Hear from Akamai’s industry experts on today’s trends and topics to move your business faster forward.

  • Evaluating & Measuring DDoS Risk during a COVID 19 Era

    皇冠体育投注The number of DDoS attacks instantly mitigated via the Prolexic platform has increased exponentially over the past four years. Akamai mitigates DDoS attacks against its Prolexic platform via proactive mitigation controls, in 0 seconds and with no customer impact. But, what about DDoS attacks in the COVID-19 era?

    Join Dennis Birchard, Akamai’s Principal Cloud Security Architect, to learn more about DDoS Attack trends from Q1-2020, How does Prolexic protect Akamai customers and why does it matter?, Mitigation Strategies re: Proactive vs Reactive controls, Work from home and how our customers have changed their risk and How to interpret DDoS industry mitigation SLAs.

    View Now
  • Impact of COVID-19 on Cloud Security

    Since COVID-19 isolation protocols started, people across the globe suddenly found themselves working from home and away from many of the enterprise-grade protections that governed their day-to-day workflow.

    Bad actors didn’t take a break. With more time on their hands and a large pool of victims to target, they rushed to take advantage, and have leveraged data from previous data breaches to launch new attacks.

    皇冠体育投注Join Akamai security experts Patrick Sullivan and Steve Ragan, in a fireside chat moderated by Nelson Rodriguez, as they discuss current security concerns (accelerated credential stuffing, and VPNs under immense strain), share an analysis of the threat landscape during the pandemic, the two sides of security: protecting your customers and business while maintaining a great user experience and a few recent attack stories.

    View Now
  • Phishing Factories and Economies: The Real Persistent Threat

    Despite years of publicity and millions of dollars in employee training, phishing remains one of the largest insider threats that organizations face. Employees unwittingly give up personal and corporate information to malicious actors every day.

    No longer limiting themselves to email, criminals are exploiting popular social media networks, instant messaging applications, and online file-sharing services. Sadly, criminals will always leverage current events. Akamai’s expert Security Research team has noted dozens of new Coronavirus domains are being deployed each day and we expect this trend to continue.

    Defending against this dangerous attack vector will continue to require insights and modern techniques.

    皇冠体育投注In this presentation, we will take a deep dive into:

    • The current phishing landscape and what makes these scams so effective
    • Rapidly evolving commercial techniques of attackers to improve operations, distribution and efficiency
    • Zero-day phishing detection and how it helps to fight back and reduce the impact of these scams

    皇冠体育投注Our presenter is Nick Hawkins, Senior Director of Enterprise Product Management at Akamai Technologies, Asia Pacific.


    View Now
  • Business Continuity - what have we learned so far?

    Organizations across the globe have asked their workforce to work from home and have done their best to scale digital transformation on a massive scale. These rapid changes have supported workforce productivity requirements, but unfortunately most have also created an expanded attack surface and unforeseen complexity.

    To adapt to this new normal, organizations must move beyond inherent and static digital trust to adaptive access and threat protection.

    皇冠体育投注This talk covers:

    • Analysis of current business continuity challenges and their impact on your organization
    • A thorough review of use cases and best practices across Asia Pacific and Japan, including the Gaming, Education, Consumer Goods and Airline industries.
    • Practical advice and a reference architecture for quickly enabling business continuity

    皇冠体育投注Our presenter is Nick Hawkins, Senior Director of Enterprise Product Management at Akamai Technologies, Asia Pacific.


    View Now
  • Understanding Bots and Their Role in Credential Stuffing

    皇冠体育投注Botnets can be good or bad. Malicious bots could be used to launch a variety of attacks from DDoS to web application attacks to credential stuffing. Good bots, on the other hand, may serve legitimate business functions such as search engine optimization, conversational interfaces and service aggregation. As organizations introduce more automation and APIs into their digital platforms, they need to allow good bots to function while managing the risk associated with malicious bots.

    In this talk, Akamai security strategist Siddharth Deshpande will walk you through the dark web economy for malicious bots used in Credential Stuffing attacks and discuss options for effective Bot Management. He will also explore how some commercialized bot operations masquerade as legitimate businesses and target specific online brands. By better understanding how bots work, and the motivation of bot operators, you’ll be better prepared to thwart bot operators’ fast evolving techniques without affecting user experience for legitimate customers.

    Our presenter is Sid Deshpande, Director of Security Strategy for Akamai Technologies in Asia Pacific.


    View Now
  • Latest Credential Stuffing Attack Campaigns In Asia Pacific

    The wide availability of compromised credentials combined with new sophisticated automated attack techniques have made credential stuffing a risk to many businesses. For your adversaries, it is one of the most lucrative and effective forms of web fraud. For you, these swift and sophisticated attacks could put revenue, productivity, and reputation all at risk.

    Learn about recent attack patterns and how to defend against them.

    This talk covers:

    • Anatomy of a credential stuffing attack and the common bot detection challenges that organisations face
    • Current examples of credential stuffing attack campaigns across retail, financial services and other industries in Asia Pacific
    • Web Security Analytics
    • Approaches to mitigating the increasingly sophisticated attack methods

    皇冠体育投注Our presenter is Fernando Serto, Director of Security Technology & Strategy for Akamai Technologies in Asia Pacific.


    View Now
  • Third-Party Script Application Security: Intrusion vs. Detection

    Credit card skimming has long been a challenge to security teams. From physical devices to online harvesting attacks such as form-jacking and script injection, hackers are continually evolving strategies to stay ahead of web protectors. The most recent and steadily increasing skimming approach takes advantage of partner and supply-chain third-party scripts present in applications. While traditional methods of blocking suspicious intrusion into apps remain valuable, massive breaches and increasing fines make it imperative to act now to prevent personally identifiable information theft.

    Join this talk to understand:

    • The history and scale of Magecart attacks
    • How the rise of third-party scripts can increase vulnerabilities
    • Analysis of script compromises and mitigation approaches
    • Attributes of an effective Magecart protection service
    • Tips for analysing your third-party script situation

    Our presenter is Jason Hatch, Senior Director, Security & Performance Product Management, , Akamai Technologies, APJ.


    View Now
  • Customer Identity And Access Management: Deciding Between "Build vs Buy"

    皇冠体育投注Digital identity and customer profiles are at the center of every company's digital transformation. In today's markets, customer identities and personal data associated with them are among the most critical and valuable assets of any enterprise.

    皇冠体育投注This talk explores the pros and cons of in-house CIAM solutions versus commercial CIAM solutions - taking into account changing requirements dictated by resource, technology, innovation, customer experience, security compliance and regulations. It features a range of recent CIAM case studies in Asia Pacific, including the Communications & Media, Energy & Utilities and Consumer Electronics industries.

    Our presenters from Akamai Technologies are Manish Upadhaya, Senior Security Specialist and Dawson Sewo, Principal Cloud Security Architect.


    View Now
  • Why Put Identity at the Core of Data Privacy

    As consumers adjust to the reality of physical distancing for the foreseeable future, even more consumer facing services will be delivered online. Consumer identities are central to this digital customer journey. Regulators’ privacy approaches in APJ are focused on protecting customer identities while providing a framework for regional economic growth across borders. Ultimately consumer facing businesses, as they prepare for ongoing spikes in online activity, need to exercise great responsibility by protecting customer identities adequately to satisfy regulators and consumers alike.

    皇冠体育投注Join Unmesh Deshmukh and Siddharth Deshpande from Akamai in a freewheeling, informal discussion (no slides!) that brings out some of these key issues and offers some recommendations for a successful CIAM (Customer Identity and Access Management) strategy.


    View Now
  • Decoding Magecart/Web Skimming Attacks in the backdrop of COVID-19

    皇冠体育投注With most countries in lockdown mode because of COVID-19, our reliance on the internet is stronger than ever before. Unfortunately, the cyberthreat actors are eyeing this sharp growth in online transactions.

    The exposure to compromised websites, including e-commerce, is greater than ever with the uptick in web skimming cases reported in March. Web skimming attacks may worsen as more online services are consumed in the coming months.

    During this webinar we will discuss:

    • Internet and digital ecosystem in the backdrop of COVID-19
    • Cyberthreats – what has changed during COVID-19
    • Growing threats of web skimming/Magecart attacks and targeted industries
    • Magecart attack vectors
    • Attack examples
    • Measures taken in the industry – strengths and weaknesses

    Our presenter is Aseem Ahmed, Senior Product Manager, Cloud Security at Akamai Technologies, Asia Pacific.


    View Now
  • On-demand Webinar: Managing Your Web Application Firewall, Your Way

    Recorded May 19, 2020

    Presented by
    Pratyush Sinha, Technical Account Manager, Akamai

    About this webinar
    With 178 billion WAF rule triggers every 24 hours, Akamai harnesses unmatched visibility into attacks to deliver curated and highly accurate WAF protections that keep up with the latest threats.

    In this webinar we will be covering Akamai’s flagship security solution - Kona Site Defender (KSD) - and how it protects the apps and APIs of the who’s who of the Internet at the edge. Seamlessly built on the Akamai Intelligent Edge Platform, Kona Site Defender provides Always-On protection from DDoS and application-layer attacks, with dramatically lower management overhead.

    1. Threat Review and Trends
    2. Overview of Kona Site Defender
    3. Web Security Analytics
    4. Logs & Alerts
    5. Integration & Support

    Register Now
  • On-demand Webinar: How Criminals Are Playing The Gaming Industry And What You Can Do About It

    Jonathan Singer, Sr. Manager, Global Games Industry, Akamai Technologies
    Scott Adams, Founder and CEO, FraudPVP
    Lonnye Bower, COO, ProbablyMonsters
    Steve Ragan, Sr. Technical Writer, Akamai Technologies
    Dean Takahashi, Lead Gaming Writer, VentureBeat

    View this webinar to learn how to avoid becoming the next victim in online security threats with gaming.

    You’ll learn:
    • How to protect your game and players from a growing amount of online security threats
    • The latest trends in credential abuse and account hacks in gaming
    • How web attacks are evolving and where they are headed in the future
    • How to integrate security best practices with the rest of the game for best performance

    View Now
  • On-demand Webinar - Meeting Growing Expectations for Video Quality

    Recorded August 15, 2019

    Alex Balford, Sr. Product Marketing Manager, Akamai Technologies
    Nick Thomas, Associate Director, MTM

    In an increasingly competitive marketplace, premium video providers are looking at various ways to differentiate their OTT services. Options include investing in content, offering aggressive pricing, enhancing the user experience, and focusing on consistent streaming quality.

    This webinar, in partnership with MTM Research, reveals what senior executives from a range of premium video distributors say about current trends and dynamics, and explores their views on the importance of video quality to commercial success.

    View Now
  • On-demand Webinar: State of the Internet/Security: Web Attacks and Gaming Abuse

    Recorded June 20, 2019

    Martin McKeay, Editorial Director and Security Researcher, Akamai Technologies
    Steve Ragan, Editor, Security Research and Publications, Akamai Technologies
    Patrick Sullivan, Sr. Director of Global Security Strategy, Akamai Technologies

    A Conversation with Security Research Experts

    Akamai security experts recently reviewed 17 months of data on credential stuffing and web application attacks, with a focus on the gaming industry.
    • The attack vector, known for over a decade, that’s in this last study, accounted for nearly ⅔ of web application attacks
    • The two vectors that together accounted for nearly 90% of these attacks
    • The inexpensive tools and resources criminals, some as young as 14, use in credential stuffing attacks on gaming companies
    • The one common factor in all successful credential stuffing attempts
    • Three surprising observations about security professionals that Akamai Chief Marketing Officer Monique Bonner shared with the security team at Akamai

    View Now
  • Webinar: Defining Security Posture in a Zero Trust World

    22 May, 2019, Wednesday. 13:00 Singapore time

    Nick Hawkins, Sr. Director, Product Management, Enterprise, Akamai Technologies
    Johnny Yeo, Sr. Enterprise Security Architect, Akamai Technologies

    It is generally agreed that there are three key pillars of a zero trust approach - Access, Identity and Posture. In previous webinars we have explored how an identity driven approach can be used with a cloud proxy to better secure access to internal applications. In the first part of this webinar we will dive deeper into the third pillar – posture- understand what it means to a user and their devices and see how it can be integrated into a zero trust architecture. The second part will look at the mitigation aspect of posture. We’ll cover the API attack trends – how attacks are moving from web into API with the explosive growth of apps – and the lifecycle of credential fraud.

    Register Now
  • Webinar: SOTI/Security: Credential Stuffing: Attacks and Economies

    Thursday, May 30 | 11 AM ET / 8 AM PT

    Patrick Sullivan, Security Technology and Strategy, Sr. Director, Akamai Technologies
    Shane Keats, Director of Global Industry Marketing, Akamai Technologies

    January 2019 saw the public release of a massive collection of private credentials — more than 25 billion email address and password combinations. Though much of the user information was from older data breaches, the audacious data dump reflects the reality that the theft, abuse, and sale of username/password combinations is a thriving criminal business.

    Media organizations, gaming companies, and the entertainment industry are among the biggest targets of credential stuffing attacks. The people behind these attacks realize the value of an account, whether it’s to a streaming site, a game, or someone’s social media account. And they’re willing to do whatever it takes to steal them.

    During this webinar, we’ll share the recent research that digs into this trend, which has significant impacts for gaming, video, and entertainment companies. You’ll learn:
    • Why cheap tools and free tutorials lower the bar of entry for would-be criminals
    • How malicious actors turn data breaches into substantial profits on darknet markets
    • What businesses can do to detect and prevent credential stuffing attacks

    Register Now
  • Webinar: Security in the Digital Age - Protect new attack surfaces with a Zero Trust approach

    Tue, Apr 16, 2019 06.00 am EDT

    Richard Meeus, Security Technology and Strategy Director, Akamai Technologies
    Andy Crail, Head of Solution Engineering Enterprise Security, Akamai Technologies

    Dr. Thomas Hafen Freelance Journalist for COMPUTERWOCHE

    Cloud computing, mobility, and the Internet of Things (IoT) have created a plethora of new attack surfaces. Defending the company’s perimeter does no longer make sense, as users and applications have moved outside, and often are located worldwide.

    In this webinar, we will show you, how to address these new challenges. You will learn, how to secure your IT comprehensively without compromising performance or user experience.

    Find out
    • Why a "trust and verify approach" is no longer an option for IT security.
    • How a Zero Trust security model is therefore essential for successful digital transformation.
    • How Akamai implemented the Zero Trust approach, and what we learned from the process.
    For more information participate in COMPUTERWOCHE Live Webinar Tuesday, 16th April 2019, 11.00 MEZ皇冠体育投注. Also, Richard Meeus and Andy Crail will answer your questions concerning Zero Trust Security during the live webinar.

    Register Now
  • State of the Internet / Security: DDoS and Application Attacks: On-demand Webinar


    Increase your knowledge of DDoS and application attacks, with insight from Akamai's Security Research and Intelligence experts.

    You’ll hear:
    • Who malicious bot developers are trying to attract to evolve their bot evasion techniques.
    • What mental health issues to monitor on your security team to improve wellness.
    • Why up to 45,000 routers exposed 1.7 million machines to attackers.
    • When a DDoS attack isn’t really an attack, and how Akamai experts dug in and diagnosed the real cause of 4 billion unwanted requests to a site.
    • How our experts used two methodologies to gather insight for the State of the Internet / Security report.

    View the Webinar
  • On-Demand Webinar | The Future of Live Streaming

    Recorded January 17, 2019

    For many content providers and rights-holders, live streaming represents an exciting opportunity to connect directly with their target audiences plus drive new revenue streams.

    During this webinar, we discussed topics including the pros and cons of live streaming as compared with broadcasting, how to measure quality of experience and reliability, which business models are being used, current best practices, ongoing challenges, critical initiatives, and much more.

    Hear from Alec Hendry, Senior Director of Technology Convergence for Viacom, Will Richmond, Editor and Publisher at VideoNuze, and Henrik Eriksson, Service Line Manager at Akamai Technologies, for a roundtable discussion covering:
    • The state of live streaming today
    • How to measure quality in live streaming and ensure a positive user experience
    • Successful business models for live streaming
    • Best practices associated with live streaming

    View the Webinar
  • How eSports Can Combine Old and New Monetization Models to Reach New Heights


    Money is pouring into eSports with more games, more viewers and more investments coming in. But in order for companies to take advantage of this massive opportunity, they need to go beyond just using legacy sports broadcasting models and innovate to create more compelling and interactive experiences. Watch this webinar to learn about how the current eSports model stacks up against traditional sports and the new technologies that will change the existing business model.

    View the Webinar
  • Prepare for Peak—Ensuring the Optimal Holiday Shopping Season

    Recorded on September 6, 2018


    皇冠体育投注The holiday shopping season is nearly upon us, and each year retailers must ramp up their efforts to ensure a flawless customer experience. With projections suggesting this holiday shopping period will top last year’s traffic and revenue records, ensuring that your business is prepared has never been more important.

    Join Rahul Ghosh, chief strategist of commerce at Akamai and Rick Bazaz, Sr. Engineering Mgr of eCommerce at Dick's Sporting Goods to learn tried and tested practices that have helped retailers meet and even surpass consumer expectations.

    View the Webinar
  • On Demand EMEA Webinar: Summer 2018 State of the Internet/Security

    Recorded July 26th, 2018

    Internet security is never static, and attack strategies are becoming more sophisticated than ever. Join Akamai for this webinar about trends, statistics, and real-world stories from our Summer 2018 State of the Internet / Security Report: Web Attacks.

    View the Webinar
  • 4 Pillars of Security When Downtime Isn’t an Option and Data Protection Is A Must

    Recorded July 12th, 2018

    Watch Clator Butler, Senior Security Specialist from Akamai Technologies, talk about the four pillars of security critical to the health provider industry as well as hear how others in your industry are aligning this strategy to enhance their security program, manage DDoS mitigation, monitor traffic, stay compliant and move towards a zero trust model.

    View the Webinar
  • Maximizing Success for Digital Businesses

    Recorded June 21st, 2018


    The cost of switching is low, consumers are transient, and user expectations for how digital experiences should perform have never been higher.

    Watch this webinar, to understand the methodology to overcoming these barriers by continuously improving user experiences through Monitoring the quality of user experiences, Optimizing web & mobile apps, and API performance and Validating皇冠体育投注 the impact of those investments while ensuring you are prepared to meet expectations.

    View the Webinar
  • Maintaining availability while under attack - How Whitbread and Costa mitigate Distributed Denial of Service (DDOS) attacks

    Recorded May 2, 2018

    View the Webinar
  • State of Streaming: How OTT Leaders View Quality; Opportunity Shifts to Live/Live Linear

    Recorded April 6, 2018

    皇冠体育投注 View the latest OTT industry webinar now to learn the results of the 2018 “Managing the Service” survey, where leading online video service providers shared how they are planning to address quality, scale, and economics to make OTT a viable replacement for traditional TV.

    View the Webinar
  • Webinar: Key Findings from the Ponemon Report: The Cost of Credential Stuffing

    Recorded April 5, 2018

    Credential stuffing has significant challenges for IT and security leaders trying to defend against it: It’s difficult to tell who is accessing your websites using stolen credentials, which in turn makes it problematic to prevent and remediate these attacks.

    皇冠体育投注 With the potential loss of millions of dollars at stake, it’s critical to have a smart defensive strategy and proactive response system in place. In this webinar, Dr. Larry Ponemon, founder of Ponemon Institute, discusses the results of a recent survey of more than 550 IT professionals revealing key stats about credential stuffing, including the costs incurred to prevent damage, and the consequences when attackers succeed.

    Register Now
  • On-Demand Webinar: State of the Internet/Security Report – Q4 2017 Findings (North America)

    Recorded March 29, 2018

    Patrick Sullivan, Senior Director of Security, Akamai
    Martin McKeay, Senior Security Advocate, Akamai

    Attend this webinar and arm yourself with the latest data, analysis, and in-depth research on the ever-changing threat landscape.

    We'll cover:
    • Attacks on Financial Firms
    • The Evolution of Mirai
    • Bot Traffic Analysis
    • Credential Abuse Research
    • Web Application Attack Trends for 2018

    Register Now