Episode 2 - Attacker Methods and Tools: Staying ahead of Motivated Attackers
Chris Fuller Solutions Engineering Manager, Shape Security and Slobodan Ivanovic, Major Account Manager, F5
About this talk
Competing for customer loyalty in a digital world is hard. To add to this challenge, security teams must defend the business from motivated adversaries who have evolved their tactics to bypass traditional defences and evade detection.
Any business that operates eCommerce applications or manages user accounts of value is a potential target and the consequences are significant. Credential stuffing and account takeover can result in fraud losses, damaged brand, and other equally disastrous scenarios.
Join us for our second episode to learn about attacker methods and tools. We will cover:
• The different attacker methods and tools
• Adapting to new attacks
• How to remove unwanted traffic and increase your topline revenue
• Key recommendations
By watching this episode, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
F5 application services ensure that applications are always secure and perform the way they should—in any environment and on any device.
F5 EMEA hosts webinar series on the latest IT industry trends around app services and security, so please stay tuned to this channel to get the latest information.
To learn more about F5, visit f5.com or follow @F5_EMEA on Twitter.…