March 26, 2019
1 PM ET
One of the most critical aspects of applications and APIs is the code that deals with users' accounts. In DevOps environments, adding instrumentation is key, and security instrumentation is no exception. Many attack types can be easily stopped with specific tools and environment configurations, but Account Takeover attacks don't follow conventional attack patterns: they look, act and feel like legitimate users. Defending Account Takeover attacks can be extremely difficult without the right tooling, visibility into your environment and intimate understanding of your users, but there are ways to make defending these attacks much easier. In this webinar, learn how DevOps teams are taking a new approach to security.
Kevin Hanaford, Head of Information Security at Remitly, will cover:
- How Account Takeover attacks became the problem they are today
- How Remitly defends against these attacks without impacting legitimate traffic
- Steps you can take today to secure your applications from ATO attacks
Kevin Hanaford, Head of Information Security, Remitly
Kevin is the Head of Information Security, Infrastructure, and IT at Remitly and leads the teams responsible for Remitly's security posture, cloud environment, development and deployment tools, and is a regular fixture at the coffee machines. Prior to arriving at Remitly, Kevin spent time running security programs for Amazon and PayPal, and managing NOCs for Bungie, Xbox, and Office 365. He takes a customer-centric view on the work he oversees and truly believes that you can increase your security posture without adding friction or sacrificing convenience if you try hard enough... it just may feel a bit like hunting for unicorns in the process.