Defending against malicious bot attacks: Where, when, and how
Thursday, May 31, 2018
Duration: Approximately 60 minutes.
Questions? Please send email to
Interact with experts online, for free.Sign in to Register
Today, malicious bots represent a significant threat to organizations of all sizes. According to a recent report, bots (both good and bad) compose over half of all internet traffic today. As more vulnerable and unprotected IoT devices are connected to the internet, experts expect this threat to continue to grow.
Malicious bots were responsible for the world’s largest DDoS attacks on record, and bad actors are likely already using AI to power their bots. This webcast will help you understand the risk to your networks, websites, applications, APIs, and data and outline how you can mitigate the growing risk posed by malicious bots now and in the future.
Join this webcast with cybersecurity experts, Stephen Gates and Allan Liska, where you’ll learn:
Stephen Gates, Edge Security Evangelist & SME at Oracle Dyn
Stephen brings more than 25 years of computer networking and information security experience to his role at Oracle Dyn. He helps service providers, hosting providers, and enterprises solve their DDoS and web application security problems. He has an extensive background in the deployment and implementation of on-premises and next-generation cloud security solutions.
He has a Master’s Degree in Information Security and Technology Management and is in demand as a thought leader and presenter at RSA, Black Hat, SecureWorld, SANs, Infosecurity, IANS, ISSA, InfraGard, ISACA, among other industry events.
Allan Liska, Threat Intelligence Architect at Recorded Future
Allan Liska is an intelligence architect at Recorded Future. Allan has more than 15 years’ experience in the world of security and has worked as both a security practitioner and an ethical hacker. Through his work at Symantec, iSIGHT Partners, FireEye, and Recorded Future, Allan has helped countless organizations improve their security posture using more effective intelligence. He is the author of The Practice of Network Security, Building an Intelligence-Led Security Program, and Securing NTP: A Quickstart Guide and the coauthor of DNS Security: Defending the Domain Name System and Ransomware: Defending Against Digital Extortion.