- This event has passed so registration is closed.
API security has emerged as a top priority for protecting vital data and services. Unfortunately, many organizations are just one vulnerable API away from a privacy incident or data breach, and it’s an area where many companies lack expertise. Salt Security has compiled a comprehensive list of API security best practices, drawn from field experience and customer feedback, to help guide your API security journey. Join us for this session on API security best practices focusing on these key areas: – API documentation, discovery, and cataloging to improve awareness of your API attack surface – Runtime protection to prevent sensitive data exposure and protect your APIs from abusive callers – API-centric security operations so you're prepared in the event of an API incident or breach
Betty currently serves on the ISSA International Board of Directors and is a past President of the MN-ISSA chapter. Betty has over twenty years’ experience in Information Technology and Information Security in positions of progressive responsibility and technical expertise. She has worked on information security planning, developing and delivering security programs. She is respected as a decision-maker and creative problem solver with demonstrated ability to achieve desired results while maintaining effective team cooperation. She has worked with several security regulations and standards including HIPAA, ISO17799, COBIT, Payment Card Industry Standard, NIST Standards and IRS Publication 1075. Betty is CISSP and CISA certified.
Adam Fisher – Principal Security Engineer, Salt Security
Adam Fisher is an Enterprise Security Expert whose qualifications include a Bachelor of Science in Information Systems, Master of Business in Information Technology Management, and maintains a number of certifications, CISSP, CCSP, AWS Security Associate, Azure MCP. Adam has a detailed knowledge of Enterprise Security best practices and technologies and has been focused on the creation and deployment of solutions protecting networks, systems, and information assets for Fortune 500 companies and Government Agencies. Adam has worked on Secret level clearance projects for the United States Government and the United Kingdom. Deploying security solutions and network technologies while protecting key government data and assets. In addition, Adam is a respected blogger and thought leader on Enterprise Security.
Recent On-Demand Web Conferences
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.