API Threat Protection: Learning From Real Life Examples

Every day, new data breaches occur and many of them happen through APIs.

Our goal in this session is to share pragmatic, directly actionable best practices for API threat protection. Taking real breaches as examples, we analyze what went wrong and explain how those breaches could have been prevented.

In this session, we will:
– Describe what API Security encompasses, and the different layers at which security must be applied.
– Provide an overview of the OWASP API Security Top10
– Deep dive into recent breaches and bug bounties
– Share several approaches to secure your APIs, learning from the root causes of those breaches.

This session is not product-oriented, but rather action-oriented!


Isabelle Mauny

Field CTO