Dyn Distributed Denial of Service: Impact & Lessons Learned

CSCSS

Join this presentation to learn the facts about the recent Distributed Denial of Service (DDoS) attack on Dyn. Discover the impact of the attack, and the likelihood of a repeat attack of the same or greater magnitude.  Richard Zaluski, President and CEO of CSCSS and David Swan, Director of the Cyber Intelligence Defence Centre will discuss the causes behind the Internet outages on October 21 and the implications of the attack.
Watch Now

Spotlight

For people with responsibility for corporate security – everyone from CIOs to CISOs and CROs – AI presents two types of risk that change the nature of their jobs. The first is that criminals, bad state actors, unscrupulous competitors, and inside threats will manipulate their companies’ fledgling AI programs. The second risk is that attackers will use AI in a variety of ways to exploit vulnerabilities in their victims’ defenses.


OTHER ON-DEMAND WEBINARS

Spearphishing, Whaling, and Other Targeted Social Engineering Attacks On Your Us

KNOWBE4

Most major enterprise data breaches begin with an attempt to fool a single user on your network. Whether they are targeting top executives, financial decision makers, or IT people who maintain passwords and credentials, today’s cyberattackers often are going after specific individuals in your organization. And as the holiday shopping season begins, these attacks on individuals may become easier – and more frequent.

Know What to Defend Against: Anatomy of a Network Attack

You can’t secure your IT infrastructure if you don’t know what’s attacking you and how. In this session, Alert Logic will share information on the latest network security trends, including the types of activity that the Alert Logic research team sees from our more than 2700 customers, and data on the origins and targets of attacks.

"The Value of Adopting and Improving Security Maturity Models"

Security maturity models can take a variety of forms; they can be embedded on-premises or delivered as a managed third-party service. As such modeling has advanced over the past decade, the need for improved detection and mitigation of attacks has extended well beyond large businesses. A burgeoning underground populated by sophisticated data thieves, state-sponsored hacking collectives, and ideologically motivated hacktivists, is engaged in the systematic plundering and disruption of IT operations at companies of all sizes. This webcast will outline the drivers behind this imperative, summarize the robust approaches security vendors are adopting, and lay out a roadmap for shoring up the security postures of organizations, whatever their size.

Stay Secure During the Holiday Season

"On Cyber Monday, your organization’s employees will return from the Thanksgiving weekend, ready to kick off the online holiday shopping season – from their desks and devices. Last year over 500+ million identities were exposed via breaches. And with malware and phishing also in the news, join us to find out how you can protect not only your business but your employees’ personal information as they shop-from-work during the season. Learn more about the proactive steps you can do for protection including: · How you are the first line of defense when it comes to protection – password management and user access · When and how data should be encrypted · How to fight social engineered exploits: malicious web sites, malicious look-alike mobile apps and deceptive emails "

Spotlight

For people with responsibility for corporate security – everyone from CIOs to CISOs and CROs – AI presents two types of risk that change the nature of their jobs. The first is that criminals, bad state actors, unscrupulous competitors, and inside threats will manipulate their companies’ fledgling AI programs. The second risk is that attackers will use AI in a variety of ways to exploit vulnerabilities in their victims’ defenses.

resources