SlideShare a Scribd company logo
| @ema_research
Debunking the Myths
Around API Security
Christopher M. Steffen, CISSP, CISA
Managing Research Director, EMA
CSteffen@enterprisemanagement.com
Sponsored by
| @ema_research 2
Watch the On-Demand Webinar
• Debunking the Myths Around API Security On-Demand Webinar:
https://info.enterprisemanagement.com/api-security-2023-webinar-ws
• Check out upcoming webinars from EMA here:
https://www.enterprisemanagement.com/freeResearch
© 2023 Enterprise Management Associates, Inc.
| @ema_research
| @ema_research
Featured Speaker
Chris brings over 20 years of industry experience as a noted
information security executive, researcher, and presenter, focusing
on IT management/leadership, cloud security, and regulatory
compliance.
His technical career started in the financial services vertical in systems
administration for a credit reporting company, eventually building the
network operations group, as well as the information security practice
and technical compliance practice for the company before leaving
as the Principal Technical Architect. He was the Director of
Information for a manufacturing company and the Chief Evangelist
for several technical companies, and also held the position of CIO of
a financial services company, overseeing the technology-related
functions of the enterprise. He currently leads the information security,
risk, and compliance management practice for Enterprise
Management Associates (EMA), a leading industry analyst firm that
provides deep insight across the full spectrum of IT and data
management technologies.
Chris holds several technical certifications, including Certified
Information Systems Security Professional (CISSP) and Certified
Information Systems Auditor (CISA), and was awarded the Microsoft
Most Valuable Professional Award five times for virtualization and
cloud and data center management (CDM). He holds a Bachelor of
Arts (Summa Cum Laude) from Metropolitan State College of Denver.
© 2023 Enterprise Management Associates, Inc. 3
Christopher Steffen
Managing Research Director
Information Security, Risk and Compliance Management
Enterprise Management Associates
| @ema_research
| @ema_research
| @ema_research
Agenda
© 2023 Enterprise Management Associates, Inc. 4
Introduction
1 2 3
Voices from
the Survey
Research
Findings
4
Conclusions
| @ema_research
| @ema_research
Sponsors
© 2023 Enterprise Management Associates, Inc. 5
| @ema_research
Introduction
| @ema_research
| @ema_research
Demographics & Methodology
© 2023 Enterprise Management Associates, Inc. 7
Sample Size = 229
| @ema_research
Voices of the Survey –
Respondent Quotes
| @ema_research
| @ema_research
Securing our API is important so
confidential and trusted information can
be sent securely. It gives us peace of
mind when the messages are in transit
through encryption. It also validates and
authenticates the data being sent. By
accepting queries sent over a secure
channel, we maintain production and
efficiency without the risk of a breach.
Securing our organization's API is
important because it helps protect
sensitive data, maintain customer trust
and reputation, ensure legal compliance,
and maintain a competitive advantage.
Our executive has made securing my
organization's API the highest priority and
is putting others on hold to achieve that
objective. My organization receives and
sends files to external organizations and
governments to meet regulatory and
compliance requirements.
Securing our APIs is critical to avoid
security breaches, as well as to remain in
compliance. Right now, many
organizations are at risk due to poorly
secured APIs and resources, and it is
essential to harden services to ensure an
organization is protected.
API security is critical for our business
because APIs are used to connect
services and transfer data, and a hacked
API can result in a data breach since we
are working in the mobile software
industry. Also, we provide information and
technology consultation services, so we
put a high focus on secured APIs.
API security is crucial to our business
because it facilitates shielding the facts
that are being transferred and stored.
When an API is not comfy, it is vulnerable
to theft and misuse. Stolen authentication
records can be used to get entry to
personal facts, control transactions, and
damage reputations. This can result in
financial losses, prison, and customer
dissatisfaction, all of which can have a
drastic effect on an enterprise.
Securing an organization's API is critical for
business since it prevents private data
from being accessed or abused.
Businesses may guarantee that only
authorized users can use the API and that
the data is safe from bad actors by
implementing encryption and
authentication mechanisms.
Voices from the Survey – Open Ended Responses
Describe why securing your organization’s API is important to your business.
© 2023 Enterprise Management Associates, Inc. 9
| @ema_research
Research Findings
| @ema_research
| @ema_research
© 2023 Enterprise Management Associates, Inc. 11
| @ema_research
| @ema_research
© 2023 Enterprise Management Associates, Inc. 12
| @ema_research
| @ema_research
© 2023 Enterprise Management Associates, Inc. 13
| @ema_research
| @ema_research
© 2023 Enterprise Management Associates, Inc. 14
| @ema_research
| @ema_research
© 2023 Enterprise Management Associates, Inc. 15
| @ema_research
| @ema_research
© 2023 Enterprise Management Associates, Inc. 16
| @ema_research
| @ema_research
© 2023 Enterprise Management Associates, Inc. 17
| @ema_research
| @ema_research
© 2023 Enterprise Management Associates, Inc. 18
| @ema_research
| @ema_research
© 2023 Enterprise Management Associates, Inc. 19
| @ema_research
Conclusions
| @ema_research
| @ema_research
Conclusions
© 2023 Enterprise Management Associates, Inc. 21
Management
understands the
importance of
API security.
25% of all APIs are
undiscovered or
undocumented.
API security
should not wait
until production.
Integrations are
key.
| @ema_research
| @ema_research
Get the Report!
Learn more and download at
http://bit.ly/3YIHgGA
© 2023 Enterprise Management Associates, Inc. 22

More Related Content

PDF
Transcending Passwords: Emerging Trends in Authentication
PDF
Applying Generative AI to IT Operations Research
PDF
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
PDF
Optimize Your Zero Trust Infrastructure
PDF
Secure Coding Practices – Growing Success or Zero-Day Epidemic?
PDF
Securing Tomorrow: The Role of AI in Transforming Cybersecurity
PDF
TLS 1.3’s Fourth Anniversary: What Have We Learned About Implementation and N...
PPTX
BV Company Overview Web
Transcending Passwords: Emerging Trends in Authentication
Applying Generative AI to IT Operations Research
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
Optimize Your Zero Trust Infrastructure
Secure Coding Practices – Growing Success or Zero-Day Epidemic?
Securing Tomorrow: The Role of AI in Transforming Cybersecurity
TLS 1.3’s Fourth Anniversary: What Have We Learned About Implementation and N...
BV Company Overview Web

Similar to Debunking the Myths Around API Security Research Slides (20)

PDF
EMA AIOps Radar: A Guide to Investing in Innovation
PDF
Identity Access Management(IAM) - Government Market Report
PDF
Navigating the Future of Security Operations Centers (SOC) with Agentic AI
PDF
The 10 most promising enterprise security solution providers 2019
PDF
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
PDF
Passwordless Authentication
PDF
How Can Enterprise App Development Help Your Business Growth.pdf
PDF
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
PPTX
How Can Enterprise App Development Help Your Business Growth.pptx
PPT
Path Maker Security Presentation
PDF
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
PDF
Achieving Effective Identity and Access Governance
PPT
Proteus OCM Company Profile
PPTX
IAM and cybersecurity - June 15
PDF
The Rise of Active Directory Exploits
PDF
Business-Driven Identity and Access Governance: Why This New Approach Matters
 
PDF
How a Salesforce Development Company Ensures Data Security and Compliance.pdf
PPT
How It All Ties Together Sun Idm Roadshow For Sun
PDF
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
EMA AIOps Radar: A Guide to Investing in Innovation
Identity Access Management(IAM) - Government Market Report
Navigating the Future of Security Operations Centers (SOC) with Agentic AI
The 10 most promising enterprise security solution providers 2019
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
Passwordless Authentication
How Can Enterprise App Development Help Your Business Growth.pdf
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
How Can Enterprise App Development Help Your Business Growth.pptx
Path Maker Security Presentation
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Achieving Effective Identity and Access Governance
Proteus OCM Company Profile
IAM and cybersecurity - June 15
The Rise of Active Directory Exploits
Business-Driven Identity and Access Governance: Why This New Approach Matters
 
How a Salesforce Development Company Ensures Data Security and Compliance.pdf
How It All Ties Together Sun Idm Roadshow For Sun
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
Ad

More from Enterprise Management Associates (20)

PDF
How Network Teams are Powering Stronger Cybersecurity: Closing Gaps in Vulner...
PDF
Enterprise Strategies for Hybrid, Multi-Cloud Networks
PDF
Unlocking the Future of Observability: OpenTelemetry’s Role in IT Performance...
PDF
The AI Advantage: How IT Leaders are Redefining Operations in 2025
PDF
The Future of Workload Automation and Orchestration: Driving Digital Transfor...
PDF
From Adversaries to Allies: Bridge the NetOps-SecOps Gap with Network Observa...
PDF
Network Observability: Managing Performance Across Hybrid Networks
PDF
Zero Trust Networking: How Network Teams Support Cybersecurity
PPTX
Network as a Service: Understanding the Cloud Consumption Model in Networking
PDF
Orchestrating Data Transfers in the Digital Era: Navigating Challenges and So...
PDF
Network Management Megatrends 2024: Skills Gaps, Hybrid and Multi-Cloud, SASE...
PDF
ServiceOps 2024: automation and (gen)AI-powered IT service and operations
PDF
The Evolution of Work: Enhancing Productivity and Collaboration through Digit...
PDF
Avoid Observability Failure: Hybrid Enterprises Must Complement APM with Inte...
PDF
Enterprise Network Automation: Emerging from the Dark Ages and Reaching Towar...
PDF
Redefining Automation Horizons: Orchestrating Multi-Cloud Landscapes
PDF
Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
PDF
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
PDF
Real-world incident response, management, and prevention
PDF
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
How Network Teams are Powering Stronger Cybersecurity: Closing Gaps in Vulner...
Enterprise Strategies for Hybrid, Multi-Cloud Networks
Unlocking the Future of Observability: OpenTelemetry’s Role in IT Performance...
The AI Advantage: How IT Leaders are Redefining Operations in 2025
The Future of Workload Automation and Orchestration: Driving Digital Transfor...
From Adversaries to Allies: Bridge the NetOps-SecOps Gap with Network Observa...
Network Observability: Managing Performance Across Hybrid Networks
Zero Trust Networking: How Network Teams Support Cybersecurity
Network as a Service: Understanding the Cloud Consumption Model in Networking
Orchestrating Data Transfers in the Digital Era: Navigating Challenges and So...
Network Management Megatrends 2024: Skills Gaps, Hybrid and Multi-Cloud, SASE...
ServiceOps 2024: automation and (gen)AI-powered IT service and operations
The Evolution of Work: Enhancing Productivity and Collaboration through Digit...
Avoid Observability Failure: Hybrid Enterprises Must Complement APM with Inte...
Enterprise Network Automation: Emerging from the Dark Ages and Reaching Towar...
Redefining Automation Horizons: Orchestrating Multi-Cloud Landscapes
Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Real-world incident response, management, and prevention
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Ad

Recently uploaded (20)

PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Encapsulation theory and applications.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Big Data Technologies - Introduction.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
A Presentation on Artificial Intelligence
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Review of recent advances in non-invasive hemoglobin estimation
Building Integrated photovoltaic BIPV_UPV.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Encapsulation_ Review paper, used for researhc scholars
20250228 LYD VKU AI Blended-Learning.pptx
Encapsulation theory and applications.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Machine learning based COVID-19 study performance prediction
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Spectral efficient network and resource selection model in 5G networks
Network Security Unit 5.pdf for BCA BBA.
Chapter 3 Spatial Domain Image Processing.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Big Data Technologies - Introduction.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
A Presentation on Artificial Intelligence

Debunking the Myths Around API Security Research Slides

  • 1. | @ema_research Debunking the Myths Around API Security Christopher M. Steffen, CISSP, CISA Managing Research Director, EMA CSteffen@enterprisemanagement.com Sponsored by
  • 2. | @ema_research 2 Watch the On-Demand Webinar • Debunking the Myths Around API Security On-Demand Webinar: https://info.enterprisemanagement.com/api-security-2023-webinar-ws • Check out upcoming webinars from EMA here: https://www.enterprisemanagement.com/freeResearch © 2023 Enterprise Management Associates, Inc.
  • 3. | @ema_research | @ema_research Featured Speaker Chris brings over 20 years of industry experience as a noted information security executive, researcher, and presenter, focusing on IT management/leadership, cloud security, and regulatory compliance. His technical career started in the financial services vertical in systems administration for a credit reporting company, eventually building the network operations group, as well as the information security practice and technical compliance practice for the company before leaving as the Principal Technical Architect. He was the Director of Information for a manufacturing company and the Chief Evangelist for several technical companies, and also held the position of CIO of a financial services company, overseeing the technology-related functions of the enterprise. He currently leads the information security, risk, and compliance management practice for Enterprise Management Associates (EMA), a leading industry analyst firm that provides deep insight across the full spectrum of IT and data management technologies. Chris holds several technical certifications, including Certified Information Systems Security Professional (CISSP) and Certified Information Systems Auditor (CISA), and was awarded the Microsoft Most Valuable Professional Award five times for virtualization and cloud and data center management (CDM). He holds a Bachelor of Arts (Summa Cum Laude) from Metropolitan State College of Denver. © 2023 Enterprise Management Associates, Inc. 3 Christopher Steffen Managing Research Director Information Security, Risk and Compliance Management Enterprise Management Associates | @ema_research
  • 4. | @ema_research | @ema_research Agenda © 2023 Enterprise Management Associates, Inc. 4 Introduction 1 2 3 Voices from the Survey Research Findings 4 Conclusions
  • 5. | @ema_research | @ema_research Sponsors © 2023 Enterprise Management Associates, Inc. 5
  • 7. | @ema_research | @ema_research Demographics & Methodology © 2023 Enterprise Management Associates, Inc. 7 Sample Size = 229
  • 8. | @ema_research Voices of the Survey – Respondent Quotes
  • 9. | @ema_research | @ema_research Securing our API is important so confidential and trusted information can be sent securely. It gives us peace of mind when the messages are in transit through encryption. It also validates and authenticates the data being sent. By accepting queries sent over a secure channel, we maintain production and efficiency without the risk of a breach. Securing our organization's API is important because it helps protect sensitive data, maintain customer trust and reputation, ensure legal compliance, and maintain a competitive advantage. Our executive has made securing my organization's API the highest priority and is putting others on hold to achieve that objective. My organization receives and sends files to external organizations and governments to meet regulatory and compliance requirements. Securing our APIs is critical to avoid security breaches, as well as to remain in compliance. Right now, many organizations are at risk due to poorly secured APIs and resources, and it is essential to harden services to ensure an organization is protected. API security is critical for our business because APIs are used to connect services and transfer data, and a hacked API can result in a data breach since we are working in the mobile software industry. Also, we provide information and technology consultation services, so we put a high focus on secured APIs. API security is crucial to our business because it facilitates shielding the facts that are being transferred and stored. When an API is not comfy, it is vulnerable to theft and misuse. Stolen authentication records can be used to get entry to personal facts, control transactions, and damage reputations. This can result in financial losses, prison, and customer dissatisfaction, all of which can have a drastic effect on an enterprise. Securing an organization's API is critical for business since it prevents private data from being accessed or abused. Businesses may guarantee that only authorized users can use the API and that the data is safe from bad actors by implementing encryption and authentication mechanisms. Voices from the Survey – Open Ended Responses Describe why securing your organization’s API is important to your business. © 2023 Enterprise Management Associates, Inc. 9
  • 11. | @ema_research | @ema_research © 2023 Enterprise Management Associates, Inc. 11
  • 12. | @ema_research | @ema_research © 2023 Enterprise Management Associates, Inc. 12
  • 13. | @ema_research | @ema_research © 2023 Enterprise Management Associates, Inc. 13
  • 14. | @ema_research | @ema_research © 2023 Enterprise Management Associates, Inc. 14
  • 15. | @ema_research | @ema_research © 2023 Enterprise Management Associates, Inc. 15
  • 16. | @ema_research | @ema_research © 2023 Enterprise Management Associates, Inc. 16
  • 17. | @ema_research | @ema_research © 2023 Enterprise Management Associates, Inc. 17
  • 18. | @ema_research | @ema_research © 2023 Enterprise Management Associates, Inc. 18
  • 19. | @ema_research | @ema_research © 2023 Enterprise Management Associates, Inc. 19
  • 21. | @ema_research | @ema_research Conclusions © 2023 Enterprise Management Associates, Inc. 21 Management understands the importance of API security. 25% of all APIs are undiscovered or undocumented. API security should not wait until production. Integrations are key.
  • 22. | @ema_research | @ema_research Get the Report! Learn more and download at http://bit.ly/3YIHgGA © 2023 Enterprise Management Associates, Inc. 22