Hi [[ session.user.profile.firstName ]]

F5 Security

  • Date
  • Rating
  • Views
  • The Evolving Role of CISOs
    The Evolving Role of CISOs Ray Pompon, Michael Hamilton, Kip Boyle Recorded: Nov 16 2017 65 mins
    In every organization, the executive who leads cyber-defense efforts is becoming a key player in their long-term survival. But what do we really know about CISOs and how they operate? Join F5’s own Principal Threat Research Evangelist, Ray Pompon, and CISO guest speakers Kip Boyle and Michael Hamilton for a lively discussion about the findings of the recent F5 commissioned report, The Evolving Role of CISOs and Their Importance to the Business.

    What You'll Learn

    - How much experience, education and business/technical background most CISOs have
    - Who the CISO is reporting to and how the structure can affect security practices
    - How security initiatives are rolled out across organizations
  • Don't Get Stung by the OWASP Top 10 - Getting the Most from Advanced WAF
    Don't Get Stung by the OWASP Top 10 - Getting the Most from Advanced WAF Nathan McKay, Security Solutions Manager, F5 Networks; Danny Luedke, Product Marketing Manager, F5 Networks Recorded: Nov 16 2017 65 mins
    Web application security is complex, difficult, and costly – the problems are well known, but remain prevalent out in the real world. Most development teams do not have the resources to sufficiently protect against the myriad of attacks that are relevant to each vector, and the level of expertise required is difficult to come by even if your project has the time and budget for it. This is further compounded by the need to address these vulnerabilities over and over in every application that goes out the door making it a significant blocker in your path to production.

    The good news is that advanced WAF technology is more accessible and affordable than ever before. F5 has teams of researchers and engineers dedicated to this task, and their industry-leading expertise is packaged and available today to defend apps of any size and variety. With the right tools, comprehensive WAF coverage can not only reduce your exposures and give you better control over your applications but also help optimize your resources and reduce overall operating costs. F5 is committed to supporting the OWASP Top 10 and providing defenses for everything it addresses, but that’s just the tip of the iceberg.

    In this webinar you will learn:
    - About the primary risks to your app, including those addressed by the Top 10.
    - How to make the most of development resources by using WAF to do the heavy lifting for you.
    - How F5’s unique and flexible deployment options will make WAF remediation for your app a snap.
    - How you can go beyond the Top 10 and address additional risk, such as DDoS, bot defense, intellectual property theft, or fraud.
    - How WAF can optimize and filter unwanted traffic to help you cut costs in the cloud.
  • How to Develop a Secure Cloud Strategy
    How to Develop a Secure Cloud Strategy Brian McHenry, Security Solutions Architect; Tom Thomas, Director of Architecture Recorded: Nov 7 2017 63 mins
    How are you deciding what applications should move to the cloud? Is there a clear understanding of how to best secure those apps?

    Join F5’s own Director of Architecture Tom Thomas, and Security Solutions Architect Brian McHenry, as they discuss a deployment framework which you can use to assess the impact of on-premises versus cloud, while considering the business, data security, and financial impact of cloud migration.

    By the end of this webinar you’ll have the answers to these questions and more:

    • Are the security services my cloud provider offers enough to secure my applications?
    • How much of my business should migrate to the cloud?
    • What tools can help protect against the cost of lost or compromised data?
  • 10 Steps for Combating DDoS in Real Time
    10 Steps for Combating DDoS in Real Time David Holmes, Principal Threat Research Evangelist Recorded: Sep 21 2017 49 mins
    Please join us for the 10 Steps for Combating DDoS in Real Time Webinar.

    While the nature of distributed denial-of-service (DDoS) attacks is constantly evolving, two things are clear: the volume of attacks is increasing and every business is at risk.

    Join fellow IT Security Professionals for an interactive webinar presentation. You'll learn:
    - The importance of having a plan in place before attacks happen
    - The four basic types of DDoS attacks and what you can do to protect yourself against them
    - How to build your response plan using the customizable playbook and action plan
  • Threat Modeling the Internet of Things
    Threat Modeling the Internet of Things David Holmes, Principal Threat Research Evangelist Recorded: Sep 12 2017 45 mins
    The Internet of Things is finally here. We know because it attacked everyone in October! If you are working at a company that is making—or even using—an Internet-connected gadget, you’ll want to learn how to properly model the threats against it. Legendary security guru David Holmes will walk you through a full threat model assessment process specific to the IoT. Hilarious examples of what not to do are included.

    This presentation was originally delivered at the F5 Agility conference August, 2017.
  • Stamping out Security: The move toward inherently applied security policy
    Stamping out Security: The move toward inherently applied security policy Nathan McKay, Security Solutions Marketing Manager Recorded: Sep 12 2017 55 mins
    Ensuring adherence to the variety of industry and organizational security requirements can be a daunting task for development teams, application owners, and network operators alike. Security policy authors and owners don’t always have the best visibility or technical involvement in application development and deployment. This can necessitate a lot of facilitation on the part of security operation teams to ensure that policy is being met and adhered to not just during the implementation phase, but over the lifecycle of an application.

    Using application delivery templatization tools such as iApps and iWorkflow, we can build technical security controls right into our application delivery toolkits once, and have deployed apps automatically inherit pre-approved technical measures that ensure that security policy is not only applied at delivery time, but remains firmly in place for the lifecycle of the application. Let app owners worry about the app and simply inherit the technical measures requisite to get their app out the door with the right controls, right now.

    This presentation was originally delivered at the F5 Agility conference August, 2017.
  • F5 FPS: Web Fraud Protection
    F5 FPS: Web Fraud Protection Joe Martin, Security Solution Architect Recorded: Sep 12 2017 53 mins
    Join us for an introduction to browser-based threats and how the BIG-IP Fraud Protection Service (FPS) can be integrated into a financial anti-fraud infrastructure to detect and mitigate threats. In this interactive session, we’ll workshop defining a threat and then detecting and mitigating it.

    This presentation was originally delivered at the F5 Agility conference August, 2017.
  • Evolution of AppSec
    Evolution of AppSec Brian McHenry, Sr. Solution Architect Recorded: Sep 12 2017 48 mins
    BIG-IP Application Security Manager (ASM), along with WebSafe and MobileSafe, represent a comprehensive vision for application security. In this session, we’ll cover how to achieve measurable levels of app security without all the operational overhead normally associated with WAF and anti-fraud solutions. We’ll also discuss which features of BIG-IP ASM, WebSafe, and MobileSafe are most relevant in the fast-moving, continuous-delivery infrastructures fueled by DevOps.

    This presentation was originally delivered at the F5 Agility conference August, 2017.
  • Secure Web Apps Without Complexity, F5 Silverline WAF
    Secure Web Apps Without Complexity, F5 Silverline WAF Tim Wagner, Sales Manager Security Recorded: Aug 30 2017 61 mins
    The growth of cloud - hosted web applications has been accompanied by increasingly sophisticated security attacks and risks that threaten enterprise data. As a result, administrators and security teams face challenges keeping up to date on the latest attacks and protection measures. At the same time, they must meet the stringent compliance requirements for online commerce and data sharing across traditional and cloud environments. Organizations must choose between employing specialized IT security teams in-house - resulting in higher expenses and increased time to deploy policies - or delegating the complex WAF policy management and compliance to a cloud service to drive efficiencies.

    In this webinar you will learn:
    - How application vulnerabilities are evolving
    - The benefits of cloud-based managed and on-premises WAF
    - How to bolster your defenses and ensure mitigation consistency through a “Managed Service” model
    - Don't leave your application or your organization vulnerable

    There will also be a demonstration of our customer portal.
    - Interested in a free trial of Silverline WAF?
    Please visit https://interact.f5.com/SilverlineWAF.html and your dedicated Silverline Account Manager will reach out to start the trial process.
  • The Hunt for IoT that Threatens Our Modern Way of Life
    The Hunt for IoT that Threatens Our Modern Way of Life Sara Boddy, Principal Threat Research Evangelist Recorded: Aug 18 2017 62 mins
    Not a week goes by without another IoT hack headline, yet we’re not doing enough to address this threat. We’ll show you in this presentation why the threat of IoT should remain top of mind.

    Join us for this webinar to learn about:

    - Global scope of IoT devices and their vulnerability posture – aka the IoT threat landscape
    - The growth of threat actor activity targeting IoT devices from 2016 to current day
    - A viewpoint of pre and post Mirai as an indication of what’s to come
    - The networks launching IoT attacks
    - The countries being targeted
    - What “dealing with” the threat of IoT looks like

Embed in website or blog