Loading Events

API Security Best Practices

Home » Events » API Security Best Practices

Sponsor

Details

Date and Time

June 15 @ 1:00 pm - 2:00 pm EDT

Event Category

Web Conference

Organizer

Sponsorship Contact

 

Send an email to

Overview

API security has emerged as a top priority for protecting vital data and services. Unfortunately, many organizations are just one vulnerable API away from a privacy incident or data breach, and it’s an area where many companies lack expertise.

Salt Security has compiled a comprehensive list of API security best practices, drawn from field experience and customer feedback, to help guide your API security journey.

Join us for this session on API security best practices focusing on these key areas:

– API documentation, discovery, and cataloging to improve awareness of your API attack surface
– Runtime protection to prevent sensitive data exposure and protect your APIs from abusive callers
– API-centric security operations so you're prepared in the event of an API incident or breach

Moderator

Speaker/s

Adam Fisher – Principal Security Engineer, Salt Security

Adam Fisher is an Enterprise Security Expert whose qualifications include a Bachelor of Science in Information Systems, Master of Business in Information Technology Management, and maintains a number of certifications, CISSP, CCSP, AWS Security Associate, Azure MCP. Adam has a detailed knowledge of Enterprise Security best practices and technologies and has been focused on the creation and deployment of solutions protecting networks, systems, and information assets for Fortune 500 companies and Government Agencies. Adam has worked on Secret level clearance projects for the United States Government and the United Kingdom. Deploying security solutions and network technologies while protecting key government data and assets. In addition, Adam is a respected blogger and thought leader on Enterprise Security.

See Adam Fisher‘s full profile.

ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.

Scroll to Top