Attackers' primary targets - applications and identities – aren’t going to change. 98% of companies say applications are essential to their business or provide them a competitive advantage. Our world will become increasingly more dependent on the internet and applications that are the connection point between consumers and businesses. With this, applications and the identities that access applications, will continue to be gateways to data, intellectual property, and processing power that is extremely valuable to attackers.
Come learn how applications and identities are being attacked, how this has evolved over the past 2 years, and what the attack landscape looks like right now in Latin America. Most importantly, because not all attacks become breaches, learn what attacks are most likely to become breaches through F5 Labs’ 2019 breach root cause analysis, and the controls you should either implement or mature to reduce your risk of a breach.
Sara Boddy is the Director of F5’s threat intelligence reporting division: F5 Labs. Prior to F5, Boddy was the VP of Information Security and Business Intelligence at Demand Media. Before Demand Media, Boddy worked as an Information Security Consultant at Network Computing Architects and Conjungi Networks. With over 20 years’ experience in the information security field, Boddy specializes in incident response, application security and information security awareness training. She is a frequent keynote speaker, and author of F5 Labs threat intelligence reports._1591421711034