A Decade of Denial: Why DDoS Still Exists and What To Do About It

Manage webcast
Jeff Wilson, Infonetics; Dan Holden, Arbor Networks; John Dickson, Denim Group; Matt Wilson, Verisign
Distributed Denial of Service or DDoS has been around since the late 1990s, but hit in a big way in Feb. 2000 when sustained attacks took down several large Websites including Yahoo and Amazon. Since then, the techniques for DDoS have evolved to leverage different attack motivations as well as to bypass protection measures put in place to stop these attacks. In this panel, industry experts will discuss the history of DDoS and why it is still so prevalent today. Topics will focus on attacker motivation, various threat vectors and new tools being used – and why you need to be updating your mitigation measures at the same pace.

Jeff Wilson, Senior Analyst, Infonetics (Moderator);
Dan Holden, Director of Security Research, Arbor Networks;
John Dickson, Principal, Denim Group
Matt Wilson, Senior Manager - Product Management, Verisign
Sep 5 2012
59 mins
A Decade of Denial: Why DDoS Still Exists and What To Do About It
Join us for this summit:
  • Channel
  • Channel profile
  • Black Hat Recap – Implications for the Enterprise Aug 12 2015 5:00 pm UTC 60 mins
    Cameron Camp, Security Researcher
    Join Security Researcher, Cameron Camp, as he reviews the latest in cyber security covered at this year's Black Hat Conference.
  • Security Transformation: The Current Evolution and How to Manage It Aug 12 2015 4:00 pm UTC 45 mins
    Justin Somaini, CTO, BOX
    The need for a Security Transformation in the enterprise has been clear to our industry for quite some time and the struggle to protect our data in today’s business environment has been a main focus. At the same time, in an increasingly mobile-centric workforce, organizations are dealing with the shift from analog to digital and require more compliance and policy to protect against breaches, lack of transparency and accountability. To keep up with these changing demands, IT decision makers and their organizations must be more agile, manageable and responsive to a different set of challenges that arise. Join this session to hear Justin Somaini, Chief Trust Officer at Box, detail what security transformation will look like in the coming year and how it will redefine the responsibilities of vendors, cloud providers, and security practitioners to resolve one of the most significant security problems of the past 40 years.
  • Why Security Starts with Identity in Today’s Mobile Enterprise Aug 12 2015 3:00 pm UTC 45 mins
    Richard Walters, GM and VP, IAM & Alex Smith, Director, IAM Products, both Intermedia
    With users expecting 24x7 access to web applications and data from all types of mobile devices and from any location, it’s not a surprise that data security is still a key focus for most enterprises. How do you reduce risk by bringing contextual information into the authentication process?

    Join us and learn how to:

    •Address the authentication and authorization management challenges in today’s mobile enterprise

    •Limit access to applications to approved or trusted devices

    •Automate changing of passwords to ensure they are complex and unique across all accounts

    Register now!
  • DNS Firewall: Securing Networks In a Rapidly Changing Landscape Aug 12 2015 2:00 pm UTC 45 mins
    Michael Kaczmarek Sr. Director, Product Management, Verisign
    Cyber threats are at an all-time high, presenting numerous challenges to organizations and end users. Additionally, with the increasing importance of mobile devices and Bring Your Own Device (BYOD) initiatives, endpoint management and security is becoming more critical. In light of these trends, proactively protecting against threats is a constant and ever-changing battle. Verisign DNS Firewall is a cloud-based network security and threat intelligence service built upon our global recursive DNS platform that offers robust protection from unwanted content and malware as well as customizable filtering down to the individual DNS level. Verisign DNS Firewall provides organizations with the opportunity to secure the rapidly growing landscape of devices on their networks with a single, simple modification – an update of the recursive DNS settings.
  • Going Mobile? The Shifting Native SSO Landscape Aug 12 2015 1:00 pm UTC 45 mins
    Paul Madsen, Principal Technical Architect, Ping Identity
    Delivering a Single SignOn (SSO) experience to users of native applications is becoming more and more critical as the number of such applications grows. We'll cover the best practice for native applications authenticating to restful APIs, the different models for enabling SSO across such applications, and how recent enhancements to the mobile OSs promise to offer to a nice balance between usability, security, and deployment ease.
  • Top 10 Android Application Vulnerabilities Aug 12 2015 9:00 am UTC 45 mins
    Erez Metula, Founder & CEO of AppSec Labs
    Android apps handle our most sensitive data – private conversations, financial information, phone calls, SMS, geographic locations. You name it… the question is – can we really tell whether they’re secure? Who can assure us they are not spying on us? Can they be abused? Erez will answer those questions, focusing on Android mobile apps and their common vulnerabilities.

    This session will be all about the security of such applications, how they can be hacked, the common mistakes developers do, and how to avoid such mistakes.
  • Twelve Recommendations for Your Security Program in 2015 Aug 11 2015 7:00 pm UTC 45 mins
    Rick Holland - Principal Analyst, Forrester Research and David Dufour - Sr. Director of Security Architecture, Webroot
    In 2014, Forrester Research saw a significant shift in customers’ awareness of cybersecurity risks. In response, Forrester has developed strategic and tactical recommendations for enterprise security programs in a March 2015 report entitled “Twelve Recommendations For Your Security Program In 2015.” In this webcast, guest speaker Rick Holland from Forrester and Webroot’s David Dufour will review and discuss those recommendations, with a particular focus on the use of big data and threat intelligence, and the impact of IoT.
  • The Trustworthy Cloud Aug 11 2015 5:00 pm UTC 15 mins
    Michael Quinn, General Manager, Cybersecurity & Data Protection, Microsoft
    Decades of experience in fighting cybercrimes has greatly informed how Microsoft develops products. Michael Quinn (General Manager, Cybersecurity & Data Protection, Microsoft) discusses the features, policies, and practices that make the Microsoft Cloud so secure and set it apart from other options on the market.
  • Quantum Random Number on a Smart Phone Aug 11 2015 3:00 pm UTC 45 mins
    Yuri Andersson, Tech Startup Entrepreneur, CryptaLabs
    Today's problem is that all MOBILE DEVICES use Pseudo Random Number Generators, which is true of any brand or type. This exposes devices to potential mobile attacks. However, tomorrow's problems are that societal shifts will manage more of our personal data on mobile devices and this will become acute with the Internet of Things set to increase the number of devices that are connected.
  • Best Practices for Securing the Mobile Employee Aug 11 2015 3:00 pm UTC 45 mins
    Himanshu Verma, Director, Authentication-as-a-Service, Gemalto
    Join us on August 11th to gain expert advice on enterprise application and mobile security. Here you will learn market dynamics, possible risks and effective solutions you can use while working within your budget.
  • Challenges to Stay Secure in the Era of Digital Business Aug 11 2015 2:00 pm UTC 45 mins
    Marcelo Pereira, Product Marketing Manager, Secunia
    The era of digital business is bringing a lot of opportunities for organizations. At the same time, it is bringing new challenges for those in charge of securing companies’ assets: customer data, intellectual property, and infrastructure.

    The digital business environment requires a new approach to security. An approach that focuses on supporting the business to achieve its desired outcomes while ensuring that what really matters is protected from the reach of hackers and criminals.

    In this webinar we will look into two distinct areas of IT: Enterprise Application and Mobility and the vulnerability landscape around those to discuss some of the challenges security professionals are facing today.
  • The Microsoft Digital Crimes Unit Aug 5 2015 5:00 pm UTC 20 mins
    David Finn, Executive Director, Digital Crimes Unit, Microsoft
    Cybercrime impacts millions of people around the world. David Finn, Executive Director of the Microsoft Digital Crimes Unit, gives you a behind the scenes look at how Microsoft is going on the offensive to stop criminals, refer perpetrators to law enforcement, and create a safe digital world.
  • An Offensive Strategy for Today's Cyber Warzone: Winning With Cyber Campaigns Recorded: Aug 3 2015 63 mins
    Chris Inglis, former Deputy Director of the NSA and Al Corchuelo, President, Recruit Leaders LLC
    In this webinar, Chris Inglis, former Deputy Director of the NSA will share research and actionable insights on:

    -What it takes to build a winning cyber security strategy

    -Why cyber campaigns are much more effective than reactive cyber tactics

    -How to enhance your organization's cyber security profile and maintain a sustainable security posture

    About Chris Inglis:

    Mr. Inglis retired from the Department of Defense in January 2014 following over 41 years of federal service, including 28 years at NSA and seven and a half years as its senior civilian and Deputy Director. Mr. Inglis began his career at NSA as a computer scientist within the National Computer Security Center followed by tours in information assurance, policy, time-sensitive operations, and signals intelligence organizations. Promoted to NSA's Senior Executive Service in 1997, he held a variety of senior leadership assignments and twice served away from NSA Headquarters, first as a visiting professor of computer science at the U.S. Military Academy (1991-1992) and later as the U.S. Special Liaison to the United Kingdom (2003-2006).
  • Security 2020 Recorded: Jul 31 2015 43 mins
    Tom Bowers, vCISO for ePlus
    Tom Bowers, vCISO for ePlus and their clients, will cover what he sees as the looming threats for 2016, including Threat Intelligence and Sharing, State Sponsored Code and Commercial Malware, Security of Big Data, Embedded Systems, and the Physical and Cyber Convergence.
  • How the United States Postal Service secured their email channel against fraud Recorded: Jul 30 2015 26 mins
    Michael Ray, Inspector in Change of Revenue, Product & Cyber Security at the United States Postal Inspection Service
    Email is #1 source of risk in today's enterprise, yet also the #1 digital communication channel for businesses today. The United States Postal Service sends more than thirteen million emails per day, which makes their email channel and brand a high-profile target for criminal email cyberattacks. In this case study webinar, hear from Michael Ray, Inspector in Change of Revenue, Product & Cyber Security at the United States Postal Inspection Service, as he shares their story of how they implemented Agari to protect their brand and their customers against fraudulent attacks by securing their email channel.
  • Hunting Hackers in the Carding Underground Recorded: Jul 30 2015 53 mins
    Grayson Lenik, Director of Digital Forensics and Incident Response at Nuix
    The rise in e-commerce data breaches over the past year raises important questions: Why is cardholder data such a big target, how do the bad guys get in and why are we seemingly powerless to stop them?

    This session will examine the black market for card data, the three most common attack vectors, and the wrong way to encrypt databases.

    You will see real-world examples of malware discovered during investigations and gain insights into the skill sets of each attacker.
  • Contextual Analytics: A Deep Dive into the Contextualization of Threat Data Recorded: Jul 30 2015 27 mins
    David Dufour, Senior Director of Security Architecture, Webroot
    This presentation will provide an overview of contextualization and how contextualized data can be used to prevent both known and unknown threats. It will dive deep into the technologies used in the collation and analysis process across both single and multiple threat types. It will conclude with real world use cases where contextualized data can help identified and prevent threats.
  • Internet Security Best Practices From The Global 1000 Recorded: Jul 30 2015 51 mins
    Daniel Druker, Chief Marketing Officer at Zscaler
    The world of IT security is undergoing tremendous change. The unstoppable momentum of the Internet and cloud computing, the ubiquity of mobile devices and the emergence of Internet of things have together turned the IT security landscape upside down.

    So what can you do today to keep your security ahead of these trends?

    This webcast will discuss actionable best practices gleaned from more than 5,000 leading global organizations - including United Airlines, Humana, Sealed Air, British American Tobacco, the United States Marines and NATO.

    We will also talk about:

    - The latest strategies and techniques cyber-criminals are using today
    - Concrete steps you can take to keep your organization safe
    - What to do about Internet security in today's cloud and mobile first IT landscape
  • Surviving the incident response surge: Detecting and Investigating Incidents Recorded: Jul 29 2015 50 mins
    Christian Kirsch, Principal Product Marketing Manager, Rapid7
    As security incidents grow in frequency and complexity businesses struggle to be prepared to respond and mitigate the threat. Incident detection and response is expected to take up the majority of security budgets by 2020 but solutions are siloed and specialized staff is hard to hire and retain. How can security professionals who may not be experts in incident response detect and assess the scope of potential incidents or breaches effectively? This case study will explore this question leveraging real-world examples that illustrate how to confidently detect and respond to security incidents 10x faster.

    Participants will learn:
    · Methods for simplified discovery of anomalous user behavior

    · Strategies for enabling fast incident response decisions

    · How to cope when bombarded with false positive alerts

    · Common attacker methods (and why they’re so often successful)

    · Why you need to monitor privileged and risky accounts
  • Constrained or Unleashed:Is your Identity Mgt Ready for Consumer-scale Business? Recorded: Jul 29 2015 57 mins
    John Hawley, Vice President of Security Strategy at CA Technologies
    Consumer-Scale Identity Management Deployments require different approaches than the typical employee use case. However, there are profound benefits - from overall risk reduction to enhanced engagement and loyalty with customers. This webcast will highlight the key challenges in moving identity management from the IT user to a much larger business user population and highlight best practices for success.

    As a two part series, this webcast will be followed by "Improving Your User Experience for Successful Consumer-Scale Identity Management", scheduled on August 19th.
For Certified Members and Information Security Professionals Globally
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: A Decade of Denial: Why DDoS Still Exists and What To Do About It
  • Live at: Sep 5 2012 4:00 pm
  • Presented by: Jeff Wilson, Infonetics; Dan Holden, Arbor Networks; John Dickson, Denim Group; Matt Wilson, Verisign
  • From:
Your email has been sent.
or close
You must be logged in to email this