Hi [[ session.user.profile.firstName ]]

The New “Denial of Service” Attack: Why You May No Longer be Protected

There was a time when distributed denial of service (DDOS) attacks threatened business operations by simply “flooding the network pipe” with traffic congestion. But that has all changed. Today’s sophisticated and targeted attacks use a multitude of vectors to overwhelm and infiltrate websites and online services – disrupting an enterprise’s online presence and customer’s ability to do business with the company under attack.

While enterprises once could rely solely on their cloud service providers, ISPs and perimeter security to protect against these attacks, many are just now learning they are vulnerable to the new types of denial of service attacks. Some of these highly targeted attacks are taking down online services while others are being used as a diversionary tactic that is used to distract from an advanced malware attack.

This presentation will cover examples of high profile, multi vector attacks that use stealth components and application vulnerabilities to shut down or infiltrate an enterprise’s network. Attendees will learn what types of attacks cloud providers and service providers are stopping and what attacks need to be handled on the internal enterprise network. The presentation will also cover a framework that will help organizations move toward a more secure stance against denial of service attacks.
Recorded Jun 12 2013 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Dave Shackleford, Faculty Member of IANS
Presentation preview: The New “Denial of Service” Attack: Why You May No Longer be Protected

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How to Calculate the Financial Impact of an Attack on Your Network Recorded: Oct 30 2014 41 mins
    Ben Fischer, Senior Product Marketing Manager, Arbor Networks
    Security incidents can have broad ranging impacts on a service provider, its customers and its peers. Damage can be hard to calculate after an incident and even harder to predict the number, size, type, and targets of an attack. Despite these complexities, we will review how you can forecast future financial burdens of any attack(s) and leverage this knowledge for business planning. During this webinar, we will explore ALE (Annualized Loss Expectancy) and how to use it to analyze risk and investments in security products.
  • Leveraging the Uniqueness of the Arbor Networks Threat Intelligence Feeds Recorded: Oct 30 2014 40 mins
    Darren Anstee, Director, Solutions Architects, Arbor Networks
    Staying abreast of the latest cyber threats is a daunting task for even the best of security teams. Timely and high-fidelity threat intelligence can be the difference between business continuity and business disaster. In this session, you will learn about the uniqueness of the Arbor Networks ATLAS Intelligence Feed (AIF) and how it is used to arm different Arbor products to provide a comprehensive cyber threat protection solution.
  • Delivering a Comprehensive, Arbor-based, DDoS Protection Service Recorded: Oct 30 2014 45 mins
    Tom Bienkowski, Director, Product Marketing, Arbor Networks
    Due to changes in motivation and the abundance of do-it-yourself DDoS attack tools/services, DDoS attacks are rising in size, frequency and complexity. In turn, enterprises of all sorts are turning to their ISPs and managed security service providers for help. In this session, we’ll share examples of how Arbor Networks’ products and services can be monetized to deliver a comprehensive portfolio of in-cloud and CPE-based DDoS protection services.
  • Shedding Light on Threats That Lurk in Your Network Blind Spots Recorded: Oct 29 2014 33 mins
    Tom Bienkowski, Director, Product Marketing, Arbor Networks
    Network visibility is a fundamental requirement for proper network and threat management. You can’t protect yourself (or your customers) from what you can’t see.

    In this session, you’ll learn about how the Arbor products, specifically Peakflow SP 7.0 with Flex Licensing and Pravail enable service providers to cost-effectively gain the proper level of visibility into their customer edges and data centers in order to detect and stop threats before they impact the availability of their services.

    This session will highlight real-world use cases and a recent report from the FCC’s CSRIC (Communication, Security, Reliability, Interoperability Council) Working Group 5: Remediation of Server‐Based DDoS Attacks.
  • How to Stop a DDoS Attack in Less Than 1 Minute Recorded: Oct 29 2014 42 mins
    Scott Iekel-Johnson, Product Manager, Arbor Networks
    When you are under attack, every seconds counts. In this session, you will learn about the new features in Peakflow v7.0 that are designed to significantly reduce the time required for DDoS attack detection, mitigation and comprehensive reporting -- in some cases, reduced to less than 1 minute. Other new Peakflow SP 7.0 features, such as tag-based reporting, new DDoS attack countermeasures and SSL decryption will also be discussed.
  • DDoS and Malware Trends: Incident Response in the New Era of Targeted Attacks Recorded: Oct 29 2014 48 mins
    Gary Sockrider, Solutions Architect, Arbor Networks
    This session will present insights from Arbor Networks’ Worldwide Infrastructure Security Report and Arbor's ATLAS® real-time threat monitoring system. You will learn about the largest DDoS attacks on record, as well as stealthy POS malware and nation state campaigns. Discover best practices and implications for preparing and responding more effectively within this new era of targeted attacks where organizations are most under-prepared and unprotected.
  • Pravail Security Analytics for Service Providers Recorded: May 29 2014 28 mins
    Yaroslav Rosomakho, Senior Channel Consulting Engineer, EMEA
    Understanding attacks that have bypassed defenses and gained a foothold in the network has become a priority for IT security teams. These teams are dealing with a constant, escalating barrage of attacks on the network—as well as a steady stream of information alerting them to other potential threats. Attackers are counting on this chaos to remain undetected, for as long as possible. Motivated by profit or other political gains, these attackers will look to exploit any vulnerability in a network, often using methods that bypass traditional security systems designed to actively prevent such an attack. Once embedded in a network, these attackers may stay inactive for months before using compromised hosts to attack other parts of the organization or to systematically exfiltrate data from the target environment. The Pravail® Security Analytics platform enables organizations to deal with advanced threats by offering an unprecedented and detailed view of the attacks in any captured network traffic. In this webinar, we will introduce you to Pravail Security Analytics, share use cases and discuss unique MSSP opportunities enabled by Pravail Security Analytics.
  • Peakflow Mobile Network Analysis: Arbor's Mobile Visibility and Threat Detection Recorded: May 29 2014 36 mins
    Talbot Hack, Senior Product Manager, Arbor Networks
    Peakflow Mobile Network Analysis – an extension of Arbor Networks' best-in-class Peakflow visibility and threat management solution for Service Providers – addresses the unique challenges associated with ensuring mobile network service dependability/availability. Peakflow Mobile Network Analysis provides real-time visibility into the sources, frequency and impacts of potential attacks and misuses on the HSPA/LTE packet core signaling plane, enabling proactive detection and mitigation of unwanted traffic and emerging threats before they affect critical network resources. This presentation provides an overview of the current solution, its use cases and Arbor's vision in the context of key operational and security challenges and Mobile Network Operator (MNO) needs.
  • Gambling with Security and Availability: Is Your Data Center Prepared? Recorded: May 28 2014 49 mins
    Ben Fischer, Senior Product Marketing Manager, Arbor Networks
    As Hosting and Cloud Service Providers, you face many risks today, especially in the realm of security , the availability of your infrastructure and the service that you enable for your customers. Risks range from being the target of an attack to being impacted by the collateral damage of an attack directed at a customer, peer, or a non-affiliated organization. During this webinar, we will review potential security and availability risks and the damage and costs they cause Hosting and Cloud Service Providers and your customers.
  • An Introduction to the Value of Peakflow SP 6.0 and Flex Licensing Recorded: May 28 2014 43 mins
    Tom Bienkowski, Director Product Marketing, Arbor Networks
    Modern day service provider networks are complex and under constant threat. In this session, we’ll introduce you to the major improvements in performance, scalability and financial benefits of Peakflow SP 6.0’s new Flex Licensing that enable you to meet challenges of today and the future.
  • DDoS and Malware – The Next Generation Recorded: May 28 2014 47 mins
    Gary Sockrider
    For over a decade, the Internet community has struggled with the challenge of large-scale distributed denial of service (DDoS) attacks. However, today's attacks are much more complex than the simple volumetric packet floods of the past. In 2013, we saw the largest attacks increase three fold to over 300Gbps and so far this year the trend continues. Today's DDoS attacks commonly include stealthy, application-layer attacks and are also used as part of broader Advanced Threat campaigns including malware, root kits, trojans, phishing, plus other tools and techniques. This session will explore trends and real-world examples of the modern threat landscape. You will learn about the current threats and how you should plan, prepare and react to them.
  • The Economist Research: Cyber Attack Response – Are business leaders ready? Recorded: Mar 26 2014 52 mins
    James Chambers, Senior Editor, The Economist Intelligence Unit & Arabella Hallawell, VP Strategic Planning, Arbor Networks
    New research from The Economist Intelligence Unit shows how businesses are starting to view cyber-attacks as inevitable – and also as a potential opportunity. The report, sponsored by Arbor Networks, entitled “Cyber incident response: Are business leaders ready?” shows that despite 77 percent of companies suffering an incident in the past two years, over a third of firms (38 percent) still have no incident response plan in place. In fact, only 17 percent of businesses globally are fully prepared for an online security incident. Despite this, the majority (67%) of senior executives believe cyber incidents can be an opportunity to enhance their company’s reputation, provided the response is competently handled.

    Attend this webinar to learn:

    • Why the level of preparedness is being held back by lack of understanding about threats
    • How an emphasis on reputation is driving formalization of plans and processes
    • The reasons firms remain reticent about disclosing incidents and sharing intelligence about threats
Arbor Networks
Arbor Networks

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The New “Denial of Service” Attack: Why You May No Longer be Protected
  • Live at: Jun 12 2013 3:00 pm
  • Presented by: Dave Shackleford, Faculty Member of IANS
  • From:
Your email has been sent.
or close