It is generally agreed that there are three key pillars of a zero trust approach - Access, Identity and Posture. In previous webinars we have explored how an identity driven approach can be used with a cloud proxy to better secure access to internal applications. In the first part of this webinar we will dive deeper into the third pillar – posture- understand what it means to a user and their devices and see how it can be integrated into a zero trust architecture. The second part will look at the mitigation aspect of posture. We’ll cover the API attack trends – how attacks are moving from web into API with the explosive growth of apps – and the lifecycle of credential fraud.
Join Akamai Technologies and (ISC)² on May 22 to learn how to define security posture in a zero trust world.
Presenter: Nick Hawkins, Senior Director, Product Management, Enterprise, Akamai Technologies
Presenter: Johnny Yeo, Senior Enterprise Security Architect, Akamai Technologies
Moderator: Kawin Boonyapredee, CISSP, Executive Security Advisor, IBM Security