SlideShare a Scribd company logo
Harnessing the
Speed of Innovation
Jyoti Bansal
Co-Founder and CEO, Traceable
jyoti@traceable.ai
▪ Introduction
▪ The evolution of modern app development
▪ How to solve for complex API challenges
▪ Securing APIs in the new world
▪ What the future holds
Agenda
Software Code and
APIs are Everywhere
Nos of Developers
45 million
Nos of APIs
1.2 Billion
100 Million
< 10 Million
< 1 Million
2020 2030
2.8 have been written in the past 20 years.
Trillion Lines of Code
2010
25 Million
VS
APIs Connect
Everyone and Everything
IDC predicts by 2022, 90% of new
enterprise applications worldwide will be
developed as cloud-native, using agile
methodologies and API-driven
architectures that leverage microservices,
containers, and serverless functions.
IDC FutureScape: Worldwide Cloud 2020
Predictions, Doc # US44640719, October 2019
API
Cloud
Services
Healthcare
Mobile
Services
Real
Estate
E-commerce
Govern
ment
Education
Crypto
Financial
Services
Insurance
Media/
Entertai
nment
Hi-Tech
Growing API
Security Crisis
91% of organizations had an API
Security incident last year…
Security Magazine - Feb 2021
Data Breaches & Exfiltration
Business Fraud
Sensitive Data Exposure
Customer & Employee Privacy Violations
Regulatory Fines
Intellectual Property Theft
Business Fraud via API
Allowed attacker to make unlimited
cryptocurrency trades between
different currency accounts
Learn more
Attackers could initiate orders and trade
cryptocurrency they did not have by
modifying the API - the coinbase validation
logic did not verify source account properly,
and processed the trade normally.
Hacker could take over Apple iCloud
Accounts by exploiting the password
reset API endpoint of “Forgot Password”
function
Missing logic
validation check
in a retail
brokerage API
endpoint
Allowed attacker to bypass 2-Factor
authentication, SMS verification and
password validation rate limits
Learn more
Rate limiting
protection failed
to work as
designed
APIs hijacked and modified
API Attacks Are Hard to Detect
▪ Mostly Unknown threats
▪ Malicious usage of APIs for
unauthorized activities
▪ Exploit your own code and business
logic
Hard to Detect and High Signal to
Noise Ratio
Countless
Attack Surfaces
Ever-changing
Competitive
Landscape.
Business And Technical Challenge -
Constant Change
Costumer
Needs Change
Frequently.
Critical Pivots:
Process, Architecture,
Culture, Engg.
Smaller,
autonomous
teams.
Business And Technical Challenge - Agile
Distributed Dev Teams
Shift from
tightly coupled,
monolithic
systems to
loosely coupled
APIs.
Higher ratio of
dev to security
Securing APIs in
this new world…
You Can’t Secure
What You Can’t See
Application Context
API ACTIVITY
Edge API Calls
Internal API Calls
Sequence of API Calls
USER ACTIVITY
Identity
Devices
Roles & Permissions
DATA FLOW
Across Sequence of Calls
Between Internal Services
To External Services
CODE EXECUTION
API Parameters
Request/Response Data
Errors & Latency
rider / view locations
rider / reserver car
rider / process payment
rider / send receipt
01010
01010
01010
01010
01010
Observability is the core foundation of application security
Edge APIs Internal APIs External Service
Move Over Networks,
CODE Is The Next Frontier
Of Cyber Security
What the
future holds…
What the future holds…
Transformation
journeys that
integrate
speed,
innovation.
01 02 03
APIs will become
the primary
vector of attack.
Even more
adoption of
APIs as the
primary method
of delivering
value.
Top Three Approaches Needed
for API Security
Observability is Key
Data Lake
and Threat Hunting
▪ Capture and correlate all
transactions and data for all APIs
and microservices (internal,
external, shadow, orphaned, 3rd
party)
▪ Comprehensive breadth and
depth of data captured for
application security &
observability
▪ Store every data trace from
all API and data transactions
▪ All data is explorable,
searchable, and filterable
▪ Enables deep root cause
analysis and threat hunting
▪ Build full application context
▪ Understand user behavior
across all activity and time
based on user attribution of
every transaction.
▪ Correlate all activities across
sessions and time into user
storylines
Machine Learning
Platform for Context
Culture and Collaboration is Key
Data transparency
is the foundation
of collaboration.
01 02 03
API security
has to be part
of development
culture.
Continuous
learning
between API
Development
and Security
teams.
Questions?
Jyoti Bansal
Co-Founder and CEO, Traceable
jyoti@traceable.ai
Thank you.
Jyoti Bansal
Co-Founder and CEO, Traceable
jyoti@traceable.ai

More Related Content

PDF
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...
PDF
The winners and losers in the move to the Real-Time Cloud Communications
PDF
I Love APIs London 2016 Keynote
PDF
CA Continuous Application Insight: Discovery, Insight, Automation for Paralle...
PPTX
apidays Paris 2024 - Layered Approach of API Security Strategies and its Busi...
PDF
5 Must-Know Software Development Trends Shaping the Future.pdf
PDF
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
PDF
La Seguridad en la Economía de las Aplicaciones
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...
The winners and losers in the move to the Real-Time Cloud Communications
I Love APIs London 2016 Keynote
CA Continuous Application Insight: Discovery, Insight, Automation for Paralle...
apidays Paris 2024 - Layered Approach of API Security Strategies and its Busi...
5 Must-Know Software Development Trends Shaping the Future.pdf
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
La Seguridad en la Economía de las Aplicaciones

Similar to 2022 APIsecure_Harnessing the Speed of Innovation (20)

PDF
Zymr Fintech app development
PDF
Leveraging Cloud and APIs as a Platform for Innovation
PDF
[WSO2Con EU 2018] Keynote - The API Driven World
PDF
6G WILL UNLOCK THE POWER OF AI-FOR-EVERYTHING
PDF
The Cloudification of Capital Markets
PDF
The 10 Most Promising IAM Solution Providers in 2022.pdf
PDF
API Security Needs AI Now More Than Ever
PPTX
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
PDF
Building the TAD ecosystem
PPTX
Software panel
PDF
Continuous delivery for digital transformation renu rajani v0 1
PDF
F5-API-Security-Best-Practices.pdf
PDF
Design - Start Your API Journey Today
PPTX
2015 Identity Summit - CTO Innovation Center
PDF
What are top 7 cyber security trends for 2020
PDF
Low Code Platforms - Ebook
PDF
How Secure are you Around “IoT”_.pdf
PDF
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
PPTX
How-to-Build-a-Blockchain-App-That-Buyers-Will-Trust (2).pptx.pptx
PDF
TADSummit Asia 2019, Richard Im, Apigate. Apigate’s Journey from In-house Ini...
Zymr Fintech app development
Leveraging Cloud and APIs as a Platform for Innovation
[WSO2Con EU 2018] Keynote - The API Driven World
6G WILL UNLOCK THE POWER OF AI-FOR-EVERYTHING
The Cloudification of Capital Markets
The 10 Most Promising IAM Solution Providers in 2022.pdf
API Security Needs AI Now More Than Ever
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
Building the TAD ecosystem
Software panel
Continuous delivery for digital transformation renu rajani v0 1
F5-API-Security-Best-Practices.pdf
Design - Start Your API Journey Today
2015 Identity Summit - CTO Innovation Center
What are top 7 cyber security trends for 2020
Low Code Platforms - Ebook
How Secure are you Around “IoT”_.pdf
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
How-to-Build-a-Blockchain-App-That-Buyers-Will-Trust (2).pptx.pptx
TADSummit Asia 2019, Richard Im, Apigate. Apigate’s Journey from In-house Ini...
Ad

More from APIsecure_ Official (20)

PPTX
2022 APIsecure_The Real World, API Security Edition
PDF
2022 APIsecure_Learn from the Past, Secure the Present, Plan for the Future: ...
PDF
2022 APIsecure_Shift Left API Security - The Right Way
PDF
2022 APIsecure_A day in the life of an API; Fighting the odds
PDF
2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity
PDF
2022 APIsecure_Securing Large API Ecosystems
PDF
2022 APIsecure_Quarterly Review of API Vulnerabilities
PPTX
2022 APIsecure_Top Ten Security Tips for APIs
PPTX
2022 APIsecure_Are your APIs Rugged Enough?
PPTX
2022 APIsecure_Making webhook APIs secure for enterprise
PDF
2022 APIsecure_API Security & Fraud Detection - Are you ready?
PPTX
2022 APIsecure_Monitoring and Responding to API Breaches
PDF
2022 APIsecure_Exploiting multi-step business logic vulnerabilities in APIs
PPTX
2022 APIsecure_API Security Testing: The Next Step in Modernizing AppSec
PPTX
2022 APIsecure_Realizing the Full Cloud Native Potential With a Multi-Layered...
PPTX
2022 APIsecure_Hackers with Valid Credentials
PDF
2022 APIsecure_API Abuse - How data breaches now and in the future will use A...
PDF
2022 APIsecure_Understanding API Abuse With Behavioral Analytics
PDF
2022 APIsecure_API Discovery: First step towards API Security
PPTX
2022 APIsecure_We’re Not in AppSec Anymore Toto
2022 APIsecure_The Real World, API Security Edition
2022 APIsecure_Learn from the Past, Secure the Present, Plan for the Future: ...
2022 APIsecure_Shift Left API Security - The Right Way
2022 APIsecure_A day in the life of an API; Fighting the odds
2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity
2022 APIsecure_Securing Large API Ecosystems
2022 APIsecure_Quarterly Review of API Vulnerabilities
2022 APIsecure_Top Ten Security Tips for APIs
2022 APIsecure_Are your APIs Rugged Enough?
2022 APIsecure_Making webhook APIs secure for enterprise
2022 APIsecure_API Security & Fraud Detection - Are you ready?
2022 APIsecure_Monitoring and Responding to API Breaches
2022 APIsecure_Exploiting multi-step business logic vulnerabilities in APIs
2022 APIsecure_API Security Testing: The Next Step in Modernizing AppSec
2022 APIsecure_Realizing the Full Cloud Native Potential With a Multi-Layered...
2022 APIsecure_Hackers with Valid Credentials
2022 APIsecure_API Abuse - How data breaches now and in the future will use A...
2022 APIsecure_Understanding API Abuse With Behavioral Analytics
2022 APIsecure_API Discovery: First step towards API Security
2022 APIsecure_We’re Not in AppSec Anymore Toto
Ad

Recently uploaded (20)

PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Cloud computing and distributed systems.
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Approach and Philosophy of On baking technology
PPTX
A Presentation on Artificial Intelligence
PDF
Modernizing your data center with Dell and AMD
PPT
Teaching material agriculture food technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Cloud computing and distributed systems.
20250228 LYD VKU AI Blended-Learning.pptx
Network Security Unit 5.pdf for BCA BBA.
Diabetes mellitus diagnosis method based random forest with bat algorithm
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Approach and Philosophy of On baking technology
A Presentation on Artificial Intelligence
Modernizing your data center with Dell and AMD
Teaching material agriculture food technology
Advanced methodologies resolving dimensionality complications for autism neur...
NewMind AI Weekly Chronicles - August'25 Week I
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Unlocking AI with Model Context Protocol (MCP)
Building Integrated photovoltaic BIPV_UPV.pdf
Empathic Computing: Creating Shared Understanding
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Mobile App Security Testing_ A Comprehensive Guide.pdf

2022 APIsecure_Harnessing the Speed of Innovation

  • 1. Harnessing the Speed of Innovation Jyoti Bansal Co-Founder and CEO, Traceable jyoti@traceable.ai
  • 2. ▪ Introduction ▪ The evolution of modern app development ▪ How to solve for complex API challenges ▪ Securing APIs in the new world ▪ What the future holds Agenda
  • 3. Software Code and APIs are Everywhere Nos of Developers 45 million Nos of APIs 1.2 Billion 100 Million < 10 Million < 1 Million 2020 2030 2.8 have been written in the past 20 years. Trillion Lines of Code 2010 25 Million VS
  • 4. APIs Connect Everyone and Everything IDC predicts by 2022, 90% of new enterprise applications worldwide will be developed as cloud-native, using agile methodologies and API-driven architectures that leverage microservices, containers, and serverless functions. IDC FutureScape: Worldwide Cloud 2020 Predictions, Doc # US44640719, October 2019 API Cloud Services Healthcare Mobile Services Real Estate E-commerce Govern ment Education Crypto Financial Services Insurance Media/ Entertai nment Hi-Tech
  • 5. Growing API Security Crisis 91% of organizations had an API Security incident last year… Security Magazine - Feb 2021 Data Breaches & Exfiltration Business Fraud Sensitive Data Exposure Customer & Employee Privacy Violations Regulatory Fines Intellectual Property Theft
  • 6. Business Fraud via API Allowed attacker to make unlimited cryptocurrency trades between different currency accounts Learn more Attackers could initiate orders and trade cryptocurrency they did not have by modifying the API - the coinbase validation logic did not verify source account properly, and processed the trade normally. Hacker could take over Apple iCloud Accounts by exploiting the password reset API endpoint of “Forgot Password” function Missing logic validation check in a retail brokerage API endpoint Allowed attacker to bypass 2-Factor authentication, SMS verification and password validation rate limits Learn more Rate limiting protection failed to work as designed APIs hijacked and modified
  • 7. API Attacks Are Hard to Detect ▪ Mostly Unknown threats ▪ Malicious usage of APIs for unauthorized activities ▪ Exploit your own code and business logic Hard to Detect and High Signal to Noise Ratio Countless Attack Surfaces
  • 8. Ever-changing Competitive Landscape. Business And Technical Challenge - Constant Change Costumer Needs Change Frequently. Critical Pivots: Process, Architecture, Culture, Engg.
  • 9. Smaller, autonomous teams. Business And Technical Challenge - Agile Distributed Dev Teams Shift from tightly coupled, monolithic systems to loosely coupled APIs. Higher ratio of dev to security
  • 10. Securing APIs in this new world…
  • 11. You Can’t Secure What You Can’t See Application Context API ACTIVITY Edge API Calls Internal API Calls Sequence of API Calls USER ACTIVITY Identity Devices Roles & Permissions DATA FLOW Across Sequence of Calls Between Internal Services To External Services CODE EXECUTION API Parameters Request/Response Data Errors & Latency rider / view locations rider / reserver car rider / process payment rider / send receipt 01010 01010 01010 01010 01010 Observability is the core foundation of application security Edge APIs Internal APIs External Service
  • 12. Move Over Networks, CODE Is The Next Frontier Of Cyber Security What the future holds…
  • 13. What the future holds… Transformation journeys that integrate speed, innovation. 01 02 03 APIs will become the primary vector of attack. Even more adoption of APIs as the primary method of delivering value.
  • 14. Top Three Approaches Needed for API Security Observability is Key Data Lake and Threat Hunting ▪ Capture and correlate all transactions and data for all APIs and microservices (internal, external, shadow, orphaned, 3rd party) ▪ Comprehensive breadth and depth of data captured for application security & observability ▪ Store every data trace from all API and data transactions ▪ All data is explorable, searchable, and filterable ▪ Enables deep root cause analysis and threat hunting ▪ Build full application context ▪ Understand user behavior across all activity and time based on user attribution of every transaction. ▪ Correlate all activities across sessions and time into user storylines Machine Learning Platform for Context
  • 15. Culture and Collaboration is Key Data transparency is the foundation of collaboration. 01 02 03 API security has to be part of development culture. Continuous learning between API Development and Security teams.
  • 16. Questions? Jyoti Bansal Co-Founder and CEO, Traceable jyoti@traceable.ai
  • 17. Thank you. Jyoti Bansal Co-Founder and CEO, Traceable jyoti@traceable.ai