Hi [[ session.user.profile.firstName ]]

Pulse on Advanced Threats: Findings from Arbor Networks' WISR Report

A discussion on the current state of advanced threat protection and incident response preparedness that will include both highlights from Arbor's Worldwide Infrastructure Security Report (WISR) as well as original research by Arbor's Security Engineering & Response Team (ASERT). The WISR is a global survey of security professionals, highlighting the key trends in the threat landscape along with the strategies network operators adopt to address and mitigate them. We’ll also provide a deep understanding of two attack campaigns discovered by ASERT. One multi-stage attack campaign was focused on government organizations and a second was focused on financial services organizations.

This session will cover:

• The primary challenges facing security teams with emphasis on the balance between technology, people and process.

• Insight into attack campaigns happening on the broader Internet and an understanding of why it is critical to connect that activity to conversations on internal networks.

• How businesses are adapting and changing their threat detection and incident response to reduce risk posture
Recorded Feb 11 2016 43 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Paul Bowen, Principal Security Technologist + Arabella Hallawell, Senior Director of Product Marketing, Arbor Networks
Presentation preview: Pulse on Advanced Threats: Findings from Arbor Networks' WISR Report

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Monitoring Encrypted Traffic to Ensure Efficiency and Availability Nov 13 2019 6:00 pm UTC 60 mins
    Erik Hjelmstad, Senior Technical Marketing Engineer
    In order to ensure networks are efficient, we need to monitor all traffic flowing through the wire. There are many tools to help, but they all rely on being able to read and decode network traffic. When the network traffic is encrypted, these tools provide limited value.

    With the nGenius Decryption Appliance (nDA), you get full visibility into all of the traffic across your network, and the ability to send that traffic to just the tools that need to see it.

    In the Webcast, you will learn about:

    • Expanding visibility by utilizing PFS in front of nDA.
    • Limiting types of decrypted traffic to ensure known good traffic stays encrypted
    • Finding malicious attacks that would otherwise be hidden by encryption
  • Solving UC&C Performance Issues in Contact Centers Nov 12 2019 6:00 pm UTC 60 mins
    Ray Krug, Solutions Architect, NETSCOUT
    Delivering high quality services in your Contact Center is critical to your long-term success. Your contact center is often the first touch your customers have with your organization, and enables positive and lucrative interactions with your business.

    Join this webinar and learn about:

    •Pinpointing the source of failure or quality issues for in-bound and outbound calls
    •Best practices for ongoing performance monitoring of Contact Centers
    •Leveraging active and synthetic testing for Contact Center availability
    •Ensuring successful Contact Center deployments on premise, in the Cloud or with SaaS providers
    •Customer Success stories for improving Contact Center performance
  • Empowering Your Network to Stop DDoS Attacks Recorded: Sep 19 2019 37 mins
    Scott Iekel-Johnson, Director of Product Management, DDoS Protection at NETSCOUT
    The goal to network protection is pretty simple. We must get ahead of the threats and protect our investments. Instead we continue to play catchup to attackers. While this goal is far from being achieved, we must abandon the idea that discreet solutions can solve multi-vectored threats. No single technology can solve this type of problem by itself. This goes for DDoS attacks like any other sophisticated threat.


    Join NETSCOUT as we discuss how smarter visibility can drives a smarter DDoS protection strategy. As we evolve our Arbor platforms for next generation of DDoS attacks, we are helping Service Providers and Enterprises change their approach to DDoS mitigation.


    In this webinar you will learn how to:

    • Detect attacks by combining smart analytics with best-in-class data

    • Defend from attacks by orchestrating multiple network protections simultaneously

    • Monitor comprehensive protection through a single interface


    With almost 20 years of expertise, the Arbor platforms have unparalleled visibility and knowledge on network-based attacks. Register for this webcast to listen how The Arbor platforms once again raise the bar on network visibility and DDoS protection.
  • Visibility into Applications Anywhere with NETSCOUT Solutions for VMware NSX-T Recorded: Sep 17 2019 40 mins
    Ray Krug, Solutions Architect, NETSCOUT
    With NSX-T, VMware is providing the ability to deliver applications and networks anywhere. NETSCOUT certified solutions for VMware NSX bridges the collaboration and knowledge gap between application, server and network operations teams as they operate in VMware NSX, cloud and legacy environments. Join this webinar to learn about:
    •The challenges and impacts facing IT as applications are hosted between private, public and multi-cloud environments.
    •How NETSCOUT automates the transformation of wire data into Smart Data to provide an early warning system into the issues and fastest path to resolution into the applications and services that you deliver to you customers and users.
    •Examples of how to reduce MTTR with true visibility into the health of application components, their inter-dependencies and interactions with the broader IT infrastructure.
  • Visibility into Applications Anywhere with NETSCOUT Solutions for VMware NSX-T Recorded: Sep 17 2019 41 mins
    Ray Krug, Solutions Architect, NETSCOUT
    With NSX-T, VMware is providing the ability to deliver applications and networks anywhere. NETSCOUT certified solutions for VMware NSX bridges the collaboration and knowledge gap between application, server and network operations teams as they operate in VMware NSX, cloud and legacy environments. Join this webinar to learn about:
    •The challenges and impacts facing IT as applications are hosted between private, public and multi-cloud environments.
    •How NETSCOUT automates the transformation of wire data into Smart Data to provide an early warning system into the issues and fastest path to resolution into the applications and services that you deliver to you customers and users.
    •Examples of how to reduce MTTR with true visibility into the health of application components, their inter-dependencies and interactions with the broader IT infrastructure.
  • NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation Machine Recorded: Sep 5 2019 31 mins
    Hardik Modi, Senior Director, Threat Intelligence and Richard Hummel, Manager, Intelligence
    Cybercrime has entered the mainstream, and the operational model being used has become efficient and effective at invading corporate networks, accessing government agencies and spreading misinformation to the public. While sophisticated malware continues to advance, deceptive practices and social engineering continue to lead the intrusion race.

    NETSCOUT has released the latest Threat Intelligence Report which provides insight into orchestrated attacks and activities analyzed through the first half of the 2019 calendar year. Register to listen to our experts highlight the findings in the latest report. During this webcast, you will learn about: 

    Attackers increasingly taking advantage of everything to discover and weaponize new attack vectors

    DDoS attack frequency growth, especially in the 100 to 400 Gbps capacities

    Malware targeting IoT devices behind firewalls

    Geopolitical adversaries targeting one another to social engineer and misinform the masses

    Register today, space is limited.
  • The Age of Smarter Network Visibility & DDoS Protection is Now Recorded: Jul 30 2019 49 mins
    Zach Wilkinson - Product Manager, Jamal Bethea - Product Marketing Manager, Traffic Visibility Solutions at NETSCOUT
    Your network traffic deserves a purpose-built network Visibility and DDoS protection solution to address your business requirements, but it should be able to provide more. Service Provider and Enterprise businesses share similar struggles when it comes to traffic troubleshooting to maintaining your network uptime. The network is a business and left unprotected, could cause more significant harm for your employees, or even worse, your customers.

    While NETSCOUT continues to enhance our customers' ability to view, analyze, and mitigate their network traffic patterns, other security vendors continue to find the standard challenging to maintain. With enhancements to our Network Visibility and DDoS Protection solution, not only do we continue to address your Visibility and DDoS requirements; we are solving your ability to work smarter and not harder.

    In this webinar, you will learn about improving:

    •Content and subscriber analysis patterns make it easier to see how users value network connectivity so you can forecast future traffic patterns;
    •Operation support requirements such as AWS compatibility, OTT Managed Objects definitions and Webhook notifications; and
    •DDoS attack mitigation capabilities with improved speed to detection and protection with enhanced packet inspection and smarter traffic mitigation design.
  • Enforcing Threat Intelligence at The Network Perimeter Recorded: Jul 16 2019 41 mins
    Tom Bienkowski, Director, Product Marketing, NETSCOUT Chris Rodriguez, Research Manager, Cybersecurity Products, IDC
    Digital transformation (DX) brings both new opportunities and differentiation; along with increases in the cybersecurity attack surface and risk to organizations.

    As bad actors continue to change their techniques, tactics and procedures (TTPs), continuous cyber threat intelligence plays a vital role in protection. But cyber threat intelligence by itself is useless unless it can be made actionable.

    Join NETSCOUT and IDC analyst Chris Rodriguez in this webinar to learn how organizations can enforce continuous threat intelligence at the network perimeter using stateless technology to not only complement stateful components of the cyber security stack (e.g. NGFWs), but also provide the benefit of bi-directional protection.
  • NETSCOUT Worldwide Infrastructure Security Update Recorded: Mar 21 2019 30 mins
    Gary Sockrider, Director – Security Technologist, NETSCOUT
    NETSCOUT’s 14th Annual Worldwide Infrastructure Security Report (WISR) offers a unique view into the most critical security challenges facing today's network operators. The report covers a wide variety of topics, from attack vectors to DNS pitfalls, to key organizational issues such as incident response training and staffing challenges.

    This year, the survey is further enhanced by regional break downs of the Enterprise respondents, thanks to our partners at Intelliclear. Attack types, targets, techniques, motivations, impacts, and costs are all broken out for US and Canada, Brazil, UK, Germany, France, and Japan.

    Join this webcast to learn:

    The challenges ahead for those involved in day-to-day network and security operations.

    How your network infrastructure may be impacted by the rapidly changing threat landscape.

    What your peers are doing to address the threats, as well as persistent staffing challenges.

    Register today, space is limited.
  • Optimizing Traffic Capacity in an Age of Terabit DDoS Attacks Recorded: Feb 12 2019 48 mins
    JP Blaho, Senior Manager, Product Management, NETSCOUT Arbor
    Consumer reliance on the Internet as well as business dependencies continue to expand through Cloud-based applications and services. This demand places an increased burden on Service Provider networks. Additionally, the growth in volumetric-based DDoS attacks is making it difficult for Service Providers to discern what is good traffic versus bad.

    In this session, NETSCOUT Arbor will walk you through a series of use cases to show how Service Providers are optimizing their current DDoS protection capacity while incorporating predictability in their growth strategy.
  • NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018 Recorded: Aug 23 2018 59 mins
    Hardik Modi, Sr Director – Threat Intelligence and Richard Hummel, Threat Intelligence Manager, NETSCOUT
    The symbiotic nature of the digitally transformed world also adds vulnerability, as malicious actors, nation states, criminal organizations, or even individuals can capitalize on the interdependencies that wind through our pervasively connected world.

    The availability of innovative DDoS attack tools and techniques has lowered the barrier of entry, which means an increase in the number of attackers launching DDoS attacks. Attack targets have also diversified. It used to be that finance, gaming, and e-commerce verticals were likely targets. Today, any organization, for any real or perceived offense or affiliation, can become a target of a DDoS attack. This while APT group and crimeware activity continues to grow, as actors in this space develop and unleash increasingly sophisticated attacks worldwide.

    Attend this webcast to learn:

    •Understand what is happening on the DDoS Landscape – the largest attacks and what is driving them
    •How Nation-State activity is going ‘internet-scale’
    •Botnets, crimeware, intrusions – how these facets of the threat landscape tie in together
  • Testimonial: Nic.br works with NETSCOUT Arbor to protect availability Recorded: Apr 25 2018 5 mins
    Interview
    NIC.br needed to improve the protection of its infrastructure by keeping its systems always available for use by its own teams and customers. The decision to strengthen their defenses against denial of service attacks was a strategic decision in response to the fact that these attacks have been increasing in both frequency and complexity.

    A particularly worrying reality for Brazil among the most targeted countries in the world for these attacks, ranking fifth in the ranking of those who suffer most from DDoS attacks, according to data from the 13th Annual Report on Global Network Infrastructure Security (WISR - Worldwide Infrastructure Security Report) from NETSCOUT Arbor.
  • The Growing Risk of DDoS Attacks Recorded: Feb 21 2018 54 mins
    Robert Ayoub Research Director- Security IDC and Tom Bienkowski Director of DDoS Product Marketing Arbor Networks
    If asked, “What’s our risk of a DDoS attack?”… Would you be able to answer with confidence? With all the attention given to ransomware, it’s easy to forget about availability protection. But the data is clear. DDoS attacks are increasing in frequency and complexity. And if not adequately prepared, the impact of a DDoS attack can be quite significant. To help you more accurately assess your risk of DDoS attacks, join Rob Ayoub, IDC Research Director and Tom Bienkowski, Arbor Networks Director of Product Marketing to learn about the latest trends in DDoS attacks and more importantly best practices in protection.
  • 13th Annual Worldwide Infrastructure Security Update Recorded: Jan 25 2018 48 mins
    Gary Sockrider, Principal Security Technologist, Arbor Networks
    Hear about the mounting challenges ahead for those involved in day-to-day security operations.
    Arbor Networks' 13th Annual Worldwide Infrastructure Security Report (WISR) offers a rare view into the most critical security challenges facing today’s network operators.This session will review the highlights from the report to help network operators understand the breadth of the threats that they face, gain insight into what their peers are doing to address these threats, and comprehend both new and continuing trends.
  • Case Study: Transform Threat Investigation With a Stretched Security Team Recorded: Oct 12 2017 43 mins
    Arabella Hallawell, Sr. Director Advanced Threat Product Marketing + Deb Briggs, CSO, NETSCOUT
    Chief Information Security Officer Reveals How With Arbor Spectrum.

    Attackers continuously have new tools, tactics and practices in their weapons arsenal. Human defenders must shift their strategies to more proactively uncover meaningful threats, and find ways that dramatically accelerate threat investigation.

    Join us to hear:
    - NETSCOUT’s Chief Security Officer discuss how the Arbor Spectrum threat analytics platform was used to help her team take detection and investigation to a new level.
    - In depth examples of how security teams can begin or enhance their detection and investigation of attack campaigns.
  • Are You Sure Your DDoS Attack Protection Will Work? Recorded: Oct 5 2017 27 mins
    Tom Bienkowski, Director DDoS Product Marketing, Arbor Networks + Ondrej Krehel, CEO and Founder, LIFARS, LLC
    So, you’ve justified, purchased and deployed your new DDoS attack protection solution. But can you assure executive management / the board that your organization is protected from the modern-day DDoS attack? Waiting to see if your protection works while under attack is not the right approach. Testing the products, people and process before an attack occurs is the industry best practice. Join Arbor Networks, the industry leader in DDoS attack protection solutions and LIFARS, an elite cybersecurity, digital forensics, and incident response firm to learn:

    - The latest trends in DDoS attacks.
    - Best practices in DDoS attack defense.
    - How to properly test your DDoS attack protection products, people and process using LIFARS’ DDoS Attack Assessment Service.
  • Quantifying DDoS Cyber Risk with the FAIR Methodology Recorded: Oct 5 2017 61 mins
    Tom Bienkowski Dir. DDoS Product Marketing Arbor Networks + Jim Hietala VP Business Development and Security The Open Group
    Here’s a question for you…Is the DDoS attack protection you (may) have put in place years ago, still adequate to protect you from the modern-day DDoS attack? If not (or you’re not sure), then you are at risk. More importantly, how do you explain the risk and build the business case for protection to Executive Management / Board? Join Arbor Networks, the world leader in DDoS attack protection and Jim Hietala from The Open Group to learn:

    - The latest trends in DDoS attacks and best practices in defense.
    - How to use FAIR (Factor Analysis of Information Risk), to take a quantitative, financial approach to analyze the risk of DDoS attacks.
    - How, using different Arbor Networks DDoS attack protection solutions, you can reduce your risk and loss exposure.
    - Tips on how to present your risk analysis and business case for DDoS attack protection - in terms your Executive Management/Board will understand.
  • The Increasing Risk of DDoS Attacks – Are You Adequately Prepared? Recorded: Sep 28 2017 45 mins
    Tom Bienkowski Director of DDoS Product Marketing Arbor Networks + John Pearson Founder and Chief Strategist IP Networks Inc.
    The data is crystal clear. DDoS attacks are dramatically increasing in size, frequency and complexity. Unfortunately, many organizations have been severely impacted by DDoS attacks simply because they either assumed they would never be the target or they thought they had adequate protection in place. Join IP Networks and Arbor Networks - the industry leader in DDoS attack protection products and services to learn:

    -The latest trends in DDoS attacks
    -The importance of proper network visibility for anomaly & DDoS attack detection.
    -Best practices in DDoS attack defense; including an intelligent combination of in-cloud and on-premises attack protection solutions - which offers the most comprehensive form of protection.
  • Intelligent Automation is Your Greatest Weapon Against DDoS Attacks Recorded: Aug 30 2017 40 mins
    Tom Bienkowski, Director of DDoS Product Marketing and Nimin Patel, Corporate Systems Engineer, Arbor Networks
    According to data from Arbor Networks’ Active Threat Level Analysis System (ATLAS), a DDoS attack occurs every 6 seconds in the world. When you’re under attack; time is of the essence. The organization that you protect doesn’t care about attacks details such as size, vectors etc. All they care about is how fast you can stop the attack to minimize impact. Your best defense against the modern-day DDoS attack is an automated, intelligently layered approach to DDoS attack detection and mitigation. Join Arbor Networks, the industry leader in DDoS attack protection solutions, to learn about the latest trends in DDoS attacks and best practices in defense – including a demonstration of Arbor’s fully automated, intelligently integrated, combination of on premise and in-cloud DDoS attack protection solution.
  • Time for Banks to Reassess Their Risk of DDoS Attacks Recorded: Jul 27 2017 33 mins
    Tom Bienkowski, Director of DDoS Product Marketing, Arbor Networks
    A study by McKinsey suggests the increased operational risk of digital innovation threatens 6% of the net profit for a retail bank. Renowned hactivist group Anonymous’ OpIcarus; a Distributed Denial of Service (DDoS) attack siege on the world’s banking infrastructure and other well publicized successful attacks have exposed just how vulnerable banks are to such threats. The reality is modern day DDoS attacks are getting more frequent, more sophisticated, and are commonly used as a distraction during the data exfiltration stage of advanced threat campaigns. The unfortunately reality is that in many cases, these attacks succeed because the targets were simply inadequately prepared to stop them.

    Join this webcast to learn:
    •The latest trends in DDoS attacks.
    •Commonly overlooked costs due to DDoS attacks.
    •And best practices in DDoS attack defense.
Webcasts for Network and Security Pros
Current DDoS and Cyber Threat strategies, best practices and latest trends.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Pulse on Advanced Threats: Findings from Arbor Networks' WISR Report
  • Live at: Feb 11 2016 4:00 pm
  • Presented by: Paul Bowen, Principal Security Technologist + Arabella Hallawell, Senior Director of Product Marketing, Arbor Networks
  • From:
Your email has been sent.
or close