Hi [[ session.user.profile.firstName ]]

F5 (Pt. 3): The Rise of Bots: Top 5 Bot Driven Threats & How to Stop Them

Bots are now teetering on the edge of being the majority of traffic on the internet. It’s not all bad news, as there are plenty of useful bots that make both our work and personal lives more productive. However, malicious bot and botnet creators have introduced more sophistication into their bots, making them harder to detect, and the resulting threats are becoming more common place. Join F5 and (ISC)2 on March 29, 2018 at 1:00PM Eastern as data gathered from internal threat research teams is presented that explains how bots are being created, the top application threats driven by bots, and how to detect and better protect to your business.
Recorded Mar 29 2018 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Brian McHenry, Senior Manager, Systems Engineering, F5; Brandon Dunlap, Moderator
Presentation preview: F5 (Pt. 3): The Rise of Bots: Top 5 Bot Driven Threats & How to Stop Them

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Solving The Problem Of TLS Visibility Recorded: May 29 2019 11 mins
    John Wagnon
    The F5 SSL Orchestrator (SSLO) provides a powerful solution to the problem of TLS encryption visibility. Most of the traffic on the Internet today is encrypted, so organizations have to figure out how to reliably inspect that encrypted traffic. Some solutions require a "daisy-chain" of security devices to inspect the traffic, but the F5 SSLO allows encryption/decryption to happen in one place. The SSLO "orchestrates" the traffic by implementing policies that direct traffic to one or more of the security devices depending on what type of traffic it is. The SSLO also solves the problem of cipher diversity by offering one set of cipher suites to external devices and another set of cipher suites to internal devices. Learn about all this and more as John outlines the details of the SSL Orchestrator!
  • Solving The Problem Of TLS Visibility Recorded: May 22 2019 12 mins
    John Wagnon
    The F5 SSL Orchestrator (SSLO) provides a powerful solution to the problem of TLS encryption visibility. Most of the traffic on the Internet today is encrypted, so organizations have to figure out how to reliably inspect that encrypted traffic. Some solutions require a "daisy-chain" of security devices to inspect the traffic, but the F5 SSLO allows encryption/decryption to happen in one place. The SSLO "orchestrates" the traffic by implementing policies that direct traffic to one or more of the security devices depending on what type of traffic it is. The SSLO also solves the problem of cipher diversity by offering one set of cipher suites to external devices and another set of cipher suites to internal devices. Learn about all this and more as John outlines the details of the SSL Orchestrator!
  • TLS 1.3 Explained Recorded: May 14 2019 11 mins
    John Wagnon
    Learn the difference between TLS 1.2 and 1.3, including the security and performance advantages with 1.3

    There are several key changes in this protocol such as a requirement to use Perfect Forward Secrecy Ciphers, and the introduction of a Zero Round Trip Time handshake for session resumption. In this video, John outlines many of the important features of this new protocol.
  • TLS 1.3 Explained Recorded: May 7 2019 12 mins
    John Wagnon
    Learn the difference between TLS 1.2 and 1.3, including the security and performance advantages with 1.3

    There are several key changes in this protocol such as a requirement to use Perfect Forward Secrecy Ciphers, and the introduction of a Zero Round Trip Time handshake for session resumption. In this video, John outlines many of the important features of this new protocol.
  • Fight the good fight against the bad bots! Recorded: Apr 24 2019 35 mins
    Brian McHenry and Graham Alderson
    Distinguishing between good bots, bad bots, and humans is a major challenge. Today, over 50% of online traffic is generated by bots and they are involved in nearly every attack. Identifying malicious bots and safeguarding against them is now a top priority for organisations developing a sustainable security strategy.

    Join us for this webinar to learn:
    - How bots infect, propagate, and attack applications
    - What types of application attacks are commonly performed by bots
    - How you can defend against bad bots without disrupting the good ones
  • How to Gain Visibility into Encrypted Threats Recorded: Apr 17 2019 39 mins
    Jay Kelley, Principal Product Marketing Manager - F5 Networks Peter Silva, Security Solutions Marketing Manager - F5 Networks
    Driven by built-in web browser warnings, the EU GDPR, and general security and privacy awareness, encrypting data-in-transit with SSL/TLS is now a standard practice among many organizations. This is a great win for security overall to help prevent data breaches, however cyber criminals are using these encrypted channels to propagate malware and exfiltrate data knowing they can bypass traditional security inspection solutions that don’t decrypt traffic.

    Join this webinar to learn more about:

    - Challenges with encrypted traffic and risks to your business
    - How to efficiently decrypt and orchestrate traffic to reduce latency
    - How to intelligently manage decryption and re-encryption across all of your security inspection solutions (IDS/IPS, NGFW, Malware Sandbox, etc.)
  • Fight the good fight against the bad bots! Recorded: Apr 16 2019 36 mins
    Brian McHenry and Graham Alderson
    Distinguishing between good bots, bad bots, and humans is a major challenge. Today, over 50% of online traffic is generated by bots and they are involved in nearly every attack. Identifying malicious bots and safeguarding against them is now a top priority for organisations developing a sustainable security strategy.

    Join us for this webinar to learn:
    - How bots infect, propagate, and attack applications
    - What types of application attacks are commonly performed by bots
    - How you can defend against bad bots without disrupting the good ones
  • How to Gain Visibility into Encrypted Threats Recorded: Dec 26 2018 40 mins
    Jay Kelley, Principal Product Marketing Manager - F5 Networks Peter Silva, Security Solutions Marketing Manager - F5 Networks
    Driven by built-in web browser warnings, the EU GDPR, and general security and privacy awareness, encrypting data-in-transit with SSL/TLS is now a standard practice among many organizations. This is a great win for security overall to help prevent data breaches, however cyber criminals are using these encrypted channels to propagate malware and exfiltrate data knowing they can bypass traditional security inspection solutions that don’t decrypt traffic.

    Join this webinar to learn more about:

    - Challenges with encrypted traffic and risks to your business
    - How to efficiently decrypt and orchestrate traffic to reduce latency
    - How to intelligently manage decryption and re-encryption across all of your security inspection solutions (IDS/IPS, NGFW, Malware Sandbox, etc.)
  • Defense Intense - Portable Multi-Cloud Security for the Agile Era Recorded: Dec 26 2018 57 mins
    Nathan Mckay- Solutions Marketing Manager, F5 Networks Robert Haynes- Cloud Technical Marketing, F5 Networks
    Defending apps in the cloud can be difficult – especially if you are pursuing a multi-cloud strategy. No matter where you deploy, your apps need resilience, which means robust defenses to ensure their continued availability. Ensure your customers (and their data) get the protection they need in the face of current and emergent threats. Not all risks are related to software vulnerabilities - some, such as “credential stuffing”, are inherited from breaches that have occurred elsewhere.

    Portable, proactive security is possible. Make sure your development teams have access to the tools they need to enable them to move fast while still delivering the confidentiality, integrity, and availability your customers expect and deserve. There are lots of options; be sure to leverage the ones best suited to protect your technology platforms and business priorities.

    In this webinar you will learn:

    - How to build an application protection strategy that will proactively protect your assets across clouds
    - How you can go beyond vulnerability management and address real business risks, such as denial of service, fraud, and intellectual property theft
    - How multi-cloud can help you stay ahead of your competitors and reap the rewards of economy scale and pricing
    - How F5 can help your organization identify and solve problems that are impacting your bottom line
  • How to Build a Comprehensive Defense Against DDoS Attacks Recorded: Sep 10 2018 51 mins
    Nathan Mckay- Solutions Marketing Manager, F5 Networks David Remington- Security Solutions Architect, F5 Networks
    DDoS attacks continue to increase in frequency – and complexity. Your network, apps, and other supporting infrastructure make for a large DDoS attack surface, meaning defense must be comprehensive. A DDoS solution should address all types of attacks whether a volumetric attack aimed at your network bandwidth or a low-and-slow attack aimed at your app or infrastructure.

    F5 DDoS Hybrid Defender (DHD) is a unique solution that offers comprehensive DDoS protection against all attack types, turning a potential catastrophe into a minor annoyance.

    Join us for this webinar to learn about:
    •Ensure accurate DDoS attack detection utilizing attack signatures, behavioral analytics to identify deviations from normal traffic, and detection of server stress
    •Leverage real-time traffic decryption to protect your applications as well as your network and intelligently block the bad traffic without impacting the good traffic
    •Automatically signal to F5’s cloud-based scrubbing service, and seamlessly re-direct attack traffic to prevent even the largest volumetric attacks from saturating your bandwidth
  • Thingbot Apocalypse - How to prepare for IoT device attacks Recorded: Jul 27 2018 48 mins
    Sara Boddy- Director, F5 Labs
    Our modern world depends on healthy, functioning, IoT devices; however, many of them are unsecure. Cyber attackers have compromised IoT devices for over a decade, turning them into Thingbots―botnets made from IoT devices.

    The hunt for IoT attacks has made a pivotal turn in the last two and a half years. F5 Labs has been tracking these attacks and the subsequent building of Thingbots from boutique attacks, into more sophisticated and powerful cyber weapons. Thingbots are now being sold as multi-vector bots-for-hire that allow cyber attackers to launch any attack of their choice―often used for automated web application attacks and credential stuffing.

    With the threat of IoT attacks increasing, as billions of new devices are deployed each year, the ability to detect threats, and clean and upgrade infected systems is still not a part of most IoT development processes.

    In this webinar we’ll explore:

    - How attacks have evolved from the methods they use to the attacks they launch from the resulting Thingbots
    - The threat actor networks and IPs behind these attacks, their geographical targets, and how that has changed over time
    - What you should do to protect your company
  • The Internet of "Very Bad" Things Recorded: Jun 8 2018 53 mins
    Sara Boddy- Director, F5 Labs and Thomas Norman- CPP/PSP, Ingram
    While attackers have been exploiting IoT devices in the consumer market for a while, they’re now increasingly targeting higher value business targets. IoT devices are typically not secure and they can be used to gain entry into your network where a devastating attack can then be carried out.

    Join top security researchers Thomas Norman, Ingram Micro, Sara Boddy and Justin Shattuck from F5 Labs, and Moderator Gregg Linde as they discuss the realities of IoT security and find out:

    • What IoT means to consumers and enterprises
    • How attackers use IoT to carry out attacks
    • Why current IoT Security approaches are making the problem worse
    • How you can protect your data and organization from IoT attacks
  • Leveraging innovative security and app delivery solutions from the F5-Microsoft Recorded: Jun 6 2018 38 mins
    Jeff Stathatos- Cloud Solutions Architect, F5 Networks, Claus Wieser- Senior Partner Development Manager, Microsoft
    Hear experts from F5 and Microsoft talk about joint offerings that provide more secure application delivery, upgrade federated identity security, and maximize app security in the cloud.

    Join us to learn more about:

    • How you can fortify your identity security and improve the UX for Microsoft Active Directory and Office 365
    • How to enable faster, smarter, and safer app deployment by inserting a CI/CD toolchain into your application infrastructure
    • How to mitigate vulnerabilities and stop application threats throughout your journey to Azure using the F5 WAF for Azure
  • Why Advanced Threats Require Advanced Application Defense Recorded: May 17 2018 46 mins
    Brian McHenry- Senior Manager, Global Customer Solutions Engineering Byron McNaught- Product Marketing Manager
    Web application attacks are the #1 source of data breaches. A Web Application Firewall (WAF) provides critical security controls to protect web apps. However, not all WAF solutions are the same. While many can help an organization protect their apps from common and known threats, most are inadequate against the myriad of attacks across the evolving risk landscape.

    F5 announced Advanced WAF, a new category of app protection that introduces unique capabilities to the WAF market. Watch this webinar to learn how F5’s Advanced WAF can:

    • Provide strong, adaptable security for every app, whether on-premises or in the cloud
    • Defend web and mobile apps against malicious bots and exploits
    • Prevent account takeover and stop large scale credential theft and abuse
    • Protect apps from layer 7 denial of service attacks
  • Making Security Cloud-Friendly Recorded: Apr 19 2018 61 mins
    Nathan McKay and Robert Haynes
    Security in the cloud vs. cloud security – whose job is it anyway? According to F5 Labs researchers, 86% of successful data breaches begin with compromises of the application layer services or user identities – placing responsibility for app security squarely in the hands of the app owners, developers, and enterprises deploying them. Application security can be difficult and daunting, but it doesn’t have to be.

    The cloud paradigm has made infrastructure easy for lots of us, and application security is poised to follow suit with advanced security tools now more affordable and accessible than ever via your favorite cloud du jour. We’ve reached a new inflection point where security tools once seen as costly and burdensome can now be seen as business enablers.
  • F5 (Pt. 3): The Rise of Bots: Top 5 Bot Driven Threats & How to Stop Them Recorded: Mar 29 2018 59 mins
    Brian McHenry, Senior Manager, Systems Engineering, F5; Brandon Dunlap, Moderator
    Bots are now teetering on the edge of being the majority of traffic on the internet. It’s not all bad news, as there are plenty of useful bots that make both our work and personal lives more productive. However, malicious bot and botnet creators have introduced more sophistication into their bots, making them harder to detect, and the resulting threats are becoming more common place. Join F5 and (ISC)2 on March 29, 2018 at 1:00PM Eastern as data gathered from internal threat research teams is presented that explains how bots are being created, the top application threats driven by bots, and how to detect and better protect to your business.
  • How to Combat the 7 Common Emergent Threats Recorded: Mar 21 2018 64 mins
    Keiron Shepherd, Senior Systems Engineer - Security, F5 Networks
    In today’s digital marketplace, your applications are the backbone of your business. However, cloud-based apps create a host of complex challenges and new risks. With automated tools and hackers for hire, threats are increasing and cybercrime has turned into a game for profit. The digital world has opened the door to unprecedented threats, putting your corporate data and reputation at risk.

    Join us for this webinar to learn about:
    • The 7 most common threats to your apps and data: Malicious bots, Credential stuffing, DDoS, Ransomware, Web fraud, Phishing, and Malware
    • How you can leverage threat intelligence to secure your apps and data
    • Where to spend your security budget to provide the strongest level of protection

    By watching this webinar, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://f5.com/about-us/policies/privacy-policy). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • F5 (Pt. 2): The Hunt for IoT and it’s Threat to Modern Life Recorded: Mar 1 2018 59 mins
    Sara Boddy, Director of F5 Labs Threat Research, F5; Brandon Dunlap, Brightfly (Moderator)
    Our modern world depends on healthy, functioning, IoT devices. Unfortunately many of them are terribly insecure. Cyber attackers know this and have been aggressively compromising IoT devices for years. For the past two years, F5 Labs has been tracking cyber attackers as they hunt, infect, and build “Thingbots” - botnets made from IoT devices. This hunt has developed sizable thingbots like the infamous Mirai, and many others that have the capability to launch globally destructive attacks. These attacks can significantly impact modern life because of IoT’s presence within power systems, transportation systems, airport monitors, emergency warning systems, and security cameras. Join F5 and (ISC)2 on March 1, 2018 at 1:00PM Eastern for the 2nd Part of our three part Security Briefings series where we’ll explore the threat actors behind these attacks, the geographical targets of their attacks, how they are evolving their attack methods, and the types of devices impacted. We’ll include tips on how to start protecting yourself personally, and what you should be doing to protect your businesses.
  • Plan the Work & Work the Plan – Continuing the Move to the Cloud Recorded: Feb 15 2018 58 mins
    Tom Thomas, Director of Enterprise Architecture, F5; Ryan Goode, Sr Mgr, Tech Ops, (ISC)2; Brandon Dunlap, Moderator
    Chances are, your organization has made a move to the cloud. In fact, most enterprises run approx. 45% of their applications and infrastructure in the cloud with that number sure to increase in the next 12 months. But as you relocate more into the cloud, what’s your strategy? What are you moving? What benefit are you seeking? Different businesses have different goals and objectives. Join F5 and (ISC)2 on February 15, 2018 at 1:00PM Eastern for a discussion on the continuing evolution of cloud migration and how organizations should prepare, strategize and execute their cloud journey while addressing operational needs, security concerns and the options that cloud-based services can bring.
  • F5 (Pt. 1): Don't Get Stung! Examining the OWASP Top 10 & Advanced WAF Recorded: Feb 1 2018 59 mins
    Nathan McKay, Solutions Marketing Manager, F5; Brandon Dunlap (Moderator)
    Web application security is complex, difficult, and costly. These issues are well known, but remain prevalent out in the real world. Most development teams do not have the time or resources to sufficiently protect against the myriad of attacks that are relevant to each vector, while the level of expertise required to address these issues are difficult to come by even if your project has the time and budget for it. The good news is that advanced WAF technology is more accessible and affordable than ever before. With the right tools, comprehensive WAF coverage can not only reduce your exposures and give you better control over your applications but also help optimize your resources and reduce overall operating costs. Join F5 and (ISC)2 for Part 1 of a 3 part Security Briefings Series on February 1, 2018 at 1PM Eastern where we’ll discuss the OWASP Top 10, defenses for everything it addresses and how to use WAF to optimize and filter unwanted traffic to cut costs in the cloud.
Think App Security First
F5 provides a comprehensive, integrated security suite for protecting against primary risks associated with your apps—no matter where they reside—helping ensure the confidentiality, integrity, and availability of your applications and data. Backed by threat intelligence and security experts, you can better navigate today’s ever-changing threat landscape.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: F5 (Pt. 3): The Rise of Bots: Top 5 Bot Driven Threats & How to Stop Them
  • Live at: Mar 29 2018 5:00 pm
  • Presented by: Brian McHenry, Senior Manager, Systems Engineering, F5; Brandon Dunlap, Moderator
  • From:
Your email has been sent.
or close