There are many things we can learn from hackers, but asking them out for coffee isn’t exactly an option. We do know that they are targeting APIs at an increasing rate for the direct access they provide to systems and data. Unfortunately, most API management solutions focus their logging, reporting and analytics capabilities on the performance of APIs. While valuable to business and operations leaders, these don’t provide the details necessary to uncover methods hackers are using to abuse APIs, exfiltrate data and take over accounts.
Join us on August 13th at 11am MST to learn where your APIs are most vulnerable and the best tools and processes you can put into place to provide increased visibility, enabling you to detect and block threats to your API infrastructures.
You’ll hear from “red teaming,” penetration testing, and API security experts who will go through best practices on how to monitor, log and report your API activity to understand hacking behavior and prevent it in the future. Attendees will be able to ask questions and come away with a better understanding of:
- Methods hackers use to uncover API vulnerabilities
- Traffic you should be logging to detect hacking behavior
- Information forensic and compliance reports must contain
- AI based solutions which can provide increased visibility