The Rise of API Attacks
  Wednesday, 9th February 2022
  Time: 4:30 PM IST  
  55 minutes
(Including 15 minutes of interactive Q & A)
Time Left:
 

Gartner predicts that "by 2022, API abuses will be the most-frequent attack vector resulting in data breaches for enterprise web applications, SaaS and hyperconnected multi-cloud environment"

The Rise of API Attacks

00 %

of breaches were caused by outsiders.

00 %

of the attacks are financially and reputational revenge motivated.

00 %

of API developers, testers, and product leaders list security as a major concern.

1 Trillion US$

Cost of cybercrime incidents ie.. 1 % of global GDP.

APIs play a crucial role in enabling digitization and financial inclusion.

Every connected mobile app, every website and every application deployed on a cloud service uses APIs. They provide the foundation for modernization and help organizations build successful business ecosystems). The number of APIs within organizations is growing rapidly in every departments and in lines of business and are going through a sea change due to ever changing market dynamics.

API security is less focused on the APIs you consume that are provided by other parties . For example, in large organizations, different departments may develop their own applications & services with their own APIs. Also, through mergers and acquisitions or third party services, eventually ending up with multiple API stacks or API silos.


Are you aware of shadow, Hidden API ? Do you have full visibility of API business logic behind call/argument?

You can’t secure what you’re not aware of. API discovery is a race between API providers and hackers who will easily exploit the APIs when found. API silos affect API visibility by having partial lists of APIs, under disconnected governance. Are we following Zero trust model on API?

Another obstacle to API visibility is the rogue or shadow API. Shadow APIs happen when an API is developed as part of an application but the API itself is considered an implementation detail of the application and is only known by a close-knit group of developers. Shadow APIs are not on the radar of security operatives because they don’t have visibility into the implementation details.

Register now. Introducing Ammune™ API Defense Solution"

L7 Defense in partnership with Seqrite introduces its powerful Ammune™ API defense solution in India that is designed to protect APIs and API-based applications inline utilizing innovative unsupervised AI/ML technology.

Seqrite in partnership with L7 Defense invites you to attend the webinar titled 'Is API Security on your radar?

Register Now »

Key Takeaways

1

Understanding API risk. Business logic argument of API and why WAF and API tools are not enough!

2

Inline protection be able to stop malicious API traffic before reaching its target service. User- friendly, Signatureless automated and AI-based capabilities for flexible and automatic policy setting.

3

Building zero trust model on API with High accuracy and 0.01%false positive errors.

Featured Speaker

Yisrael Gross

Yisrael Gross

VP Biz Dev & Co-Founder
L7 Defense

Expert in Technology Business Development and lead large high-tech communities. MBA from Hebrew University.

Join Me on LinkedIn
Mark Ginzburg

Mark Ginzburg

Head of R&D and Algorithms Lead Architect
L7 Defense

Geek, API evangelist , previously associated with PointGrab, IBM and IDF. Masters from Israel institute of Technology.

Join Me on LinkedIn
Indranil Chatterjee

Indranil Chatterjee

Head - Hi-Touch accounts & Sustenance - India

25+ yrs of ICT sales experience, associated with global organization likes of HCL, Singtel, Reliance and NTT.

Join Me on LinkedIn
Sagi Itcher

Sagi Itcher

Economic Consul, Head of Economic & Trade Mission to Mumbai

Creating added value to Israeli and Indian Partners through business collaborations.

Join Me on LinkedIn

Join the Webinar

Register for a no-cost, live and exclusive webinar on securing enterprise APIs from new and emerging cyberthreats.

Register Now
Time Left: