Find out what's inside the September 2021 edition of the Journal & download a free copy of this month's featured article
- This event has passed so registration is closed.
One key aspect of digital transformation for many companies has been the evolution and rise of the remote user. Application access from any device, anywhere has become an imperative for success, but with transformation comes challenges with attack surface and network vulnerability.
Adopting a zero trust model is key to combat cybercriminals who are probing security perimeters and enterprise resources for vulnerabilities with a distinct purpose. Application access and identity is one of the key areas to begin.
Join us on ……May 15th at 1pm EST for a discussion with Akamai security professional Faraz Siddiqui as he shares steps you can take to protect your network against breaches by evolving access policies and solutions.
Jorge Orchilles – Chief Technology Officer, SCYTHE
Jorge Orchilles is the Chief Technology Officer of SCYTHE and co-creator of the C2 Matrix project. He is a SANS Certified Instructor and the author of Security 564: Red Team Exercises and Adversary Emulation. He was a founding member of MITRE Engenuity Center of Threat-Informed Defense. He is a Fellow at the Information Systems Security Association (ISSA) and National Security Institute. Prior, Jorge led the offensive security team at Citi for over 10 years.
He also co-authored Common Vulnerability Scoring System (CVSS)and A Framework for the Regulatory Use of Penetration Testing in the Financial Services Industry, and author of Microsoft Windows 7 Administrator’s Reference. Jorge holds post-graduate degrees from Stanford and Florida International University in Advanced Computer Security & Master of Science. Jorge speaks English, Spanish, and Portuguese, in decreasing levels of fluency. When he’s not hacking, teaching, or writing, you’ll find him watching and playing soccer.
Faraz Siddiqui – Principal Solution Engineer, Akamai
Faraz Siddiqui is a Principal Solution Engineer at Akamai where he helps large enterprises in adapting Zero Trust security model with various transformation stages. He is an enterprise security evangelist with years of experience working for industry leading players like F5 Networks, Cisco Systems and Alcatel Lucent.
Faraz joined Akamai in 2016 through an acquisition of Soha Systems, a security startup which developed a completely new and modern way of enterprise access using a Cloud perimeter approach, which became the foundation of Akamai Zero Trust architecture.
At Soha Systems, he was the first Sales Engineer/TME responsible for leading different aspects of product management and pre-sales activities. Faraz has been a frequent speaker at various public events and conferences F5 Agility, Cisco Live, RSA and Akamai Edge.
He has published several white papers, blogs, industry best practices on application delivery, data center virtualization, Identity aware proxies and L4-7 service insertion techniques.
Having worked with large scale enterprises for over a decade, he has a great deal of understanding of the frustrations and challenges most customer face in transformation their legacy access architectures.
Faraz holds Master’s in Electrical and Computer Engineering.
Dipto Chakravarty – Chairman of Security COE, IoT Community
Dipto Chakravarty is the author of three best-selling books on computer architecture and security from McGraw-Hill and Wiley that have been translated in five languages. He has 11 patents to his credit in AI, security and cloud, holds a M.S in Computer Science from U. of Maryland, GMP from Harvard Business School, and EMBA from Wharton School U. Penn. He is currently the Chairman of Security, Privacy and Trust COE for IoT Community, and board member at RANK Software.
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.