The Blueprint to Secure API Design Through Effective Threat Modeling

Logo
Presented by

Elango Balusamy, Co-founder & CTO | SquareShift Technologies

About this talk

In the digital age, APIs are the backbone of digital transformation, powering everything from mobile apps to microservices. However, as the complexity and connectivity of systems increase, so does the attack surface and their vulnerability to cyber attacks. The key to securing these systems lies not just in the application of security measures post-development but in embedding security considerations throughout the Software Development LifeCycle (SDLC). This session, sheds light on the process of threat modeling and showcases its critical role in designing secure and resilient APIs. During this session, we will be covering - The fundamentals of threat modeling. - Integrating threat modeling to API lifecycle. - Case studies and real-world applications. - Tools and techniques for effective threat modeling. - Overcoming common challenges. This session is designed for developers, security professionals, and IT leaders seeking to enrich their API security strategy through the power of threat modeling. By the end of this session, attendees will be equipped with the knowledge and tools needed to implement a robust threat modeling process, transforming their API design process. About the speaker: Elango is CISSP certified and accomplished technology leader with 20+ years of experience building high-performance engineering organizations for high-tech and financial services businesses across multiple geographies. He oversaw several cloud implementations that meet the highest standards of security and compliance for top-tier banks across Singapore, Thailand and the United States.
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (617)
Subscribers (204637)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.