Akamai Diversity

The Akamai Blog

Akamai at RSA Conference Asia Pacific & Japan 2014

Several people from Akamai's InfoSec team will be at RSA Conference Asia Pacific & Japan July 22 and 23 at Marina Bay Sands, Singapore. 

You can visit us at Booth G7 and see live attacks against protected Web properties using multiple popular attack methods. You can also schedule a private meeting with us so we can update you on recent enhancements and answer any specific questions you may have about Akamai, our security solutions and the recent Prolexic acquisition.

We'll also be giving some talks. Here's a roundup:

The Perimeter is Dead! Birth of the Elastic Network
Wednesday, July 23, 2014 | 10:50 - 11:35 | Sands Level 4 | Room: Peony 4503
Akamai Enterprise Security Director John Ellis will present the following: Your data lives everywhere, and resides on systems that are beyond your control. Cloud, mobile computing and 3rd parties all reinforce what we already know. The perimeter is dead. Enter the elastic network, a concept where security policies are contextually aware and data centric and are delivered beyond your network boundary. Learn to achieve better security in the hyper-connected world.

DDoS Past, Present, and Future
Wednesday, July 23, 2014 | 13:40 - 14:25 | Sands Level 4 | Room: Peony 4501
Akamai CSIRT Director Michael Smith and A10 Networks Principal Research Scientist Terrence Gareau will present the following: Over the past several years, the frequency, size, and complexity of Distributed Denial of Service attacks has grown exponentially, leaving security practitioners wondering what the future holds. In this presentation, we will cover historical attacks, current attack tool capabilities, future attack trends, and defensive techniques and technologies.

Supply Chain: The Exposed Flank
Wednesday, July 23, 2014 | 14:45 - 15:30 | Sands Level 4 | Room: Roselle 4612
Akamai Security Advocate Dave Lewis will present the following: This talk will speak to the issues pertaining to supply chain security as is relates to global organizations and the highly interconnected nature of suppliers and corporations. The presenter will pull from personal war stories to help illustrate the need to not just worry about the main corporate security perimeter, but to address the extended perimeter and the exposures and risks that arise from the supply chain. Such aspects of an exposed supply chain include trading partner networks, code developed by offshore development centers, and outsourced help desks.

We hope to see you there.