InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Tools and Techniques used in Automated Threats

Presented by

Shain Singh, Cloud Security Lead, F5; Benjamin Francis, Fraud Specialist, Shape Security - part of F5

About this talk

The use of automation and bots for attacks have been around from the earliest days of OWASP and web application firewalls. What has changed over the years is the increased exposure to these threats with the increasing use of public clouds and explosion of applications. Malicious actors have also evolved into more sophisticated adversaries as there is a growing financial gain from successful breaches. Learn from our industry experts on the common tools used to bypass common mitigation techniques, as well as how the OWASP Automated Threat list can be implemented for a comprehensive defense strategy. Presenter: Shain Singh, Cloud Security Lead, F5 Presenter: Benjamin Francis, Fraud Specialist, Shape Security - part of F5 Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
ISC2 APAC Secure Webinars

ISC2 APAC Secure Webinars

93222 subscribers504 talks
ISC2 Live Webinars for InfoSec Professionals in APAC Region
Looking for expertise and information to advance your career and tackle your challenges? Subscribe and join us for the educational webinars in APAC time zone. Earn CPEs quickly and at no cost by attending webinars: 1 hour of webinar equals 1 CPE. We welcome members and non members alike.
Related topics