John Ellis is Chief Strategist, Cyber Security (Asia Pacific & Japan) at Akamai Technologies, where he is responsible for providing thought leadership, business development and advocating Akamai's security technologies to help customers address their business challenges in cyber security.
John is an experienced thought leader with over 20 years of IT security strategy and technology solutions experience, with the last decade, spent in Asia. John has held senior technology positions at Standard Chartered Bank, Barclays Capital and Telstra.
John's career spans time working in his native New Zealand, Australia, and Singapore. During his time in Asia, John has taken the opportunity to learn conversational Mandarin and is continuing to improve his understanding of Asian culture.
John is currently studying for his Masters of Cyber Security, Strategy and Diplomacy at the University of New South Wales at the Australian Defence Force Academy (UNSW Canberra). This masters course provides advanced interdisciplinary study into the political, military, diplomatic and higher level management aspects of issues where cyber security, strategy and diplomacy interact.
John holds industry certifications (SANS GIAC, TOGAF, CISSP, CISM, CISA, ITIL) and is an active member of industry interest groups in Singapore and Australia.
Web Threats of Past, Present and Future
Nothing comes off the plate" was a comment retold by the former CIO of the Whitehouse, in response to the challenges of securing today’s modern organisation. We are confronted with new and fast developing threat classes yet still need to be vigilant in combating the variety of threats of yesteryear that still plague us.
Digital disruption is in all full swing with the Internet at the core. The Internet is connecting everyone and everything, providing the platform to scale our business, yet also connecting us to a variety of nefarious threat actors.
Join John Ellis, Akamai’s Chief Strategist, Cyber Security as he takes a chronological examination of web vulnerability classes, their history, exploitation and uses in current attack campaigns. The presentation will conclude with an assessment of the future possibilities and developmental pathways that cyber criminals will take in exploiting the ever-growing web threat/vulnerability classes.