How to Architect API Security for Zero Trust

North America | April 22 | 11am MT
EMEA | April 23 | 2pm GMT
ANZ | April 30 | 11am AEST

What You'll Learn

Zero Trust requires all access to resources to be fully authenticated and authorized based on device state and user credentials. Recent breaches have shown that many aren’t prepared to apply these principles to their API infrastructures. Unfortunately, even those that get these right are still vulnerable to advanced cyberattacks.

Most recent API breaches involve hackers with valid credentials who reverse engineer APIs to gain access to other accounts and steal data.

Architecting API security for Zero Trust requires a defense in depth approach to protect your most sensitive data from breach.

Join Ping’s Field CTOs, Baber Amin and Francois Lascelles to learn about:
  • What Zero Trust means
  • Why Zero Trust architectures are replacing corporate perimeters
  • How to architect API security for Zero Trust
  • The visibility needed to ensure your APIs aren’t under attack
  • New AI based solutions for API attack detection and blocking


Baber Amin

Field CTO
Ping Identity

Francois Lascelles

Field CTO
Ping Identity

Save Your Spot

Your spot is now reserved!

An email with all the webinar details has been sent to your email address. We look forward to seeing you there. Interested in learning more? Visit our webinar archive.