API Security: How Are You Securing the #1 Attack Vector?
Abstract
Proactively discovering security threats like ransomware, malware, data injections and more may be a part of your daily life by now. But did you know that Gartner predicts that in 2022, application programming interface attacks will become the most-frequent attack vector. And yet many security leaders do not even know how many APIs they have in their environments – never mind their level of security. So, what are you doing proactively to protect your environment from API vulnerabilities, design flaws and misconfigurations? Join our March meeting to better understand basic API security practices that all organizations can implement to create a more resilient security posture.
Robert Smith
Field CISO, Noname API Security
Robert is a seasoned information technology and security professional with over 17 years of experience. He joined the team at Noname Security, coming from the partner community. Before the partner side, he led Engineering and Architecture, Security and Compliance, and Project Management for a publicly-traded waste management company.
Robert brings a deep security background from being the liaison to the business in the CISO role, building and managing security programs, to exploiting and compromising systems as a penetration tester. Having spent years in various security roles and being a security officer, Robert is very experienced in regulatory compliance, passionate about security, and a Marine Corps Veteran.
Agenda
March 8 : Virtual Event
Time Details: 5:00 PM – 6:15 PM
*Disclaimer
ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation. Subject to the rights granted in all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.
*Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.
*Permission to be Photographed, Videotaped, and Recorded
By attending this event, the registrant grants permission to be photographed, videotaped, and recorded during the event (in person or virtual). The resultant photographs, video recordings and virtual event recordings may be used by ISACA for future promotion of ISACA’s educational events on ISACA’s web site, on social media and/or in printed promotional materials, and by attending this event, the registrant consents to any such use. The registrant understands any use of the photographs, video recordings and virtual event recordings will be without remuneration. The registrant also waives any right to inspect or approve the aforementioned use of any photographs, video recordings and virtual event recordings now or in the future.