Resilience from the Cloud to the Edge
Rapidly advancing application architectures and the shift to a remote working culture have forced drastic changes to how businesses engage their customers, manage their work forces, and even how they design their networks. There has never been so much potential for disruptive innovation, just as motivated adversaries attempt to exploit every opportunity to disrupt digital business. Disruptions caused by outages, data theft, fraud, or by the proliferation of malware and ransomware campaigns impact customer trust and a business’s reputation. Join this session to learn about key trends in cybersecurity and Zero Trust security, and how businesses can stay resilient in the face of growing threats to their applications, infrastructure, and workforce.
Building a Zero Trust Roadmap, David Holmes from Forrester
Guest speaker, David Holmes, Forrester’s analyst for Zero Trust, works with clients assessing maturity and building Zero Trust programs. In his talk, he will share the concise definition for modern Zero Trust and show how both Forrester and CISA measure its maturity in an organization. He will address where to start, and will finish with a look at the purest form of Zero Trust on a network, a subject he is quite familiar with having just published the world’s only evaluative research with his Forrester Wave: Microsegmentation, Q1 2022.
A Social Engineer’s Playbook & How to Stop Hackers Like Me
At the world’s largest hacker conference, DEF CON, a CNN journalist asked Rachel Tobac to take over as many accounts as she could using only human based exploits. By the end of the day, Rachel had wreaked havoc on 10+ accounts, siphoned thousands of dollars worth of points into accounts she controlled, disrupted his travel plans, and was even ready to shut his lights off. Rachel did all of this without ever once contacting the journalist. Learn the human exploit playbook Rachel used to social engineer her way into her target’s accounts in one day without a single line of code, and what you can do to stop attackers like her in their tracks.
Breaking the Ransomware Attack Chain
Despite consistent increases in security spending, ransomware remains an ever-growing threat to businesses. Surprisingly, the ransomware itself, the malware that does the encryption, is only a part of a larger, equally dangerous, attack chain. Considering the entire chain offers defenders more opportunities to thwart the attack before mass encryption can occur.
In this session, Akamai will provide details on how microsegmentation can prevent adversarial techniques that precede and follow the deployment of ransomware itself. By turning our attention to the entire kill chain, a path towards minimizing the likelihood, impact, and recovery of ransomware time become clear.
In this session you will learn:
- Practical steps you can take to disrupt the kill chain before ransomware can be deployed.
- How to leverage complex environments and expedite the path towards policy enforcement that drastically reduces the impact of ransomware.
- How advancements in host-based segmentation are helping businesses achieve an infrastructure that enables rapid remediation of ransomware events without disrupting business operations.