Results

Astrix on a CISO Series Episode: Hacking Third-Party Integrations

Dana Katz July 15, 2022
Astrix logo on a blue background, featuring curved lines and key symbols, emphasizing our role as the leading NHI security platform. Alt text: "Astrix logo with key symbols on a blue background, highlighting expertise in non-human identity management.

Astrix Co-Founder & CEO, Alon Jackson, recently joined Dan Walsh, the CISO of VillageMD, and David Spark, host of CISO Series for an hour of critical thinking about securing app-to-app integrations. Astrix Co-Founder and

The Super Cyber Friday episode dedicated to third-party application integration security: β€œHacking Third-Party Integrations” is now available to watch here.

Main topics covered:

  • How are applications being brought into the enterprise IT environment? What does the security department know about and don’t know about?
  • What is the non-user activity that’s happening among applications?
  • How do you keep tabs on this activity that appears to be just a push for more automation?
  • What’s the vulnerability of low code and no code apps that allow people to connect apps easily?
  • What can’t we see in these third party integrations that we should want to see?
  • How do you determine which app integrations are risky?

Tune in as Jackson and Dan discuss the risks of app-to-app connectivity, low-code/no-code iPaaS, and more:

Click here to watch the full episode here.

Here’s a sneak peek:

Blue Star About the Author

Dana Katz

Dana Katz

Dana is the VP of Marketing at Astrix Security, where she spearheads global brand strategy, demand generation, and thought leadership initiatives. With deep expertise in cybersecurity marketing, Dana has successfully orchestrated go-to-market campaigns that underscore the importance of identity-first securityβ€”especially in the burgeoning field of machine identities (API keys, service accounts, AI agents).

Learn more

The AI Agent Adoption Blueprint: Understanding AI Agents and How They Really Work

The AI Agent Adoption Blueprint: Understanding AI Agents and How They Really Work

Chris Hughes Co-Founder and CISO, Aquia
What Is AI Agent Security?

What Is AI Agent Security?

Dr. Chase Cunningham Leading Cybersecurity Expert
The Security Challenges of AI Adoption

The Security Challenges of AI Adoption

Daniel Kelley Founder, Cyberou