Identity is a key factor in an organization’s security plan, as it covers both security and productivity. In this webinar, we will look at using identity management to protect your organization internally and externally:
- We have previously covered an overview of zero trust architecture concepts. There are plenty of options available when designing a zero trust network – one of them is Identity Aware Proxy (IAP). The first half of the webinar will focus on best practices when implementing an IAP to enforce identity and access rules at an application layer, rather than network layer, and ensuring access rights are based on “need to know” least access.
- The second half will focus on the rise of credential stuffing criminal activities in Asia Pacific and Japan. This session will focus on the root cause of credential stuffing, financial losses, the methodology adopted by criminals and the automation employed via botnets. We’ll cover case studies of how organisations across different industries have deployed solutions to successfully mitigate the risks posed by botnets.
Join Akamai Technologies and (ISC)² on Dec 5, 2018 (Wed) at 13:00 (Singapore time) to learn how to protect your organization inside out using identity.
Moderator: Paolo Miranda, CISSP, Vice-President, (ISC)² Singapore Chapter
Presenter : Nick Hawkins, Senior Director, Product Management, Enterprise; Aseem Ahmed, Senior Product Manager, Cloud Security, Akamai