Hi [[ session.user.profile.firstName ]]

How to Automate an API Security Program

Learn the prominence of APIs in today’s landscape and how to build an API security framework.

Join Doug Dooley, COO at Data Theorem, as he discusses the pressing need to automate API security. As modern companies grow, they expose their data to an increasing number of outside applications. It's critical that DevOps and Security teams are aligned on how to scale their API connections while automating the protection of their data from potential threats.

Specifically, you'll learn:

*The prominence of APIs in today's landscape
*About the challenges of securing APIs
*How to create an API security framework
*Why automation is the key
Recorded Aug 14 2019 23 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Doug Dooley, COO, Data Theorem
Presentation preview: How to Automate an API Security Program

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Kids, Privacy, and Apps Recorded: Sep 11 2019 23 mins
    Himanshu Dwivedi, CEO at Data Theorem
    Everyday we read headlines about data breaches and data privacy, but how can we start being pro-active about managing data privacy in apps for us and our kids? We have some guidelines to share with you, as well as a quick demo to show you some tools you can use now and discuss how companies should be safeguarding data.

    In this webinar we will cover:

    *How you can start securing your mobile data today
    *What kinds of data put you at risk (location data, personal information, photos)
    *How we look at app privacy as a company, as well as parents
  • Serverless vs Containers: A Case Study Recorded: Aug 28 2019 30 mins
    Alban Diquet, Head of Engineering at Data Theorem
    See the results from Data Theorem’s head-to-head experiment on building and securing real-world microservices.

    Join Alban Diquet, Head of Engineering at Data Theorem, as he discusses how Serverless performed versus Containers in a head-to-head experiment. Data Theorem implemented a back end component to compare each technology to determine which is better in several key areas that critical are for developers. This webinar will showcase what Alban and his engineering team discovered in this experiment, which should help you make your own determination of what's best for your organization.

    Specifically, you'll learn:

    *Which was better in terms of developer experience
    *How each performed with regard to cost
    *Which has the best opportunities for scale
    *What to consider in terms of security
  • How to Automate an API Security Program Recorded: Aug 14 2019 23 mins
    Doug Dooley, COO, Data Theorem
    Learn the prominence of APIs in today’s landscape and how to build an API security framework.

    Join Doug Dooley, COO at Data Theorem, as he discusses the pressing need to automate API security. As modern companies grow, they expose their data to an increasing number of outside applications. It's critical that DevOps and Security teams are aligned on how to scale their API connections while automating the protection of their data from potential threats.

    Specifically, you'll learn:

    *The prominence of APIs in today's landscape
    *About the challenges of securing APIs
    *How to create an API security framework
    *Why automation is the key
  • How to Automate Mobile AppSec without the Staff Recorded: Aug 13 2019 33 mins
    Richard Smith, Director at Data Theorem
    Overcoming the challenges of manual mobile AppSec with automation.

    The demand for mobile apps has caused a need for developers to improve and release features at an unprecedented rate to stay ahead of the competition. Consequently, developers have introduced new models to develop mobile apps quicker and easier.

    In these fast-paced development cycles, the risk of data security vulnerabilities and breach of regulatory requirements becomes more important than ever. With such an industry trend comes an imperative need to innovate the approach to mobile AppSec.

    Join us to learn about the:

    *Top challenges and problems facing security teams for mobile AppSec.
    *Limitations of traditional mobile AppSec approaches and why a manual processes will not scale with DevOps.
    *Ways to automate your mobile AppSec program to meet the fast pace demands of modern SDLCs without the staff.
  • Did You Know CCPA Has Already Begun? Recorded: Aug 1 2019 27 mins
    Richard Smith, Director, Data Theorem
    How to prepare your data, mobile apps, web apps, and APIs

    On January 1, 2020, the California Consumer Privacy Act (CCPA) will go into effect. This new privacy law emphasizes the growing importance for companies to revisit their approach on how they handle consumer data. Recent GDPR violations have shown that exposure via poor mobile app security and leaky APIs can result in multi-million dollar fines. But security leaders may not be aware that consumers will be able to make requests to in-scope business for the 2019 calendar year. Learn how to prepare for this legislation, security audits, and future data privacy laws without the staff.

    In this webinar we will cover :

    *How this legislation affects your company and customer data
    *How it impacts your mobile and modern web app strategy
    *How you can start preparing your current data, apps, and API’s before the law goes into effect
  • Automate Compliance Audits without the Staff Recorded: Jul 24 2019 29 mins
    Himanshu Dwivedi, CEO
    How to deliver continuous compliance for APIs and mobile apps.

    With so many consequential data breaches in the past decade, data security and privacy are top of mind issues for security leaders and corporate boards. Numerous government and industry regulations like HIPAA, PCI, GDPR, and FERPA are designed to focus attention on securing data and keeping personal information private. Agile and DevOps development models are moving too quickly for manual security assurance and compliance validation.

    Join us to learn about the:

    Challenges of manual compliance audits and their inability to keep pace with modern software development (CI/CD, DevOps, Agile).
    Benefits of automating continuous security compliance testing and reporting to meet the demands on regulators, partners and customers.
    Successful augmentation of an in-house security team by replacing expensive outside consultants.
  • Top 6 Security Needs for APIs and Serverless Apps Recorded: Jul 18 2019 36 mins
    Doug Dooley, COO
    Securing APIs across Amazon Lambda, Google Cloud Functions and Azure Functions

    Serverless computing is gaining momentum among developers. Software engineers are now able to build applications that deliver scale and business value without consideration for the complexity of operations and security. However, to believe there are fewer security problems with serverless applications would be an unwise assumption. Security problems still exist with serverless, but our focus needs to shift particularly to the world of application programming interfaces (APIs) where sensitive data is prominently transferred in these modern application designs.

    Watch this webinar to learn about:

    -Top 6 API security needs for serverless apps
    -5 problems security teams face with APIs in serverless and modern Apps
    -Limitations to legacy API security solutions such as API gateways
  • How to Deal with Fraudulent Counterfeit Apps Recorded: Jul 18 2019 20 mins
    Richard Smith, Director
    Overcoming the challenges of fraudulent counterfeit apps and their business impacts.

    Fraudulent counterfeit apps are a growing problem, not only for unsuspecting consumers, but for developers of legitimate apps whose customers interact with fake imposters of their software. Fake apps are big business for malicious actors, especially if they can leverage the brand and customer base of a well-known company.

    Watch to learn about:

    -Impacts of fraudulent counterfeit apps on your business and brand
    -Challenges of finding and removing counterfeit apps
    -Ways automation can make dealing with counterfeit apps easy
  • Automating Software Security Checks for Open Source Software and SDKs Recorded: Jul 18 2019 27 mins
    Eric Castro, Engineer at Data Theorem
    A modern approach to security checks for third-party software through automation.

    The growth of open source software (OSS) and third-party SDKs has been on the rise over the last five years, and for good reason. They provide developers with many of the necessary features to build a robust and dynamic apps increasing the appeal to a wider range of users.

    While the value of using OSS and SDKs is obvious to most, there is also a downside to incorporating someone else’s code into your app. There can be privacy violations, security vulnerabilities, and other risks embedded in the third-party code. This puts the onus on development teams and their security counterparts to ensure that unsound code in OSS and SDKs is found and fixed before use.

    Join us to learn about:

    -Risks of using open source software and SDKs for your apps.
    -Challenges of staying ahead of vulnerability issues in third-party software.
    -Modern approach to security checks for third-party software through automation.
API, app, mobile, and cloud security best practices
Data Theorem is a leading provider in modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to Automate an API Security Program
  • Live at: Aug 14 2019 4:00 pm
  • Presented by: Doug Dooley, COO, Data Theorem
  • From:
Your email has been sent.
or close