Featured
What’s Changing in Ransomware for Asia Pacific: Who, What and How?
Reuben Koh, Director, Security Technology and Strategy, APJ, Akamai
Despite the growing awareness of ransomware threats and an availability of numerous tools, the Asia Pacific and Japan (APJ) region continues to witness a significant rise in victim companies. In the latest State of the Internet report, Akamai’s threat researchers meticulously examine the evolving ransomware landscape. Gain deep insights into the ‘who, what, and how’ aspects, especially concerning APJ, alongside Reuben Koh, a contributor to the report.
Join us for this session to understand:
- The evolving tactics and prominent trends in ransomware
- Which ransomware operators are currently dominating the scene in APJ
- Which industries are bearing the brunt of these attacks
- The most potent attack techniques employed
- How to better defend against ransomware
Presenter: Reuben Koh, Director, Security Technology and Strategy, APJ, Akamai
Moderator: Emily Kong, CISSP, CCSP
All episodes
-
Hardening your Kubernetes cluster against Advanced Persistent Threats
Dean Houari, Security Technology and Strategy Director, APJ
The adoption of cloud native applications is expanding attack surfaces, and it is critical to adopt the right security strategy to mitigate cyber threats like Advanced Persistent Threats (APTs) and ransomware.
How do you gain visibility and control of containerized application workloads such as Kubernetes? How do you apply network security guardrails without impacting the dynamic nature of rapidly deploying software?
We will answer all these questions and more, while demystifying network security around K8s.
Join us to learn:
- Why microsegmenting a K8s cluster is crucial
- Differences between securing K8s compared with legacy environments
- How microsegmentation can accelerate your cloud migration while mitigating APTs and ransomware -
Getting visibility and security right for workloads in hybrid environments
Marc Lainez - Sr. Security Specialist in Akamai Technologies
You have to see something to secure it. While the shift from traditional on-premises data centers to cloud, multicloud, and hybrid cloud models has unlocked many new business benefits, it has also increased the size of the attack surface while diminishing the effectiveness of perimeter-focused security.
Businesses seeking to reduce attack surface can benefit from greater visibility and more granular policy controls that can be applied consistently across the data center, any cloud, containers, virtual machines and all workloads.
This led to the evolution to software-defined segmentation which allows companies to apply workload and process-level security controls to data center and cloud assets. And the crux to success lies with visibility.
Join Marc Lainez, Senior Solutions Engineer, to find out more about how you and your organization can ensure that your microsegmentation journey is a success by gaining the right level of visibility through:
1. Visualization of assets and application dependencies down to the process-level activities
2. Multi-dimension visibility across hybrid environments
3.Detection of malicious connections and lateral movements
4.Discovery of non-compliant and high risk asset exposures including zero day threats
5.Collection of unique telemetries for Zero Trust posture assessment -
How To Achieve Zero Trust
Patrick Sullivan, Akamai | Dan Petrillo, Akamai | Aleksandar Radosavljević, STADA Group
Zero Trust is no longer just a buzz phrase. It has become a business staple. Zero Trust represents a move away from “trust but verify” to “never trust, always verify.” And with your attack surface growing and threat landscape shifting, it’s no surprise that you are beginning to consider Zero Trust as a business must-have.
But how do you get started with your Zero Trust roadmap? What are the key considerations and the potential challenges you could face?
Join us in this webinar as we discuss:
• Best practices for creating your Zero Trust roadmap
• How Zero Trust helps to facilitate digitization and cloud migration efforts
• How does Zero Trust enable the hybrid workforce?
• The value of proactive protection, and why it’s important -
Get Started with Segmentation
Patrick Sullivan, CTO, Security Strategy, Akamai | Jason Aguiar, Senior Sales Engineer, Akamai
In our previous webinar, we discussed building out your Zero Trust roadmap. But what about segmentation? If Zero Trust achieves security measures by leveraging segmentation, what can you do to get started on your segmentation journey and ensure success for your Zero Trust initiatives?
Segmentation does not have to be cumbersome or costly. The key is to protect your critical assets and grow from there. But what is your first step to getting started with segmentation, and what are the critical processes involved?
Join us in this webinar where you will learn:
• How to gain visibility through segmentation
• How to get started on your segmentation journey
• Why it’s okay to start small with segmentation
• And more! -
Making Zero Trust a Priority for Your Cybersecurity Strategy
John Grady, Principal Analyst at Enterprise Strategy Group | Bryan Ward, Field CTO Enterprise Security Group, Akamai
Zero Trust represents a real opportunity for business growth, for greater operational security, and for organizational alignment. But understanding where Zero Trust fits into your security strategy, and how to prioritise ZTNA, is key to setting you apart from the crowd.
-
Exploring Key Use Cases for Microsegmentation
John Grady, Principal Analyst at Enterprise Strategy Group | Laurent Jacquemin, Field CTO, Enterprise Security Group, Akamai
It’s no shock that organizations understand the inherent value of microsegmentation. Despite only 36% of organizations using microsegmentation today, 91% anticipate using microsegmentation in the next two years. This gap is in part due to the use of the wrong tools, but also confusion as to where to start with a microsegmentation project. While many businesses plan on using microsegmentation to support their Zero Trust goals, the breadth of these projects can lead to unforeseen challenges.
-
Stopping Threat from becoming Breaches with Micro-segmentation & Threat Hunting
Reuben Koh - Director , Security Technology & Strategy - APJ
As modern-day cyber threats evolve and become increasingly sophisticated, typical security defences can and will be circumvented. This can result in threat actors establishing persistence undetected in victim’s networks and choosing to launch devastating attacks at opportune moments of their choosing, giving little time for organisations to respond. In this session, we will be discussing on why combining two critical strategies - micro-segmentation and proactive threat hunting, is not only able to effectively restrict lateral movement of advanced threats within the network but also actively search for previously undetected threats and identifying vulnerabilities before they can be exploited.
-
Top Priorities for Evaluating Microsegmentation Solutions
John Grady, Principal Analyst at Enterprise Strategy Group | Garrett Weber, Field CTO - Enterprise Security, Akamai
It has been established that microsegmentation is a fast-growing essential business building block - from gaining visibility into your applications and workloads, developing your security posture, and enabling Zero Trust - microsegmentation represents exciting advancements for operational security.
But there are many approaches organizations have at their disposal, and understanding the tools and solutions that suit your business needs and requirements is essential for longevity and success.
In this session, we’ll be reviewing the solutions and tools available today, the mistakes to avoid, and how to set your business up for success.
Join Akamai and Enterprise Strategy Group Analysts as we discuss:
- Considerations before assessing Microsegmentation vendors
- Where historical microsegmentation tools have fallen short in the past, and the tools available today
- How you can gain visibility into your network using Microsegmentation
- AI and machine learning in the microsegmentation space
- And more!Join this webinar to get an exclusive first look at our white paper.
-
What’s Changing in Ransomware for Asia Pacific: Who, What and How?
Reuben Koh, Director, Security Technology and Strategy, APJ, Akamai
Despite the growing awareness of ransomware threats and an availability of numerous tools, the Asia Pacific and Japan (APJ) region continues to witness a significant rise in victim companies. In the latest State of the Internet report, Akamai’s threat researchers meticulously examine the evolving ransomware landscape. Gain deep insights into the ‘who, what, and how’ aspects, especially concerning APJ, alongside Reuben Koh, a contributor to the report.
Join us for this session to understand:
- The evolving tactics and prominent trends in ransomware
- Which ransomware operators are currently dominating the scene in APJ
- Which industries are bearing the brunt of these attacks
- The most potent attack techniques employed
- How to better defend against ransomwarePresenter: Reuben Koh, Director, Security Technology and Strategy, APJ, Akamai
Moderator: Emily Kong, CISSP, CCSP