Featured
Akamai Client Side Protection & Compliance
Emily Lyons, Product Marketing Manager, Boris Kirzner
In this session, we'll discuss the latest PCI DSS 4.0 requirements for script protection so brands can better identify, monitor and manage suspicious and malicious script behavior.
All episodes
-
Ready, Set, Comply: Gearing Up for PCI DSS 4.0 Compliance
Chris Trynoga - Senior Solutions Engineer & Mark Carrizosa - Akamai Global PCI Program Owner
Explore the evolving landscape of compliance through our interactive webinar, focusing on the new PCI DSS 4.0 standards. In this session, Mark Carrizosa, our esteemed Director of Information Security and owner for the Akamai Global PCI program, takes on the auditor's role in a simulated live audit, while Chris Trynoga simultaneously demonstrates how Akamai Guardicore Segmentation adeptly navigates the evolving compliance challenges of PCI 4.0. This webinar aims to clarify and simplify the complexities involved in adhering to the new standards, offering an in-depth examination of the procedures and tactics for seamless compliance navigation.
Gain hands-on experience with the most current compliance strategies and acquire thorough knowledge on the critical elements of PCI DSS 4.0, all through a mix of expert discussions and real-time demonstrations. Whether you're new to the compliance scene or a veteran looking to update your practices with the newest standards, this webinar is designed to elevate your understanding and application of compliance measures.
During the session you will::
- Understand the nuances and requirements of PCI DSS 4.0 from experienced professionals.
- Learn how to leverage Akamai Guardicore Segmentation for efficient and effective compliance with the latest standards.
- Enhance your understanding of PCI DSS 4.0 and how to apply it to your compliance efforts.Note: The simulated audit scenario presented is designed for educational purposes to illustrate proactive compliance strategies with PCI DSS 4.0. Individual results may vary.
-
How to Prepare for the Wide-Ranging Effects of NIS2 & DORA
Gerald Deck | Nuria Inserte | Cheryl Chiodi
In an era where digital threats are rapidly evolving, the European Union has responded with two pivotal regulations: the NIS2 Directive and the Digital Operational Resilience Act (DORA). These frameworks are not merely updates; they are comprehensive overhauls designed to secure the EU's digital infrastructure across all critical sectors and financial entities. NIS2 extends its reach to ensure uniform cybersecurity across the EU, while DORA establishes rigorous resilience requirements for the financial sector, affecting every organization that conducts financial operations in Europe.
This session will explore the sweeping impacts of these regulations and illustrate how compliance is not just a legal obligation but a crucial strategic advantage. The Akamai Guardicore Platform plays a vital role here, providing the sophisticated tools needed to meet these regulations—through advanced segmentation, enhanced monitoring, and robust defense mechanisms against cyber threats.
During the session, you will:
- Understand the extensive impact and delve into how NIS2 and DORA reshape the cybersecurity landscape for a wide range of organizations.
- Learn how Akamai Guardicore Platform specifically aids in adhering to these critical regulations.
- Explore actionable strategies to overcome the complexities of compliance.This webinar is designed to not only inform but also equip you with the necessary tools to navigate this new regulatory environment successfully.
-
Accelerate Your Compliance with the Latest PCI DSS Standards
Mark Carrizosa, Director, Security & Compliance Akamai
As the use of payment card data has evolved and become more widespread, the methods and techniques that attackers use to access, harvest, and sell that data have evolved in concert. The Payment Card Industry Data Security Standard, or PCI DSS, has adapted in turn, forcing companies to update their policies and their software. The latest standards, PCI DSS 4.0 and 4.0.1, include several new security requirements and updated guidance to address current threats and technologies. In this on-demand video webinar, sponsored by Akamai, you’ll learn the importance of:
Streamlining workflows for security and compliance teams
Reducing the auditing burden with purpose-built and dedicated PCI capabilities
Receiving and logging actionable PCI alerts for events related to compliance
Consolidating vendors to meet PCI requirements with Akamai’s comprehensive portfolio of security solutions. -
API Security and Compliance: Requirements for Data Protection
Stas Neyman, Director of Product Marketing | Akamai
Demonstrating compliance with data protection regulations has traditionally required significant effort and resources to mitigate mostly familiar risks. However, the digital landscape is evolving rapidly, introducing threats that many enterprise compliance programs don't fully address. Even regulatory bodies themselves can't always keep pace and provide explicit guidelines covering every aspect necessary to prevent breaches.
This is the case with API protection. Every time a customer, partner, or vendor engages with your business digitally, there's an API behind the scenes facilitating a rapid exchange of information that often includes sensitive data. Understanding and mitigating API threats is essential as APIs become increasingly integral to our technological infrastructure. This webinar will equip you with an understanding of API risks, effective strategies to safeguard your systems, and the direct implications of APIs on your compliance initiatives.
This webinar is ideal for IT professionals, security analysts, compliance officers, and anyone involved in API development and management who is looking to enhance their understanding of API security and compliance.
-
Akamai Client Side Protection & Compliance
Emily Lyons, Product Marketing Manager, Boris Kirzner
In this session, we'll discuss the latest PCI DSS 4.0 requirements for script protection so brands can better identify, monitor and manage suspicious and malicious script behavior.