, Head of Solution Strategy, Google Cloud
    Amir Shaked, VP R&D PerimeterX
    Tina Gravel, Senior Vice President, Appgate
    Charles Johnson, Cybersecurity Advocate, Anitian
  • 5 Big Trends Impacting Application Security In 2021 Recorded: Dec 7 2020 46 mins
    Ido Safruti, CTO and Kim DeCarlis, CMO
    Each year, the PerimeterX research team identifies five trends and key developments to watch for application security in the coming year.

    Join PerimeterX executives Ido Safruti, CTO and Kim DeCarlis, CMO to learn how these trends can impact your applications' security and your customers - and how to better protect your business in 2021.

    We will also provide valuable insight on how to:
    Understand the rapidly developing cybercriminal ecosystem
    Improve security of your GraphQL APIs
    Understand the risks of Buy-Online-Pickup-In-Store (BOPIS)
  • Top 3 Cyberthreats of the Holiday Shopping Season Recorded: Nov 19 2020 34 mins
    Avishai Shafir, Director of Product Management; Reesha Dedhia, Cybersecurity Evangelist
    The COVID pandemic has expedited the mass adoption of online and mobile shopping, which incentivized cybercriminals to innovate. With the holiday shopping season around the corner, e-commerce sites are starting to prepare for unprecedented spending. In parallel with this growth, we see emerging threat trends that can disrupt your holiday sales.

    Join PerimeterX on Thursday, November 19 as Avishai Shafir, Director of Product Management, and Reesha Dedhia, Cybersecurity Evangelist discuss how to protect your customers and safeguard your business.

    We will also give you valuable tips on how to:
    - Discern between helpful and malicious bot traffic
    - Thwart bot-driven fraud and client-side attacks via Shadow Code
    - Prevent revenue-impacting browser extensions
  • AWS + PerimeterX: Enhancing Security and Performance at the Edge Recorded: Nov 12 2020 56 mins
    Shawn Brady, Head of Global Partnerships - Edge Services, AWS; Tanweer Shaikh, Director of Onboarding, CS, PerimeterX
    With almost 50% of overall traffic coming from malicious bots it is essential to protect websites and applications from bot attacks.
    Join us on November 12 at 10 am PT to discover how AWS and PerimeterX have joined forces to deliver comprehensive application security without sacrificing performance or scalability.
    During the webinar we will show you:
    - How PerimeterX Bot Defender integrated with AWS CloudFront and LambdaEdge, complements AWS Shield and AWS WAF to prevent ATO and carding attacks
    - Techniques such as advanced ML and powerful behavioral analytics that block unwanted bots in real-time
    - How easily/ PerimeterX Bot Defender can be deployed through the AWS App Store without the need to manage servers or install components
  • Protecting Hype Sales From Bot Attacks: The Winning Strategies Recorded: Oct 29 2020 60 mins
    Chris Fiorino, Customer Success, Engineering Manager; Gad Bornstein, Sr. Product Manager
    Hype sales are designed to engage customers and boost revenue, with a growing industry of sneakers, tickets, streetwear, and cosmetics that are sold out almost immediately. But who is really shopping?

    During a hype sale, websites and applications might experience extreme volumes of bot attacks (95% of traffic), when bots are purchasing all Hype Sale inventory and crashing the website. This damages the brand’s reputation with a bad user experience and disappointed customers. This becomes even more frustrating during the COVID-19 pandemic when most shopping is happening online.

    Come and listen more on the Hype Sale ecosystem and how you can solve critical problems to optimize your user experience. You will:
    - See bot operators in action
    - Discover the new generation of Hype Sale bots
    - Explore how to let human users win against the fast purchases of bad bots
  • The Hidden Business Impact of Web Browser Extensions on eCommerce Merchants Recorded: Oct 21 2020 50 mins
    Derek E. Brink, VP & Research Fellow, Aberdeen; Uriel Maimon, Head of Revenue Optimization; Reesha Dedhia
    Web browser extensions represent a hidden, negative business impact on critical aspects of e-commerce merchant performance. Aberdeen’s research and analysis describes and quantifies this impact - as well as the value of solutions designed to reduce these risks.

    Join this webinar to hear the insights from the research and:

    - Understand the impact of browser extensions on your revenue and conversion rates
    - Discover how to increase the number and profitability of online orders with solutions that help you manage browser extensions
  • COVID-19 Predictions for Web App Security and the Impact on the Holiday Season Recorded: Oct 20 2020 46 mins
    Ido Safruti (CTO) and Deepak Patel (VP Product Marketing)
    COVID has accelerated changes in the way attackers are hitting web applications. Join the discussion to hear about the predictions on how the world of web application security will be during COVID and the impact it will have during the holiday season.
  • PerimeterX Podcast Ep. 9: Conversion Rate and Revenue Protection Recorded: Sep 25 2020 20 mins
    Reesha Dedhia, Cybersecurity Evangelist and Eric Pestana, Corporate Communications Manager
    PerimeterX cybersecurity evangelist Reesha Dedhia joins us to discuss conversion rate optimization and revenue protection, with impact stats from the recent Aberdeen Research report conducted with PerimeterX.
  • New PerimeterX Partner Program to Accelerate Customers' Digital Transformation Recorded: Sep 10 2020 44 mins
    PerimeterX Chief Marketing Officer, Kim DeCarlis, and Director of Channel Strategy, Bruce Holbert
    As a solution provider, your customers lean on you for your expertise and insights to protect their websites and web apps, and to accelerate their digital transformation. You have a variety of on-prem technologies on your line card already, but are looking for ways to help customers address the new risks they face as they transform. Traditional firewalls and WAFs go part of the way, but leave the door open to sophisticated automated attacks from bots, vulnerable third party code and malicious coupon extensions that disrupt their visitors' experience.

    In this session PerimeterX CMO, Kim DeCarlis and Director of Channels, Bruce Holbert will help you:
    -Learn about the cloud-native PerimeterX web app security platform
    -Get an overview of how you can grow your business by joining the just-announced PerimeterX Partner Program
    -Discover new ways to stay relevant to your customers with insights to help them with their digital transformation
  • PerimeterX Podcast Ep. 7: Top Threats in 2020 Featuring Research from Forrester Recorded: Sep 3 2020 16 mins
    Deepak Patel, Cybersecurity Evangelist; Eric Pestana, Corporate Communications Manager
    PerimeterX cybersecurity evangelist Deepak Patel returns to discuss the top cyberthreats in 2020 as reported by independent research firm Forrester Research, as well as some best practices on how to protect and grow digital businesses in their midst.
  • Holiday Readiness and the Shadow Code Risk Recorded: Sep 2 2020 36 mins
    Ameet Naik, PerimeterX; Alexandra Brown, RH-ISAC
    Studies show that up to 70% of the scripts running on a typical website are third-party, which in turn call other scripts creating an extensive digital supply chain. These scripts and libraries introduce Shadow Code into the application which alters its security posture and vastly expands the attack surface. The recent succession of digital skimming and Magecart attacks on the client-side of web applications are one such consequence of Shadow Code.

    Paradigms like CI/CD, DevOps and DevSecOps enable a faster app development pipeline but make it harder to meet information security standards and data privacy requirements. However, security and innovation do not need to be at odds.

    Key Takeaways:

    1. Things to know about the Shadow Code and the negative impacts to your applications before the holiday shopping rush
    2. Findings from a 2020 Survey on scope and impacts of Shadow Code in web applications
    3. Strategies to manage Shadow Code risk using a trust but verify model
  • Shining a Light on Shadow Code Recorded: Aug 19 2020 41 mins
    Ameet Naik, Cybersecurity Evangelist, PerimeterX
    Modern web applications make extensive use of third-party scripts and open source libraries to speed up innovation and be responsive to business needs. Studies show that up to 70% of the scripts running on a typical website are third-party, which in turn call other scripts creating an extensive digital supply chain. These scripts and libraries introduce Shadow Code into the application which alters its security posture and vastly expands the attack surface. The recent succession of digital skimming and Magecart attacks on the client-side of web applications are one such consequence of Shadow Code.

    Paradigms like CI/CD, DevOps and DevSecOps enable a faster app development pipeline but make it harder to meet information security standards and data privacy requirements. However, security and innovation do not need to be at odds.

    In this session you will learn about:
    -Shadow Code and the negative impacts to your applications
    -Findings from a 2020 Survey on scope and impacts of Shadow Code in web applications
    -Strategies to manage Shadow Code risk using a trust but verify model
Cyber Security Webinars: Discussing latest Trends & Threats
PerimeterX protects the modern web and mobile applications, and APIs from automated attacks. We protect against account abuse, carding, scraping, checkout abuse, marketing fraud, PII harvesting, skimming and watering hole attacks.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: PerimeterX Podcast Ep. 9: Conversion Rate and Revenue Protection
  • Live at: Sep 25 2020 8:10 pm
  • Presented by: Reesha Dedhia, Cybersecurity Evangelist and Eric Pestana, Corporate Communications Manager
  • From:
Your email has been sent.
or close