Best Practices in DDoS Defense: Real World Customer Perspectives

Presented by

Carlos Morales,VP – Sales Engineering and Arbor Cloud,Arbor Networks

About this talk

There’s little doubt that DDoS attacks continue to rise in size, frequency and complexity. It’s also true that DDoS attacks impact organizations of all types – from service providers to cloud/hosting providers to enterprises in all verticals and regions of the world. In this session, Arbor’s Carlos Morales, VP of Sales Engineering, along with a panel of Arbor Service Provider and Enterprise customers, will discuss their experiences with DDoS attacks and best practices for DDoS attack defense. The panel will discuss: -Their DDoS attacks trends and top challenges. -Their recommended best practices in DDoS defense. -The importance of threat intelligence. -The future of DDoS and role of Arbor products and services. Panelists: Steve Bendall Head of Network Security DDoS BT Security Roman Lara Network Engineer II Rackspace Alexander Miranda Director of Security Tradeweb J. Marc Hopkins Network Services Manager SouthWest Ohio Computer Association

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (657)
Subscribers (13397)
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security. Due to our partnerships, we are able to offer discounts on some of the most popular security certifications and training courses, including CEH, CISSP, CCISO, and more. www.infosec-careers.com This BrightTALK channel is an extension of the group and the ISCN website (www.infosec-careers.com), featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after. Key areas: InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more