Why APIs will be the No. 1 Enterprise Attack Vector in 2022

Register Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Application programming interfaces (APIs) are increasingly enabling business innovation. A rapid increase in mobile applications, containers, serverless computing, microservices architectures and cloud adoption has led to an explosion in API usage, with many enterprises deploying hundreds or even thousands of APIs.

However, many organizations’ API security strategies are still maturing: adequate security controls have yet to be developed, vulnerable code is knowingly pushed into production and organisations are not fully aware of what is in their API estate and the exposure to risk this may represent.

With Gartner now stating APIs will be the number one attack vector for cloud applications in 2022, decision-makers responsible for protecting APIs may now need to review their security strategies. 

Join us as we explore

  • Why APIs are now the attacker’s favorite tool
  • What are the common mistakes organizations are making
  • Understanding if you need to act now by defining the scope of your attack surface and the risks this may imply.
  • What should a best practice API strategy look like

Speakers

Farrukh Ahmad

Cloud and Cybersecurity Expert , PA Consulting

Benjamin David

Deputy Editor, Infosecurity Magazine

Jason Kent

Hacker In Residence, Cequence Security

    Colin Tankard

    Managing Director, Digital Pathways

      Brought to You by

      Should you register for this event your information will be shared with the sponsor indicated above. Please see Cequence Security's privacy policy here: https://www.cequence.ai/privacy/. Please see Infosecurity Magazine’s privacy policy for additional information.