The Distributed Denial of Service (DDoS) attack launched Friday, October 21, against Dyn - one of the largest managed DNS infrastructure providers - was the most destructive attack to date launched from an IoT botnet. The threat of mega attacks launched from infected connected devices is now a reality that dramatically changes the paradigm for mobile and fixed operators whose core infrastructure is susceptible to global attacks that are large enough to significantly disrupt subscriber quality of experience (QoE).
Join us in this webinar to learn:
•The impact of IoT driven DDoS mega attacks
•Architectural approaches to volumetric DDOS mitigation
•How to measure and maintain subscriber quality of experience during an attack
While we will never see the end of generalized mass attacks, the real damage is being done through highly targeted attacks. In discussing why targeted attacks are so effective and economically advantageous to the attacker, we'll learn why that trend is likely to continue. Timely case studies of targeted and integrated attacks will contribute to understanding the trade-offs for the adversaries. Some suggestions for countermeasures against this strategy will be provided.Read more >
Brute force attacks are relatively simple for attackers to implement and they can wreak havoc on your organization if you don’t detect them and shut them down quickly. Join us for a live demo, where we’ll demonstrate a brute force attack (simulated, of course!) and show how AlienVault USM can help you detect and investigate these types of attacks.
How attackers can use brute force attacks to gain access to your network
Measures you can take to better secure your environment to detect and prevent these attacks
How AlienVault USM alerts you immediately of brute force attack attempts
How to use AlienVault USM to investigate an attack and identify compromised assets
Email is the most popular communication tool, as well as the entry point for up to 95% of security breaches. As cyber criminals evolve their techniques, targeted, enterprise-facing email attacks are rapidly increasing, fueled by an almost inexhaustible supply of potential victims and the tremendous profits awaiting successful fraudsters.
This talk will provide an overview of both the technical and psychological principles these criminals take advantage of, shedding light on why traditional defenses continue to fail. We will then describe a set of new defense mechanisms that enable enterprises to stop these attacks and review the results of early experiments with these approaches, which offer a new perspective on ways to prevent email fraud.
Dr. Markus Jakobsson is a security researcher with interests in applied security, ranging from device security to user interfaces. He is one of the main contributors to the understanding of phishing and crimeware, and is currently focusing his efforts on human aspects of security and mobile security.
Phishing and Spear Phishing attacks are the number one starting point for most large data breaches. However, no traditional security technology is currently able to mitigate the risks associated with these type of threats. Join this webinar to learn why phishing attacks are so successful, what capabilities organizations need to carry out a forensic investigation and what questions you need to be able to answer following an attack to respond effectively.Read more >
On October 21st, a distributed denial of service (DDoS) attack on Dyn DNS took out a large number of high-profile websites, such as Twitter, Reddit, Netflix, Spotify, Paypal and others, offline. Join this panel discussion to find out what happened, who was affected and the likelihood of repeat attacks of this magnitude in the future.
* Tim Helming, Director of Product Management at DomainTools
* Ann Barron-DiCamillo, Partner & CTO, Strategic Cyber Ventures, LLC
* JP Bourget, CEO of Syncurity
* Robert Hamilton, Director of Product Marketing at Imperva Incapsula
Proofpoint's Information Security platform takes an entirely new approach, using big data analysis techniques to identify and apply additional security controls to suspicious messages. Watch Proofpoint product experts demonstrate how to protect your organization using Targeted Attack Prevention, Policy-Based Email Encryption for DLP, and real-time email message tracing. Each of these solutions is designed to provide the necessary security tools to elevate email protection.Read more >
Cyber attacks are on the rise, and financial institutions are increasingly becoming targets of sophisticated attackers. Join this presentation and learn about the current cyber-attacks affecting the industry.
David Swan, EVP of the Defense Intelligence Group will discuss current attacks, attack trends and forecasts what banks and other financial institutions can expect in the near to middle term.
After a brief introduction to the world of SEO, we will dive into the different types of web application attacks and manipulations that are made to either degrade your competitor’s ranking or raise your own.Read more >
In this webinar Andrew Shoemaker, a DDoS simulation expert from NimbusDDOS, gives you a rare glimpse into how hackers find the weak points in your defenses and exploit them to level devastating DDoS attacks. You'll see real world examples of the tactics and methods used to create tailored DDoS attacks that can bring down a targeted network or application, and learn how best to defend against them.Read more >
Cyber Attacks are increasing in frequency and sophistication. No longer content to just steal data, criminals are deploying ransomware everywhere and holding businesses hostage on a daily basis. To combat the threats, Regulators are pushing out warnings and recommendations, and IT needs to think and respond differently.
EMC Data Protection offers a wide range of solutions to provide strong defenses against these attacks. This session will walk through the risk, regulations and the solutions.
Over the last few months we have seen DDoS attacks become more ferocious and attackers more sophisticated. As DDoS threats continue to evolve, your traditional mitigation solution may not be enough to protect you.
Watch as we follow a fictitious attacker analysing a target, exploring and finding weaknesses. Experience how the attacker launches a DDoS attack with devastating effects. Learn about the advantages and limitations of various mitigation technologies, and be given a DDoS preparedness roadmap to help you navigate the DDoS landscape.
A DDoS attack is sometimes a smokescreen to cover up much more damaging activity such as theft or fraud. While you’re working frantically to mitigate the DDoS attack and get critical applications back online, cybercriminals could be working under the radar to break into your systems and conduct more malevolent activities.
Learn to listen to your network activity:
-Clues from DDoS attacks that will help you investigate threats
-Why organizations like FFIEC warn banks about the use of DDoS
-Best practices for DDoS protection
Based on on our extensive knowledge of leading practices and experience responding to critical security incidents, we would like to briefly discuss with you the topic of being “Response Ready”. Being prepared for a cyber attack is not easy and usually starts with looking within the organisation and checking your Response Readiness. Let’s talk briefly about your security operations center (SOC) and incident response (IR) capabilities. Maybe after the webinar you can analyse where your IR program needs to develop and how to get there.Read more >
You should assume that during 2016 your data will be subject to an attack from Cyber Criminals. Therefore you need to ask yourself… Where are you most vulnerable? What door has been left open?
Our final webinar will look behind Door 6, Web and Collaboration. How can you secure real-time collaboration and inappropriate content from impacting your business?
The volume, size, and sophistication of DDoS attacks have increased rapidly over the years. Is your organization prepared for today’s modern, multi-vector DDoS offensives? Join Imperva and (ISC)2 on May 19, 2016, at 1:00 PM Eastern for the final part of a three-part Security Briefing series where we’ll specifically explore the anatomy and timeline of a complex DDoS attack, as well as the steps used to mitigate each phase of the assault.Read more >