Hi [[ session.user.profile.firstName ]]

Why DDoS Makes for Risky Business – And What You Can Do About It

Despite years of headlines, and countless examples, many organizations are still under the impression that DDoS attacks are a problem for somebody else (i.e. their ISP), or that it’s a problem that can be defended using an existing on-premise security solution, such as their firewall or IPS. In a risk obsessed world, these organizations are ignoring the very real likelihood of becoming a target for DDoS attacks, along with the severe operational and business consequences of falling victim to an attack.

It’s time to debunk some misconceptions about DDoS.

Attend this webinar to learn:

- Why a single layer of DDoS protection isn’t enough
- How the impact of a DDoS attack is significantly more costly than protection options
- The correlation between DDoS attacks and advanced threats revealed in our latest research and how both are used during multiple phases of an advanced threat campaign.
Recorded Apr 8 2015 55 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Dave Shackleford, IANS Lead Faculty and Tom Bienkowski, Director of Product Marketing
Presentation preview: Why DDoS Makes for Risky Business – And What You Can Do About It

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • 5 reasons why your web gateway is falling behind (attackers) Oct 27 2016 5:00 pm UTC 45 mins
    Guy Guzner
    Web gateways and proxies are losing to malware and other advanced threats and are generating troubling operational overhead. Join us to learn the top 5 reasons why gateways are falling behind and experience a live demo of web isolation which prevents malware from ever reaching the corporate network.
  • Activated Charcoal: Making sense of endpoint data Oct 26 2016 1:00 pm UTC 60 mins
    Greg Foss, Head of Global Security Operations, LogRhythm and Sarah Miller Threat Intelligence Analyst, Carbon Black
    Security operations is all about understanding and acting upon of large amounts of data. When you can pull data from multiple sources, condense it down and correlate across systems, you are able to highlight trends, find flaws and resolve issues.

    This webcast will cover the importance of monitoring endpoints and how to leverage endpoint data to detect, respond and neutralize advanced threats.

    You’ll discover:

    - Why endpoints are the new perimeter
    - How employees can strengthen your security operations strategy
    - Techniques to test and validate security awareness program
    - How to take the data that Carbon Black collects, correlate it against thousands of endpoints, and dynamically neutralize threats using the LogRhythm security intelligence and analytics platform

    Register now to learn how LogRhythm and Carbon Black can help you strengthen your overall security operations strategy—all within a single interface.
  • Best Practices: Architecting Security for Microsoft Azure VMs Recorded: Oct 25 2016 61 mins
    Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture
    Do you know if your workloads are secure? Do you have the same security and compliance coverage across all of the cloud platforms and datacenters running your critical applications? Are you having to design your security framework each time you deploy to a new region or datacentre?

    Whether you’re working with multiple cloud environments or exclusively on Azure, there are certain things you should consider when moving assets to Azure. As with any cloud deployment, security is a top priority, and moving your workloads to the cloud doesn’t mean you’re not responsible for the security of your operating system, applications and data. Building on the security of the Azure infrastructure, this shared security responsibility starts with making sure your Azure environment is secure.

    Register for this impactful webinar as we discuss step-by-step what you need to do to secure access at the administrative, application and network layers.

    In this webinar, we will take a look at:
    • The Shared Security Model: What security you are responsible for to protect your content, application, systems and networks
    • Best practices for how to protect your environment from the latest threats
    • Learn how traditional security approaches may have limitations in the cloud
    • How to build a scalable secure cloud infrastructure on Azure
  • Make the Case for a Cloud Access Security Broker (CASB) in 4 Steps Recorded: Oct 20 2016 57 mins
    Steve Zalewski, Chief Security Architect at Levi Strauss & Co. | Robert Mally, CFO Palerra
    58% of security professionals expect their budgets to stay the same next year. If you’re like them, you’re trying to secure a growing number of cloud services and infrastructure without a bigger budget.  

    What do you do? Make a bulletproof business case for a Cloud Access Security Broker (CASB).

    In this webinar you'll learn:

    - How to demonstrate the financial exposure of not having a cloud security solution
    - How to align cloud security spending with business objectives
    - How to demonstrate savings in cybersecurity expertise through automation
  • The Data Breach War: How banks can step up their line of defence Recorded: Oct 19 2016 62 mins
    JP Vergne (Scotiabank Lab, Ivey B-School), Nik Walser (EY), Mario Maawad (CaixaBank), Lawrence Chin (Palo Alto Networks)
    As holders of valuable client and financial data, banks have been prime targets for hackers and thieves. Entire payment systems can be compromised in the blink of an eye and clients also risk having their identities stolen.

    Join this panel session where our experts will discuss:

    -Best practices for preventing cyberattacks at every stage
    -Top mistakes banks and financial institutions make when dealing with valuable data
    -What makes you a target?
    -Using real-time analytics to identify anomalies and act on them immediately
    -Malware, threat prevention, next-generation security — what are they, what do you need to know?
  • Turbocharge your Cyber Investigations, Part 1 Recorded: Oct 13 2016 32 mins
    Jeff Lenton, Solutions Architect, RiskIQ
    While their cyber tactics may be continuously changing, bad actors can’t avoid interacting with core components of the internet. These interactions leave a trail that when connected through rigorous threat infrastructure analysis, can reveal the full scale of an attack and provide the information needed to determine the best response. The key to this analysis is access to a variety of global datasets and the ability to correlate and pivot between them in your investigation.

    In this two part series we will look at a range of global datasets and how each can be used to shed additional light on your adversary’s infrastructure. This session will focus on Passive DNS, Whois and Malware data. We will also demonstrate how security analysts can use the free community version of RiskIQ’s PassiveTotal to gain access to and pivot across these global datasets.
  • Using machines to combat criminals Recorded: Oct 13 2016 39 mins
    Lloyd Webb, Sales Engineering Director, Cylance
    2016 is turning out to be a landmark year in terms of Ransomware and there’s no sign of these threats slowing down any time soon. Ransomware is not new, it is just getting more sophisticated and is inflicting major damage to companies, organisations and individuals, shaping up to be a frighteningly lucrative year for cybercriminals, where any person with a computer can be exploited and used as a revenue source with the potential for vast profits.

    Learn how Cylance have revolutionized the industry by utilizing data science and security experts to provide a next-generation cybersecurity technology that proactively prevents, rather than detects the execution of advanced persistent threats and malware in real time before they ever cause harm.
  • One Step Ahead of Phishing Attacks Recorded: Oct 12 2016 56 mins
    Greg Maudsley, Senior Director Product Marketing, Menlo Security
    Phishing is serious business. It is the most common targeted method of cyber attacks, and the main perpetrators for phishing attacks are organized crime syndicates and state-affiliated actors.* Despite multiple security defense layers and many hours and dollars spent on end-user training, phishing continues to create headaches for security administrators.

    Join this webinar to learn:

    · New phishing prevention techniques

    · How to stop ransomware, malware and drive-by-exploits enabled by email phishing

    · Updated security research findings

    · Real-life case studies for using isolation techniques to prevent phishing attacks
    Speaker Bio:
    Greg Maudsley has over 15 years of IT security experience and is responsible for strategy development and threat isolation innovations at Menlo Security. Previously, Maudsley was a product marketing leader for F5 and Juniper Networks' Junos Pulse Business Unit. His responsibilities spanned the security spectrum, including application security, anti-fraud, cloud security, DDoS prevention, DNS sec, secure access, NAC, mobile security, application delivery and WAN Optimization. Maudsley holds an MBA from Santa Clara University Leavey School of Business, and a B.S. in Physics from the University of Redlands.
  • The Magic Bullet: How Social Engineering is the Key Recorded: Oct 12 2016 38 mins
    Jenny Radcliffe, Head Trainer, Jenny Radcliffe Training
    The human side of security is beginning to be acknowledged as at least as important as the technical side in terms of awareness and training programs for most organisations.

    In this webinar, Social Engineer and Trainer Jenny Radcliffe shares some advice as to what happens beyond acknowledging the threat, what, if anything, can an organisation do to turn Social Engineering to its advantage? Is there really a "magic bullet" that can engage staff, change security culture and contribute to a more secure organisation?
  • Solving the dilemma of securing private data in the cloud Recorded: Oct 12 2016 64 mins
    Sunil Choudrie, Global Solutions Marketing Mngr - Symantec & Robert Arandjelovic, Security Strategy Director EMEA - Bluecoat
    The cloud allows open sharing of data, allowing people to access information at home, in the office or on the move. This openness has come at a price, putting security and data privacy at risk.

    Research shows that on average, organisations are aware of less than 10% of all cloud applications used by their staff, providing a massive blind spot. If you don’t know where your sensitive data is, how do you secure it? In this 45 minute webinar we will outline the Symantec three-part framework for managing the Information Protection lifecycle and show how this applies to securing the cloud. The webinar will address:
    · The opportunities and risks of moving data to the cloud
    · Security and privacy implications
    · The Symantec three-part framework
    o How to ensure only trusted users and devices can access data
    o How to classify and discover sensitive data, and gain full visibility into the cloud
    o How to protect data through the application of encryption technology
    · Future direction and recommendations

    So if you are struggling with the dilemma of providing open access to sensitive data, register for this webinar today.
  • Understanding the Risks from DDoS Attacks Recorded: Oct 11 2016 29 mins
    Rohit Kinra, Director - Product Technology, Verisign
    Recent DDoS attacks trends indicate that DDoS attacks are becoming more sophisticated and persistent. What do these DDoS trends mean for your organization, especially during the upcoming holiday season?

    Join Rohit Kinra, Director, Product Technology, Verisign, as he discusses the behavioral shifts observed by Verisign in recent DDoS attacks and what should concern you. Rohit will also share recommendations on how your organization can prepare and defend against DDoS attacks.
  • The role of Threat Intelligence Feeds in the Battle Against Evolving Cybercrime Recorded: Oct 11 2016 45 mins
    Nahim Fazal, Head of Cybersecurity Development at ‎Blueliv
    Today, advanced cyber threats form part of the risk landscape we encounter every day in our increasingly digital lives. Cybercrime is known for its complex, chameleon characteristics – it’s a highly lucrative industry with fast-paced innovation at its core. The evolution of cybercriminal techniques enables it to thrive, and we need to sprint to keep up. Organizations must respond with security solutions nimble enough to compete with the bad guys. Sounds like a job for MRTI, and we think we’ve got just the ticket.

    This webinar intends to be an educational piece for any Security team in need of having a better understanding of the value provided by Threat Intelligence feed in order to complement traditional security real estate. This is not intended for those who already have a strong expertise and understanding of the fundamentals of threat intelligence delivered via a feed.
  • Privacy vs. Security Recorded: Oct 11 2016 48 mins
    Steve Durbin, Managing Director, ISF Ltd
    In May 2018 the EU’s General Data Protection Regulation (GDPR) will take effect. The GDPR upholds the protection of personal data and increases the accountability of organisations processing any personal details belonging to EU citizens- with severe penalties for those who do not comply.

    In this webinar Steve Durbin, Managing Director at the ISF, discusses why it is important for the security and data privacy teams to work together to run risk assessments on their most critical information assets and to develop checklists, policies and procedures that can be implemented internally and with third party suppliers. Only by taking this approach will organisations be able to remain agile, maintain customer confidence and demonstrate that they are ‘GDPR ready.’
  • Stop Taking a Reactive Approach to Network Security Recorded: Oct 11 2016 42 mins
    Patrick Grillo, Senior Director, Security Solutions, Fortinet
    Preparation and advance planning are key words for a number of activities but when it comes to securing a network, it seems that being reactive is more the norm.

    This session will focus on the consequences of not taking a proactive approach: dealing with the consequences of past decisions while trying to respond to the challenges of today.
  • 7 Things You Didn't Know About GDPR But Were Afraid To Ask Recorded: Oct 7 2016 43 mins
    Shadi Razak, CTO of CyNation
    The EU General Data Protection Regulation (GDPR) is the biggest change to data protection law in the world since the late 90’s. Every aspect of the old law has been overhauled and modernised. Businesses trading with the EU or handling EU citizens private data will need to comply with the GDPR come 25th May 2018. This mean almost all British organisations will have to adapt to the EU GDPR despite the latest Brexit vote. Accordingly, companies will be fully accountable for implementing a comprehensive data governance policy and appropriate security mechanisms. Non-compliance can result in fines of up to €20 million or 4% of a company's global annual turnover, whichever is greater.

    The adaption process to the EU GDPR won’t be simple and easy one. It will take time and energy from businesses, especially SMBs. During this webinar we give the chance to understand the biggest changes to the current law, and learn the essential steps business need to get in place to be ready come May 2018. With the webinar's open and live format, you will have ample opportunity to engage in Q&A with our data privacy and security experts.
  • The Future of Cybercrime Recorded: Oct 7 2016 43 mins
    Greg Iddon, Security Specialist at Sophos
    As more and more internet-enabled devices hit the market, securing these devices and our personal data is becoming an increasingly difficult task. Additionally, as more and more businesses make use of cloud-based services, new opportunities for criminals to exploit these services are appearing at a rapid pace as cybercrime becomes one of the most lucrative forms of crime we have ever seen. What cyberthreats will we start to see more of in the coming years? And what tactics will start to disappear?

    In this webinar, Greg Iddon, Security Specialist at Sophos, will explore the future of cybercrime based upon the views and trends observed by members of Sophos and researchers at Sophos Labs, as well as how businesses and consumers can protect themselves from the threats and risks of tomorrow.
  • The industrialisation of cybercrime Recorded: Oct 6 2016 49 mins
    Adam Tyler, Chief Innovation Officer, CSID global
    In the last decade, cybercrime has industrialised. It’s no longer the preserve of a small number of skilled hackers. The webinar will focus on the industrialisation of cybercrime and will highlight how fraud, particularly identity fraud, is on the rise in the UK.

    Tools for carrying out sophisticated cyber-attacks are now cheap, mass-produced, and easily accessible. Hacking communities, discussion groups and online walkthroughs are plentiful and easy to find. The raw material for crime - personal information - is available at low cost and neatly packaged for resale in online marketplaces. It really is possible for anyone, aged 8 to 80, to get involved if they want to.

    Andy will warn that as more services move online, the opportunities for abusing stolen personal data increase. He will stress the need for greater communication and partnership between major fraud targets - financial institutions, utility companies, online retailers and the like - which can make the UK provide a strong stance against fraudsters and help to win the battle against cybercrime.

    The webinar will cover and consider the evolving circumstances of data breach; the link between breaches and identity fraud; and the risks for those whose data is appropriated. Andy will explain why the response to data theft is currently inadequate; and identify some measures which could provide consumers with greater security and peace of mind, as well as the potential business benefits of doing so.
  • The Keys to a Secure Hybrid Cloud Environment Recorded: Oct 5 2016 62 mins
    Paul Fletcher, Cyber Security Evangelist, Alert Logic
    Despite increasing cloud adoption in IT departments, many organizations are still concerned with data security. Those concerns are amplified by the loss of physical control over data and the potential for mismanagement of those assets when migrating to the cloud. As a result, this is often the top barrier to cloud deployment. However, with cloud innovations growing exponentially, the new wave of security solutions is breaking down those barriers.

    In this webinar, Alert Logic cyber security evangelist, Paul Fletcher, will provide you with insight on how to get over hybrid cloud security hurdles and discuss:

    • Common misconceptions surrounding hybrid cloud security
    • Key strategies to secure a hybrid cloud environment
    • Solutions to security threats within multiple hybrid cloud environments
  • Modern Sub-Saturating DDoS Attacks - the Silent Bandwidth Thief Recorded: Oct 5 2016 30 mins
    Sean Newman, Director Product Management for Corero Network Security
    The threat landscape is evolving at an unprecedented rate - attackers are better educated, well-funded, and relentless in the pursuit of their goals. But, some things never change, the bad guys will always take the easiest path to the money. Learn how the latest trend could be negatively impacting your network and its profitability.
  • Network Monitor & behavior analysis: Achieve real-time network visibility Recorded: Oct 5 2016 57 mins
    Rob McGovern | Senior Technical Product Manager | LogRhythm
    When attackers compromise the perimeter or are operating from within, you need to know. You can only stop attackers from gaining a foothold in your network to expand their presence if you can see them. The indicators of a breach are often first observed within the network itself, therefore network monitoring and forensics plays an essential role in helping to detect, respond, and naturalize attacks.

    In this webcast, Rob McGovern senior technical product manager at LogRhythm, will discuss how to quickly identify emerging threats in your IT environment using network monitoring and forensic tools.

    You’ll learn:
    •What Network Monitor is and the important role it plays in your security operations strategy
    •Real-life use cases that highlight the power of Network Monitor
    •How Network Monitor works with SIEM to reduce the mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR) to cyber attacks

    Register now to learn how monitoring your network can help you detect and investigate potential malicious behavior within your IT environment.
Your Resource for Information Security Trends & Education
With over 280,000 members, the Information Security Community is the largest community of cybersecurity professionals in the industry. Let's build a network that connects people, opportunities, and ideas. If you are involved in purchasing, selling, designing, marketing ... or using information security solutions - this group is for you. Covered topics include compliance, encryption, anti-virus, malware, cloud security, data protection, hacking, network security, virtualization, and more.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Why DDoS Makes for Risky Business – And What You Can Do About It
  • Live at: Apr 8 2015 3:00 pm
  • Presented by: Dave Shackleford, IANS Lead Faculty and Tom Bienkowski, Director of Product Marketing
  • From:
Your email has been sent.
or close