Webinars

Hear from Akamai’s industry experts on today’s trends and topics to move your business faster forward.

  • Live Webinar: Managing Your Web Application Firewall, Your Way

    Live online May 19, 2020

    Presented by
    Pratyush Sinha, Technical Account Manager, Akamai

    About this webinar
    With 178 billion WAF rule triggers every 24 hours, Akamai harnesses unmatched visibility into attacks to deliver curated and highly accurate WAF protections that keep up with the latest threats.

    In this webinar we will be covering Akamai’s flagship security solution - Kona Site Defender (KSD) - and how it protects the apps and APIs of the who’s who of the Internet at the edge. Seamlessly built on the Akamai Intelligent Edge Platform, Kona Site Defender provides Always-On protection from DDoS and application-layer attacks, with dramatically lower management overhead.

    Agenda:
    1. Threat Review and Trends
    2. Overview of Kona Site Defender
    3. Web Security Analytics
    4. Logs & Alerts
    5. Integration & Support

    Register Now
  • On-demand Webinar: How Criminals Are Playing The Gaming Industry And What You Can Do About It

    Speakers:
    Jonathan Singer, Sr. Manager, Global Games Industry, Akamai Technologies
    Scott Adams, Founder and CEO, FraudPVP
    Lonnye Bower, COO, ProbablyMonsters
    Steve Ragan, Sr. Technical Writer, Akamai Technologies
    Dean Takahashi, Lead Gaming Writer, VentureBeat

    Summary:
    View this webinar to learn how to avoid becoming the next victim in online security threats with gaming.

    You’ll learn:
    • How to protect your game and players from a growing amount of online security threats
    • The latest trends in credential abuse and account hacks in gaming
    • How web attacks are evolving and where they are headed in the future
    • How to integrate security best practices with the rest of the game for best performance

    View Now
  • On-demand Webinar: Bringing Zero Trust to the Top of the Agenda

    Recorded August 27, 2019

    Presented by:
    Patrick Sullivan, Sr. Director of Global Security Strategy, Akamai Technologies

    Summary:
    Not that long ago, many infosec leaders were asking, "What is zero trust and why should I care?" Today, it's more often, "How do I get my business owners to properly support and resource our transition to a zero trust architecture/posture?"

    Media production, marketing and delivery is a complex journey that requires countless teams, partners and individuals to access resources inside the network. Prevailing perimeter-based solutions are complex, costly and most significantly, put the intellectual property of the company at enormous risk.

    Akamai's Patrick Sullivan has been a security engineer, architect and strategist for more than 12 years working with media companies to implement Zero Trust solutions.

    Watch this OnDemand webinar where Sullivan shares hard won insights for media companies on:
    • Key ways that Zero Trust can simplify infosec implementation
    • Advice on how to assess and audit the security hygiene of key partners
    • And tips on how to communicate security risk, and the rewards of Zero Trust, to business owners

    View Now
  • On-demand Webinar - Meeting Growing Expectations for Video Quality

    Recorded August 15, 2019

    Speakers:
    Alex Balford, Sr. Product Marketing Manager, Akamai Technologies
    Nick Thomas, Associate Director, MTM

    Summary:
    In an increasingly competitive marketplace, premium video providers are looking at various ways to differentiate their OTT services. Options include investing in content, offering aggressive pricing, enhancing the user experience, and focusing on consistent streaming quality.

    This webinar, in partnership with MTM Research, reveals what senior executives from a range of premium video distributors say about current trends and dynamics, and explores their views on the importance of video quality to commercial success.

    View Now
  • On-demand Webinar: State of the Internet/Security: Web Attacks and Gaming Abuse

    Recorded June 20, 2019

    Speakers:
    Martin McKeay, Editorial Director and Security Researcher, Akamai Technologies
    Steve Ragan, Editor, Security Research and Publications, Akamai Technologies
    Patrick Sullivan, Sr. Director of Global Security Strategy, Akamai Technologies

    Summary:
    A Conversation with Security Research Experts

    Akamai security experts recently reviewed 17 months of data on credential stuffing and web application attacks, with a focus on the gaming industry.
    • The attack vector, known for over a decade, that’s in this last study, accounted for nearly ⅔ of web application attacks
    • The two vectors that together accounted for nearly 90% of these attacks
    • The inexpensive tools and resources criminals, some as young as 14, use in credential stuffing attacks on gaming companies
    • The one common factor in all successful credential stuffing attempts
    • Three surprising observations about security professionals that Akamai Chief Marketing Officer Monique Bonner shared with the security team at Akamai

    View Now
  • Webinar: Defining Security Posture in a Zero Trust World

    22 May, 2019, Wednesday. 13:00 Singapore time

    Speakers:
    Nick Hawkins, Sr. Director, Product Management, Enterprise, Akamai Technologies
    Johnny Yeo, Sr. Enterprise Security Architect, Akamai Technologies

    Summary:
    It is generally agreed that there are three key pillars of a zero trust approach - Access, Identity and Posture. In previous webinars we have explored how an identity driven approach can be used with a cloud proxy to better secure access to internal applications. In the first part of this webinar we will dive deeper into the third pillar – posture- understand what it means to a user and their devices and see how it can be integrated into a zero trust architecture. The second part will look at the mitigation aspect of posture. We’ll cover the API attack trends – how attacks are moving from web into API with the explosive growth of apps – and the lifecycle of credential fraud.

    Register Now
  • Webinar: SOTI/Security: Credential Stuffing: Attacks and Economies

    Thursday, May 30 | 11 AM ET / 8 AM PT

    Speakers:
    Patrick Sullivan, Security Technology and Strategy, Sr. Director, Akamai Technologies
    Shane Keats, Director of Global Industry Marketing, Akamai Technologies

    Summary:
    January 2019 saw the public release of a massive collection of private credentials — more than 25 billion email address and password combinations. Though much of the user information was from older data breaches, the audacious data dump reflects the reality that the theft, abuse, and sale of username/password combinations is a thriving criminal business.

    Media organizations, gaming companies, and the entertainment industry are among the biggest targets of credential stuffing attacks. The people behind these attacks realize the value of an account, whether it’s to a streaming site, a game, or someone’s social media account. And they’re willing to do whatever it takes to steal them.

    During this webinar, we’ll share the recent research that digs into this trend, which has significant impacts for gaming, video, and entertainment companies. You’ll learn:
    • Why cheap tools and free tutorials lower the bar of entry for would-be criminals
    • How malicious actors turn data breaches into substantial profits on darknet markets
    • What businesses can do to detect and prevent credential stuffing attacks

    Register Now
  • Webinar: Security in the Digital Age - Protect new attack surfaces with a Zero Trust approach

    Tue, Apr 16, 2019 06.00 am EDT

    Speakers:
    Richard Meeus, Security Technology and Strategy Director, Akamai Technologies
    Andy Crail, Head of Solution Engineering Enterprise Security, Akamai Technologies

    Moderator:
    Dr. Thomas Hafen Freelance Journalist for COMPUTERWOCHE

    Summary:
    Cloud computing, mobility, and the Internet of Things (IoT) have created a plethora of new attack surfaces. Defending the company’s perimeter does no longer make sense, as users and applications have moved outside, and often are located worldwide.

    In this webinar, we will show you, how to address these new challenges. You will learn, how to secure your IT comprehensively without compromising performance or user experience.

    Find out
    • Why a "trust and verify approach" is no longer an option for IT security.
    • How a Zero Trust security model is therefore essential for successful digital transformation.
    • How Akamai implemented the Zero Trust approach, and what we learned from the process.
    For more information participate in COMPUTERWOCHE Live Webinar Tuesday, 16th April 2019, 11.00 MEZ. Also, Richard Meeus and Andy Crail will answer your questions concerning Zero Trust Security during the live webinar.

    Register Now
  • State of the Internet / Security: DDoS and Application Attacks: On-demand Webinar

    Summary:

    Increase your knowledge of DDoS and application attacks, with insight from Akamai's Security Research and Intelligence experts.

    You’ll hear:
    • Who malicious bot developers are trying to attract to evolve their bot evasion techniques.
    • What mental health issues to monitor on your security team to improve wellness.
    • Why up to 45,000 routers exposed 1.7 million machines to attackers.
    • When a DDoS attack isn’t really an attack, and how Akamai experts dug in and diagnosed the real cause of 4 billion unwanted requests to a site.
    • How our experts used two methodologies to gather insight for the State of the Internet / Security report.

    View the Webinar
  • On-Demand Webinar | The Future of Live Streaming

    Recorded January 17, 2019

    For many content providers and rights-holders, live streaming represents an exciting opportunity to connect directly with their target audiences plus drive new revenue streams.

    During this webinar, we discussed topics including the pros and cons of live streaming as compared with broadcasting, how to measure quality of experience and reliability, which business models are being used, current best practices, ongoing challenges, critical initiatives, and much more.

    Hear from Alec Hendry, Senior Director of Technology Convergence for Viacom, Will Richmond, Editor and Publisher at VideoNuze, and Henrik Eriksson, Service Line Manager at Akamai Technologies, for a roundtable discussion covering:
    • The state of live streaming today
    • How to measure quality in live streaming and ensure a positive user experience
    • Successful business models for live streaming
    • Best practices associated with live streaming

    View the Webinar
  • How eSports Can Combine Old and New Monetization Models to Reach New Heights


    Summary:

    Money is pouring into eSports with more games, more viewers and more investments coming in. But in order for companies to take advantage of this massive opportunity, they need to go beyond just using legacy sports broadcasting models and innovate to create more compelling and interactive experiences. Watch this webinar to learn about how the current eSports model stacks up against traditional sports and the new technologies that will change the existing business model.

    View the Webinar
  • Prepare for Peak—Ensuring the Optimal Holiday Shopping Season

    Recorded on September 6, 2018

    Summary:

    The holiday shopping season is nearly upon us, and each year retailers must ramp up their efforts to ensure a flawless customer experience. With projections suggesting this holiday shopping period will top last year’s traffic and revenue records, ensuring that your business is prepared has never been more important.

    Join Rahul Ghosh, chief strategist of commerce at Akamai and Rick Bazaz, Sr. Engineering Mgr of eCommerce at Dick's Sporting Goods to learn tried and tested practices that have helped retailers meet and even surpass consumer expectations.

    View the Webinar
  • On Demand EMEA Webinar: Summer 2018 State of the Internet/Security

    Recorded July 26th, 2018

    Summary:
    Internet security is never static, and attack strategies are becoming more sophisticated than ever. Join Akamai for this webinar about trends, statistics, and real-world stories from our Summer 2018 State of the Internet / Security Report: Web Attacks.

    View the Webinar
  • 4 Pillars of Security When Downtime Isn’t an Option and Data Protection Is A Must

    Recorded July 12th, 2018

    Summary:
    Watch Clator Butler, Senior Security Specialist from Akamai Technologies, talk about the four pillars of security critical to the health provider industry as well as hear how others in your industry are aligning this strategy to enhance their security program, manage DDoS mitigation, monitor traffic, stay compliant and move towards a zero trust model.

    View the Webinar
  • Maximizing Success for Digital Businesses

    Recorded June 21st, 2018

    Summary:

    The cost of switching is low, consumers are transient, and user expectations for how digital experiences should perform have never been higher.

    Watch this webinar, to understand the methodology to overcoming these barriers by continuously improving user experiences through Monitoring the quality of user experiences, Optimizing web & mobile apps, and API performance and Validating the impact of those investments while ensuring you are prepared to meet expectations.

    View the Webinar
  • Maintaining availability while under attack - How Whitbread and Costa mitigate Distributed Denial of Service (DDOS) attacks

    Recorded May 2, 2018

    View the Webinar
  • State of Streaming: How OTT Leaders View Quality; Opportunity Shifts to Live/Live Linear

    Recorded April 6, 2018

    Summary:
    View the latest OTT industry webinar now to learn the results of the 2018 “Managing the Service” survey, where leading online video service providers shared how they are planning to address quality, scale, and economics to make OTT a viable replacement for traditional TV.

    View the Webinar
  • Webinar: Key Findings from the Ponemon Report: The Cost of Credential Stuffing

    Recorded April 5, 2018

    Summary:
    Credential stuffing has significant challenges for IT and security leaders trying to defend against it: It’s difficult to tell who is accessing your websites using stolen credentials, which in turn makes it problematic to prevent and remediate these attacks.

    With the potential loss of millions of dollars at stake, it’s critical to have a smart defensive strategy and proactive response system in place. In this webinar, Dr. Larry Ponemon, founder of Ponemon Institute, discusses the results of a recent survey of more than 550 IT professionals revealing key stats about credential stuffing, including the costs incurred to prevent damage, and the consequences when attackers succeed.

    Register Now
  • On-Demand Webinar: State of the Internet/Security Report – Q4 2017 Findings (North America)

    Recorded March 29, 2018

    Speakers:
    Patrick Sullivan, Senior Director of Security, Akamai
    Martin McKeay, Senior Security Advocate, Akamai

    Summary:
    Attend this webinar and arm yourself with the latest data, analysis, and in-depth research on the ever-changing threat landscape.

    We'll cover:
    • Attacks on Financial Firms
    • The Evolution of Mirai
    • Bot Traffic Analysis
    • Credential Abuse Research
    • Web Application Attack Trends for 2018

    Register Now