Hi [[ session.user.profile.firstName ]]

How To Use Your Network To Fend Off The Latest Cyber Threats

A discussion on the latest cyber-attack methods and approaches, including ransomware, facing security teams. Quickly identifying malicious or suspicious network traffic communications can be the key to faster detection and effective response. We demonstrate how to quickly identify the signs and shut down malicious activity in the network and access data where and where you need it from your security infrastructure.
Recorded Jan 12 2017 57 mins
Your place is confirmed,
we'll send you email reminders
Presented by
John Pescatore,director of emerging security trends,SANS+Paul Bowen,security practitioner, Arbor Networks, Arabella Hallawell
Presentation preview: How To Use Your Network To Fend Off The Latest Cyber Threats

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • STIX/TAXII mein individueller Security Feed in einem Threat Intelligence Gateway May 20 2021 8:00 am UTC 60 mins
    Guido Schaffner, Channel Sales Engineer, NETSCOUT and Alexander Maerz, Consulting Engineer DACH, NETSCOUT
    Was ist ein TIG, welche Vorteile hat ein TIG im Perimeter. Was ist STIX / TAXII als Schnittstelle. Wie sieht eine komplette Integration mit anderen Security Feeds aus.
  • The next cyber attack will challenge your anti-DDoS defence May 18 2021 8:00 am UTC 60 mins
    Virgile Dailly, Security Overlay Account Manager, NETSCOUT
    This webinar will be presented in French.

    Threat intelligence must go beyond merely collecting and analysing attack data. It should make a marked improvement over existing staff and processes. This information must be actionable with the risk from each threat being clear, and the actions to be taken evident.

    Looking at how stateless DDoS protection works and asking from which dangers, apart from DDoS attacks, can it protect we will, using explanation based on the ATLAS® Intelligence Feed (AIF) for NETSCOUT® Arbor Edge Defense (AED), look at the information in a security feed and how this should enable you to quickly address advanced attacks, whether they are DDoS-related or part of a larger advanced threat campaign against your organisation.
  • Protect Against Healthcare DDoS & Ransomware Attacks as they Grow in Complexity Recorded: Apr 6 2021 57 mins
    R Hummel, Threat Intel Mgr NTCT; J Burgess, Tech Lead Threat Intel Adv CrowdStrike; Z Nelson, Intel & Ops Team Lead HISAC
    During the discussion, Zach Nelson from H-ISAC will ask our experts about the tools leveraged to extort resources from healthcare organizations and the indicators and dynamics that illustrate that cybercrime incidents are rising. Further, our experts will explore the steps healthcare organizations can take to protect themselves from extortion attempts. Intrinsic to the dialogue will be context around the risks and similarities between DDoS extortion and ransomware attacks.

    Attendees will learn:
    • How eCriminals are evolving and enhancing their tools to evade security applications
    • What steps can be taken to protect organizations from extortion attempts
    • How increased complexity and risk have grown the overall threats deployed
    • What are the differences and cross-over points between ransomware and DDoS extortion attacks
  • DDos Schutz On-Premise Deepdive. Recorded: Mar 25 2021 55 mins
    Guido Schaffner, Channel Sales Engineer, NETSCOUT and Alexander Maerz, Consulting Engineer DACH, NETSCOUT
    Welche Varianten von DDoS Angriffen kann ich lokal abwehren. Wo sollte diese Lösung platziert werden. Praktische Vorführung von Angriffen und deren Abwehr mittels einer AED.
  • Microsoft RDP, DNS and Other Protocols are Exploited in DDoS Extortion Campaign Recorded: Mar 24 2021 52 mins
    Tom Bienkowski, Director Product Marketing and Roland Dobbins, Principal Engineer
    For the past several months NETSCOUT’s ATLAS Security Engineering and Response Team (ASERT) has been tracking and helping organizations defend themselves from the Lazarus Bear Armada (LBA) DDoS Extortion Campaign. Join us in this webinar to:
    · Learn how the attacker continues to target and retarget different industries and critical infrastructure (e.g. as VPN concentrators) on a worldwide basis.
    · Get updated information on the latest attack vectors being used in the campaign including everyday protocols such as Microsoft RDP, DNS, NTP and more.
    · Take a behind-the-scenes glimpse into how ASERT gathers Threat Intelligence.
    · Understand current best practices in defense
  • A Climate of Change: Security & Success for Next-Generation Mobile Services Recorded: Feb 11 2021 44 mins
    Darren Anstee
    Next-generation mobile services will bring the connected world into every aspect of our business and personal lives, delivering a multitude of benefits and efficiencies – but also threats, some obvious and some insidious.

    More speed, more devices, more protocols, more vendors, more complexity, and more high-value services are driving a growing realization that visibility and security solutions within the 4G/5G mobile network itself are not just important, they are essential for next-generation use-cases and services to succeed – and for 5G to deliver the ROI that network operators need.

    Learn how the unique visibility of NETSCOUT and experience of Arbor can help you to assure the quality and security of next generation services.

    Protect your network and services with orchestrated, automated DDoS attack response.


    Learn more about Smart Security:
  • DDoS Attacks on Service Providers are Up. Are You Prepared? Recorded: Dec 16 2020 59 mins
    Richard Hummel, Manager of Threat Intelligence and Darren Anstee, CTO Office/Security
    Join us for our webinar as we discuss the dramatic rise in CSP (communication service providers) DDoS attacks during the 1st half of 2020.

    NETSCOUT DDoS experts will share with you how service providers bore the brunt of DDoS attacks during the pandemic and how they’re meeting this challenge head-on. Learn how CSPs are mitigating DDoS attacks, defending their network, and meeting DDoS requirements for their customers.

    •4.8 million attacks representing a 15% increase year-over-year
    •Tbps sized, and increase in multi-million pps DDoS attacks
    •2,851% increase in 15-plus vector DDoS attacks
    •Top industry targets
    •DDoS mitigation best practices
  • Ensure Successful Application Migrations to AWS Recorded: Dec 8 2020 29 mins
    Michael Segal AVP Strategic Alliances, NETSCOUT and Ray Krug Director Product Marketing, NETSCOUT
    Enterprises rely on the IT organization to continuously deploy new services and migrate on-premises workloads to the cloud. But moving workloads creates borders and blind spots between different technology and management domains across on-premises and cloud environments. How do IT teams handle the unexpected?
    NETSCOUT is an AWS Network Advanced Technology Partner, providing the first-of-its-kind network traffic visibility. Join NETSCOUT experts Michael Segal and Ray Krug in this webinar and learn:
    • Acceleration of the migration to AWS
    • Getting to Day 2 cost-effectively with smart visibility
    • Hybrid cloud visibility with NETSCOUT Smart Data, from Day 0 to Day 2
    • Looking forward: Smart Data in 5G and the edge
    • NETSCOUT and AWS collaboration
  • Ransomware & DDoS Extortion Attacks in Healthcare Recorded: Dec 1 2020 48 mins
    Tom Bienkowski, Director Product Marketing
    5 Similarities and 1 Big Difference

    Healthcare organizations are facing many forms of cyber threats. Ransomware and DDoS Extortion attacks are just two on an upward trend in the first half of 2020. In this webinar, NETSCOUT will discuss the similarities and differences between ransomware and DDoS extortion attacks and, if you are unprepared – one big difference.

    In this webinar, you will learn about:

    • The 5 similarities and one key difference between ransomware and DDoS Extortion attacks.
    • The increase in DDoS attack frequency and complexity in the first half 2020.
    •The best practices in modern-day DDoS defense for healthcare organizations.
  • Bridging security visibility gaps and building stakeholder commonality Recorded: Nov 24 2020 36 mins
    Kevin Ware-Lane, Security Sales Manager (UK & Ireland), NETSCOUT
    The ability to react and respond in a timely manner to security incidents, failure scenarios and application performance issues means bringing data and teams together in a cohesive way.

    Networks, infrastructure, applications, and security operations all surface their data through a plethora of tools often with different, non-aligned viewpoints, but cohesive visibility is paramount to keeping the business operational and effective.

    In this session we will discuss the need and capabilities for:

    -Extending visibility between teams and silos by building a common reference point; Visibility Without Borders. Giving teams actionable intelligence they need, with the right role-specific toolset, using the Smart Data they all share.
    -Re-gaining security visibility in an encrypted World.
  • DDoS Schutz – Was tun, wenn es schnell gehen muss? Recorded: Nov 19 2020 41 mins
    Guido Schaffner, Channel Sales Engineer, NETSCOUT and Alexander Maerz, Consulting Engineer DACH, NETSCOUT
    Zurzeit gibt es verstärkt DDoS Angriffe auf Unternehmen kombiniert mit einer
    Zahlungsaufforderung. Was steckt dahinter? Wie sollte man reagieren?
    Wie kann ich mich – auch kurzfristig – vor möglichen angedrohten oder realen Angriffen wirkungsvoll schützen?
  • DDoS Schutz – Welche Lösung passt zu Anforderung und Risiko? Recorded: Nov 5 2020 50 mins
    Guido Schaffner, Channel Sales Engineer, NETSCOUT and Alexander Maerz, Consulting Engineer DACH, NETSCOUT
    Wir wollen in dem Webinar einen Überblick über einen DDoS Schutz für alle Unternehmen geben.
    Dabei werden die unterschiedlichen Schutz-Möglichkeiten vorgestellt. Wiekann man sich auf Angriffe vorbereiten? Welche der vielfältigen Lösungen passt zu meinem Risiko?
  • THREAT ADVISORY UPDATE: High-Profile DDoS Extortion Campaign Recorded: Oct 23 2020 20 mins
    Tom Bienkowski, Director Product Marketing, Roland Dobbins, Principal Engineer
    Update to Sept 2020 Threat Advisory DDoS Extortion Campaign. Includes review of attack methodology. Attacks have expanded globally from the initial industries of regional banks, stock exchanges, travel agencies, currency exchanges, and, in some cases, their upstream internet transit providers to now inlcude healthcare providers, broadband access ISPs, insurance providers, personal care product manufacturers, regional energy providers, and IT-related vendors.
  • Key Findings from 1st Half 2020 Threat Intelligence Report Recorded: Oct 12 2020 48 mins
    Tom Bienkowski, Director Product Marketing - NETSCOUT and Richard Hummel, Manager of Threat Intelligence - NETSCOUT
    The year is not even over yet, but there’s little doubt 2020 will be one for the history books! Please join the experts from NETSCOUT’s ATLAS Security Engineering & Response Team (ASERT) as we reveal key findings from the 1st Half 2020 Threat Intelligence Report.

    Findings include:
    • Worldwide and regional DDoS attack trends and predictions. (Hint: There was a 25% increase during the pandemic lockdown).
    • The rising complexity of DDoS attacks; a 126% increase in 15+ vector, higher packet-per second, and shorter-lived DDoS attacks.
    • The rise in IoT-based botnets launching DDoS attacks from within our network boundaries.
    • The hidden tax of DDoS attacks that ultimately trickles down to consumers of the internet.
    • Best practices in DDoS attack defense.
  • Ensure Successful Application Migrations to Google Cloud Recorded: Oct 8 2020 49 mins
    Shishir Agrawal, Product Manager, Google Cloud Ray Krug, Director Product Marketing, NETSCOUT Ganesh Palaniappan, Senior Mana
    Companies undergoing digital transformation most likely rely on their IT and SecOps to continuously deploy new services and migrate on-premises workloads across hybrid cloud environments. As Enterprises implement new technology and look to improve connectivity, the complexity of this hybrid cloud environment adds both security and performance challenges to mission-critical applications. It's not enough to isolate a problem to a specific domain; you need to have visibility across the entire hybrid cloud infrastructure.

    In this webinar, you will learn:

    • Real-world examples of how to gain complete visibility into hybrid cloud traffic traversing across Google Cloud environment by leveraging Packet Mirroring feature.

    • What is smart data and how to use it to intelligently and efficiently analyze traffic flows for a contextual view of service, and its' interdependencies end-to-end across the service delivery infrastructure.

    • How to accelerate deployments of services into Google Cloud, while assuring application reliability, availability, responsiveness, and business continuity through NETSCOUT's smart data.
  • THREAT ALERT: High Profile DDoS Extortion Attacks - September 2020 Recorded: Sep 10 2020 13 mins
    Tom Bienkowski, Director Product Marketing - NETSCOUT, Roland Dobbins, Principal Engineer - NETSCOUT
    Starting in mid-August 2020, a relatively prolific threat actor initiated a global campaign of DDoS extortion attacks largely directed towards regional financial and travel-industry targets such as regional banks, stock exchanges, travel agencies, currency exchanges, and, in some cases, their upstream internet transit providers.
    Watch this interview with NETSCOUT experts to learn:
    - Description of attack
    - Collateral Impact
    - Mitigating Factors
    - Recommended Actions
  • DDoS Attacks in 2020 & Best Practices in Defense Recorded: Aug 17 2020 45 mins
    Tom Bienkowski, Director Product Marketing and Richard Hummel, Manager Threat Intelligence
    The years not even over yet, but there’s little doubt 2020 will be a year for the history books. Amid the COVID-19 pandemic, cybersecurity teams gallantly protected their organizations and work/learn-from-home users from a massive uptick in COVID-19 related phishing, ransomware, and DDoS attacks.
    In this session, experts from NETSCOUT’s ATLAS Security Engineering & Response Team (ASERT) will discuss:
    • Worldwide, DDoS attack trends during the 1st half of 2020
    • DDoS attacks designed to restrict remote workforce access to corporate resources
    • Some common misconceptions about DDoS attacks
    • And best practices in DDoS defense
  • Ensure Performance of Telemedicine to Optimize Patient Experience Recorded: Jul 21 2020 44 mins
    Eric Gray, Chief Solutions Architect
    Are you concerned about the delivery and performance of your telemedicine services? Telemedicine is no longer a “nice to have,” but a necessary capability to keep patients and healthcare workers safe and avoid compromising the overall quality of patient care.

    Attend this webinar to get practical steps on how to maintain your telemedicine services and keep them up and running efficiently. In this webinar, we will discuss the challenges of maintaining actionable visibility across complex telemedicine services and workflows given increased demand. In this webinar, NETSCOUT expert Eric Gray, Chief Solutions Architect, will discuss diagnosing the source of issues with telemedicine services for faster resolution:

    1.Before Consultation with Healthcare Provider
    2.During Visit with Healthcare Provider
    3.After Consult with Healthcare Provider
    4.Enabling Technology for Telemedicine Delivery and Support
  • Garantizar la continuidad del negocio para ubicaciones remotas y domésticas Recorded: Apr 20 2020 41 mins
    Damian Miguelez Llamas, Engineer NETSCOUT
    Asegurar la continuidad del negocio protegiendo las VPN. Ahora más que nunca es crítico proteger el acceso VPN de ataques tales como los ataques DDoS. En estos momentos en los que una gran parte de los usuarios están trabajando desde casa, una caída de las VPN resulta en la paralización del negocio. Es probable que después del confinamiento El número de usuarios trabajando en remoto se incremente notablemente con respecto al número que había antes de la situación del COVID-19. Por lo tanto, los accesos VPN son y serán más críticos que nunca y deben protegerse frente a posibles ataques.
  • Ensure Business Continuity by Maximizing Visibility Into Your VPN Services Recorded: Apr 16 2020 31 mins
    NETSCOUT Experts: Paul Barrett, CTO Enterprise, Lewis Sharpe, Enterprise IT Architect
    In NETSCOUT’s Business Continuity webinar series, we are sharing how to ensure the performance, availability, and security of essential business services like the network, VPN, VDI, UC&C, Call Centers, Office365, and other SaaS applications.

    In this second webinar of the series, we will discuss the challenges presented by different VPN architectures when the entire company is working remotely. In this webinar, NETSCOUT experts Paul Barrett, CTO for Enterprise and Lewis Sharpe, Enterprise IT Architect, will discuss:
    •How NETSCOUT’s IT organization is using nGeniusONE to gain the visibility it needs to ensure employees have uninterrupted and unimpaired access to the business services they need to work effectively and efficiently from home.
    •Understanding the usage and performance of VPN links, gaining visibility into which services are being used via VPN, whether the Split VPN rules can be further optimized, and helping remote workers to understand how to use the VPN services available more efficiently.
    •Visibility into the impacts that saturated VPN connections has on UC&C service audio and video quality.
    •Tips for quickly configuring VPN centric views and reports in nGeniusONE
Webcasts for Network and Security Pros
Current DDoS and Cyber Threat strategies, best practices and latest trends.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How To Use Your Network To Fend Off The Latest Cyber Threats
  • Live at: Jan 12 2017 7:30 pm
  • Presented by: John Pescatore,director of emerging security trends,SANS+Paul Bowen,security practitioner, Arbor Networks, Arabella Hallawell
  • From:
Your email has been sent.
or close