Learn how real-world hackers attack APIs, and what requirements should be on your API protection checklist.
Corey Ball, the author of Hacking APIs joined ThreatX experts for a 30-minute Live Q&A on August 18th.
We answer questions related to:
- How Web API Security Works
- Common API Attack Techniques
- Misconceptions of API Protection
Senior Manager – Penetration Testing, Moss Adams & Author of ‘Hacking APIs: Breaking Web Application Programming Interfaces”
Corey Ball is a cybersecurity consulting manager at Moss Adams, where he leads its penetration testing services. He has over ten years of experience working in IT and cybersecurity across several industries, including aerospace, agribusiness, energy, financial tech, government services, and healthcare. In addition to a bachelor’s degree in English and philosophy from Sacramento State University, Corey holds the OSCP, CCISO, CEH, CISA, CISM, CRISC, and CGEIT industry certifications.
SOC Manager @ThreatX
Neil has 15 years of experience in roles from user support to leading security programs. He has expertise in security architecture and cybersecurity best practices and is an active member of the security community. He has delivered lectures at DEF CON, OWASP, and local security meetups. Neil also acts as an adjunct lecturer on Software Engineering at Indiana University.