Hi [[ session.user.profile.firstName ]]

DDoS Extortion Threats Return: Are Your Defenses Ready? | Security Briefing

You may be aware of the recent surge in DDoS attacks targeting organizations across major industries like Financial Services, Retail and Gaming. Akamai’s Security Intelligence Research Team (SIRT) has been tracking attacks peak at almost 200 Gb/sec, utilizing ARMS, DNS Flood, GRE Protocol Flood, SNMP Flood, SYN Flood, and WSDiscovery Flood attacks as their main vectors. While such attacks are increasing in sophistication, sheer volume and frequency, extortion demands put even more pressure on security and IT teams that could potentially leave many areas of the business undefended.

In this session we will cover:
Details behind mitigating the largest and most complex DDoS attacks in 2020
Analysis of the attack vectors and impact of the current DDoS extortion campaign
Top Considerations in building a DDoS protection plan that works for organizations in your industry
Live Q&A to address your specific concerns
Recorded Oct 6 2020 66 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Aseem Ahmed, Senior Product Manager, Akamai
Presentation preview: DDoS Extortion Threats Return: Are Your Defenses Ready? | Security Briefing

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Cybersecurity Threat Trends – What 2020 Can Teach Us About 2021 And Beyond Dec 7 2020 5:00 am UTC 60 mins
    Sid Deshpande, Director of Security Strategy, Akamai Technologies
    2020 has been a unique year in so many ways, and the cybersecurity landscape is no different. Threats vectors and threat actors have rapidly evolved their attack methods to match the changes in the digital risk surface and security teams have had to spend considerable effort to keep pace with new types of threats.

    This session will look at key threats organizations faced in 2020, from DDoS and credential stuffing attacks, to attacks on remote working infrastructure, with a focus on extracting key learnings to help security leaders prepare their security strategies for 2021 and beyond.
  • 써드파티 스크립트 애플리케이션 보안: 침입 vs 탐지 Recorded: Oct 30 2020 15 mins
    아카마이 코리아, 신동곤 상무
    신용카드 스키밍(skimming)은 오랫동안 보안팀의 도전과제였습니다. 해커들은 물리적 디바이스에서부터 폼재킹, 스크립트 인젝션과 같은 온라인 정보 수집 공격에 이르기까지 웹 보안 시스템보다 앞서 나가기 위해 지속적으로 전략을 발전시키고 있습니다. 최근에 꾸준히 증가하는 스키밍 방식은 애플리케이션에 존재하는 파트너·공급망 써드파티 스크립트를 활용합니다. 앱으로 들어오는 수상한 침입을 차단하는 기존의 방식도 유용하지만, 벌금이 증가하고 대규모 유출이 발생하고 있다는 점을 고려할 때 개인식별정보(PII)가 탈취되는 것을 막을 수 있는 조치를 반드시 마련해야 합니다.

    발표 내용은 다음과 같습니다.
    Magecart 공격의 역사와 규모
    써드파티 스크립트의 증가가 취약점 증가로 이어지는 이유
    스크립트 감염 분석 및 대응 방법
    Magecart를 효과적으로 방어하는 서비스의 특징
    써드파티 스크립트의 상황을 분석하는 데 유용한 팁

    발표자는 Akamai Technologies의 신동곤 상무입니다.
  • Customer Identity And Access Management: Deciding Between “Build vs Buy” Recorded: Oct 29 2020 26 mins
    Manish Upadhaya, Senior Security Sales Specialist, Akamai & Dawson Sewo, Prin. Cloud Security Architect, Akamai
    Digital identity and customer profiles are at the center of every company's digital transformation. In today's markets, customer identities and personal data associated with them are among the most critical and valuable assets of any enterprise.

    This talk explores the pros and cons of in-house CIAM solutions versus commercial CIAM solutions - taking into account changing requirements dictated by resource, technology, innovation, customer experience, security compliance and regulations. It features a range of recent CIAM case studies in Asia Pacific, including the Communications & Media, Energy & Utilities and Consumer Electronics industries.

    Our presenters from Akamai Technologies are Manish Upadhaya, Senior Security Specialist and Dawson Sewo, Principal Cloud Security Architect.
  • Webスキミングの最新手口と、PIMによる最先端のブラウザ内悪性スクリプト検知技術 Recorded: Oct 28 2020 28 mins
    ハレンドラ バンダリ
    「新しい生活様式」のもと経済活動のインターネットへの依存が高まる中で、アカウント情報やカード情報などを盗むWebスキミング攻撃の増加が懸念されています。ウェブスキミング/Magecart 攻撃の手口をを再現デモを交えて明らかにするとともに、Akamaiの開発した最新のWebスキミング対策について解説します。
  • 第三方脚本应用程序安全性:入侵与检测 Recorded: Oct 27 2020 18 mins
    孟焯,高级售前咨询,Akamai
    信用卡数据窃取一直是安全团队面临的一大挑战。从实体设备到在线搜集攻击(例如表单劫持和脚本注入),黑客一直在不断推动攻击策略的发展,企图比 Web 保护程序领先一步。稳步增加的最新数据窃取方法利用了应用程序中存在的合作伙伴和供应链第三方脚本。尽管阻止可疑的应用程序入侵活动的传统方法仍然很有价值,但是大规模的泄露事件和不断增加的罚款使得企业必须立即采取行动,以防止个人身份信息被窃。

    参加本次演讲,了解以下内容:
    ● Magecart 攻击的发展历程和攻击规模
    ● 第三方脚本的兴起如何造成漏洞增加
    ● 有关脚本入侵与缓解方法的分析
    ● 有效的 Magecart 保护服务的属性
    ● 有关第三方脚本分析的技巧
  • 봇의 이해와 역할 Recorded: Oct 23 2020 29 mins
    아카마이 코리아, 한준형 상무
    우리 주변에는 좋은 봇도 있고 나쁜 봇도 있습니다. 나쁜 봇은 DDoS, 웹 애플리케이션 공격, 크리덴셜 스터핑 등 다양한 공격에 사용될 수 있습니다. 반면 좋은 봇은검색 엔진 최적화, 대화형 인터페이스, 서비스 통합과 같은 유용한 비즈니스 기능을 제공할 수 있습니다. 디지털 플랫폼에 API를 도입하고 자동화하는 기업들이 증가하고 있습니다. 따라서 좋은 봇이 제 기능을 할 수 있도록 허용하고 동시에 악성 봇과 관련된 리스크를 관리해야 합니다.

    Akamai Technologies, 기술 영업 매니저 한준형 (Chun Han)은 이 발표를 통해 봇의 진화, 봇을 활용한 공격 및 다크웹의 경제를 설명하고 효과적인 봇 관리 방법을 공유합니다. 또한 일부 상용화된 봇이 합법적인 비즈니스로 가장하고 특정 온라인 기업을 공격하는 방법도 자세히 설명합니다. 봇의 작동 방식과 봇 운영자의 의도에 대한 이해도를 높이면 정상적인 고객의 사용자 환경에 영향을 주지 않으면서 빠르게 변화하는 봇 운영자의 기술에 효과적으로 대응할 수 있습니다. 어떻게 대비해야 할지, 어떤 부분을 고민해야할지를 기업과 개인 입장에서 제시합니다.

    발표자는 Akamai Technologies의 한준형 상무, Korea Media PreSales Manager입니다.
  • Code Less, Optimise More: How to Automate Image and Video Management at Scale Recorded: Oct 22 2020 47 mins
    Adam Newman, Global Sr. Product Manager, Web Performance Solutions & Sven Dummer, Global Sr. Product Marketing Manager
    Our lives have shifted online. Without the ability to see and touch, images and videos are providing the connections to our physical world. Consumers rely on what they can see online before making a buying decision.

    But these are also times of limited bandwidth and network overload. Media-rich websites and apps are creating challenges for marketers, visual design teams, and web developers alike. Delivering high-quality images and video with speed and impact is more difficult than ever. Nothing is more frustrating for consumers if they want to zoom in on a detail and all they get is a pixelated, blurry mess.

    Imagine all your videos and images delivered in the optimal format, tailored to the screen size of each end user, and always with the best possible visual quality — all without the need to touch your code or your image and video files. And imagine you could do this in a heartbeat across all your websites and apps without having to touch every single one of them.

    Too good to be true? In this webinar, we will introduce and demonstrate how Image & Video Manager can be used to:

    - Simplify and automate the process of image and video optimisation
    - Deliver the right formats, sizes, and visual quality tailored to each end user’s specific browser, device, and network connection in real time
    - Decrease page weight by reducing file sizes without quality degradation
    - Do all of the above without the need to write complex code and generate countless derivative renditions of your media assets
    - In fact, do all of the above without writing any code, generating any derivatives, or making any changes to your digital asset management (DAM)

    You’ll also learn about next steps for your free trial of Image & Video Manager.
  • State of the Internet / Security: Loyalty for Sale - Retail & Hospitality Fraud Recorded: Oct 22 2020 55 mins
    Martin Mckeay, Patrick Sullivan & Tony Lauro - Akamai Technologies
    Retail, travel, and hospitality were among the hardest-hit industries this year. But what was it about those industries that attracted 63% of credential stuffing attacks and 41% of web application attacks in the past two years? The answer is simple: loyalty points.

    Our threat researchers discovered alarming security vulnerabilities in these three industries while analyzing our exclusive data up through Q2 2020.

    Watch our on-demand webinar, where you’ll learn:

    • Common tactics in credential stuffing, web application, and DDoS attacks
    • The vast underground marketplace in stolen accounts
    • Strategies and tech solutions to protect your customer data
    • Simple steps to protect your own loyalty accounts

    Speakers:
    • Martin McKeay, Editorial Director
    • Patrick Sullivan, Sr. Director of Global Security Strategy
    • Tony Lauro, Director, Security Technology & Strategy
  • フィッシング攻撃の新しいエコシステム Recorded: Oct 21 2020 31 mins
    金子 春信
    フィッシングは依然として、組織にとっての大きな脅威です。個人に対してだけではなく、企業に対する脅威として広がっています。そして、このフィッシング攻撃は、攻撃者達が経済的につながって協力し合うエコシステムを形成し始めています。その攻撃の実態、具体的な攻撃手法、そして防ぎ方をご紹介します。
  • State of the Internet / Security: Gaming - You Can't Solo Security Recorded: Oct 21 2020 58 mins
    Martin McKeay, Steve Ragan & Molly Elise Young - Akamai Technologies
    Disposable income. Socially active online. Passionate about gaming. Sound familiar?

    For cybercriminals, this combination makes gamers a lucrative target. Add COVID-19 lockdowns to the mix — like Steam’s record-setting day of 24 million players online — and conditions are extraordinarily ripe for attack.

    Join us for our upcoming webinar, where we’ll examine the security threats against gamers. Get insights on:
    • Attack volumes and seasonal patterns over two years through Q2 2020
    • The top web attack vectors in gaming and across all industries
    • Gamer perspectives based on a survey of over 1,200 (in partnership with DreamHack)
    • How gamers should protect their accounts

    Our expert panelists include gamers (including one who has played some version of modded Minecraft almost every day for the past decade). Register to watch today!

    Speakers:
    • Martin McKeay, Editorial Director
    • Steve Ragan, Editor & Security Researcher
    • Molly Elise Young, Security Compliance Specialist II
  • 客户身份和访问管理:做出“自行构建还是购买”的决定 Recorded: Oct 20 2020 23 mins
    李国庆,高级云安全架构师,Akamai
    数字身份和客户档案是每个公司数字化转型的中心。在当今市场中,客户身份及其关联的个人数据对任何企业来说都是高度重要、颇有价值的资产之一。

    本次演讲探讨了自主开发的 CIAM 解决方案与商业 CIAM 解决方案的优缺点,其中结合了资源、技术、创新、客户体验、安全合规性和法规等因素带来的不断变化的要求。演示中重点分析了亚太地区最近的一系列 CIAM 案例,涉及通信与传媒、能源与公用事业和消费类电子产品行业。
  • State of the Internet / Security: Credential Stuffing in the Media Industry Recorded: Oct 20 2020 60 mins
    Martin McKeay, Steve Ragan & Patrick Sullivan - Akamai Technologies
    From astronomical spikes in attack numbers to new markets for illegal access, COVID-19 has had a major impact on account takeover attacks against the media industry.

    Join Akamai security experts as we explore trends that surfaced in the 2018–2019 data, and how they exploded in 2020. Security professionals: Don’t miss this on-demand webinar. These new discoveries about credential stuffing are critical — no matter what industry you’re in.

    Speakers:
    • Martin McKeay, Editorial Director
    • Steve Ragan, Editor & Security Researcher
    • Patrick Sullivan, Sr. Director of Global Security Strategy
  • 최신 크리덴셜 스터핑 공격 사례 Recorded: Oct 16 2020 15 mins
    아카마이 코리아, 한준 부장
    정교하고 자동화된 최신 공격 기술이 등장하고 유출된 인증정보가 광범위하게 사용되면서 크리덴셜 스터핑은 많은 기업들에게 리스크가 되었습니다. 크리덴셜 스터핑은 가장 효과적이고 수익성이 높은 웹 사기 중 하나입니다. 또한, 신속하고 정교한 크리덴셜 스터핑 공격은 기업의 매출, 생산성, 평판을 저해할 수 있습니다.

    최신 공격 패턴과 이를 방어할 수 있는 방법에 대해 알아보시기 바랍니다.

    발표 내용은 다음과 같습니다.
    크리덴셜 스터핑 공격의 특징과 기업이 직면한 일반적인 봇 탐지 문제
    현재 아시아 지역의 리테일, 금융, 기타 산업 전반에 걸친 크리덴셜 스터핑 공격 사례
    점점 정교해지는 공격을 방어하는 방법

    발표자는 Akamai Technologies의 한준 부장입니다.
  • The Total Economic Impact of Akamai Edge Security Recorded: Oct 15 2020 49 mins
    Renny Shen, Director, Product Marketing, Akamai | Bob Cormier, VP & Principal Consultant, Forrester Consulting
    While security vendors often talk about financial costs in terms of brand damage and lost revenue, quantifying the actual economic impact from a security solution can be a daunting task.

    Akamai commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study, interviewing Akamai customers on their experiences with Akamai edge security solutions, including DDoS protection, web application firewall, bot management, secure web gateway, and secure application access.

    The result is a repeatable methodology for any organization to calculate security benefits in terms of revenue protection, decommissioning legacy security products, reduced hardware spend, and security FTE savings.

    Join this live webinar with guest speaker Bob Cormier, vice president and principal consultant at Forrester Consulting, and Renny Shen, director of product marketing at Akamai.

    At the end of the webinar, you will have a good understanding of the methodology used and how to apply this with an interactive calculator to evaluate the potential financial benefits your organization can realize.

    Agenda:

    • Akamai edge security products overview
    • Forrester Research TEI methodology
    • Key findings
    • Financial benefits summary
    • Q&A
  • 事業継続性ーこれまでの経験から何を学んだか? Recorded: Oct 14 2020 35 mins
    金子 春信
    パンデミック対策によるとテレワークの急増から、企業のアタックサーフェス(攻撃面)は拡大し、IT管理の複雑さが生じています。この動画では、アカマイ自身の経験をもとに、テレワークにすぐに役立つ考慮ポイントとその実践的な技術をご紹介します。
  • 了解爬虫程序以及由爬虫引发的撞库攻击 Recorded: Oct 13 2020 31 mins
    梁医,资深技术顾问,Akamai
    僵尸网络可能是良性的,也可能是恶意的。恶意爬虫程序可用来发起各种攻击,从 DDoS、Web 应用程序攻击一直到撞库。另一方面,良性的爬虫程序可以提供合法的业务功能,例如搜索引擎优化、对话界面和服务聚合。随着企业在其数字平台中引入更多的自动化机制和 API,他们需要允许良性的爬虫程序正常工作,同时也要管理与恶意的爬虫程序相关的风险。

    在这次演讲中,Akamai 安全专家将带您了解撞库攻击中的恶意爬虫程序带来的暗网经济,并探讨有效的爬虫程序管理方案。他还会谈到一些商业化的爬虫程序操纵者如何伪装成合法企业,并针对特定在线品牌发起攻击。通过更好地了解爬虫程序的工作原理以及爬虫程序操纵者的动机,您可以有效抵御爬虫程序操纵者快速发展演进的技术,同时保证不会影响合法客户的用户体验。
  • A2C of cyber security - Securing Applications, API & Preventing Credential Abuse Recorded: Oct 9 2020 76 mins
    L.S Subramanian, Aseem Ahmed, Biju K, Subhojit Roy, Gurprit Singh Grewal, Krishna Raj Sharma, Babu Nair
    Presenting a conversation with the CXOs of the Banks and NBFCs on The A2C of Cybersecurity and Customer Experience. The conversation throws light on how the manifold rise in digital transactions has given newer directions to adopt technologies with a combination of enhanced Security and customer delight. API attacks, Application attacks and the credential abuse have risen in leaps and bounds and delivering scalable, and user-friendly technologies are the need of the hour.

    This session covers how the CIOs and the CISOs of the organisations have planned not only to mitigate risks but at the same time embracing new technologies to sustain growth and profitability. It discusses how organisations are speeding up innovations, improving service stability, introducing new UXs and also taking care of customer satisfaction to catapult them to newer heights.

    Discussions around how cloud has seen strong adoption in many organisations and a strong security and compliance strategy around cloud is also a covered this conversation. Watch experts from leading banks & NBFCs from around India discuss their cybersecurity priorities for the near future and best practices around application & API security and credential abuse.
  • 고객 ID 및 접속 관리: 구축 vs 구매 Recorded: Oct 9 2020 32 mins
    아카마이 코리아, 최승호 이사, 한준형 상무
    디지털 ID와 고객 프로파일은 모든 기업의 디지털 트랜스포메이션에서 핵심적인 역할을 합니다. 현재 시장에서 고객 ID 및 이와 관련된 개인 정보는 모든 기업의 가장 중요하고 가치 있는 자산입니다.

    이 발표에서는 리소스, 기술, 혁신, 고객 경험, 보안 규정 준수, 규제에 따라 변화하는 요구 사항을 고려하여 사내에서 자체적으로 구축한 CIAM 솔루션과 상업용 CIAM 솔루션의 장단점을 설명합니다. 아시아 태평양 지역의 통신·미디어, 에너지·유틸리티, 가전 업계에 걸쳐 다양한 최신 CIAM 사례 연구를 살펴봅니다.

    발표자는 Akamai Technologies의 최승호 이사와 한준형 상무입니다.
  • An Operational View in Akamai's SOCC Recorded: Oct 8 2020 42 mins
    Roger Barranco, VP Global Security Operations, and, Richard Meeus, Director of Security Technology and Strategy EMEA, Akamai
    Attacks are growing, evolving, and becoming more sophisticated. This webinar will take a deep dive into Akamai’s Security Operations Command Centre (SOCC) to examine security trends we have witnessed over the past few months, from credential stuffing, to web application and DDoS attacks.

    Join us to find out how Akamai security engineers successfully mitigated some of the world’s largest and most sophisticated attacks.

    What we will cover:
    - A deep dive into Akamai’s SOCC
    - A review of the cyber attack trends we are witnessing
    - Mitigation techniques
    - What you can do to better protect yourself
  • 不正ログイン、買い占めにおけるボットの進化 Recorded: Oct 7 2020 41 mins
    中西 一博
    攻撃や業務の妨げになる悪性ボットの活動の実態を、ダークウェブなどの闇市場を介して繋がる攻撃側のエコシステム、実際利用されているツールや最新の手口の傾向、攻撃の観測データなどから解き明かし、有効な対策について考察します。
Discover the latest talks and webinars with Akamai expert perspectives
Akamai secures and delivers digital experiences for the world’s largest companies. Our intelligent edge platform keeps apps and experiences closer to users — and attacks and threats far away. Top brands globally rely on Akamai so their businesses can be fast, smart, and secure.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: DDoS Extortion Threats Return: Are Your Defenses Ready? | Security Briefing
  • Live at: Oct 6 2020 5:45 am
  • Presented by: Aseem Ahmed, Senior Product Manager, Akamai
  • From:
Your email has been sent.
or close