Your applications are some of your organisation’s most valuable assets. They are the gateways to your data – and your customers’ data. Attackers know this better than anyone, and with apps everywhere and accessible anywhere, there is increased risk to your business.
At this live virtual summit, we’ll bring together experts from across F5 to share the latest application security strategies and how security solutions from F5, Shape Security, and NGINX can protect your applications from today’s advanced attacks and tomorrow’s emerging threats.
Tuesday, February 2, 2021 | 2:00 PM - 5:00 PM GMT
KEYNOTE SESSIONS:
At an Inflection Point: Application Security Is Required for Growth At an Inflection Point: Application Security Is Required for Growth
John Morgan, Vice President & General Manager, Security Solutions, F5 In this session, hear John Morgan, VP & GM of Security at F5, explain why applications are going through massive changes and why application security will be needed more than ever to help protect customers’ applications against the latest threats. You will learn about the new approaches needed to protect applications and how F5 can help you scale your business with its application security solutions. |
Why Security Can’t Be Optional Why Security Can’t Be Optional
Sara Boddy, Senior Director, F5 Labs and Communities, F5 Over the past 20 years, the threat landscape has evolved, not because defenders have made life more difficult for attackers but because attackers have become more innovative in their use of stolen data. It is easy for attackers to hit their targets: people, and vulnerable apps. Attackers are successful with little innovation beyond new use cases for stolen data, and their challenge is finding new business models for their bots. Because outside of compliance, security is optional. Meanwhile, defenders appear to not be learning from the past. In this talk, we will cover the evolution of risk management strategies over the years, the current threat landscape, where we are innovating and not evolving, and what we need to do moving forward. And if we choose to value a stable internet, a communication system that our modern world depends upon, security cannot be optional. |
||
|
||
|
||
|
||
|
||
|