Hi [[ session.user.profile.firstName ]]

Deploying Flowspec in a Service Provider Environment

Flowspec is an important tool in combating DDoS attacks, especially in large networks. Arbor provides valuable intelligence on how to craft your Flowspec routes, as well as a handy interface for managing the routes.

In this session, Steve Walsh, Senior Security Engineer at AOL, describes what Flowspec is, how it came about, and how it works. Learn about some of the tests performed by Juniper and others on scalability, and the discovered limitations that were overcome with the implementation of Flowspec.

Join this session to learn:
•Some of the different methods of deploying Flowspec
•How Flowspec compares with alternative filtering methods
•Best practices for secure traffic routing
Recorded Apr 29 2015 37 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Steve Walsh, Senior Security Engineer, AOL
Presentation preview: Deploying Flowspec in a Service Provider Environment

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Seeing through the Clouds: How Visibility Reduces Security Failures Oct 18 2017 3:00 pm UTC 45 mins
    Dominic Vogel, Chief Security Strategist, Cyber.SC
    As organizations continue to ramp-up their migration to cloud-based environments, they will need to account for the associated security and control risks. There are hidden dangers and blind spots that arise through the use of virtualization technology in the data center. These hidden dangers and blind spots become more prevalent as business-critical applications are increasingly deployed on the public cloud. This is a problem considering that an organization’s operations are dependent on a cloud environment that inherently has a huge visibility gap.

    Many are now making the necessary changes to keep data secure in the cloud. This talk will focus on how to pragmatically accomplish cloud security through increased emphasis on cloud network visibility and cloud access security brokers. Enterprises that can properly implement appropriate cloud network visibility and cloud access security brokers will experience a third fewer security failures. Learn about practical steps and tools that you can use for accomplishing cloud security in your organization.
  • From Self-parking to Self-loathing: Innovation and Risk in Connected Cars Jun 22 2017 12:00 pm UTC 45 mins
    Ken Munro, Partner, Pen Test Partners LLP
    While autonomous driverless cars are still a work-in-progress connected cars and the IoT are becoming the norm. Whether that relates to communications infrastructure, on-board services for vehicle management, or mobile device connectivity, more and more new cars come equipped as standard with some sort of "connected" element. Typically the cost of new technology is in the buying price, but with modern cars it could be insurance hikes, loss of privacy, or even loss of life.

    Ken Munro, Partner and Security Consultant and Pen Test Partners, breaks down the key technologies and examines the security implications for drivers, insurers and manufactures alike.

    Viewers will learn about:
    - The attack surface that a connected car presents
    - What those attacks look like
    - The implications for everyday drivers
    - What manufacturers need to be doing
  • GDPR: Ready or not, here it comes Mar 16 2017 3:00 pm UTC 60 mins
    Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture
    Europe’s General Data Protection Regulation (GDPR) will come into effect on 25th May 2018, leaving all organisations that process the data of EU residents with less than 18 months to meet the stringent requirements of the regulation. Organisations must implement a cloud security strategy that supports compliance and minimises their organisation’s exposure to the new breach notification requirements and financial penalties, as high as 20 million Euros or 4% of total annual turnover.

    Still figuring out how your organisation is going to comply? What actionable steps you should be taking today? Look no further. Join Oliver Pinson-Roxburgh, EMEA Technical Director from Alert Logic for an in-depth discussion about GDPR, highlights include:

    - Cutting through the ambiguity and focusing on the key cloud security considerations
    - Data breach responsibilities and what that means to your organisation
    - What is the role and expectation of your cloud provider when it comes to GDPR
    - Insight into real-life case studies

    Register for this must-attend webinar as we provide you with a way to help reduce risk and keep the regulators happy.
  • 7 Strategies for Dynamic Contract Management in the Cloud Mar 15 2017 2:00 pm UTC 45 mins
    Jeffrey Ritter
    New threats and new defenses constantly challenge the rules for managing security across third party cloud services. In this webcast, you will learn 7 strategies for how to structure and adapt the complex commercial agreements to assure both vendors and customers new risks are being controlled.
  • What's Next on the Corporate GRC Agenda? Mar 15 2017 11:00 am UTC 45 mins
    Hassham Idris, Cyber Security GRC, ISMS and Program Delivery Expert
    The snowballing complexity of the business and technology risks, introduction of new regulations and ever increasing compliance requirements have made it vital for every enterprise to set up a proficient Governance, Risk and Compliance (GRC) framework.

    This webinar will emphasise on the essential GRC elements that organizations must adopt in order to protection business critical assets and exploit new opportunities with confidence.
  • Shark Attacks and Car Crashes: Interrogating Fear and Risk in Data Protection Mar 15 2017 9:00 am UTC 45 mins
    Tim Sadler, ‎Co-founder & CEO, CheckRecipient
    Contrary to the fear around malicious insiders and external hackers, the Information Commissioner's Office recently reported that the most common data security incidents reported to them are all due to inadvertent human error (incidents like misaddressed emails and laptops being left on trains).

    In the face of game-changing regulatory changes like GDPR, it's crucial that information security and data protection professionals prioritise addressing the most prevalent risks first, not the ones that appear the scariest.

    This webinar is ideal for any security professionals looking to understand the regulatory and data protection landscape; reduce vulnerabilities; respond to threats more effectively and remediate breaches more effectively.
  • Availability 101: How to Defend against Cyber Attacks Mar 14 2017 12:00 pm UTC 45 mins
    Jay Coley, Sr. Director Security Strategy and Planning EMEA, Akamai Technologies
    With DDoS cyber attacks rapidly increasing in both size and speed, as well as attacks that are crafted for a specific application or service, it’s never been so critical to ensure your basic availability is sound. Mitigation services can no longer be ‘one size fits all’. Organisations now need a tailored platform for the specific application or service to ensure 100% availability. Without availability ensured then other security overlays are meaningless.

    This webinar will look at attack trends and case studies and provide top tips on how to stay ‘always on’ in the face of cyber attacks.
  • Hackers, Threats & Cyber Defence: Reporting from the front line Mar 14 2017 11:00 am UTC 45 mins
    Peter Wood
    Cyber attack trend reporting from the front line of cyber security
  • Blockchain For Identity Authentication Infrastructure Mar 14 2017 9:00 am UTC 45 mins
    Professor Michael Mainelli, FCCA FCSI FBCS (Z/Yen Group Limited)
    Mutual distributed ledger (MDL) identity schemes could empower people with personal data storage and management, permission frameworks for access by third parties such as banks insurers or governments, and even distributed reputation ratings.

    Such applications could reduce financial fraud, costs, and crime, and increase returns, confidence, and security. MDLs are uniquely supportive of controlled distribution and sharing of digitally-signed documentation and could form the backbone to identity and authentication systems worldwide. In fact, some claim that identity authentication infrastructure is the ‘killer app’ for MDLs rather than payments.

    While anti-money-laundering/know-your-customer/ultimate-beneficial-ownership processes are arduous for high-net-worth individuals, about 2.4 billion poor people worldwide lack official identification, about 1.5 billion over the age of 14.

    This webinar will examine how MDLs might aid both rich and poor.
  • Roll of the Dice: The Dangers of Third Party Code on Your Websites Mar 9 2017 2:00 pm UTC 45 mins
    Fabian Libeau, EMEA Technical Director, RiskIQ
    Third-party website resources and code play an integral role in the online economy. They enable interactive sites that allow people to transact with their banks; shop online, watch movies or television, share photos, videos, documents and much more. Unfortunately, these resources also represent exploitable infrastructure that sits outside the control of an organisation's IT security team. As a result third party web components have become fertile ground for launching attacks and distributing malware. Addressing this challenge requires looking at security from a new perspective.

    In this webinar we will explore the different kinds of third party code that organisations host on their sites along with their security implications. We’ll show how an outside-in approach to security can provide the controls organisations require while at the same time protecting their customers and employees.
  • How to scout the dark web and why Mar 8 2017 1:00 pm UTC 60 mins
    Aurélie Perez, Senior Security Consultant at Orange Cyberdefense
    Are cybercriminals using the dark web to buy and sell your customer and employee data, intellectual property and malware? Highly specialist expertise, big data tools and Artificial Intelligence are essential to detect and mitigate the threats to your enterprise.

    Learn about the techniques used to:
    • Conduct undercover surveillance on the dark web to discover mentions of your industry, brand, and data
    • Find data from a security breach at your enterprise
    • Stop stolen user account credentials from being used to breach trusted systems
    • Track emerging exploit kits and vulnerabilities

    Mainstream search engines are unable to penetrate and index these hidden parts of the Internet. Access to sites is often restricted to cybercriminals who are recommended by a current member. Meanwhile, the cost of cybercrime is forecast to hit $6 trillion annually by 2021 according to Cybersecurity Ventures. It’s an issue that can’t be ignored.
  • [VIDEO] The Crucial Steps to Prepare for GDPR in 2018 Mar 7 2017 2:00 pm UTC 45 mins
    Josh Downs, Community Manager, BrightTALK & John Elliott, Payments & Privacy Expert
    BrightTALK will be broadcasting its in-depth interview with easyJet Head of Payment Security John Elliott in conversation with BrightTALK Information Security Community Manager.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • [VIDEO] Cyber Opportunities for the New US Political Administration in 2017 Mar 2 2017 4:00 pm UTC 45 mins
    Josh Downs, Community Manager, BrightTALK & Simon Crosby, Co-Founder & CTO, Bromium
    BrightTALK will be broadcasting its in-depth interview with Bromium's Co-Founder and CTO Simon Crosby in conversation with Josh Downs, Community Manager, BrightTALK.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • [Video Interview] Threat Management and the Keys to Avoiding a Major Data Breach Mar 2 2017 3:00 pm UTC 45 mins
    Ross Brewer, VP & MD, LogRhythm & Josh Downs, Community Manager, BrightTALK
    Research shows that 76% of companies suffered a data breach in 2016, so it’s now almost inevitable that hackers will gain access to your company and your sensitive data.

    Security professionals are now looking to deal with breaches faster, to keep their company off the front page and with heavy GDPR fines on the horizon, they’re wise to do so…

    Organisations are fearful of damaging data breaches but unsure of the best course of action to protect themselves from major cyber incidents. Whilst a large per cent of businesses focus on building up perimeter defences, not enough are concentrating on monitoring their own network for the best chance to detect threats and mitigate them before significant damage is done.

    Tune into this in-depth one-on-one interview to learn:

    - More about the threatscape and the dangers to your organisation

    - The influence that GDPR will have and steps you need to take

    - Processes for responding to a breach

    - The workflow for effective threat management
  • How to Enable Zero Trust Security for Your Data Center Mar 2 2017 2:00 pm UTC 60 mins
    John Kindervag, Vice President and Principal Analyst at Forrester
    The rising tide of successful cyberattacks against organizations has made it clear that traditional approaches for defining trust levels, stopping lateral movement and enforcing advanced security controls within a data center are no longer effective. The Zero Trust approach advocated by Forrester provides guiding principles for achieving a robust and secure data center security architectures. However, choice of the security platform, design considerations and effective use of advanced security capabilities play a crucial role in implementing a successful Zero Trust enabled data center.

    In this webinar, guest speaker John Kindervag, Vice President and Principal Analyst at Forrester will talk about the steps to achieving a Zero Trust data center.

    Topics covered in this webinar will include:

    - 5 Steps to achieving Zero Trust enabled data centers.
    - Extending Zero Trust design principles across hybrid cloud deployments
    - Security policy considerations and guidelines for implementing Zero Trust enabled data centers.
  • [VIDEO] The Rise of the Underground Darknet Criminal Economy Mar 1 2017 2:00 pm UTC 45 mins
    Josh Downs, Community Manager, BrightTALK & Rob Wainwright, Director, Europol
    BrightTALK will be broadcasting its in-depth interview with Europol Director Rob Wainwright and Josh Downs, Information Security Community Manager at BrightTALK.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • Swimming in the Sea of Compliance: Become NCUA Compliant with Gemalto Feb 28 2017 7:00 pm UTC 60 mins
    Alex Hanway, Encryption Marketing at Gemalto
    The National Credit Union Administration (NCUA) requires every credit union to protect their members’ personal, private data. But with a host of mandates and a range of technology options, where should credit union IT administrators begin? Encryption and key management can address a number of the requirements set out in these guidelines. Together they can help credit unions become compliant and can keep customer data safe.
    Join our live webinar "Navigating the National Credit Union Administration (NCUA) Privacy Guidelines:
    Securing Customer Records with Encryption and Key Management" on February 7th to learn about:
    •Which specific guidelines concern customer information at rest and in transit
    •How encryption and key management addresses these requirements
    •The benefits of a centralized encryption management
  • [VIDEO] The Influence of Machine Learning and AI on Cyber Security Feb 28 2017 2:00 pm UTC 45 mins
    Josh Downs, Community Manager, BrightTALK & Troels Oerting, CISO, Barclays
    BrightTALK will be broadcasting its in-depth interview with Troels Oerting, CISO of Barclays and Josh Downs, Community Manager of the BrightTALK Information Security Community.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • [VIDEO] Cyber Security Lessons for the Financial Sector Feb 24 2017 2:00 pm UTC 45 mins
    Josh Downs, Community Manager, BrightTALK; Ian Glover, President, CREST & Rowland Johnson, MD, Nettitude
    BrightTALK will be broadcasting its in-depth interview with CREST President Ian Glover and Nettitude MD Rowland Johnson jointly in conversation.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • [VIDEO Panel] Securing the Cloud and Driving Digital Transformation Recorded: Feb 23 2017 58 mins
    Josh Downs, BrightTALK (moderator); Dan Webb, James Brown, Oliver Pinson-Roxburgh & David Howorth, Alert Logic
    Digital transformation is changing the business landscape for every organisation, with the way new technologies can unlock competitive advantage, enable efficiently, agility and enhance customer experiences. The cloud is where this innovation is happening and enabling this transformation, but when you take advantage of its possibilities, it’s crucial that you secure your cloud applications and workloads.

    If you’re building applications or migrating workloads to the cloud, you’re probably like most organisations – trying to determine what security controls are needed, and how to integrate workload security without slowing down innovation or needing to add dedicated security staff – which these days is harder to find and more expensive to keep.

    During this panel discussion you will hear from industry experts as they discuss what steps and considerations should be taken when moving to any cloud. Where are the responsibilities of security and how do you maintain visibility and control over your data, including:

    - Why when moving business critical applications to the cloud you require a different approach to security?
    - Best Practices for minimizing risk in your cloud adoption
    - Filling the Cloud Security IT Skills Gap
    - Managing the Challenges of the Cloud under EU GDPR
Resources and information to help you further your InfoSec career
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security.

www.infosec-careers.com

- Post Security jobs
- Set up and manage your resume to get found by security employers & recruiters
- Security training & certification offers
- Security resources, including reports, white papers & toolkits.

This BrightTALK channel is an extension of the group and the ISCN website (www.infosec-careers.com), featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after.

Key areas:

InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Deploying Flowspec in a Service Provider Environment
  • Live at: Apr 29 2015 2:00 pm
  • Presented by: Steve Walsh, Senior Security Engineer, AOL
  • From:
Your email has been sent.
or close