talk-data.com
People (1 result)
Activities & events
| Title & Speakers | Event |
|---|---|
|
Kong Developer Day: API Security
2025-01-30 · 17:00
In an era of escalating cyber threats and sophisticated attack vectors, securing APIs has become more critical than ever for organizations building modern applications. The surge in API adoption has created new security challenges that go beyond traditional web security approaches. APIs are the foundation of modern applications, driving unprecedented digital transformation but also expanding the attack surface. However, effectively securing APIs across an organization requires addressing complex challenges like authentication, authorization, data protection, threat detection, and compliance requirements. Whether you're a developer implementing API security best practices, a security engineer designing zero-trust architectures, or an architect establishing enterprise-wide API governance - this is an essential event to strengthen your API security strategy. Learn how to protect your APIs while enabling innovation and maintaining development velocity. Agenda 9:00am - Protecting your APIs: Moving Beyond OWASP Top 10 (Veena Rajarathna, Staff Product Manager, Kong) 9:30am - The Most Prevalent Code Flaws in API Development and How Hackers Exploit Them (Inon Shkedy, Head of Security Research, Traceable AI) 10:00am - Building Trust in a Zero Trust World: Network Security and Auth Best Practices with Kong API Gateway (Greg Peranich, Solutions Engineer, Kong) |
Kong Developer Day: API Security
|
|
Kong Developer Day: API Security
2025-01-30 · 17:00
In an era of escalating cyber threats and sophisticated attack vectors, securing APIs has become more critical than ever for organizations building modern applications. The surge in API adoption has created new security challenges that go beyond traditional web security approaches. APIs are the foundation of modern applications, driving unprecedented digital transformation but also expanding the attack surface. However, effectively securing APIs across an organization requires addressing complex challenges like authentication, authorization, data protection, threat detection, and compliance requirements. Whether you're a developer implementing API security best practices, a security engineer designing zero-trust architectures, or an architect establishing enterprise-wide API governance - this is an essential event to strengthen your API security strategy. Learn how to protect your APIs while enabling innovation and maintaining development velocity. Agenda 9:00am - Protecting your APIs: Moving Beyond OWASP Top 10 (Veena Rajarathna, Staff Product Manager, Kong) 9:30am - The Most Prevalent Code Flaws in API Development and How Hackers Exploit Them (Inon Shkedy, Head of Security Research, Traceable AI) 10:00am - Building Trust in a Zero Trust World: Network Security and Auth Best Practices with Kong API Gateway (Greg Peranich, Solutions Engineer, Kong) |
Kong Developer Day: API Security
|
|
Kong Developer Day: API Security
2025-01-30 · 17:00
In an era of escalating cyber threats and sophisticated attack vectors, securing APIs has become more critical than ever for organizations building modern applications. The surge in API adoption has created new security challenges that go beyond traditional web security approaches. APIs are the foundation of modern applications, driving unprecedented digital transformation but also expanding the attack surface. However, effectively securing APIs across an organization requires addressing complex challenges like authentication, authorization, data protection, threat detection, and compliance requirements. Whether you're a developer implementing API security best practices, a security engineer designing zero-trust architectures, or an architect establishing enterprise-wide API governance - this is an essential event to strengthen your API security strategy. Learn how to protect your APIs while enabling innovation and maintaining development velocity. Agenda 9:00am - Protecting your APIs: Moving Beyond OWASP Top 10 (Veena Rajarathna, Staff Product Manager, Kong) 9:30am - The Most Prevalent Code Flaws in API Development and How Hackers Exploit Them (Inon Shkedy, Head of Security Research, Traceable AI) 10:00am - Building Trust in a Zero Trust World: Network Security and Auth Best Practices with Kong API Gateway (Greg Peranich, Solutions Engineer, Kong) |
Kong Developer Day: API Security
|
|
Building Trust in a Zero Trust World: Network Security and Auth Best Practices with Kong API Gateway
2025-01-30 · 10:00
Greg Peranich
– Solutions Engineer
@ Kong
kong api gateway
zero trust architecture
authentication
authorization
|
|
|
Inon Shkedy
– Head of Security Research
@ Traceable AI
api security
secure coding
threat modeling
input validation
|
|
|
Protecting your APIs: Moving Beyond OWASP Top 10
2025-01-30 · 09:00
Veena Rajarathna
– Staff Product Manager
@ Kong
api security
owasp top 10
kong api gateway
|
|
|
The wide adoption of cloud-native and microservice-based applications to connect applications, data, and devices across the enterprise has led to an exponential growth in APIs. But as the API ecosystem grows, so does the risk of exposing sensitive data. APIs get directly to critical and sensitive data, making them a valuable target for hackers. How can you ensure your APIs are protected from malicious attacks and unauthorized access? Join Inon Shkedy, Head of Security Research at Traceable AI and co-author of the OWASP API Top 10 Project, as he takes a closer look at the largest, most common API vulnerabilities. In this session, Inon will cover:
|
The Most Prevalent Code Flaws in API Development and How Hackers Exploit Them
|
|
The wide adoption of cloud-native and microservice-based applications to connect applications, data, and devices across the enterprise has led to an exponential growth in APIs. But as the API ecosystem grows, so does the risk of exposing sensitive data. APIs get directly to critical and sensitive data, making them a valuable target for hackers. How can you ensure your APIs are protected from malicious attacks and unauthorized access? Join Inon Shkedy, Head of Security Research at Traceable AI and co-author of the OWASP API Top 10 Project, as he takes a closer look at the largest, most common API vulnerabilities. In this session, Inon will cover:
|
The Most Prevalent Code Flaws in API Development and How Hackers Exploit Them
|
|
The wide adoption of cloud-native and microservice-based applications to connect applications, data, and devices across the enterprise has led to an exponential growth in APIs. But as the API ecosystem grows, so does the risk of exposing sensitive data. APIs get directly to critical and sensitive data, making them a valuable target for hackers. How can you ensure your APIs are protected from malicious attacks and unauthorized access? Join Inon Shkedy, Head of Security Research at Traceable AI and co-author of the OWASP API Top 10 Project, as he takes a closer look at the largest, most common API vulnerabilities. In this session, Inon will cover:
|
The Most Prevalent Code Flaws in API Development and How Hackers Exploit Them
|
|
The wide adoption of cloud-native and microservice-based applications to connect applications, data, and devices across the enterprise has led to an exponential growth in APIs. But as the API ecosystem grows, so does the risk of exposing sensitive data. APIs get directly to critical and sensitive data, making them a valuable target for hackers. How can you ensure your APIs are protected from malicious attacks and unauthorized access? Join Inon Shkedy, Head of Security Research at Traceable AI and co-author of the OWASP API Top 10 Project, as he takes a closer look at the largest, most common API vulnerabilities. In this session, Inon will cover:
|
The Most Prevalent Code Flaws in API Development and How Hackers Exploit Them
|