Hi [[ session.user.profile.firstName ]]

Cyber Security Edge | Distil Networks

  • Date
  • Rating
  • Views
  • Better Together - A Partnership for Mitigating Bad Bots Better Together - A Partnership for Mitigating Bad Bots Tin Zaw, Dir., Sec. Solutions, Verizon, Elias Terman, VP Marketing, Edward Roberts, Dir., Product Marketing Distil Networks Recorded: Feb 8 2017 49 mins
    Malicious bots, or what OWASP calls Automated Threats, are more sophisticated than ever and fast becoming the biggest threat to web application security. Join Tin Zaw, Director of Security Solutions at Verizon Digital Media Services and Edward Roberts, Director of Product Marketing at Distil Networks, for a lively conversation about the new automated threat and how enterprises can protect themselves with a proactive and layered approach to web application security and performance.

    About the Presenters:

    Tin Zaw, Director of Security Solutions, Verizon Digital Media Services
    Elias Terman, VP of Marketing, Distil Networks
    Edward Roberts, Director of Product Marketing, Distil Networks
  • easyJet’s Journey to Protect Their Booking Engine from Unwanted Traffic easyJet’s Journey to Protect Their Booking Engine from Unwanted Traffic Sean O'Neill, Editor in Chief & Moderator Tnooz, Gene Quinn, Co-Founder & Producer Tnooz Recorded: Dec 28 2016 41 mins
    Did you know 30% of travel industry website visitors are unsavory competitors, hackers, spammers, and fraudsters?

    Worse yet, unwanted traffic from web-scraping bots can negatively impact revenue management targets and yields across multiple distribution channels. Join Anthony Drury, Director, Head of Business, at easyJet, as he takes you through his strategy to ensure easyJet customers -- wherever they are booking -- get price and availability content through approved API channels. The approach of easyJet ensures that all bookings are screened for fraudulent activity and blocks are added to restrict screen scraping.

    Watch the reply to learn how to:

    - Eliminate the cascading negative effects of screen-scraping bots
    - Optimize revenue while simultaneously improving the customer experience
    - Strengthen travel industry partnerships by creating a level playing field
    - Improve website KPIs like look-to-book ratios, SEO page rank, cross-selling/up-selling, site speed and conversion rates
  • 2017 State of Digital Publishers' Fight Against NHT 2017 State of Digital Publishers' Fight Against NHT Charlie Minesinger, Director of Publisher Solutions at Distil Networks, Rob Rasko, CEO and Found of The 614 Group Recorded: Dec 6 2016 62 mins
    The digital advertising marketplace is under sustained attack from increasingly sophisticated Non Human Traffic (NHT) (aka Bots) that divert, steal, and defraud billions of dollars a year. According to a new study by The 614 Group, 78% of digital publishers identify NHT post campaign, and 39% proactively block it outright--just one of many revelations collected from surveying over forty digital publishers’ about their daily battle to combat digital ad fraud.

    Watch our discussion led by The 614 Group and Distil Networks with commentary from industry luminaries.

    Key Takeaways include:

    - Insights from top digital publishers on the impact of NHT on their businesses, NHT countermeasures, and the impact of these countermeasures on their bottom line
    - Understand why the impact of the even 3% or 5% of NHT that lands on a site is even greater than that amount
    - Watch a conversation on how we can understand the impact of NHT at a campaign level or in other words how does NHT actually affect your clients
    - The differences between NHT “blocking” and “auditing”, and key use cases for each
  • How Distil Networks Protects Your Apps from Bad Bots and API Abuse How Distil Networks Protects Your Apps from Bad Bots and API Abuse Rami Essaid, CEO & Co-Founder of Distil Networks Recorded: Sep 20 2016 5 mins
    Automated threats are bad bots and are being used by hackers and fraudsters to exploit your web applications. Whether it's account takeovers, unauthorized vulnerability scan, testing stolen credit cards, DDoS attacks bringing down your site, bots are being leveraged by the bad guys to attack you at scale.
  • Are Bot Operators Eating Your Lunch? Are Bot Operators Eating Your Lunch? Brian Gress, Director of IT at Hayneedle, Rami Essaid, CEO of Distil Networks, Adam Blair, Exec Editor at Retail TouchPoints Recorded: Sep 20 2016 65 mins
    Did you know 30% of Ecommerce website visitors are unsavory competitors, hackers, and fraudsters?

    Fact is, online retailers are particularly susceptible to the effects of advanced bot threats, including competitive tactics like price scraping, product matching, variation tracking and availability targeting. Even worse, security breaches such as transaction fraud and account takeovers endanger the overall security of your website, customer base, and brand.

    When aggressive scrapers caused repeated site slowdowns, Brian Gress, Director of IT Systems & Governance at Hayneedle, said enough was enough.

    Key takeaways include how to:

    - Stop competitors from scraping your prices and monitoring your inventory
    - Reduce chargeback fees due to transaction fraud, carding and account hijacking
    - Optimize your conversion funnel and enjoy clean analytics and KPIs
    - Protect your brand image, reputation and SEO rankings

    Brian Gress is Director of IT Systems & Governance at Hayneedle where he leads the network and infrastructure, IT security and compliance, quality assurance, and change management functions and teams. Mr. Gress holds undergraduate and graduate degrees in information systems, is a certified chief information security officer and auditor, as well as a licensed PCI internal security assessor. Mr. Gress also spent several years teaching as an adjunct professor at the University of Nebraska College of Information, Science and Technology.
  • When Bots Attack! Stopping OWASP’s New Top 20 Automated Threats When Bots Attack! Stopping OWASP’s New Top 20 Automated Threats Rami Essaid, Co-Founder Distil Networks Recorded: Aug 16 2016 38 mins
    The OWASP Top 10 Vulnerabilities, last published in 2013, has been a valuable list of criteria by which any Web Application Firewall (WAF) is evaluated, but has a glaring flaw, it only focuses on vulnerabilities in the code, and ignores automated threats. In late 2015, this flaw was addressed and OWASP released the first Automated Threat Handbook specifically to help organizations better understand and respond to the notable worldwide increase of automated threats from bots. This presentation discusses these new bot threats, bot evolution, and how to fight back.

    - How malicious bots attack and cause problems

    - Why homegrown IT solutions have troubles keeping up with bots, threats

    - See Distil Networks in action finding, fighting bots
  • Web Application Firewalls (WAFs) vs. Web Behavior Analytics Web Application Firewalls (WAFs) vs. Web Behavior Analytics Eric Ogren, Sr Security Analyst 451 Research; Rami Essaid, Co-Founder Distil Networks Recorded: Jun 15 2016 58 mins
    This webinar discusses how the biggest problems to your web site aren’t cross-site scripting and SQL injection attacks. The biggest problems are the ones you don’t see; automated bots masquerading as real people browsing through web sites and mobile interfaces.

    Traditional web security products directed towards exploits, vulnerabilities and software coding defects don’t look to tell if an automated bot is driving a session meant for people. Only Web Behavior Analytics can determine this.

    Attend this webinar for what promises to be a spirited web application security conversation between Eric Ogren, Senior Security Analyst at 451 Research, and Rami Essaid, CEO of Distil Networks.

    You will learn:

    – The new threat landscape of Advanced Persistent Bots (APBs)
    – How Web Application Firewalls (WAFs) and Web Behavior Analytics solve different problems
    – The impact bots have on your security results
    – How applied Web Behavior Analytics can protect your business
  • Digital Content & The Legality of Web Scraping Digital Content & The Legality of Web Scraping Jonathan Bailey, Rami Essaid, Katie Sunstrom, Orion Cassetto Recorded: May 25 2016 52 mins
    Web scraping - the process of using bots to systematically lift content from a website - is either loved or hated. Startups love it because it’s a cheap and powerful way to gather data without the need for partnerships. Large companies use web scraping to gain competitive intelligence, but try to block others from doing the same. However, new legislation and high profile court cases have called into question the legality of web scraping.

    In this lively conversation, diverse panelists will discuss the origin of web scraping, the changing legal landscape, and the legal and technical best practices for protecting your website content.
  • The Inconvenient Truth about API Security The Inconvenient Truth about API Security Rik Turner, IT Security Analyst, Ovum; Rami Essaid, CEO, Distil Networks; Shane Ward, Sr Director of Technology, GuideStar Recorded: Apr 12 2016 59 mins
    The notion of API management in which enterprise architects, app developers,and IT security experts work in harmony is great in theory. The reality, according to new research from Ovum, is much more scattered.

    Register today and join Ovum IT Security Analyst Rik Turner, Rami Essaid, CEO of Distil Networks and Shane Ward, Senior Director of Technology at GuideStar as they dig deep into API Security and what it means for your business.

    Here’s just some of what you’ll learn in this webinar:

    -The importance of CIO and/or CISO visibility into how API security is managed across the enterprise
    - How to map your business requirements to your API security strategy
    - The How, Where, and Why of API controls such as geo/org fencing, token governance, dynamic access control lists, and advanced rate limiting
    - When heavy “application services governance” software suites are the wrong approach
  • Using Permaculture to Cultivate a Sustainable Security Program Using Permaculture to Cultivate a Sustainable Security Program Chris Nelson, Director of Security, Distil Networks Recorded: Feb 16 2016 35 mins
    For centuries mankind’s greatest innovations came about through careful examination of natural systems. Information Security is no different. This presentation will explore how information security professionals can use the agricultural concept of “permaculture” (the practice of using design principles observed in natural ecosystems) to cultivate a sustainable, data-driven security program.

    In this fast-paced, thought-provoking session you’ll learn:

    - The basic tenets of permaculture and how they apply to information security strategy
    - How to build a security program that fosters collaboration, coupled with feedback loops and metrics
    - How embracing differences within an organization can lead to increases in productivity and security
    - Effective policy and control designs that enhance business objections as opposed to stifling them

    About the Speaker

    Chris Nelson has a passion for security, especially building security programs and teams in incredibly dynamic organizations. Chris is currently the Vice President of ISSA’s Denver Chapter, and Director of Security for Distil Networks, where he continues to expand his theories on using Permaculture in the design and implementation of security programs and controls. Chris held a similar role at Rally Software after working with Aetna as a security, compliance and privacy lead. Previously, he held similar roles with Return Path and has served multiple Fortune 500 clients in a consulting capacity.

Embed in website or blog