Akamai wird dieses Transkript aufzeichnen. Weitere Informationen erhalten Sie in unserer Datenschutzrichtlinie. Durch Fortfahren erklären Sie sich mit der Aufzeichnung und Nutzung Ihrer persönlichen Daten einverstanden.
Connecting off network has become the norm for many users, but for IT departments, the use of public and private Wi-Fi that can’t be monitored or controlled is a concern. Although most businesses have layers of security in place, effectively protecting off-network users — and ultimately your entire network — against credential theft and malware, as well as being able to enforce acceptable use policies, remains a challenge. In this talk, we’ll cover:
Security incidents that can occur while users are off network
Why enforcing a zero trust security model is imperative
Methods of protecting users and devices while they are off network
About the Presenter
Patrick Sullivan is Akamai’s Global Director of Security Strategy. In his 12 years at Akamai, Patrick has held a number of leadership positions including leading the Enterprise Security Architect team. Patrick and his team work with customers when they come under attack and designs security architectures to protect them from threats. In the course of helping to fend off so many attacks, he has gained unique visibility into attacks targeting many of the top Enterprises. With his unique ability to see Security issues as a critical component of a client’s business strategy, Patrick often speaks at security events and with clients around the world. Patrick holds a variety of security certifications including CISSP, GSLC, GCIH, and GWAPT. Patrick holds an Electrical Engineering degree from Virginia Tech and holds a graduate degree from George Mason University and a Graduate Certificate from Stanford University. Prior to Akamai, Patrick held various leadership positions at AT&T, Savvis, and Cable and Wireless.
While traditional perimeter based security models have served Enterprises well in the past, they are increasingly losing their effectiveness when applied to modern workloads and topologies. As applications shift out of the data center and into the cloud, and employees, partners, and contractors shift from dedicated offices to remote access in homes and coffee houses, the perimeter itself is dissolving. Traditional VPNs are being stretched beyond their initial purpose to desperately try to hold together the remnants of an increasingly obsolete network architecture. And no one knows that better than the threat actors who are exploiting weaknesses in traditional security perimeters that simply weren’t designed for this.
Holiday season accounts for 20 percent of the retail industry's annual sales and it is often responsible for up to 30 percent of some individual retailer's total annual sales. As the stakes are extremely high during such a short period of time, you can't afford to let customers down with bad experiences and miss out on their business.
Our emotional brain is highly tuned for making decisions based on the subtleness of features. What we see with our eyes is highly processed by our brains and subconsciously impacts how consumers buy products, or interact with brands.